1249 lines
52 KiB
Go
1249 lines
52 KiB
Go
package protocol
|
|
|
|
import (
|
|
"math/big"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
"go.uber.org/zap"
|
|
|
|
gethcommon "github.com/ethereum/go-ethereum/common"
|
|
hexutil "github.com/ethereum/go-ethereum/common/hexutil"
|
|
|
|
gethbridge "github.com/status-im/status-go/eth-node/bridge/geth"
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
|
"github.com/status-im/status-go/eth-node/types"
|
|
"github.com/status-im/status-go/protocol/common"
|
|
"github.com/status-im/status-go/protocol/communities"
|
|
"github.com/status-im/status-go/protocol/protobuf"
|
|
"github.com/status-im/status-go/protocol/requests"
|
|
"github.com/status-im/status-go/protocol/tt"
|
|
)
|
|
|
|
func TestMessengerCommunitiesSharedMemberAddressSuite(t *testing.T) {
|
|
suite.Run(t, new(MessengerCommunitiesSharedMemberAddressSuite))
|
|
}
|
|
|
|
type MessengerCommunitiesSharedMemberAddressSuite struct {
|
|
suite.Suite
|
|
owner *Messenger
|
|
bob *Messenger
|
|
alice *Messenger
|
|
|
|
ownerWaku types.Waku
|
|
bobWaku types.Waku
|
|
aliceWaku types.Waku
|
|
|
|
logger *zap.Logger
|
|
|
|
mockedBalances map[uint64]map[gethcommon.Address]map[gethcommon.Address]*hexutil.Big // chainID, account, token, balance
|
|
collectiblesServiceMock *CollectiblesServiceMock
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) SetupTest() {
|
|
// Initialize with nil to avoid panics in TearDownTest
|
|
s.owner = nil
|
|
s.bob = nil
|
|
s.alice = nil
|
|
s.ownerWaku = nil
|
|
s.bobWaku = nil
|
|
s.aliceWaku = nil
|
|
|
|
communities.SetValidateInterval(300 * time.Millisecond)
|
|
s.collectiblesServiceMock = &CollectiblesServiceMock{}
|
|
|
|
s.resetMockedBalances()
|
|
|
|
s.logger = tt.MustCreateTestLogger()
|
|
|
|
wakuNodes := CreateWakuV2Network(&s.Suite, s.logger, []string{"owner", "bob", "alice"})
|
|
|
|
s.ownerWaku = wakuNodes[0]
|
|
s.owner = s.newMessenger(ownerPassword, []string{ownerAddress}, s.ownerWaku, "owner", []Option{})
|
|
|
|
s.bobWaku = wakuNodes[1]
|
|
s.bob = s.newMessenger(bobPassword, []string{bobAddress}, s.bobWaku, "bob", []Option{})
|
|
s.bob.EnableBackedupMessagesProcessing()
|
|
|
|
s.aliceWaku = wakuNodes[2]
|
|
s.alice = s.newMessenger(alicePassword, []string{aliceAddress1, aliceAddress2}, s.aliceWaku, "alice", []Option{})
|
|
|
|
_, err := s.owner.Start()
|
|
s.Require().NoError(err)
|
|
_, err = s.bob.Start()
|
|
s.Require().NoError(err)
|
|
_, err = s.alice.Start()
|
|
s.Require().NoError(err)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TearDownTest() {
|
|
TearDownMessenger(&s.Suite, s.owner)
|
|
TearDownMessenger(&s.Suite, s.bob)
|
|
TearDownMessenger(&s.Suite, s.alice)
|
|
if s.ownerWaku != nil {
|
|
s.Require().NoError(gethbridge.GetGethWakuV2From(s.ownerWaku).Stop())
|
|
}
|
|
if s.bobWaku != nil {
|
|
s.Require().NoError(gethbridge.GetGethWakuV2From(s.bobWaku).Stop())
|
|
}
|
|
if s.aliceWaku != nil {
|
|
s.Require().NoError(gethbridge.GetGethWakuV2From(s.aliceWaku).Stop())
|
|
}
|
|
_ = s.logger.Sync()
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) newMessenger(password string, walletAddresses []string, waku types.Waku, name string, extraOptions []Option) *Messenger {
|
|
communityManagerOptions := []communities.ManagerOption{
|
|
communities.WithAllowForcingCommunityMembersReevaluation(true),
|
|
}
|
|
extraOptions = append(extraOptions, WithCommunityManagerOptions(communityManagerOptions))
|
|
|
|
return newTestCommunitiesMessenger(&s.Suite, waku, testCommunitiesMessengerConfig{
|
|
testMessengerConfig: testMessengerConfig{
|
|
logger: s.logger.Named(name),
|
|
extraOptions: extraOptions,
|
|
},
|
|
password: password,
|
|
walletAddresses: walletAddresses,
|
|
mockedBalances: &s.mockedBalances,
|
|
collectiblesService: s.collectiblesServiceMock,
|
|
})
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) joinCommunity(community *communities.Community, user *Messenger, password string, addresses []string) {
|
|
s.joinCommunityWithAirdropAddress(community, user, password, addresses, "")
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) joinCommunityWithAirdropAddress(community *communities.Community, user *Messenger, password string, addresses []string, airdropAddress string) {
|
|
passwdHash := types.EncodeHex(crypto.Keccak256([]byte(password)))
|
|
if airdropAddress == "" && len(addresses) > 0 {
|
|
airdropAddress = addresses[0]
|
|
}
|
|
|
|
request := &requests.RequestToJoinCommunity{CommunityID: community.ID(), AddressesToReveal: addresses, AirdropAddress: airdropAddress}
|
|
joinCommunity(&s.Suite, community, s.owner, user, request, passwdHash)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) checkRevealedAccounts(communityID types.HexBytes, user *Messenger, expectedAccounts []*protobuf.RevealedAccount) {
|
|
revealedAccounts, err := user.communitiesManager.GetRevealedAddresses(communityID, s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(revealedAccounts, expectedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) makeAddressSatisfyTheCriteria(chainID uint64, address string, criteria *protobuf.TokenCriteria) {
|
|
walletAddress := gethcommon.HexToAddress(address)
|
|
contractAddress := gethcommon.HexToAddress(criteria.ContractAddresses[chainID])
|
|
balance, ok := new(big.Int).SetString(criteria.AmountInWei, 10)
|
|
s.Require().True(ok)
|
|
|
|
s.mockedBalances[chainID][walletAddress][contractAddress] = (*hexutil.Big)(balance)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) resetMockedBalances() {
|
|
s.mockedBalances = make(map[uint64]map[gethcommon.Address]map[gethcommon.Address]*hexutil.Big)
|
|
s.mockedBalances[testChainID1] = make(map[gethcommon.Address]map[gethcommon.Address]*hexutil.Big)
|
|
s.mockedBalances[testChainID1][gethcommon.HexToAddress(aliceAddress1)] = make(map[gethcommon.Address]*hexutil.Big)
|
|
s.mockedBalances[testChainID1][gethcommon.HexToAddress(aliceAddress2)] = make(map[gethcommon.Address]*hexutil.Big)
|
|
s.mockedBalances[testChainID1][gethcommon.HexToAddress(bobAddress)] = make(map[gethcommon.Address]*hexutil.Big)
|
|
}
|
|
|
|
func createTokenMasterTokenCriteria() *protobuf.TokenCriteria {
|
|
return &protobuf.TokenCriteria{
|
|
ContractAddresses: map[uint64]string{testChainID1: "0x123"},
|
|
Type: protobuf.CommunityTokenType_ERC20,
|
|
Symbol: "STT",
|
|
Name: "Status Test Token",
|
|
AmountInWei: "10000000000000000000",
|
|
Decimals: 18,
|
|
}
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) createEditSharedAddressesRequest(communityID types.HexBytes) *requests.EditSharedAddresses {
|
|
request := &requests.EditSharedAddresses{CommunityID: communityID, AddressesToReveal: []string{aliceAddress2}, AirdropAddress: aliceAddress2}
|
|
|
|
signingParams, err := s.alice.GenerateJoiningCommunityRequestsForSigning(common.PubkeyToHex(&s.alice.identity.PublicKey), communityID, request.AddressesToReveal)
|
|
s.Require().NoError(err)
|
|
|
|
passwdHash := types.EncodeHex(crypto.Keccak256([]byte(alicePassword)))
|
|
for i := range signingParams {
|
|
signingParams[i].Password = passwdHash
|
|
}
|
|
signatures, err := s.alice.SignData(signingParams)
|
|
s.Require().NoError(err)
|
|
|
|
updateAddresses := len(request.AddressesToReveal) == 0
|
|
if updateAddresses {
|
|
request.AddressesToReveal = make([]string, len(signingParams))
|
|
}
|
|
for i := range signingParams {
|
|
request.AddressesToReveal[i] = signingParams[i].Address
|
|
request.Signatures = append(request.Signatures, types.FromHex(signatures[i]))
|
|
}
|
|
if updateAddresses {
|
|
request.AirdropAddress = request.AddressesToReveal[0]
|
|
}
|
|
|
|
return request
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestJoinedCommunityMembersSharedAddress() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{})
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{})
|
|
|
|
community, err := s.owner.GetCommunityByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(3, community.MembersCount())
|
|
|
|
// Check owner's DB for revealed accounts
|
|
for pubKey := range community.Members() {
|
|
if pubKey != common.PubkeyToHex(&s.owner.identity.PublicKey) {
|
|
revealedAccounts, err := s.owner.communitiesManager.GetRevealedAddresses(community.ID(), pubKey)
|
|
s.Require().NoError(err)
|
|
switch pubKey {
|
|
case common.PubkeyToHex(&s.alice.identity.PublicKey):
|
|
s.Require().Len(revealedAccounts, 2)
|
|
s.Require().Equal(revealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(revealedAccounts[1].Address, aliceAddress2)
|
|
s.Require().Equal(true, revealedAccounts[0].IsAirdropAddress)
|
|
case common.PubkeyToHex(&s.bob.identity.PublicKey):
|
|
s.Require().Len(revealedAccounts, 1)
|
|
s.Require().Equal(revealedAccounts[0].Address, bobAddress)
|
|
s.Require().Equal(true, revealedAccounts[0].IsAirdropAddress)
|
|
default:
|
|
s.Require().Fail("pubKey does not match expected keys")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Check Bob's DB for revealed accounts
|
|
revealedAccountsInBobsDB, err := s.bob.communitiesManager.GetRevealedAddresses(community.ID(), common.PubkeyToHex(&s.bob.identity.PublicKey))
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccountsInBobsDB, 1)
|
|
s.Require().Equal(revealedAccountsInBobsDB[0].Address, bobAddress)
|
|
s.Require().Equal(true, revealedAccountsInBobsDB[0].IsAirdropAddress)
|
|
|
|
// Check Alices's DB for revealed accounts
|
|
revealedAccountsInAlicesDB, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), common.PubkeyToHex(&s.alice.identity.PublicKey))
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccountsInAlicesDB, 2)
|
|
s.Require().Equal(revealedAccountsInAlicesDB[0].Address, aliceAddress1)
|
|
s.Require().Equal(revealedAccountsInAlicesDB[1].Address, aliceAddress2)
|
|
s.Require().Equal(true, revealedAccountsInAlicesDB[0].IsAirdropAddress)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestJoinedCommunityMembersSelectedSharedAddress() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress2})
|
|
|
|
community, err := s.owner.GetCommunityByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(2, community.MembersCount())
|
|
|
|
alicePubkey := common.PubkeyToHex(&s.alice.identity.PublicKey)
|
|
|
|
// Check Alice's DB for revealed accounts
|
|
revealedAccountsInAlicesDB, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccountsInAlicesDB, 1)
|
|
s.Require().Equal(revealedAccountsInAlicesDB[0].Address, aliceAddress2)
|
|
s.Require().Equal(true, revealedAccountsInAlicesDB[0].IsAirdropAddress)
|
|
|
|
// Check owner's DB for revealed accounts
|
|
s.checkRevealedAccounts(community.ID(), s.owner, revealedAccountsInAlicesDB)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestJoinedCommunityMembersMultipleSelectedSharedAddresses() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
|
|
s.joinCommunityWithAirdropAddress(community, s.alice, alicePassword, []string{aliceAddress1, aliceAddress2}, aliceAddress2)
|
|
|
|
community, err := s.owner.GetCommunityByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(2, community.MembersCount())
|
|
|
|
alicePubkey := common.PubkeyToHex(&s.alice.identity.PublicKey)
|
|
|
|
// Check Alice's DB for revealed accounts
|
|
revealedAccountsInAlicesDB, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccountsInAlicesDB, 2)
|
|
s.Require().Equal(revealedAccountsInAlicesDB[0].Address, aliceAddress1)
|
|
s.Require().Equal(revealedAccountsInAlicesDB[1].Address, aliceAddress2)
|
|
s.Require().Equal(true, revealedAccountsInAlicesDB[1].IsAirdropAddress)
|
|
|
|
// Check owner's DB for revealed accounts
|
|
s.checkRevealedAccounts(community.ID(), s.owner, revealedAccountsInAlicesDB)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestEditSharedAddresses() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
alicePubkey := common.PubkeyToHex(&s.alice.identity.PublicKey)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
community, err := s.owner.GetCommunityByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(2, community.MembersCount())
|
|
|
|
aliceExpectedRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceExpectedRevealedAccounts, 1)
|
|
s.Require().Equal(aliceExpectedRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, aliceExpectedRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.owner, aliceExpectedRevealedAccounts)
|
|
|
|
request := s.createEditSharedAddressesRequest(community.ID())
|
|
|
|
response, err := s.alice.EditSharedAddressesForCommunity(request)
|
|
s.Require().NoError(err)
|
|
s.Require().NotNil(response)
|
|
|
|
aliceExpectedRevealedAccounts, err = s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceExpectedRevealedAccounts, 1)
|
|
s.Require().Equal(aliceExpectedRevealedAccounts[0].Address, aliceAddress2)
|
|
s.Require().Equal(true, aliceExpectedRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
// check that owner received revealed address
|
|
_, err = WaitOnMessengerResponse(s.owner, func(r *MessengerResponse) bool {
|
|
revealedAccounts, err := s.owner.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccounts, 1)
|
|
return revealedAccounts[0].Address == aliceAddress2
|
|
|
|
}, "owned did not receive alice shared address")
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.owner, aliceExpectedRevealedAccounts)
|
|
|
|
// check that we filter out outdated edit shared addresses events
|
|
community, err = s.owner.GetCommunityByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
aliceClock := community.Description().Members[s.alice.IdentityPublicKeyString()].LastUpdateClock
|
|
s.Require().Greater(aliceClock, uint64(1))
|
|
|
|
editMsg := &protobuf.CommunityEditSharedAddresses{
|
|
Clock: aliceClock - 1,
|
|
CommunityId: community.ID(),
|
|
RevealedAccounts: aliceExpectedRevealedAccounts,
|
|
}
|
|
|
|
state := &ReceivedMessageState{
|
|
CurrentMessageState: &CurrentMessageState{
|
|
PublicKey: s.alice.IdentityPublicKey(),
|
|
},
|
|
}
|
|
|
|
err = s.owner.HandleCommunityEditSharedAddresses(state, editMsg, nil)
|
|
s.Require().Error(err, communities.ErrEditSharedAddressesRequestOutdated)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestTokenMasterReceivesEditedSharedAddresses() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
alicePubkey := s.alice.IdentityPublicKeyString()
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
// check bob has TM role
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER, &s.bob.identity.PublicKey, community)
|
|
|
|
aliceRevealedAccounts, err := s.bob.GetRevealedAccounts(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceRevealedAccounts, 1)
|
|
|
|
request := s.createEditSharedAddressesRequest(community.ID())
|
|
|
|
response, err := s.alice.EditSharedAddressesForCommunity(request)
|
|
s.Require().NoError(err)
|
|
s.Require().NotNil(response)
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress2)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
// check that owner received revealed address
|
|
_, err = WaitOnMessengerResponse(s.owner, func(r *MessengerResponse) bool {
|
|
revealedAccounts, err := s.owner.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccounts, 1)
|
|
return revealedAccounts[0].Address == aliceAddress2
|
|
|
|
}, "owned did not receive alice shared address")
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.owner, expectedAliceRevealedAccounts)
|
|
|
|
// check that bob as a token master received revealed address
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
revealedAccounts, err := s.bob.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccounts, 1)
|
|
return revealedAccounts[0].Address == aliceAddress2
|
|
}, "user not accepted")
|
|
s.Require().NoError(err)
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestSharedAddressesReturnsRevealedAccount() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
permissionRequest := requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_CAN_VIEW_AND_POST_CHANNEL,
|
|
TokenCriteria: []*protobuf.TokenCriteria{
|
|
&protobuf.TokenCriteria{
|
|
Type: protobuf.CommunityTokenType_ERC20,
|
|
ContractAddresses: map[uint64]string{testChainID1: "0x123"},
|
|
Symbol: "TEST",
|
|
AmountInWei: "100000000000000000000",
|
|
Decimals: uint64(18),
|
|
},
|
|
},
|
|
}
|
|
|
|
response, err := s.owner.CreateCommunityTokenPermission(&permissionRequest)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(response.Communities(), 1)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{})
|
|
|
|
revealedAccounts, err := s.alice.GetRevealedAccounts(community.ID(), common.PubkeyToHex(&s.alice.identity.PublicKey))
|
|
s.Require().NoError(err)
|
|
|
|
revealedAddressesMap := make(map[string]struct{}, len(revealedAccounts))
|
|
for _, acc := range revealedAccounts {
|
|
revealedAddressesMap[acc.Address] = struct{}{}
|
|
}
|
|
|
|
s.Require().Len(revealedAddressesMap, 2)
|
|
s.Require().Contains(revealedAddressesMap, aliceAddress1)
|
|
s.Require().Contains(revealedAddressesMap, aliceAddress2)
|
|
|
|
sharedAddresses, err := s.alice.getSharedAddresses(community.ID(), []string{})
|
|
s.Require().NoError(err)
|
|
s.Require().Len(sharedAddresses, 2)
|
|
|
|
sharedAddressesMap := make(map[string]struct{}, len(sharedAddresses))
|
|
for _, acc := range sharedAddresses {
|
|
sharedAddressesMap[acc.String()] = struct{}{}
|
|
}
|
|
|
|
s.Require().Len(sharedAddressesMap, 2)
|
|
s.Require().Contains(sharedAddressesMap, aliceAddress1)
|
|
s.Require().Contains(sharedAddressesMap, aliceAddress2)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestResendSharedAddressesOnBackupRestore() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
// bob joins the community
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
currentBobSharedAddresses, err := s.bob.GetRevealedAccounts(community.ID(), s.bob.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(currentBobSharedAddresses, 1)
|
|
|
|
requestID := communities.CalculateRequestID(s.bob.IdentityPublicKeyString(), community.ID())
|
|
err = s.bob.communitiesManager.RemoveRequestToJoinRevealedAddresses(requestID)
|
|
s.Require().NoError(err)
|
|
|
|
emptySharedAddresses, err := s.bob.GetRevealedAccounts(community.ID(), s.bob.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(emptySharedAddresses, 0)
|
|
|
|
// Simulate backup creation and handling backup message
|
|
// As a result, bob sends request to resend encryption keys to the owner
|
|
clock, _ := s.bob.getLastClockWithRelatedChat()
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
backupMessage, err := s.bob.backupCommunity(community, clock)
|
|
s.Require().NoError(err)
|
|
|
|
err = s.bob.HandleBackup(s.bob.buildMessageState(), backupMessage, nil)
|
|
s.Require().NoError(err)
|
|
|
|
// Owner will receive the request for addresses and send them back to Bob
|
|
response, err := WaitOnMessengerResponse(
|
|
s.bob,
|
|
func(r *MessengerResponse) bool {
|
|
_, _ = s.owner.RetrieveAll()
|
|
return len(r.requestsToJoinCommunity) > 0
|
|
},
|
|
"request to join not received",
|
|
)
|
|
s.Require().NoError(err)
|
|
|
|
requestToJoin, ok := response.requestsToJoinCommunity[requestID.String()]
|
|
s.Require().Equal(true, ok)
|
|
s.Require().Equal(currentBobSharedAddresses, requestToJoin.RevealedAccounts)
|
|
|
|
currentBobSharedAddresses, err = s.bob.GetRevealedAccounts(community.ID(), s.bob.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(currentBobSharedAddresses, 1)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestTokenMasterReceivesMembersSharedAddressesOnBackupRestore() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.GetRevealedAccounts(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
// check bob has TM role
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER, &s.bob.identity.PublicKey, community)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
|
|
// remove alice revealed addresses
|
|
aliceRequestID := communities.CalculateRequestID(s.alice.IdentityPublicKeyString(), community.ID())
|
|
err = s.bob.communitiesManager.RemoveRequestToJoinRevealedAddresses(aliceRequestID)
|
|
s.Require().NoError(err)
|
|
|
|
emptySharedAddresses, err := s.bob.GetRevealedAccounts(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(emptySharedAddresses, 0)
|
|
s.Require().NotEqual(emptySharedAddresses, expectedAliceRevealedAccounts)
|
|
|
|
// Simulate backup creation and handling backup message
|
|
// As a result, bob sends request to resend encryption keys to the owner
|
|
clock, _ := s.bob.getLastClockWithRelatedChat()
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
backupMessage, err := s.bob.backupCommunity(community, clock)
|
|
s.Require().NoError(err)
|
|
|
|
err = s.bob.HandleBackup(s.bob.buildMessageState(), backupMessage, nil)
|
|
s.Require().NoError(err)
|
|
|
|
// Owner will receive the request for addresses and send requests to join with revealed
|
|
// addresses to token master
|
|
_, err = WaitOnMessengerResponse(
|
|
s.bob,
|
|
func(r *MessengerResponse) bool {
|
|
_, _ = s.owner.RetrieveAll()
|
|
if len(r.requestsToJoinCommunity) == 0 {
|
|
return false
|
|
}
|
|
|
|
for _, requestToJoin := range r.requestsToJoinCommunity {
|
|
if requestToJoin.PublicKey == s.alice.IdentityPublicKeyString() {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
},
|
|
"alice request to join with revealed addresses not received",
|
|
)
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestTokenMasterReceivedRevealedAddressesFromJoinedMember() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 1)
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
// check bob has TM role
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER, &s.bob.identity.PublicKey, community)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
// check that bob received revealed address
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 && r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString()
|
|
}, "user not accepted")
|
|
s.Require().NoError(err)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestTokenMasterJoinedToCommunityAndReceivedRevealedAddresses() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 1)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER, &s.bob.identity.PublicKey, community)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestMemberReceivedSharedAddressOnGettingTokenMasterRole() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
community, err := s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 0)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
// wait for owner to send sync message for bob, who got a TM role
|
|
waitOnOwnerSendSyncMessage := waitOnCommunitiesEvent(s.owner, func(sub *communities.Subscription) bool {
|
|
return sub.CommunityPrivilegedMemberSyncMessage != nil &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.CommunityPrivilegedUserSyncMessage.Type == protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN &&
|
|
len(sub.CommunityPrivilegedMemberSyncMessage.Receivers) == 1 &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.Receivers[0].Equal(&s.bob.identity.PublicKey)
|
|
})
|
|
|
|
_, err = s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
err = <-waitOnOwnerSendSyncMessage
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.Communities()) == 1 && r.Communities()[0].IsTokenMaster()
|
|
}, "bob didn't receive token master role")
|
|
s.Require().NoError(err)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestTokenMasterReceivesAccountsAfterPendingRequestToJoinApproval() {
|
|
community, _ := createOnRequestCommunity(&s.Suite, s.owner)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 1)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
|
|
aliceArray64Bytes := common.HashPublicKey(&s.alice.identity.PublicKey)
|
|
aliceSignature := append([]byte{0}, aliceArray64Bytes...)
|
|
aliceRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{aliceAddress1},
|
|
AirdropAddress: aliceAddress1,
|
|
Signatures: []types.HexBytes{aliceSignature},
|
|
}
|
|
|
|
aliceRequestToJoinID := requestToJoinCommunity(&s.Suite, s.owner, s.alice, aliceRequest)
|
|
|
|
bobArray64Bytes := common.HashPublicKey(&s.bob.identity.PublicKey)
|
|
bobSignature := append([]byte{0}, bobArray64Bytes...)
|
|
bobRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{bobAddress},
|
|
AirdropAddress: bobAddress,
|
|
Signatures: []types.HexBytes{bobSignature},
|
|
}
|
|
|
|
joinOnRequestCommunity(&s.Suite, community, s.owner, s.bob, bobRequest)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().True(community.IsMemberTokenMaster(&s.bob.identity.PublicKey))
|
|
|
|
_, err = s.owner.AcceptRequestToJoinCommunity(&requests.AcceptRequestToJoinCommunity{ID: aliceRequestToJoinID})
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
if r.RequestsToJoinCommunity() != nil {
|
|
for _, request := range r.RequestsToJoinCommunity() {
|
|
if request.PublicKey == s.alice.IdentityPublicKeyString() && request.State == communities.RequestToJoinStateAccepted {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}, "bob didn't receive accepted Alice request to join")
|
|
s.Require().NoError(err)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestMemberReceivesPendingRequestToJoinAfterAfterGettingTokenMasterRole() {
|
|
s.T().Skip("flaky test")
|
|
|
|
community, _ := createOnRequestCommunity(&s.Suite, s.owner)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
|
|
aliceArray64Bytes := common.HashPublicKey(&s.alice.identity.PublicKey)
|
|
aliceSignature := append([]byte{0}, aliceArray64Bytes...)
|
|
aliceRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{aliceAddress1},
|
|
AirdropAddress: aliceAddress1,
|
|
Signatures: []types.HexBytes{aliceSignature},
|
|
}
|
|
|
|
aliceRequestToJoinID := requestToJoinCommunity(&s.Suite, s.owner, s.alice, aliceRequest)
|
|
|
|
bobArray64Bytes := common.HashPublicKey(&s.bob.identity.PublicKey)
|
|
bobSignature := append([]byte{0}, bobArray64Bytes...)
|
|
bobRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{bobAddress},
|
|
AirdropAddress: bobAddress,
|
|
Signatures: []types.HexBytes{bobSignature},
|
|
}
|
|
|
|
joinOnRequestCommunity(&s.Suite, community, s.owner, s.bob, bobRequest)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
// wait for owner to send sync message for bob, who got a TM role
|
|
waitOnOwnerSendSyncMessage := waitOnCommunitiesEvent(s.owner, func(sub *communities.Subscription) bool {
|
|
return sub.CommunityPrivilegedMemberSyncMessage != nil &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.CommunityPrivilegedUserSyncMessage.Type == protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN &&
|
|
len(sub.CommunityPrivilegedMemberSyncMessage.Receivers) == 1 &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.Receivers[0].Equal(&s.bob.identity.PublicKey)
|
|
})
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
err = <-waitOnOwnerSendSyncMessage
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.Communities()) == 1 && r.Communities()[0].IsTokenMaster()
|
|
}, "bob didn't receive token master role")
|
|
s.Require().NoError(err)
|
|
|
|
_, err = s.owner.AcceptRequestToJoinCommunity(&requests.AcceptRequestToJoinCommunity{ID: aliceRequestToJoinID})
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) > 0 &&
|
|
r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString() &&
|
|
r.RequestsToJoinCommunity()[0].State == communities.RequestToJoinStateAccepted
|
|
|
|
}, "bob didn't receive accepted Alice request to join")
|
|
s.Require().NoError(err)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestHandlingOutdatedPrivilegedUserSyncMessages() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 1)
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
// check bob has TM role
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER, &s.bob.identity.PublicKey, community)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
// check that bob received revealed address
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 && r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString()
|
|
}, "user not accepted")
|
|
s.Require().NoError(err)
|
|
|
|
// handle outdated CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN msg
|
|
expectedAliceRequestToJoin, err := s.bob.communitiesManager.GetRequestToJoinByPkAndCommunityID(s.alice.IdentityPublicKey(), community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().NotNil(expectedAliceRequestToJoin)
|
|
|
|
bobRequestToJoin, err := s.bob.communitiesManager.GetRequestToJoinByPkAndCommunityID(s.bob.IdentityPublicKey(), community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().NotNil(bobRequestToJoin)
|
|
|
|
invalidAliceSyncRtj := expectedAliceRequestToJoin.ToSyncProtobuf()
|
|
invalidAliceSyncRtj.RevealedAccounts = bobRequestToJoin.RevealedAccounts
|
|
invalidAliceSyncRtj.EnsName = "corrupted"
|
|
invalidAliceSyncRtj.State = uint64(communities.RequestToJoinStatePending)
|
|
|
|
syncMsg := &protobuf.CommunityPrivilegedUserSyncMessage{
|
|
Type: protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN,
|
|
CommunityId: community.ID(),
|
|
SyncRequestsToJoin: []*protobuf.SyncCommunityRequestsToJoin{invalidAliceSyncRtj},
|
|
}
|
|
|
|
state := &ReceivedMessageState{
|
|
CurrentMessageState: &CurrentMessageState{
|
|
PublicKey: community.PublicKey(),
|
|
},
|
|
}
|
|
|
|
err = s.bob.HandleCommunityPrivilegedUserSyncMessage(state, syncMsg, nil)
|
|
s.Require().NoError(err)
|
|
|
|
aliceRtj, err := s.bob.communitiesManager.GetRequestToJoinByPkAndCommunityID(s.alice.IdentityPublicKey(), community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(aliceRtj, expectedAliceRequestToJoin)
|
|
|
|
// handle outdated CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ACCEPT_REQUEST_TO_JOIN msg
|
|
|
|
invalidAliceCommunityRtj := aliceRtj.ToCommunityRequestToJoinProtobuf()
|
|
invalidAliceCommunityRtj.RevealedAccounts = bobRequestToJoin.RevealedAccounts
|
|
invalidAliceCommunityRtj.EnsName = "corrupted"
|
|
|
|
syncMsg.Type = protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ACCEPT_REQUEST_TO_JOIN
|
|
syncMsg.RequestToJoin = map[string]*protobuf.CommunityRequestToJoin{
|
|
s.alice.IdentityPublicKeyString(): invalidAliceCommunityRtj,
|
|
}
|
|
|
|
err = s.bob.HandleCommunityPrivilegedUserSyncMessage(state, syncMsg, nil)
|
|
s.Require().NoError(err)
|
|
|
|
aliceRtj, err = s.bob.communitiesManager.GetRequestToJoinByPkAndCommunityID(s.alice.IdentityPublicKey(), community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Equal(aliceRtj, expectedAliceRequestToJoin)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestMemberReceivedEditedSharedAddressOnGettingTokenMasterRole() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
alicePubkey := s.alice.IdentityPublicKeyString()
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
request := s.createEditSharedAddressesRequest(community.ID())
|
|
|
|
response, err := s.alice.EditSharedAddressesForCommunity(request)
|
|
s.Require().NoError(err)
|
|
s.Require().NotNil(response)
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress2)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
// check that owner received edited shared adresses
|
|
_, err = WaitOnMessengerResponse(s.owner, func(r *MessengerResponse) bool {
|
|
revealedAccounts, err := s.owner.communitiesManager.GetRevealedAddresses(community.ID(), alicePubkey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(revealedAccounts, 1)
|
|
return revealedAccounts[0].Address == aliceAddress2
|
|
|
|
}, "owned did not receive alice shared address")
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.owner, expectedAliceRevealedAccounts)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
// wait for owner to send sync message for bob, who got a TM role
|
|
waitOnOwnerSendSyncMessage := waitOnCommunitiesEvent(s.owner, func(sub *communities.Subscription) bool {
|
|
return sub.CommunityPrivilegedMemberSyncMessage != nil &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.CommunityPrivilegedUserSyncMessage.Type == protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN &&
|
|
len(sub.CommunityPrivilegedMemberSyncMessage.Receivers) == 1 &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.Receivers[0].Equal(&s.bob.identity.PublicKey)
|
|
})
|
|
|
|
_, err = s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
err = <-waitOnOwnerSendSyncMessage
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.Communities()) == 1 && r.Communities()[0].IsTokenMaster()
|
|
}, "bob didn't receive token master role")
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestMemberReceivesAccountsOnRoleChangeFromAdminToTokenMaster() {
|
|
community, _ := createCommunity(&s.Suite, s.owner)
|
|
|
|
alicePublicKey := s.alice.IdentityPublicKeyString()
|
|
|
|
adminTokenCriteria := &protobuf.TokenCriteria{
|
|
ContractAddresses: map[uint64]string{testChainID1: "0x125"},
|
|
Type: protobuf.CommunityTokenType_ERC20,
|
|
Symbol: "STT",
|
|
Name: "Status Test Token",
|
|
AmountInWei: "10000000000000000000",
|
|
Decimals: 18,
|
|
}
|
|
tokenMasterTokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenMasterTokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
_, err = s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_ADMIN,
|
|
TokenCriteria: []*protobuf.TokenCriteria{adminTokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 2)
|
|
|
|
// make bob satisfy the admin criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, adminTokenCriteria)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
s.joinCommunity(community, s.bob, bobPassword, []string{bobAddress})
|
|
|
|
// check bob has admin role
|
|
community, err = s.bob.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
checkRoleBasedOnThePermissionType(protobuf.CommunityTokenPermission_BECOME_ADMIN, &s.bob.identity.PublicKey, community)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
s.joinCommunity(community, s.alice, alicePassword, []string{aliceAddress1})
|
|
|
|
expectedAliceRevealedAccounts, err := s.alice.communitiesManager.GetRevealedAddresses(community.ID(), alicePublicKey)
|
|
s.Require().NoError(err)
|
|
s.Require().Len(expectedAliceRevealedAccounts, 1)
|
|
s.Require().Equal(expectedAliceRevealedAccounts[0].Address, aliceAddress1)
|
|
s.Require().Equal(true, expectedAliceRevealedAccounts[0].IsAirdropAddress)
|
|
|
|
// check that bob received alice request to join without revealed accounts
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 &&
|
|
r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString() &&
|
|
len(r.RequestsToJoinCommunity()[0].RevealedAccounts) == 0
|
|
}, "alice request to join was not delivered to admin bob")
|
|
s.Require().NoError(err)
|
|
|
|
emptyAliceAccounts, err := s.bob.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(emptyAliceAccounts, 0)
|
|
|
|
// make bob satisfy TokenMaster criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenMasterTokenCriteria)
|
|
|
|
// wait for owner to send sync message for bob, who got a TM role
|
|
waitOnOwnerSendSyncMessage := waitOnCommunitiesEvent(s.owner, func(sub *communities.Subscription) bool {
|
|
return sub.CommunityPrivilegedMemberSyncMessage != nil &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.CommunityPrivilegedUserSyncMessage.Type == protobuf.CommunityPrivilegedUserSyncMessage_CONTROL_NODE_ALL_SYNC_REQUESTS_TO_JOIN &&
|
|
len(sub.CommunityPrivilegedMemberSyncMessage.Receivers) == 1 &&
|
|
sub.CommunityPrivilegedMemberSyncMessage.Receivers[0].Equal(&s.bob.identity.PublicKey)
|
|
})
|
|
|
|
err = s.owner.communitiesManager.ForceMembersReevaluation(community.ID())
|
|
s.Require().NoError(err)
|
|
|
|
err = <-waitOnOwnerSendSyncMessage
|
|
s.Require().NoError(err)
|
|
|
|
// check that bob received alice request to join with revealed accounts
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
revealedAccounts, err := s.bob.communitiesManager.GetRevealedAddresses(community.ID(), alicePublicKey)
|
|
s.Require().NoError(err)
|
|
return len(revealedAccounts) > 0
|
|
}, "alice request to join was not delivered to token master bob")
|
|
s.Require().NoError(err)
|
|
|
|
s.checkRevealedAccounts(community.ID(), s.bob, expectedAliceRevealedAccounts)
|
|
}
|
|
|
|
func (s *MessengerCommunitiesSharedMemberAddressSuite) TestOwnerRejectAndAcceptAliceRequestToJoin() {
|
|
s.T().Skip("flaky test")
|
|
|
|
community, _ := createOnRequestCommunity(&s.Suite, s.owner)
|
|
s.Require().False(community.AutoAccept())
|
|
|
|
tokenCriteria := createTokenMasterTokenCriteria()
|
|
|
|
// make bob satisfy the Token Master criteria
|
|
s.makeAddressSatisfyTheCriteria(testChainID1, bobAddress, tokenCriteria)
|
|
|
|
_, err := s.owner.CreateCommunityTokenPermission(&requests.CreateCommunityTokenPermission{
|
|
CommunityID: community.ID(),
|
|
Type: protobuf.CommunityTokenPermission_BECOME_TOKEN_MASTER,
|
|
TokenCriteria: []*protobuf.TokenCriteria{tokenCriteria},
|
|
})
|
|
s.Require().NoError(err)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(community.TokenPermissions(), 1)
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.bob)
|
|
|
|
aliceArray64Bytes := common.HashPublicKey(&s.alice.identity.PublicKey)
|
|
aliceSignature := append([]byte{0}, aliceArray64Bytes...)
|
|
aliceRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{aliceAddress1},
|
|
AirdropAddress: aliceAddress1,
|
|
Signatures: []types.HexBytes{aliceSignature},
|
|
}
|
|
|
|
bobArray64Bytes := common.HashPublicKey(&s.bob.identity.PublicKey)
|
|
bobSignature := append([]byte{0}, bobArray64Bytes...)
|
|
bobRequest := &requests.RequestToJoinCommunity{
|
|
CommunityID: community.ID(),
|
|
AddressesToReveal: []string{bobAddress},
|
|
AirdropAddress: bobAddress,
|
|
Signatures: []types.HexBytes{bobSignature},
|
|
}
|
|
|
|
joinOnRequestCommunity(&s.Suite, community, s.owner, s.bob, bobRequest)
|
|
|
|
community, err = s.owner.communitiesManager.GetByID(community.ID())
|
|
s.Require().NoError(err)
|
|
s.Require().True(community.IsMemberTokenMaster(&s.bob.identity.PublicKey))
|
|
|
|
advertiseCommunityTo(&s.Suite, community, s.owner, s.alice)
|
|
|
|
aliceRequestToJoinID := requestToJoinCommunity(&s.Suite, s.owner, s.alice, aliceRequest)
|
|
|
|
// check that bob received alice request to join without revealed accounts due to pending state
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 &&
|
|
r.RequestsToJoinCommunity()[0].State == communities.RequestToJoinStatePending &&
|
|
r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString()
|
|
}, "alice pending request to join was not delivered to token master bob")
|
|
s.Require().NoError(err)
|
|
|
|
// request to join was not approved, bob should not have alice revealed addresses
|
|
aliceRevealedAccounts, err := s.bob.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceRevealedAccounts, 0)
|
|
|
|
_, err = s.owner.DeclineRequestToJoinCommunity(&requests.DeclineRequestToJoinCommunity{ID: aliceRequestToJoinID})
|
|
s.Require().NoError(err)
|
|
|
|
// check that bob received owner decline sync msg
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 &&
|
|
r.RequestsToJoinCommunity()[0].State == communities.RequestToJoinStateDeclined &&
|
|
r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString()
|
|
}, "alice declined request to join was not delivered to token master bob")
|
|
s.Require().NoError(err)
|
|
|
|
// request to join was declined, bob should not have alice revealed addresses
|
|
aliceRevealedAccounts, err = s.bob.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceRevealedAccounts, 0)
|
|
|
|
_, err = s.owner.AcceptRequestToJoinCommunity(&requests.AcceptRequestToJoinCommunity{ID: aliceRequestToJoinID})
|
|
s.Require().NoError(err)
|
|
|
|
_, err = WaitOnMessengerResponse(s.bob, func(r *MessengerResponse) bool {
|
|
return len(r.RequestsToJoinCommunity()) == 1 &&
|
|
r.RequestsToJoinCommunity()[0].State == communities.RequestToJoinStateAccepted &&
|
|
r.RequestsToJoinCommunity()[0].PublicKey == s.alice.IdentityPublicKeyString()
|
|
}, "bob didn't receive accepted Alice request to join")
|
|
s.Require().NoError(err)
|
|
|
|
// request to join was accepted, bob should have alice revealed addresses
|
|
aliceRevealedAccounts, err = s.bob.communitiesManager.GetRevealedAddresses(community.ID(), s.alice.IdentityPublicKeyString())
|
|
s.Require().NoError(err)
|
|
s.Require().Len(aliceRevealedAccounts, 1)
|
|
}
|