2023-03-31 00:24:11 +00:00
|
|
|
use rand_core::{RngCore, OsRng};
|
|
|
|
|
|
|
|
use sp_core::{sr25519::Public, Pair};
|
|
|
|
|
|
|
|
use serai_client::{
|
2023-10-10 10:53:24 +00:00
|
|
|
primitives::{NetworkId, insecure_pair_from_name},
|
2023-03-31 00:24:11 +00:00
|
|
|
validator_sets::{
|
2023-05-13 08:20:13 +00:00
|
|
|
primitives::{Session, ValidatorSet, musig_key},
|
2023-03-31 00:24:11 +00:00
|
|
|
ValidatorSetsEvent,
|
|
|
|
},
|
2023-03-31 10:34:09 +00:00
|
|
|
Serai,
|
2023-03-31 00:24:11 +00:00
|
|
|
};
|
|
|
|
|
2023-03-31 10:34:09 +00:00
|
|
|
mod common;
|
2023-05-13 06:02:47 +00:00
|
|
|
use common::{serai, validator_sets::set_validator_set_keys};
|
2023-03-31 00:24:11 +00:00
|
|
|
|
|
|
|
serai_test!(
|
2023-05-13 06:02:47 +00:00
|
|
|
async fn set_validator_set_keys_test() {
|
2023-04-18 06:01:53 +00:00
|
|
|
let network = NetworkId::Bitcoin;
|
2023-03-31 00:24:11 +00:00
|
|
|
let set = ValidatorSet { session: Session(0), network };
|
|
|
|
|
2023-03-31 10:34:09 +00:00
|
|
|
let public = insecure_pair_from_name("Alice").public();
|
|
|
|
|
2023-03-31 00:24:11 +00:00
|
|
|
// Neither of these keys are validated
|
|
|
|
// The external key is infeasible to validate on-chain, the Ristretto key is feasible
|
|
|
|
// TODO: Should the Ristretto key be validated?
|
|
|
|
let mut ristretto_key = [0; 32];
|
|
|
|
OsRng.fill_bytes(&mut ristretto_key);
|
|
|
|
let mut external_key = vec![0; 33];
|
|
|
|
OsRng.fill_bytes(&mut external_key);
|
|
|
|
let key_pair = (Public(ristretto_key), external_key.try_into().unwrap());
|
|
|
|
|
2023-03-31 10:34:09 +00:00
|
|
|
let serai = serai().await;
|
2023-03-31 00:24:11 +00:00
|
|
|
|
|
|
|
// Make sure the genesis is as expected
|
2023-04-15 04:40:33 +00:00
|
|
|
assert_eq!(
|
|
|
|
serai
|
2023-04-15 21:38:47 +00:00
|
|
|
.get_new_set_events(serai.get_block_by_number(0).await.unwrap().unwrap().hash())
|
2023-04-15 04:40:33 +00:00
|
|
|
.await
|
|
|
|
.unwrap(),
|
2023-10-10 10:53:24 +00:00
|
|
|
[NetworkId::Serai, NetworkId::Bitcoin, NetworkId::Ethereum, NetworkId::Monero]
|
2023-04-15 04:40:33 +00:00
|
|
|
.iter()
|
|
|
|
.copied()
|
|
|
|
.map(|network| ValidatorSetsEvent::NewSet {
|
|
|
|
set: ValidatorSet { session: Session(0), network }
|
|
|
|
})
|
|
|
|
.collect::<Vec<_>>(),
|
|
|
|
);
|
|
|
|
|
2023-10-10 10:53:24 +00:00
|
|
|
let participants = serai
|
|
|
|
.get_validator_set_participants(set.network, serai.get_latest_block_hash().await.unwrap())
|
|
|
|
.await
|
|
|
|
.unwrap()
|
|
|
|
.unwrap();
|
|
|
|
let participants_ref: &[_] = participants.as_ref();
|
|
|
|
assert_eq!(participants_ref, [public].as_ref());
|
2023-03-31 00:24:11 +00:00
|
|
|
assert_eq!(
|
2023-10-10 10:53:24 +00:00
|
|
|
serai
|
|
|
|
.get_validator_set_musig_key(set, serai.get_latest_block_hash().await.unwrap())
|
|
|
|
.await
|
|
|
|
.unwrap()
|
|
|
|
.unwrap(),
|
2023-05-13 08:20:13 +00:00
|
|
|
musig_key(set, &[public]).0
|
2023-03-31 00:24:11 +00:00
|
|
|
);
|
2023-05-13 06:02:47 +00:00
|
|
|
|
|
|
|
let block = set_validator_set_keys(set, key_pair.clone()).await;
|
|
|
|
|
|
|
|
// While the set_validator_set_keys function should handle this, it's beneficial to
|
|
|
|
// independently test it
|
2023-03-31 00:24:11 +00:00
|
|
|
assert_eq!(
|
|
|
|
serai.get_key_gen_events(block).await.unwrap(),
|
|
|
|
vec![ValidatorSetsEvent::KeyGen { set, key_pair: key_pair.clone() }]
|
|
|
|
);
|
2023-10-10 10:53:24 +00:00
|
|
|
assert_eq!(serai.get_keys(set, block).await.unwrap(), Some(key_pair));
|
2023-03-31 00:24:11 +00:00
|
|
|
}
|
|
|
|
);
|