mirror of
https://github.com/tornadocash/tornado-anonymity-mining.git
synced 2024-11-01 08:05:19 +01:00
862 lines
36 KiB
JavaScript
862 lines
36 KiB
JavaScript
/* global artifacts, web3, contract */
|
|
require('chai').use(require('bn-chai')(web3.utils.BN)).use(require('chai-as-promised')).should()
|
|
|
|
const fs = require('fs')
|
|
const { toBN } = require('web3-utils')
|
|
const { takeSnapshot, revertSnapshot, mineBlock } = require('../scripts/ganacheHelper')
|
|
const tornConfig = require('torn-token')
|
|
const RLP = require('rlp')
|
|
const Controller = require('../src/controller')
|
|
const Account = require('../src/account')
|
|
const Note = require('../src/note')
|
|
const {
|
|
toFixedHex,
|
|
poseidonHash2,
|
|
packEncryptedMessage,
|
|
unpackEncryptedMessage,
|
|
getExtWithdrawArgsHash,
|
|
} = require('../src/utils')
|
|
const { getEncryptionPublicKey } = require('eth-sig-util')
|
|
const Miner = artifacts.require('MinerMock')
|
|
const TornadoTrees = artifacts.require('TornadoTreesMock')
|
|
const Torn = artifacts.require('TORNMock')
|
|
const RewardSwap = artifacts.require('RewardSwapMock')
|
|
const RewardVerifier = artifacts.require('RewardVerifier')
|
|
const WithdrawVerifier = artifacts.require('WithdrawVerifier')
|
|
const TreeUpdateVerifier = artifacts.require('TreeUpdateVerifier')
|
|
const provingKeys = {
|
|
rewardCircuit: require('../build/circuits/Reward.json'),
|
|
withdrawCircuit: require('../build/circuits/Withdraw.json'),
|
|
treeUpdateCircuit: require('../build/circuits/TreeUpdate.json'),
|
|
rewardProvingKey: fs.readFileSync('./build/circuits/Reward_proving_key.bin').buffer,
|
|
withdrawProvingKey: fs.readFileSync('./build/circuits/Withdraw_proving_key.bin').buffer,
|
|
treeUpdateProvingKey: fs.readFileSync('./build/circuits/TreeUpdate_proving_key.bin').buffer,
|
|
}
|
|
const MerkleTree = require('fixed-merkle-tree')
|
|
const Hasher2 = artifacts.require('Hasher2')
|
|
const Hasher3 = artifacts.require('Hasher3')
|
|
|
|
// Set time to beginning of a second
|
|
async function timeReset() {
|
|
const delay = 1000 - new Date().getMilliseconds()
|
|
await new Promise((resolve) => setTimeout(resolve, delay))
|
|
await mineBlock()
|
|
}
|
|
|
|
async function getNextAddr(sender, offset = 0) {
|
|
const nonce = await web3.eth.getTransactionCount(sender)
|
|
return (
|
|
'0x' +
|
|
web3.utils
|
|
.sha3(RLP.encode([sender, Number(nonce) + Number(offset)]))
|
|
.slice(12)
|
|
.substring(14)
|
|
)
|
|
}
|
|
|
|
async function registerNote(note, tornadoTrees) {
|
|
await tornadoTrees.setBlockNumber(note.depositBlock)
|
|
await tornadoTrees.registerDeposit(note.instance, toFixedHex(note.commitment))
|
|
|
|
await tornadoTrees.setBlockNumber(note.withdrawalBlock)
|
|
await tornadoTrees.registerWithdrawal(note.instance, toFixedHex(note.nullifierHash))
|
|
|
|
return {
|
|
depositLeaf: {
|
|
instance: note.instance,
|
|
hash: toFixedHex(note.commitment),
|
|
block: toFixedHex(note.depositBlock),
|
|
},
|
|
withdrawalLeaf: {
|
|
instance: note.instance,
|
|
hash: toFixedHex(note.nullifierHash),
|
|
block: toFixedHex(note.withdrawalBlock),
|
|
},
|
|
}
|
|
}
|
|
|
|
contract('Miner', (accounts) => {
|
|
let miner
|
|
let torn
|
|
let rewardSwap
|
|
let tornadoTrees
|
|
const tornado = '0x3535249DFBb73e21c2aCDC6e42796d920A0379b7'
|
|
const tornCap = toBN(tornConfig.torn.cap)
|
|
const miningCap = toBN(tornConfig.torn.distribution.miningV2.amount)
|
|
const initialTornBalance = toBN(tornConfig.miningV2.initialBalance)
|
|
const RATE = toBN(10)
|
|
const amount = toBN(15)
|
|
// eslint-disable-next-line no-unused-vars
|
|
const sender = accounts[0]
|
|
const recipient = accounts[1]
|
|
// eslint-disable-next-line no-unused-vars
|
|
const relayer = accounts[2]
|
|
const levels = 20
|
|
let snapshotId
|
|
const AnotherWeb3 = require('web3')
|
|
let contract
|
|
let controller
|
|
const note1 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 10 + 4 * 60 * 24,
|
|
})
|
|
const note2 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 10 + 2 * 4 * 60 * 24,
|
|
})
|
|
const note3 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 10 + 3 * 4 * 60 * 24,
|
|
})
|
|
const note = note1
|
|
const notes = [note1, note2, note3]
|
|
|
|
const emptyTree = new MerkleTree(levels, [], { hashFunction: poseidonHash2 })
|
|
const privateKey = web3.eth.accounts.create().privateKey.slice(2)
|
|
const publicKey = getEncryptionPublicKey(privateKey)
|
|
const operator = accounts[0]
|
|
const thirtyDays = 30 * 24 * 3600
|
|
const poolWeight = 1e11
|
|
const governance = accounts[9]
|
|
|
|
before(async () => {
|
|
const rewardVerifier = await RewardVerifier.new()
|
|
const withdrawVerifier = await WithdrawVerifier.new()
|
|
const treeUpdateVerifier = await TreeUpdateVerifier.new()
|
|
const hasher2 = await Hasher2.new()
|
|
const hasher3 = await Hasher3.new()
|
|
tornadoTrees = await TornadoTrees.new(operator, hasher2.address, hasher3.address, levels)
|
|
const swapExpectedAddr = await getNextAddr(accounts[0], 1)
|
|
const minerExpectedAddr = await getNextAddr(accounts[0], 2)
|
|
torn = await Torn.new(sender, thirtyDays, [
|
|
{ to: swapExpectedAddr, amount: miningCap.toString() },
|
|
{ to: sender, amount: tornCap.sub(miningCap).toString() },
|
|
])
|
|
rewardSwap = await RewardSwap.new(
|
|
torn.address,
|
|
minerExpectedAddr,
|
|
miningCap.toString(),
|
|
initialTornBalance.toString(),
|
|
poolWeight,
|
|
)
|
|
miner = await Miner.new(
|
|
rewardSwap.address,
|
|
governance,
|
|
tornadoTrees.address,
|
|
[rewardVerifier.address, withdrawVerifier.address, treeUpdateVerifier.address],
|
|
toFixedHex(emptyTree.root()),
|
|
[{ instance: tornado, value: RATE.toString() }],
|
|
)
|
|
|
|
const depositData = []
|
|
const withdrawalData = []
|
|
for (const note of notes) {
|
|
const { depositLeaf, withdrawalLeaf } = await registerNote(note, tornadoTrees)
|
|
depositData.push(depositLeaf)
|
|
withdrawalData.push(withdrawalLeaf)
|
|
}
|
|
|
|
await tornadoTrees.updateRoots(depositData, withdrawalData)
|
|
|
|
const anotherWeb3 = new AnotherWeb3(web3.currentProvider)
|
|
contract = new anotherWeb3.eth.Contract(miner.abi, miner.address)
|
|
const tornadoTreesContract = new anotherWeb3.eth.Contract(tornadoTrees.abi, tornadoTrees.address)
|
|
controller = new Controller({
|
|
contract,
|
|
tornadoTreesContract,
|
|
merkleTreeHeight: levels,
|
|
provingKeys,
|
|
})
|
|
await controller.init()
|
|
snapshotId = await takeSnapshot()
|
|
})
|
|
|
|
beforeEach(async () => {
|
|
await timeReset()
|
|
})
|
|
|
|
describe('#constructor', () => {
|
|
it('should initialize', async () => {
|
|
const tokenFromContract = await rewardSwap.torn()
|
|
tokenFromContract.should.be.equal(torn.address)
|
|
|
|
const rewardSwapFromContract = await miner.rewardSwap()
|
|
rewardSwapFromContract.should.be.equal(rewardSwap.address)
|
|
|
|
const rateFromContract = await miner.rates(tornado)
|
|
rateFromContract.should.be.eq.BN(RATE)
|
|
})
|
|
})
|
|
|
|
describe('#Note.fromString()', () => {
|
|
it('should work', () => {
|
|
const note = Note.fromString(
|
|
'tornado-eth-1-1-0x3a1f1e0e10b22b15ed8208bc810dd5564d564fd7930874db4d7d58870deb72978fb5fccae2f1554cac71e2cff85f9c8908295647adf2b443a4dd93635d8d',
|
|
'0x8b3f5393bA08c24cc7ff5A66a832562aAB7bC95f',
|
|
10,
|
|
15,
|
|
)
|
|
note.secret.should.be.eq.BN(toBN('0x8d5d6393dda443b4f2ad47562908899c5ff8cfe271ac4c55f1e2cafcb58f97'))
|
|
note.nullifier.should.be.eq.BN(toBN('0x72eb0d87587d4ddb740893d74f564d56d50d81bc0882ed152bb2100e1e1f3a'))
|
|
note.nullifierHash.should.be.eq.BN(
|
|
toBN('0x33403728f37e70a275acac2eb8297a3231698f9003838ec4cd7115ee2693943'),
|
|
)
|
|
note.commitment.should.be.eq.BN(
|
|
toBN('0x1a08fd10dae9806ce25b62582e44d237c1cb9f8d6bf73e756f18d0e5d7a7351a'),
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('#Account', () => {
|
|
it('should throw on negative amount', () => {
|
|
;(() => new Account({ amount: toBN(-1) })).should.throw('Cannot create an account with negative amount')
|
|
})
|
|
})
|
|
|
|
describe('#encrypt', () => {
|
|
it('should work', () => {
|
|
const account = new Account()
|
|
const encryptedAccount = account.encrypt(publicKey)
|
|
const encryptedMessage = packEncryptedMessage(encryptedAccount)
|
|
const unpackedMessage = unpackEncryptedMessage(encryptedMessage)
|
|
const account2 = Account.decrypt(privateKey, unpackedMessage)
|
|
|
|
account.amount.should.be.eq.BN(account2.amount)
|
|
account.secret.should.be.eq.BN(account2.secret)
|
|
account.nullifier.should.be.eq.BN(account2.nullifier)
|
|
account.commitment.should.be.eq.BN(account2.commitment)
|
|
})
|
|
})
|
|
|
|
describe('#reward', () => {
|
|
it('should work', async () => {
|
|
const zeroAccount = new Account()
|
|
const accountCount = await miner.accountCount()
|
|
|
|
zeroAccount.amount.should.be.eq.BN(toBN(0))
|
|
|
|
const rewardNullifierBefore = await miner.rewardNullifiers(toFixedHex(note.rewardNullifier))
|
|
rewardNullifierBefore.should.be.false
|
|
const accountNullifierBefore = await miner.accountNullifiers(toFixedHex(zeroAccount.nullifier))
|
|
accountNullifierBefore.should.be.false
|
|
|
|
const { proof, args, account } = await controller.reward({ account: zeroAccount, note, publicKey })
|
|
const { logs } = await miner.reward(proof, args)
|
|
logs[0].event.should.be.equal('NewAccount')
|
|
logs[0].args.commitment.should.be.equal(toFixedHex(account.commitment))
|
|
logs[0].args.index.should.be.eq.BN(accountCount)
|
|
|
|
logs[0].args.nullifier.should.be.equal(toFixedHex(zeroAccount.nullifierHash))
|
|
|
|
const encryptedAccount = logs[0].args.encryptedAccount
|
|
const account2 = Account.decrypt(privateKey, unpackEncryptedMessage(encryptedAccount))
|
|
account.amount.should.be.eq.BN(account2.amount)
|
|
account.secret.should.be.eq.BN(account2.secret)
|
|
account.nullifier.should.be.eq.BN(account2.nullifier)
|
|
account.commitment.should.be.eq.BN(account2.commitment)
|
|
|
|
const accountCountAfter = await miner.accountCount()
|
|
accountCountAfter.should.be.eq.BN(accountCount.add(toBN(1)))
|
|
const rootAfter = await miner.getLastAccountRoot()
|
|
rootAfter.should.be.equal(args.account.outputRoot)
|
|
const rewardNullifierAfter = await miner.rewardNullifiers(toFixedHex(note.rewardNullifier))
|
|
rewardNullifierAfter.should.be.true
|
|
const accountNullifierAfter = await miner.accountNullifiers(toFixedHex(zeroAccount.nullifierHash))
|
|
accountNullifierAfter.should.be.true
|
|
|
|
account.amount.should.be.eq.BN(toBN(note.withdrawalBlock - note.depositBlock).mul(RATE))
|
|
})
|
|
|
|
it('should send fee to relayer', async () => {
|
|
const fee = toBN(3)
|
|
const amount = toBN(44)
|
|
const delta = toBN('10000') // max floating point error
|
|
|
|
const claim = await controller.reward({ account: new Account(), note, publicKey, relayer, fee })
|
|
await timeReset()
|
|
let expectedFeeInTorn = await rewardSwap.getExpectedReturn(fee)
|
|
let relayerBalanceBefore = await torn.balanceOf(relayer)
|
|
await miner.reward(claim.proof, claim.args)
|
|
let relayerBalanceAfter = await torn.balanceOf(relayer)
|
|
relayerBalanceAfter.should.be.eq.BN(relayerBalanceBefore.add(expectedFeeInTorn))
|
|
|
|
const withdrawal = await controller.withdraw({
|
|
account: claim.account,
|
|
amount,
|
|
recipient,
|
|
publicKey,
|
|
relayer,
|
|
fee,
|
|
})
|
|
await timeReset()
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
expectedFeeInTorn = await rewardSwap.getExpectedReturn(amount.add(fee))
|
|
expectedFeeInTorn = expectedFeeInTorn.sub(expectedAmountInTorn)
|
|
|
|
relayerBalanceBefore = await torn.balanceOf(relayer)
|
|
const recipientBalanceBefore = await torn.balanceOf(recipient)
|
|
await miner.withdraw(withdrawal.proof, withdrawal.args)
|
|
const recipientBalanceAfter = await torn.balanceOf(recipient)
|
|
relayerBalanceAfter = await torn.balanceOf(relayer)
|
|
|
|
recipientBalanceAfter.should.be.eq.BN(recipientBalanceBefore.add(expectedAmountInTorn))
|
|
relayerBalanceAfter.sub(relayerBalanceBefore).sub(expectedFeeInTorn).should.be.lt.BN(delta)
|
|
})
|
|
|
|
it('should use fallback with outdated tree', async () => {
|
|
const { proof, args, account } = await controller.reward({ account: new Account(), note, publicKey })
|
|
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
await miner.reward(proof, args).should.be.rejectedWith('Outdated account merkle root')
|
|
|
|
const update = await controller.treeUpdate(account.commitment)
|
|
await miner.reward(proof, args, update.proof, update.args)
|
|
|
|
const rootAfter = await miner.getLastAccountRoot()
|
|
rootAfter.should.be.equal(update.args.newRoot)
|
|
})
|
|
|
|
it('should reject with incorrect insert position', async () => {
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
const { proof, args } = await controller.reward({ account: new Account(), note, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
let fakeIndex = toBN(args.account.outputPathIndices).sub(toBN('1'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
fakeIndex = toBN(args.account.outputPathIndices).add(toBN('1'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
fakeIndex = toBN(args.account.outputPathIndices).add(toBN('10000000000000000000000000'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
await miner.reward(proof, args).should.be.fulfilled
|
|
})
|
|
|
|
it('should reject with incorrect external data hash', async () => {
|
|
const { proof, args } = await controller.reward({ account: new Account(), note, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.extDataHash = toFixedHex('0xdeadbeef')
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
malformedArgs.extDataHash = toFixedHex('0x00')
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
await miner.reward(proof, args).should.be.fulfilled
|
|
})
|
|
|
|
it('should prevent fee overflow', async () => {
|
|
const { proof, args } = await controller.reward({ account: new Account(), note, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.fee = toFixedHex(toBN(2).pow(toBN(248)))
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Fee value out of range')
|
|
|
|
malformedArgs.fee = toFixedHex(toBN(2).pow(toBN(256)).sub(toBN(1)))
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Fee value out of range')
|
|
|
|
await miner.reward(proof, args).should.be.fulfilled
|
|
})
|
|
|
|
it('should reject with invalid reward rate', async () => {
|
|
const { proof, args } = await controller.reward({ account: new Account(), note, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.instance = miner.address
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Invalid reward rate')
|
|
|
|
malformedArgs.rate = toFixedHex(toBN(9999999))
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Invalid reward rate')
|
|
|
|
malformedArgs.instance = toFixedHex('0x00', 20)
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Invalid reward rate')
|
|
|
|
const anotherInstance = accounts[5]
|
|
const rate = toBN(1000)
|
|
await miner.setRates([{ instance: anotherInstance, value: rate.toString() }], { from: governance })
|
|
|
|
malformedArgs.instance = anotherInstance
|
|
malformedArgs.rate = toFixedHex(rate)
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Invalid reward proof')
|
|
|
|
await miner.reward(proof, args).should.be.fulfilled
|
|
})
|
|
|
|
it('should reject for double spend', async () => {
|
|
let { proof, args } = await controller.reward({ account: new Account(), note, publicKey })
|
|
await miner.reward(proof, args).should.be.fulfilled
|
|
;({ proof, args } = await controller.reward({ account: new Account(), note, publicKey }))
|
|
await miner.reward(proof, args).should.be.rejectedWith('Reward has been already spent')
|
|
})
|
|
|
|
it('should reject for invalid proof', async () => {
|
|
const claim1 = await controller.reward({ account: new Account(), note, publicKey })
|
|
const claim2 = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
|
|
await miner.reward(claim2.proof, claim1.args).should.be.rejectedWith('Invalid reward proof')
|
|
})
|
|
|
|
it('should reject for invalid account root', async () => {
|
|
const account1 = new Account()
|
|
const account2 = new Account()
|
|
const account3 = new Account()
|
|
|
|
const fakeTree = new MerkleTree(
|
|
levels,
|
|
[account1.commitment, account2.commitment, account3.commitment],
|
|
{ hashFunction: poseidonHash2 },
|
|
)
|
|
const { proof, args } = await controller.reward({ account: account1, note, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
malformedArgs.account.inputRoot = toFixedHex(fakeTree.root())
|
|
await miner.reward(proof, malformedArgs).should.be.rejectedWith('Invalid account root')
|
|
})
|
|
|
|
it('should reject with outdated account root (treeUpdate proof validation)', async () => {
|
|
const { proof, args, account } = await controller.reward({ account: new Account(), note, publicKey })
|
|
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
await miner.reward(proof, args).should.be.rejectedWith('Outdated account merkle root')
|
|
|
|
const update = await controller.treeUpdate(account.commitment)
|
|
|
|
const tmp2 = await controller.reward({ account: new Account(), note: note3, publicKey })
|
|
await miner.reward(tmp2.proof, tmp2.args)
|
|
|
|
await miner
|
|
.reward(proof, args, update.proof, update.args)
|
|
.should.be.rejectedWith('Outdated tree update merkle root')
|
|
})
|
|
|
|
it('should reject for incorrect commitment (treeUpdate proof validation)', async () => {
|
|
const claim = await controller.reward({ account: new Account(), note, publicKey })
|
|
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
await miner.reward(claim.proof, claim.args).should.be.rejectedWith('Outdated account merkle root')
|
|
const anotherAccount = new Account()
|
|
const update = await controller.treeUpdate(anotherAccount.commitment)
|
|
|
|
await miner
|
|
.reward(claim.proof, claim.args, update.proof, update.args)
|
|
.should.be.rejectedWith('Incorrect commitment inserted')
|
|
|
|
claim.args.account.outputCommitment = update.args.leaf
|
|
await miner
|
|
.reward(claim.proof, claim.args, update.proof, update.args)
|
|
.should.be.rejectedWith('Invalid reward proof')
|
|
})
|
|
|
|
it('should reject for incorrect account insert index (treeUpdate proof validation)', async () => {
|
|
const { proof, args, account } = await controller.reward({ account: new Account(), note, publicKey })
|
|
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
await miner.reward(proof, args).should.be.rejectedWith('Outdated account merkle root')
|
|
|
|
const update = await controller.treeUpdate(account.commitment)
|
|
const malformedArgs = JSON.parse(JSON.stringify(update.args))
|
|
|
|
let fakeIndex = toBN(update.args.pathIndices).sub(toBN('1'))
|
|
malformedArgs.pathIndices = toFixedHex(fakeIndex)
|
|
|
|
await miner
|
|
.reward(proof, args, update.proof, malformedArgs)
|
|
.should.be.rejectedWith('Incorrect account insert index')
|
|
})
|
|
|
|
it('should reject for invalid tree update proof (treeUpdate proof validation)', async () => {
|
|
const { proof, args, account } = await controller.reward({ account: new Account(), note, publicKey })
|
|
|
|
const tmp = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmp.proof, tmp.args)
|
|
|
|
await miner.reward(proof, args).should.be.rejectedWith('Outdated account merkle root')
|
|
|
|
const update = await controller.treeUpdate(account.commitment)
|
|
await miner
|
|
.reward(proof, args, tmp.proof, update.args)
|
|
.should.be.rejectedWith('Invalid tree update proof')
|
|
})
|
|
|
|
it('should work with outdated deposit or withdrawal merkle root', async () => {
|
|
const note0 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 55,
|
|
})
|
|
const note4 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 55,
|
|
})
|
|
const note5 = new Note({
|
|
instance: tornado,
|
|
depositBlock: 10,
|
|
withdrawalBlock: 65,
|
|
})
|
|
|
|
const claim1 = await controller.reward({ account: new Account(), note: note3, publicKey })
|
|
|
|
const note4Leaves = await registerNote(note4, tornadoTrees)
|
|
await tornadoTrees.updateRoots([note4Leaves.depositLeaf], [note4Leaves.withdrawalLeaf])
|
|
|
|
const claim2 = await controller.reward({ account: new Account(), note: note4, publicKey })
|
|
|
|
for (let i = 0; i < 9; i++) {
|
|
const note0Leaves = await registerNote(note0, tornadoTrees)
|
|
await tornadoTrees.updateRoots([note0Leaves.depositLeaf], [note0Leaves.withdrawalLeaf])
|
|
}
|
|
|
|
await miner.reward(claim1.proof, claim1.args).should.be.rejectedWith('Incorrect deposit tree root')
|
|
await miner.reward(claim2.proof, claim2.args).should.be.fulfilled
|
|
|
|
const note5Leaves = await registerNote(note5, tornadoTrees)
|
|
await tornadoTrees.updateRoots([note5Leaves.depositLeaf], [note5Leaves.withdrawalLeaf])
|
|
|
|
const claim3 = await controller.reward({ account: new Account(), note: note5, publicKey })
|
|
await miner.reward(claim3.proof, claim3.args).should.be.fulfilled
|
|
})
|
|
})
|
|
|
|
describe('#withdraw', () => {
|
|
let proof, args, account
|
|
// prettier-ignore
|
|
beforeEach(async () => {
|
|
({ proof, args, account } = await controller.reward({ account: new Account(), note, publicKey }))
|
|
await miner.reward(proof, args)
|
|
})
|
|
|
|
it('should work', async () => {
|
|
const accountNullifierBefore = await miner.accountNullifiers(toFixedHex(account.nullifierHash))
|
|
accountNullifierBefore.should.be.false
|
|
|
|
const accountCount = await miner.accountCount()
|
|
const withdrawSnark = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
await timeReset()
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const { logs } = await miner.withdraw(withdrawSnark.proof, withdrawSnark.args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
|
|
const accountCountAfter = await miner.accountCount()
|
|
accountCountAfter.should.be.eq.BN(accountCount.add(toBN(1)))
|
|
const rootAfter = await miner.getLastAccountRoot()
|
|
rootAfter.should.be.equal(withdrawSnark.args.account.outputRoot)
|
|
const accountNullifierAfter = await miner.accountNullifiers(toFixedHex(account.nullifierHash))
|
|
accountNullifierAfter.should.be.true
|
|
|
|
logs[0].event.should.be.equal('NewAccount')
|
|
logs[0].args.commitment.should.be.equal(toFixedHex(withdrawSnark.account.commitment))
|
|
logs[0].args.index.should.be.eq.BN(accountCount)
|
|
logs[0].args.nullifier.should.be.equal(toFixedHex(account.nullifierHash))
|
|
|
|
const encryptedAccount = logs[0].args.encryptedAccount
|
|
const account2 = Account.decrypt(privateKey, unpackEncryptedMessage(encryptedAccount))
|
|
withdrawSnark.account.amount.should.be.eq.BN(account2.amount)
|
|
withdrawSnark.account.secret.should.be.eq.BN(account2.secret)
|
|
withdrawSnark.account.nullifier.should.be.eq.BN(account2.nullifier)
|
|
withdrawSnark.account.commitment.should.be.eq.BN(account2.commitment)
|
|
})
|
|
|
|
it('should reject for double spend', async () => {
|
|
const withdrawSnark = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
await timeReset()
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(withdrawSnark.proof, withdrawSnark.args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
|
|
await miner
|
|
.withdraw(withdrawSnark.proof, withdrawSnark.args)
|
|
.should.be.rejectedWith('Outdated account state')
|
|
})
|
|
|
|
it('should reject with incorrect insert position', async () => {
|
|
const { proof, args } = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
let fakeIndex = toBN(args.account.outputPathIndices).sub(toBN('1'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
fakeIndex = toBN(args.account.outputPathIndices).add(toBN('1'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
fakeIndex = toBN(args.account.outputPathIndices).add(toBN('10000000000000000000000000'))
|
|
malformedArgs.account.outputPathIndices = toFixedHex(fakeIndex)
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect account insert index')
|
|
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(proof, args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
|
|
it('should reject with incorrect external data hash', async () => {
|
|
const { proof, args } = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.extDataHash = toFixedHex('0xdeadbeef')
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
malformedArgs.extDataHash = toFixedHex('0x00')
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(proof, args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
|
|
it('should reject for amount overflow', async () => {
|
|
const { proof, args } = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.amount = toFixedHex(toBN(2).pow(toBN(248)))
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Amount value out of range')
|
|
|
|
malformedArgs.amount = toFixedHex(toBN(2).pow(toBN(256)).sub(toBN(1)))
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Amount value out of range')
|
|
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(proof, args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
|
|
it('should reject for fee overflow', async () => {
|
|
const fee = account.amount.add(toBN(5))
|
|
const fakeAmount = toBN(-5)
|
|
const { proof, args } = await controller.withdraw({
|
|
account,
|
|
amount: fakeAmount,
|
|
recipient,
|
|
publicKey,
|
|
fee,
|
|
})
|
|
await miner.withdraw(proof, args).should.be.rejectedWith('Amount should be greater than fee')
|
|
})
|
|
|
|
it('should reject for unfair amount', async () => {
|
|
const fee = toBN(3)
|
|
const amountToWithdraw = amount.sub(fee)
|
|
const { proof, args } = await controller.withdraw({
|
|
account,
|
|
amount: amountToWithdraw,
|
|
recipient,
|
|
publicKey,
|
|
})
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.amount = toFixedHex(amountToWithdraw.add(amountToWithdraw))
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Invalid withdrawal proof')
|
|
|
|
await timeReset()
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amountToWithdraw)
|
|
await miner.withdraw(proof, args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
|
|
it('can use fallback with outdated tree', async () => {
|
|
const tmpReward = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmpReward.proof, tmpReward.args)
|
|
|
|
const withdrawal = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
|
|
const tmpWithdraw = await controller.withdraw({
|
|
account: tmpReward.account,
|
|
amount,
|
|
recipient,
|
|
publicKey,
|
|
})
|
|
await miner.withdraw(tmpWithdraw.proof, tmpWithdraw.args)
|
|
|
|
await miner
|
|
.withdraw(withdrawal.proof, withdrawal.args)
|
|
.should.be.rejectedWith('Outdated account merkle root')
|
|
|
|
const update = await controller.treeUpdate(withdrawal.account.commitment)
|
|
await timeReset()
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(withdrawal.proof, withdrawal.args, update.proof, update.args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
|
|
const rootAfter = await miner.getLastAccountRoot()
|
|
rootAfter.should.be.equal(update.args.newRoot)
|
|
})
|
|
|
|
it('should reject for invalid proof', async () => {
|
|
const tmpReward = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(tmpReward.proof, tmpReward.args)
|
|
|
|
const withdrawal = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
const tmpWithdraw = await controller.withdraw({
|
|
account: tmpReward.account,
|
|
amount,
|
|
recipient,
|
|
publicKey,
|
|
})
|
|
|
|
await miner
|
|
.withdraw(tmpWithdraw.proof, withdrawal.args)
|
|
.should.be.rejectedWith('Invalid withdrawal proof')
|
|
})
|
|
|
|
it('should reject for malformed relayer and recipient address and fee', async () => {
|
|
const fakeRelayer = accounts[6]
|
|
const fakeRecipient = accounts[7]
|
|
const fee = 12
|
|
const fakeFee = 123
|
|
const { proof, args } = await controller.withdraw({
|
|
account,
|
|
amount,
|
|
recipient,
|
|
publicKey,
|
|
fee,
|
|
relayer,
|
|
})
|
|
const malformedArgs = JSON.parse(JSON.stringify(args))
|
|
|
|
malformedArgs.extData.recipient = fakeRecipient
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
malformedArgs.extData.recipient = recipient
|
|
malformedArgs.extData.relayer = fakeRelayer
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
malformedArgs.extData.relayer = relayer
|
|
malformedArgs.extData.fee = fakeFee
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Incorrect external data hash')
|
|
|
|
const extDataHash = getExtWithdrawArgsHash({
|
|
fee: fakeFee,
|
|
recipient: fakeRecipient,
|
|
relayer: fakeRelayer,
|
|
encryptedAccount: malformedArgs.extData.encryptedAccount,
|
|
})
|
|
malformedArgs.extData.fee = fakeFee
|
|
malformedArgs.extData.relayer = fakeRelayer
|
|
malformedArgs.extData.recipient = fakeRecipient
|
|
malformedArgs.extDataHash = extDataHash
|
|
await miner.withdraw(proof, malformedArgs).should.be.rejectedWith('Invalid withdrawal proof')
|
|
|
|
await timeReset()
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(proof, args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
})
|
|
|
|
describe('#batchReward', () => {
|
|
it('should work', async () => {
|
|
let account = new Account()
|
|
const claim = await controller.reward({ account, note, publicKey })
|
|
await miner.reward(claim.proof, claim.args)
|
|
|
|
const { proofs, args } = await controller.batchReward({
|
|
account: claim.account,
|
|
notes: notes.slice(1),
|
|
publicKey,
|
|
})
|
|
await miner.batchReward(args)
|
|
|
|
account = proofs.slice(-1)[0].account
|
|
const amount = toBN(55)
|
|
const rewardSnark = await controller.withdraw({ account, amount, recipient, publicKey })
|
|
await timeReset()
|
|
const balanceBefore = await torn.balanceOf(recipient)
|
|
const expectedAmountInTorn = await rewardSwap.getExpectedReturn(amount)
|
|
await miner.withdraw(rewardSnark.proof, rewardSnark.args)
|
|
const balanceAfter = await torn.balanceOf(recipient)
|
|
balanceAfter.should.be.eq.BN(balanceBefore.add(expectedAmountInTorn))
|
|
})
|
|
})
|
|
|
|
describe('#isKnownAccountRoot', () => {
|
|
it('should work', async () => {
|
|
const claim1 = await controller.reward({ account: new Account(), note: note1, publicKey })
|
|
await miner.reward(claim1.proof, claim1.args)
|
|
|
|
const claim2 = await controller.reward({ account: new Account(), note: note2, publicKey })
|
|
await miner.reward(claim2.proof, claim2.args)
|
|
|
|
const tree = new MerkleTree(levels, [], { hashFunction: poseidonHash2 })
|
|
await miner.isKnownAccountRoot(toFixedHex(tree.root()), 0).should.eventually.be.true
|
|
|
|
tree.insert(claim1.account.commitment)
|
|
await miner.isKnownAccountRoot(toFixedHex(tree.root()), 1).should.eventually.be.true
|
|
|
|
tree.insert(claim2.account.commitment)
|
|
await miner.isKnownAccountRoot(toFixedHex(tree.root()), 2).should.eventually.be.true
|
|
|
|
await miner.isKnownAccountRoot(toFixedHex(tree.root()), 1).should.eventually.be.false
|
|
await miner.isKnownAccountRoot(toFixedHex(tree.root()), 5).should.eventually.be.false
|
|
await miner.isKnownAccountRoot(toFixedHex(1234), 1).should.eventually.be.false
|
|
await miner.isKnownAccountRoot(toFixedHex(0), 0).should.eventually.be.false
|
|
await miner.isKnownAccountRoot(toFixedHex(0), 5).should.eventually.be.false
|
|
})
|
|
})
|
|
|
|
describe('#setRates', () => {
|
|
it('should reject for invalid rates', async () => {
|
|
const bigNum = toBN(2).pow(toBN(128))
|
|
await miner
|
|
.setRates([{ instance: tornado, value: bigNum.toString() }], { from: governance })
|
|
.should.be.rejectedWith('Incorrect rate')
|
|
})
|
|
})
|
|
|
|
describe('#setVerifiers', () => {
|
|
it('onlyGovernance can set new verifiers', async () => {
|
|
const verifiers = [
|
|
'0x0000000000000000000000000000000000000001',
|
|
'0x0000000000000000000000000000000000000002',
|
|
'0x0000000000000000000000000000000000000003',
|
|
]
|
|
await miner.setVerifiers(verifiers).should.be.rejectedWith('Only governance can perform this action')
|
|
await miner.setVerifiers(verifiers, { from: governance })
|
|
|
|
const rewardVerifier = await miner.rewardVerifier()
|
|
rewardVerifier.should.be.equal(verifiers[0])
|
|
const withdrawVerifier = await miner.withdrawVerifier()
|
|
withdrawVerifier.should.be.equal(verifiers[1])
|
|
const treeUpdateVerifier = await miner.treeUpdateVerifier()
|
|
treeUpdateVerifier.should.be.equal(verifiers[2])
|
|
})
|
|
})
|
|
|
|
afterEach(async () => {
|
|
await revertSnapshot(snapshotId.result)
|
|
// eslint-disable-next-line require-atomic-updates
|
|
snapshotId = await takeSnapshot()
|
|
})
|
|
})
|