// Copyright 2017-2020 Parity Technologies (UK) Ltd. // This file is part of Polkadot. // Substrate is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Substrate is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Substrate. If not, see . //! Module to process claims from Ethereum addresses. use sp_std::{prelude::*, fmt::Debug}; use sp_io::{hashing::keccak_256, crypto::secp256k1_ecdsa_recover}; use frame_support::{ decl_event, decl_storage, decl_module, decl_error, ensure, traits::{Currency, Get, VestingSchedule}, weights::{Pays, DispatchClass}, dispatch::IsSubType }; use system::{ensure_signed, ensure_root, ensure_none}; use codec::{Encode, Decode}; #[cfg(feature = "std")] use serde::{self, Serialize, Deserialize, Serializer, Deserializer}; #[cfg(feature = "std")] use sp_runtime::traits::Zero; use sp_runtime::{ traits::{CheckedSub, SignedExtension, DispatchInfoOf}, RuntimeDebug, DispatchResult, transaction_validity::{ TransactionLongevity, TransactionValidity, ValidTransaction, InvalidTransaction, TransactionSource, TransactionValidityError, }, }; use primitives::ValidityError; type CurrencyOf = <::VestingSchedule as VestingSchedule<::AccountId>>::Currency; type BalanceOf = as Currency<::AccountId>>::Balance; /// Configuration trait. pub trait Trait: system::Trait { /// The overarching event type. type Event: From> + Into<::Event>; type VestingSchedule: VestingSchedule; type Prefix: Get<&'static [u8]>; } /// The kind of a statement an account needs to make for a claim to be valid. #[derive(Encode, Decode, Clone, Copy, Eq, PartialEq, RuntimeDebug)] #[cfg_attr(feature = "std", derive(Serialize, Deserialize))] pub enum StatementKind { /// Statement required to be made by non-SAFT holders. Regular, /// Statement required to be made by SAFT holders. Saft, } impl StatementKind { /// Convert this to the (English) statement it represents. fn to_text(self) -> &'static [u8] { match self { StatementKind::Regular => &b"I hereby agree to the terms of the statement whose SHA-256 multihash is \ Qmc1XYqT6S39WNp2UeiRUrZichUWUPpGEThDE6dAb3f6Ny. (This may be found at the URL: \ https://statement.polkadot.network/regular.html)"[..], StatementKind::Saft => &b"I hereby agree to the terms of the statement whose SHA-256 multihash is \ QmXEkMahfhHJPzT3RjkXiZVFi77ZeVeuxtAjhojGRNYckz. (This may be found at the URL: \ https://statement.polkadot.network/saft.html)"[..], } } } impl Default for StatementKind { fn default() -> Self { StatementKind::Regular } } /// An Ethereum address (i.e. 20 bytes, used to represent an Ethereum account). /// /// This gets serialized to the 0x-prefixed hex representation. #[derive(Clone, Copy, PartialEq, Eq, Encode, Decode, Default, RuntimeDebug)] pub struct EthereumAddress([u8; 20]); #[cfg(feature = "std")] impl Serialize for EthereumAddress { fn serialize(&self, serializer: S) -> Result where S: Serializer { let hex: String = rustc_hex::ToHex::to_hex(&self.0[..]); serializer.serialize_str(&format!("0x{}", hex)) } } #[cfg(feature = "std")] impl<'de> Deserialize<'de> for EthereumAddress { fn deserialize(deserializer: D) -> Result where D: Deserializer<'de> { let base_string = String::deserialize(deserializer)?; let offset = if base_string.starts_with("0x") { 2 } else { 0 }; let s = &base_string[offset..]; if s.len() != 40 { Err(serde::de::Error::custom("Bad length of Ethereum address (should be 42 including '0x')"))?; } let raw: Vec = rustc_hex::FromHex::from_hex(s) .map_err(|e| serde::de::Error::custom(format!("{:?}", e)))?; let mut r = Self::default(); r.0.copy_from_slice(&raw); Ok(r) } } #[derive(Encode, Decode, Clone)] pub struct EcdsaSignature(pub [u8; 65]); impl PartialEq for EcdsaSignature { fn eq(&self, other: &Self) -> bool { &self.0[..] == &other.0[..] } } impl sp_std::fmt::Debug for EcdsaSignature { fn fmt(&self, f: &mut sp_std::fmt::Formatter<'_>) -> sp_std::fmt::Result { write!(f, "EcdsaSignature({:?})", &self.0[..]) } } decl_event!( pub enum Event where Balance = BalanceOf, AccountId = ::AccountId { /// Someone claimed some DOTs. Claimed(AccountId, EthereumAddress, Balance), } ); decl_error! { pub enum Error for Module { /// Invalid Ethereum signature. InvalidEthereumSignature, /// Ethereum address has no claim. SignerHasNoClaim, /// Account ID sending tx has no claim. SenderHasNoClaim, /// The destination is already vesting and cannot be the target of a further claim. DestinationVesting, /// There's not enough in the pot to pay out some unvested amount. Generally implies a logic /// error. PotUnderflow, /// A needed statement was not included. InvalidStatement, } } decl_storage! { // A macro for the Storage trait, and its implementation, for this module. // This allows for type-safe usage of the Substrate storage database, so you can // keep things around between blocks. trait Store for Module as Claims { Claims get(fn claims) build(|config: &GenesisConfig| { config.claims.iter().map(|(a, b, _, _)| (a.clone(), b.clone())).collect::>() }): map hasher(identity) EthereumAddress => Option>; Total get(fn total) build(|config: &GenesisConfig| { config.claims.iter().fold(Zero::zero(), |acc: BalanceOf, &(_, b, _, _)| acc + b) }): BalanceOf; /// Vesting schedule for a claim. /// First balance is the total amount that should be held for vesting. /// Second balance is how much should be unlocked per block. /// The block number is when the vesting should start. Vesting get(fn vesting) config(): map hasher(identity) EthereumAddress => Option<(BalanceOf, BalanceOf, T::BlockNumber)>; /// The statement kind that must be signed, if any. Signing build(|config: &GenesisConfig| { config.claims.iter() .filter_map(|(a, _, _, s)| Some((a.clone(), s.clone()?))) .collect::>() }): map hasher(identity) EthereumAddress => Option; /// Pre-claimed Ethereum accounts, by the Account ID that they are claimed to. Preclaims build(|config: &GenesisConfig| { config.claims.iter() .filter_map(|(a, _, i, _)| Some((i.clone()?, a.clone()))) .collect::>() }): map hasher(identity) T::AccountId => Option; } add_extra_genesis { config(claims): Vec<(EthereumAddress, BalanceOf, Option, Option)>; } } decl_module! { pub struct Module for enum Call where origin: T::Origin { type Error = Error; /// The Prefix that is used in signed Ethereum messages for this network const Prefix: &[u8] = T::Prefix::get(); /// Deposit one of this module's events by using the default implementation. fn deposit_event() = default; /// Make a claim to collect your DOTs. /// /// The dispatch origin for this call must be _None_. /// /// Unsigned Validation: /// A call to claim is deemed valid if the signature provided matches /// the expected signed message of: /// /// > Ethereum Signed Message: /// > (configured prefix string)(address) /// /// and `address` matches the `dest` account. /// /// Parameters: /// - `dest`: The destination account to payout the claim. /// - `ethereum_signature`: The signature of an ethereum signed message /// matching the format described above. /// /// /// The weight of this call is invariant over the input parameters. /// - One `eth_recover` operation which involves a keccak hash and a /// ecdsa recover. /// - Three storage reads to check if a claim exists for the user, to /// get the current pot size, to see if there exists a vesting schedule. /// - Up to one storage write for adding a new vesting schedule. /// - One `deposit_creating` Currency call. /// - One storage write to update the total. /// - Two storage removals for vesting and claims information. /// - One deposit event. /// /// Total Complexity: O(1) /// ---------------------------- /// Base Weight: 269.7 µs /// DB Weight: /// - Read: Signing, Claims, Total, Claims Vesting, Vesting Vesting, Balance Lock, Account /// - Write: Vesting Vesting, Account, Balance Lock, Total, Claim, Claims Vesting, Signing /// Validate Unsigned: +188.7 µs /// #[weight = T::DbWeight::get().reads_writes(7, 7) + 270_000_000 + 190_000_000] fn claim(origin, dest: T::AccountId, ethereum_signature: EcdsaSignature) { ensure_none(origin)?; let data = dest.using_encoded(to_ascii_hex); let signer = Self::eth_recover(ðereum_signature, &data, &[][..]) .ok_or(Error::::InvalidEthereumSignature)?; ensure!(Signing::get(&signer).is_none(), Error::::InvalidStatement); Self::process_claim(signer, dest)?; } /// Mint a new claim to collect DOTs. /// /// The dispatch origin for this call must be _Root_. /// /// Parameters: /// - `who`: The Ethereum address allowed to collect this claim. /// - `value`: The number of DOTs that will be claimed. /// - `vesting_schedule`: An optional vesting schedule for these DOTs. /// /// /// The weight of this call is invariant over the input parameters. /// - One storage mutate to increase the total claims available. /// - One storage write to add a new claim. /// - Up to one storage write to add a new vesting schedule. /// /// Total Complexity: O(1) /// --------------------- /// Base Weight: 10.46 µs /// DB Weight: /// - Reads: Total /// - Writes: Total, Claims /// - Maybe Write: Vesting, Statement /// #[weight = T::DbWeight::get().reads_writes(1, 2) + T::DbWeight::get().writes(vesting_schedule.is_some().into()) + T::DbWeight::get().writes(statement.is_some().into()) + 10_000_000 ] fn mint_claim(origin, who: EthereumAddress, value: BalanceOf, vesting_schedule: Option<(BalanceOf, BalanceOf, T::BlockNumber)>, statement: Option, ) { ensure_root(origin)?; >::mutate(|t| *t += value); >::insert(who, value); if let Some(vs) = vesting_schedule { >::insert(who, vs); } if let Some(s) = statement { Signing::insert(who, s); } } /// Make a claim to collect your DOTs by signing a statement. /// /// The dispatch origin for this call must be _None_. /// /// Unsigned Validation: /// A call to `claim_attest` is deemed valid if the signature provided matches /// the expected signed message of: /// /// > Ethereum Signed Message: /// > (configured prefix string)(address)(statement) /// /// and `address` matches the `dest` account; the `statement` must match that which is /// expected according to your purchase arrangement. /// /// Parameters: /// - `dest`: The destination account to payout the claim. /// - `ethereum_signature`: The signature of an ethereum signed message /// matching the format described above. /// - `statement`: The identity of the statement which is being attested to in the signature. /// /// /// The weight of this call is invariant over the input parameters. /// - One `eth_recover` operation which involves a keccak hash and a /// ecdsa recover. /// - Four storage reads to check if a claim exists for the user, to /// get the current pot size, to see if there exists a vesting schedule, to get the /// required statement. /// - Up to one storage write for adding a new vesting schedule. /// - One `deposit_creating` Currency call. /// - One storage write to update the total. /// - Two storage removals for vesting and claims information. /// - One deposit event. /// /// Total Complexity: O(1) /// ---------------------------- /// Base Weight: 270.2 µs /// DB Weight: /// - Read: Signing, Claims, Total, Claims Vesting, Vesting Vesting, Balance Lock, Account /// - Write: Vesting Vesting, Account, Balance Lock, Total, Claim, Claims Vesting, Signing /// Validate Unsigned: +190.1 µs /// #[weight = T::DbWeight::get().reads_writes(7, 7) + 270_000_000 + 190_000_000] fn claim_attest(origin, dest: T::AccountId, ethereum_signature: EcdsaSignature, statement: Vec, ) { ensure_none(origin)?; let data = dest.using_encoded(to_ascii_hex); let signer = Self::eth_recover(ðereum_signature, &data, &statement) .ok_or(Error::::InvalidEthereumSignature)?; if let Some(s) = Signing::get(signer) { ensure!(s.to_text() == &statement[..], Error::::InvalidStatement); } Self::process_claim(signer, dest)?; } /// Attest to a statement, needed to finalize the claims process. /// /// WARNING: Insecure unless your chain includes `PrevalidateAttests` as a `SignedExtension`. /// /// Unsigned Validation: /// A call to attest is deemed valid if the sender has a `Preclaim` registered /// and provides a `statement` which is expected for the account. /// /// Parameters: /// - `statement`: The identity of the statement which is being attested to in the signature. /// /// /// Total Complexity: O(1) /// ---------------------------- /// Base Weight: 93.3 µs /// DB Weight: /// - Read: Preclaims, Signing, Claims, Total, Claims Vesting, Vesting Vesting, Balance Lock, Account /// - Write: Vesting Vesting, Account, Balance Lock, Total, Claim, Claims Vesting, Signing, Preclaims /// Validate PreValidateAttests: +8.631 µs /// #[weight = ( T::DbWeight::get().reads_writes(8, 8) + 90_000_000 + 10_000_000, DispatchClass::Normal, Pays::No )] fn attest(origin, statement: Vec) { let who = ensure_signed(origin)?; let signer = Preclaims::::get(&who).ok_or(Error::::SenderHasNoClaim)?; if let Some(s) = Signing::get(signer) { ensure!(s.to_text() == &statement[..], Error::::InvalidStatement); } Self::process_claim(signer, who.clone())?; Preclaims::::remove(&who); } } } /// Converts the given binary data into ASCII-encoded hex. It will be twice the length. fn to_ascii_hex(data: &[u8]) -> Vec { let mut r = Vec::with_capacity(data.len() * 2); let mut push_nibble = |n| r.push(if n < 10 { b'0' + n } else { b'a' - 10 + n }); for &b in data.iter() { push_nibble(b / 16); push_nibble(b % 16); } r } impl Module { // Constructs the message that Ethereum RPC's `personal_sign` and `eth_sign` would sign. fn ethereum_signable_message(what: &[u8], extra: &[u8]) -> Vec { let prefix = T::Prefix::get(); let mut l = prefix.len() + what.len() + extra.len(); let mut rev = Vec::new(); while l > 0 { rev.push(b'0' + (l % 10) as u8); l /= 10; } let mut v = b"\x19Ethereum Signed Message:\n".to_vec(); v.extend(rev.into_iter().rev()); v.extend_from_slice(&prefix[..]); v.extend_from_slice(what); v.extend_from_slice(extra); v } // Attempts to recover the Ethereum address from a message signature signed by using // the Ethereum RPC's `personal_sign` and `eth_sign`. fn eth_recover(s: &EcdsaSignature, what: &[u8], extra: &[u8]) -> Option { let msg = keccak_256(&Self::ethereum_signable_message(what, extra)); let mut res = EthereumAddress::default(); res.0.copy_from_slice(&keccak_256(&secp256k1_ecdsa_recover(&s.0, &msg).ok()?[..])[12..]); Some(res) } fn process_claim(signer: EthereumAddress, dest: T::AccountId) -> DispatchResult { let balance_due = >::get(&signer) .ok_or(Error::::SignerHasNoClaim)?; let new_total = Self::total().checked_sub(&balance_due).ok_or(Error::::PotUnderflow)?; // Check if this claim should have a vesting schedule. if let Some(vs) = >::get(&signer) { // If this fails, destination account already has a vesting schedule // applied to it, and this claim should not be processed. T::VestingSchedule::add_vesting_schedule(&dest, vs.0, vs.1, vs.2) .map_err(|_| Error::::DestinationVesting)?; } CurrencyOf::::deposit_creating(&dest, balance_due); >::put(new_total); >::remove(&signer); >::remove(&signer); Signing::remove(&signer); // Let's deposit an event to let the outside world know this happened. Self::deposit_event(RawEvent::Claimed(dest, signer, balance_due)); Ok(()) } } impl sp_runtime::traits::ValidateUnsigned for Module { type Call = Call; fn validate_unsigned(_source: TransactionSource, call: &Self::Call) -> TransactionValidity { const PRIORITY: u64 = 100; let (maybe_signer, maybe_statement) = match call { // // Base Weight: 188.7 µs (includes the full logic of `validate_unsigned`) // DB Weight: 2 Read (Claims, Signing) // Call::claim(account, ethereum_signature) => { let data = account.using_encoded(to_ascii_hex); (Self::eth_recover(ðereum_signature, &data, &[][..]), None) } // // Base Weight: 190.1 µs (includes the full logic of `validate_unsigned`) // DB Weight: 2 Read (Claims, Signing) // Call::claim_attest(account, ethereum_signature, statement) => { let data = account.using_encoded(to_ascii_hex); (Self::eth_recover(ðereum_signature, &data, &statement), Some(statement.as_slice())) } _ => return Err(InvalidTransaction::Call.into()), }; let signer = maybe_signer .ok_or(InvalidTransaction::Custom(ValidityError::InvalidEthereumSignature.into()))?; let e = InvalidTransaction::Custom(ValidityError::SignerHasNoClaim.into()); ensure!(>::contains_key(&signer), e); let e = InvalidTransaction::Custom(ValidityError::InvalidStatement.into()); match Signing::get(signer) { None => ensure!(maybe_statement.is_none(), e), Some(s) => ensure!(Some(s.to_text()) == maybe_statement, e), } Ok(ValidTransaction { priority: PRIORITY, requires: vec![], provides: vec![("claims", signer).encode()], longevity: TransactionLongevity::max_value(), propagate: true, }) } } /// Validate `attest` calls prior to execution. Needed to avoid a DoS attack since they are /// otherwise free to place on chain. #[derive(Encode, Decode, Clone, Eq, PartialEq)] pub struct PrevalidateAttests(sp_std::marker::PhantomData) where ::Call: IsSubType, T>; impl Debug for PrevalidateAttests where ::Call: IsSubType, T> { #[cfg(feature = "std")] fn fmt(&self, f: &mut sp_std::fmt::Formatter) -> sp_std::fmt::Result { write!(f, "PrevalidateAttests") } #[cfg(not(feature = "std"))] fn fmt(&self, _: &mut sp_std::fmt::Formatter) -> sp_std::fmt::Result { Ok(()) } } impl PrevalidateAttests where ::Call: IsSubType, T> { /// Create new `SignedExtension` to check runtime version. pub fn new() -> Self { Self(sp_std::marker::PhantomData) } } impl SignedExtension for PrevalidateAttests where ::Call: IsSubType, T> { type AccountId = T::AccountId; type Call = ::Call; type AdditionalSigned = (); type Pre = (); const IDENTIFIER: &'static str = "PrevalidateAttests"; fn additional_signed(&self) -> Result { Ok(()) } // // Base Weight: 8.631 µs // DB Weight: 2 Read (Preclaims, Signing) // fn validate( &self, who: &Self::AccountId, call: &Self::Call, _info: &DispatchInfoOf, _len: usize, ) -> TransactionValidity { if let Some(local_call) = call.is_sub_type() { if let Call::attest(attested_statement) = local_call { let signer = Preclaims::::get(who) .ok_or(InvalidTransaction::Custom(ValidityError::SignerHasNoClaim.into()))?; if let Some(s) = Signing::get(signer) { let e = InvalidTransaction::Custom(ValidityError::InvalidStatement.into()); ensure!(&attested_statement[..] == s.to_text(), e); } } } Ok(ValidTransaction::default()) } } #[cfg(any(test, feature = "runtime-benchmarks"))] mod secp_utils { use super::*; use secp256k1; pub fn public(secret: &secp256k1::SecretKey) -> secp256k1::PublicKey { secp256k1::PublicKey::from_secret_key(secret) } pub fn eth(secret: &secp256k1::SecretKey) -> EthereumAddress { let mut res = EthereumAddress::default(); res.0.copy_from_slice(&keccak_256(&public(secret).serialize()[1..65])[12..]); res } pub fn sig(secret: &secp256k1::SecretKey, what: &[u8], extra: &[u8]) -> EcdsaSignature { let msg = keccak_256(&>::ethereum_signable_message(&to_ascii_hex(what)[..], extra)); let (sig, recovery_id) = secp256k1::sign(&secp256k1::Message::parse(&msg), secret); let mut r = [0u8; 65]; r[0..64].copy_from_slice(&sig.serialize()[..]); r[64] = recovery_id.serialize(); EcdsaSignature(r) } } #[cfg(test)] mod tests { use secp256k1; use hex_literal::hex; use super::*; use secp_utils::*; use sp_core::H256; use codec::Encode; // The testing primitives are very useful for avoiding having to work with signatures // or public keys. `u64` is used as the `AccountId` and no `Signature`s are required. use sp_runtime::{Perbill, traits::{BlakeTwo256, IdentityLookup, Identity}, testing::Header}; use frame_support::{ impl_outer_origin, impl_outer_dispatch, assert_ok, assert_err, assert_noop, parameter_types, weights::{Pays, GetDispatchInfo}, }; use balances; use super::Call as ClaimsCall; impl_outer_origin! { pub enum Origin for Test {} } impl_outer_dispatch! { pub enum Call for Test where origin: Origin { claims::Claims, } } // For testing the module, we construct most of a mock runtime. This means // first constructing a configuration type (`Test`) which `impl`s each of the // configuration traits of modules we want to use. #[derive(Clone, Eq, PartialEq)] pub struct Test; parameter_types! { pub const BlockHashCount: u32 = 250; pub const MaximumBlockWeight: u32 = 4 * 1024 * 1024; pub const MaximumBlockLength: u32 = 4 * 1024 * 1024; pub const AvailableBlockRatio: Perbill = Perbill::from_percent(75); } impl system::Trait for Test { type Origin = Origin; type Call = Call; type Index = u64; type BlockNumber = u64; type Hash = H256; type Hashing = BlakeTwo256; type AccountId = u64; type Lookup = IdentityLookup; type Header = Header; type Event = (); type BlockHashCount = BlockHashCount; type MaximumBlockWeight = MaximumBlockWeight; type DbWeight = (); type BlockExecutionWeight = (); type ExtrinsicBaseWeight = (); type MaximumExtrinsicWeight = MaximumBlockWeight; type MaximumBlockLength = MaximumBlockLength; type AvailableBlockRatio = AvailableBlockRatio; type Version = (); type ModuleToIndex = (); type AccountData = balances::AccountData; type OnNewAccount = (); type OnKilledAccount = Balances; } parameter_types! { pub const ExistentialDeposit: u64 = 1; pub const CreationFee: u64 = 0; pub const MinVestedTransfer: u64 = 0; } impl balances::Trait for Test { type Balance = u64; type Event = (); type DustRemoval = (); type ExistentialDeposit = ExistentialDeposit; type AccountStore = System; } impl vesting::Trait for Test { type Event = (); type Currency = Balances; type BlockNumberToBalance = Identity; type MinVestedTransfer = MinVestedTransfer; } parameter_types!{ pub Prefix: &'static [u8] = b"Pay RUSTs to the TEST account:"; } impl Trait for Test { type Event = (); type VestingSchedule = Vesting; type Prefix = Prefix; } type System = system::Module; type Balances = balances::Module; type Vesting = vesting::Module; type Claims = Module; fn alice() -> secp256k1::SecretKey { secp256k1::SecretKey::parse(&keccak_256(b"Alice")).unwrap() } fn bob() -> secp256k1::SecretKey { secp256k1::SecretKey::parse(&keccak_256(b"Bob")).unwrap() } fn dave() -> secp256k1::SecretKey { secp256k1::SecretKey::parse(&keccak_256(b"Dave")).unwrap() } fn eve() -> secp256k1::SecretKey { secp256k1::SecretKey::parse(&keccak_256(b"Eve")).unwrap() } fn frank() -> secp256k1::SecretKey { secp256k1::SecretKey::parse(&keccak_256(b"Frank")).unwrap() } // This function basically just builds a genesis storage key/value store according to // our desired mockup. pub fn new_test_ext() -> sp_io::TestExternalities { let mut t = system::GenesisConfig::default().build_storage::().unwrap(); // We use default for brevity, but you can configure as desired if needed. balances::GenesisConfig::::default().assimilate_storage(&mut t).unwrap(); GenesisConfig::{ claims: vec![ (eth(&alice()), 100, None, None), (eth(&dave()), 200, None, Some(StatementKind::Regular)), (eth(&eve()), 300, Some(42), Some(StatementKind::Saft)), (eth(&frank()), 400, Some(43), None), ], vesting: vec![(eth(&alice()), (50, 10, 1))], }.assimilate_storage(&mut t).unwrap(); t.into() } fn total_claims() -> u64 { 100 + 200 + 300 + 400 } #[test] fn basic_setup_works() { new_test_ext().execute_with(|| { assert_eq!(Claims::total(), total_claims()); assert_eq!(Claims::claims(ð(&alice())), Some(100)); assert_eq!(Claims::claims(ð(&dave())), Some(200)); assert_eq!(Claims::claims(ð(&eve())), Some(300)); assert_eq!(Claims::claims(ð(&frank())), Some(400)); assert_eq!(Claims::claims(&EthereumAddress::default()), None); assert_eq!(Claims::vesting(ð(&alice())), Some((50, 10, 1))); }); } #[test] fn serde_works() { let x = EthereumAddress(hex!["0123456789abcdef0123456789abcdef01234567"]); let y = serde_json::to_string(&x).unwrap(); assert_eq!(y, "\"0x0123456789abcdef0123456789abcdef01234567\""); let z: EthereumAddress = serde_json::from_str(&y).unwrap(); assert_eq!(x, z); } #[test] fn claiming_works() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_ok!(Claims::claim(Origin::NONE, 42, sig::(&alice(), &42u64.encode(), &[][..]))); assert_eq!(Balances::free_balance(&42), 100); assert_eq!(Vesting::vesting_balance(&42), Some(50)); assert_eq!(Claims::total(), total_claims() - 100); }); } #[test] fn claiming_does_not_bypass_signing() { new_test_ext().execute_with(|| { assert_ok!(Claims::claim(Origin::NONE, 42, sig::(&alice(), &42u64.encode(), &[][..]))); assert_noop!( Claims::claim(Origin::NONE, 42, sig::(&dave(), &42u64.encode(), &[][..])), Error::::InvalidStatement, ); assert_noop!( Claims::claim(Origin::NONE, 42, sig::(&eve(), &42u64.encode(), &[][..])), Error::::InvalidStatement, ); assert_ok!(Claims::claim(Origin::NONE, 42, sig::(&frank(), &42u64.encode(), &[][..]))); }); } #[test] fn attest_claiming_works() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); let s = sig::(&dave(), &42u64.encode(), StatementKind::Saft.to_text()); let r = Claims::claim_attest(Origin::NONE, 42, s.clone(), StatementKind::Saft.to_text().to_vec()); assert_noop!(r, Error::::InvalidStatement); let r = Claims::claim_attest(Origin::NONE, 42, s, StatementKind::Regular.to_text().to_vec()); assert_noop!(r, Error::::SignerHasNoClaim); // ^^^ we use ecdsa_recover, so an invalid signature just results in a random signer id // being recovered, which realistically will never have a claim. let s = sig::(&dave(), &42u64.encode(), StatementKind::Regular.to_text()); assert_ok!(Claims::claim_attest(Origin::NONE, 42, s, StatementKind::Regular.to_text().to_vec())); assert_eq!(Balances::free_balance(&42), 200); assert_eq!(Claims::total(), total_claims() - 200); let s = sig::(&dave(), &42u64.encode(), StatementKind::Regular.to_text()); let r = Claims::claim_attest(Origin::NONE, 42, s, StatementKind::Regular.to_text().to_vec()); assert_noop!(r, Error::::SignerHasNoClaim); }); } #[test] fn attesting_works() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_noop!(Claims::attest(Origin::signed(69), StatementKind::Saft.to_text().to_vec()), Error::::SenderHasNoClaim); assert_noop!(Claims::attest(Origin::signed(42), StatementKind::Regular.to_text().to_vec()), Error::::InvalidStatement); assert_ok!(Claims::attest(Origin::signed(42), StatementKind::Saft.to_text().to_vec())); assert_eq!(Balances::free_balance(&42), 300); assert_eq!(Claims::total(), total_claims() - 300); }); } #[test] fn claim_cannot_clobber_preclaim() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); // Alice's claim is 100 assert_ok!(Claims::claim(Origin::NONE, 42, sig::(&alice(), &42u64.encode(), &[][..]))); assert_eq!(Balances::free_balance(&42), 100); // Eve's claim is 300 through Account 42 assert_ok!(Claims::attest(Origin::signed(42), StatementKind::Saft.to_text().to_vec())); assert_eq!(Balances::free_balance(&42), 100 + 300); assert_eq!(Claims::total(), total_claims() - 400); }); } #[test] fn valid_attest_transactions_are_free() { new_test_ext().execute_with(|| { let p = PrevalidateAttests::::new(); let c = Call::Claims(ClaimsCall::attest(StatementKind::Saft.to_text().to_vec())); let di = c.get_dispatch_info(); assert_eq!(di.pays_fee, Pays::No); let r = p.validate(&42, &c, &di, 20); assert_eq!(r, TransactionValidity::Ok(ValidTransaction::default())); }); } #[test] fn invalid_attest_transactions_are_recognised() { new_test_ext().execute_with(|| { let p = PrevalidateAttests::::new(); let c = Call::Claims(ClaimsCall::attest(StatementKind::Regular.to_text().to_vec())); let di = c.get_dispatch_info(); let r = p.validate(&42, &c, &di, 20); assert!(r.is_err()); let c = Call::Claims(ClaimsCall::attest(StatementKind::Saft.to_text().to_vec())); let di = c.get_dispatch_info(); let r = p.validate(&69, &c, &di, 20); assert!(r.is_err()); }); } #[test] fn cannot_bypass_attest_claiming() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); let s = sig::(&dave(), &42u64.encode(), &[]); let r = Claims::claim(Origin::NONE, 42, s.clone()); assert_noop!(r, Error::::InvalidStatement); }); } #[test] fn add_claim_works() { new_test_ext().execute_with(|| { assert_noop!( Claims::mint_claim(Origin::signed(42), eth(&bob()), 200, None, None), sp_runtime::traits::BadOrigin, ); assert_eq!(Balances::free_balance(42), 0); assert_noop!( Claims::claim(Origin::NONE, 69, sig::(&bob(), &69u64.encode(), &[][..])), Error::::SignerHasNoClaim, ); assert_ok!(Claims::mint_claim(Origin::ROOT, eth(&bob()), 200, None, None)); assert_eq!(Claims::total(), total_claims() + 200); assert_ok!(Claims::claim(Origin::NONE, 69, sig::(&bob(), &69u64.encode(), &[][..]))); assert_eq!(Balances::free_balance(&69), 200); assert_eq!(Vesting::vesting_balance(&69), None); assert_eq!(Claims::total(), total_claims()); }); } #[test] fn add_claim_with_vesting_works() { new_test_ext().execute_with(|| { assert_noop!( Claims::mint_claim(Origin::signed(42), eth(&bob()), 200, Some((50, 10, 1)), None), sp_runtime::traits::BadOrigin, ); assert_eq!(Balances::free_balance(42), 0); assert_noop!( Claims::claim(Origin::NONE, 69, sig::(&bob(), &69u64.encode(), &[][..])), Error::::SignerHasNoClaim ); assert_ok!(Claims::mint_claim(Origin::ROOT, eth(&bob()), 200, Some((50, 10, 1)), None)); assert_ok!(Claims::claim(Origin::NONE, 69, sig::(&bob(), &69u64.encode(), &[][..]))); assert_eq!(Balances::free_balance(&69), 200); assert_eq!(Vesting::vesting_balance(&69), Some(50)); }); } #[test] fn add_claim_with_statement_works() { new_test_ext().execute_with(|| { assert_noop!( Claims::mint_claim(Origin::signed(42), eth(&bob()), 200, None, Some(StatementKind::Regular)), sp_runtime::traits::BadOrigin, ); assert_eq!(Balances::free_balance(42), 0); let signature = sig::(&bob(), &69u64.encode(), StatementKind::Regular.to_text()); assert_noop!( Claims::claim_attest( Origin::NONE, 69, signature.clone(), StatementKind::Regular.to_text().to_vec() ), Error::::SignerHasNoClaim ); assert_ok!(Claims::mint_claim(Origin::ROOT, eth(&bob()), 200, None, Some(StatementKind::Regular))); assert_noop!( Claims::claim_attest( Origin::NONE, 69, signature.clone(), vec![], ), Error::::SignerHasNoClaim ); assert_ok!( Claims::claim_attest( Origin::NONE, 69, signature.clone(), StatementKind::Regular.to_text().to_vec() ) ); assert_eq!(Balances::free_balance(&69), 200); }); } #[test] fn origin_signed_claiming_fail() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_err!( Claims::claim(Origin::signed(42), 42, sig::(&alice(), &42u64.encode(), &[][..])), sp_runtime::traits::BadOrigin, ); }); } #[test] fn double_claiming_doesnt_work() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_ok!(Claims::claim(Origin::NONE, 42, sig::(&alice(), &42u64.encode(), &[][..]))); assert_noop!( Claims::claim(Origin::NONE, 42, sig::(&alice(), &42u64.encode(), &[][..])), Error::::SignerHasNoClaim ); }); } #[test] fn claiming_while_vested_doesnt_work() { new_test_ext().execute_with(|| { // A user is already vested assert_ok!(::VestingSchedule::add_vesting_schedule(&69, total_claims(), 100, 10)); CurrencyOf::::make_free_balance_be(&69, total_claims()); assert_eq!(Balances::free_balance(69), total_claims()); assert_ok!(Claims::mint_claim(Origin::ROOT, eth(&bob()), 200, Some((50, 10, 1)), None)); // New total assert_eq!(Claims::total(), total_claims() + 200); // They should not be able to claim assert_noop!( Claims::claim(Origin::NONE, 69, sig::(&bob(), &69u64.encode(), &[][..])), Error::::DestinationVesting ); }); } #[test] fn non_sender_sig_doesnt_work() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_noop!( Claims::claim(Origin::NONE, 42, sig::(&alice(), &69u64.encode(), &[][..])), Error::::SignerHasNoClaim ); }); } #[test] fn non_claimant_doesnt_work() { new_test_ext().execute_with(|| { assert_eq!(Balances::free_balance(42), 0); assert_noop!( Claims::claim(Origin::NONE, 42, sig::(&bob(), &69u64.encode(), &[][..])), Error::::SignerHasNoClaim ); }); } #[test] fn real_eth_sig_works() { new_test_ext().execute_with(|| { // "Pay RUSTs to the TEST account:2a00000000000000" let sig = hex!["444023e89b67e67c0562ed0305d252a5dd12b2af5ac51d6d3cb69a0b486bc4b3191401802dc29d26d586221f7256cd3329fe82174bdf659baea149a40e1c495d1c"]; let sig = EcdsaSignature(sig); let who = 42u64.using_encoded(to_ascii_hex); let signer = Claims::eth_recover(&sig, &who, &[][..]).unwrap(); assert_eq!(signer.0, hex!["6d31165d5d932d571f3b44695653b46dcc327e84"]); }); } #[test] fn validate_unsigned_works() { use sp_runtime::traits::ValidateUnsigned; let source = sp_runtime::transaction_validity::TransactionSource::External; new_test_ext().execute_with(|| { assert_eq!( >::validate_unsigned(source, &ClaimsCall::claim(1, sig::(&alice(), &1u64.encode(), &[][..]))), Ok(ValidTransaction { priority: 100, requires: vec![], provides: vec![("claims", eth(&alice())).encode()], longevity: TransactionLongevity::max_value(), propagate: true, }) ); assert_eq!( >::validate_unsigned(source, &ClaimsCall::claim(0, EcdsaSignature([0; 65]))), InvalidTransaction::Custom(ValidityError::InvalidEthereumSignature.into()).into(), ); assert_eq!( >::validate_unsigned(source, &ClaimsCall::claim(1, sig::(&bob(), &1u64.encode(), &[][..]))), InvalidTransaction::Custom(ValidityError::SignerHasNoClaim.into()).into(), ); let s = sig::(&dave(), &1u64.encode(), StatementKind::Regular.to_text()); let call = ClaimsCall::claim_attest(1, s, StatementKind::Regular.to_text().to_vec()); assert_eq!( >::validate_unsigned(source, &call), Ok(ValidTransaction { priority: 100, requires: vec![], provides: vec![("claims", eth(&dave())).encode()], longevity: TransactionLongevity::max_value(), propagate: true, }) ); assert_eq!( >::validate_unsigned( source, &ClaimsCall::claim_attest(1, EcdsaSignature([0; 65]), StatementKind::Regular.to_text().to_vec()) ), InvalidTransaction::Custom(ValidityError::InvalidEthereumSignature.into()).into(), ); let s = sig::(&bob(), &1u64.encode(), StatementKind::Regular.to_text()); let call = ClaimsCall::claim_attest(1, s, StatementKind::Regular.to_text().to_vec()); assert_eq!( >::validate_unsigned(source, &call), InvalidTransaction::Custom(ValidityError::SignerHasNoClaim.into()).into(), ); let s = sig::(&dave(), &1u64.encode(), StatementKind::Saft.to_text()); let call = ClaimsCall::claim_attest(1, s, StatementKind::Regular.to_text().to_vec()); assert_eq!( >::validate_unsigned(source, &call), InvalidTransaction::Custom(ValidityError::SignerHasNoClaim.into()).into(), ); let s = sig::(&dave(), &1u64.encode(), StatementKind::Saft.to_text()); let call = ClaimsCall::claim_attest(1, s, StatementKind::Saft.to_text().to_vec()); assert_eq!( >::validate_unsigned(source, &call), InvalidTransaction::Custom(ValidityError::InvalidStatement.into()).into(), ); }); } } #[cfg(feature = "runtime-benchmarks")] mod benchmarking { use super::*; use secp_utils::*; use system::RawOrigin; use system as frame_system; // NOTE: required for the benchmarks! macro use frame_benchmarking::{benchmarks, account}; use sp_runtime::DispatchResult; use sp_runtime::traits::ValidateUnsigned; use crate::claims::Call; const SEED: u32 = 0; const MAX_CLAIMS: u32 = 10_000; const VALUE: u32 = 1_000_000; fn create_claim(input: u32) -> DispatchResult { let secret_key = secp256k1::SecretKey::parse(&keccak_256(&input.encode())).unwrap(); let eth_address = eth(&secret_key); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); super::Module::::mint_claim(RawOrigin::Root.into(), eth_address, VALUE.into(), vesting, None)?; Ok(()) } fn create_claim_attest(input: u32) -> DispatchResult { let secret_key = secp256k1::SecretKey::parse(&keccak_256(&input.encode())).unwrap(); let eth_address = eth(&secret_key); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); super::Module::::mint_claim( RawOrigin::Root.into(), eth_address, VALUE.into(), vesting, Some(Default::default()) )?; Ok(()) } benchmarks! { _ { // Create claims in storage. Two are created at a time! let c in 0 .. MAX_CLAIMS / 2 => { create_claim::(c)?; create_claim_attest::(u32::max_value() - c)?; }; } // Benchmark `claim` for different users. claim { let u in 0 .. 1000; let secret_key = secp256k1::SecretKey::parse(&keccak_256(&u.encode())).unwrap(); let eth_address = eth(&secret_key); let account: T::AccountId = account("user", u, SEED); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); let signature = sig::(&secret_key, &account.encode(), &[][..]); super::Module::::mint_claim(RawOrigin::Root.into(), eth_address, VALUE.into(), vesting, None)?; assert_eq!(Claims::::get(eth_address), Some(VALUE.into())); }: _(RawOrigin::None, account, signature) verify { assert_eq!(Claims::::get(eth_address), None); } // Benchmark `mint_claim` when there already exists `c` claims in storage. mint_claim { let c in ...; let eth_address = account("eth_address", c, SEED); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); let statement = StatementKind::Regular; }: _(RawOrigin::Root, eth_address, VALUE.into(), vesting, Some(statement)) verify { assert_eq!(Claims::::get(eth_address), Some(VALUE.into())); } // Benchmark `claim_attest` for different users. claim_attest { let u in 0 .. 1000; let attest_u = u32::max_value() - u; let secret_key = secp256k1::SecretKey::parse(&keccak_256(&attest_u.encode())).unwrap(); let eth_address = eth(&secret_key); let account: T::AccountId = account("user", u, SEED); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); let statement = StatementKind::Regular; let signature = sig::(&secret_key, &account.encode(), statement.to_text()); super::Module::::mint_claim(RawOrigin::Root.into(), eth_address, VALUE.into(), vesting, Some(statement))?; assert_eq!(Claims::::get(eth_address), Some(VALUE.into())); }: _(RawOrigin::None, account, signature, statement.to_text().to_vec()) verify { assert_eq!(Claims::::get(eth_address), None); } // Benchmark `attest` for different users. attest { let u in 0 .. 1000; let attest_u = u32::max_value() - u; let secret_key = secp256k1::SecretKey::parse(&keccak_256(&attest_u.encode())).unwrap(); let eth_address = eth(&secret_key); let account: T::AccountId = account("user", u, SEED); let vesting = Some((100_000.into(), 1_000.into(), 100.into())); let statement = StatementKind::Regular; let signature = sig::(&secret_key, &account.encode(), statement.to_text()); super::Module::::mint_claim(RawOrigin::Root.into(), eth_address, VALUE.into(), vesting, Some(statement))?; Preclaims::::insert(&account, eth_address); assert_eq!(Claims::::get(eth_address), Some(VALUE.into())); }: _(RawOrigin::Signed(account), statement.to_text().to_vec()) verify { assert_eq!(Claims::::get(eth_address), None); } // Benchmark the time it takes to execute `validate_unsigned` for `claim` validate_unsigned_claim { let c in ...; // Crate signature let secret_key = secp256k1::SecretKey::parse(&keccak_256(&c.encode())).unwrap(); let account: T::AccountId = account("user", c, SEED); let signature = sig::(&secret_key, &account.encode(), &[][..]); let call = Call::::claim(account, signature); let source = sp_runtime::transaction_validity::TransactionSource::External; }: { super::Module::::validate_unsigned(source, &call)? } // Benchmark the time it takes to execute `validate_unsigned` for `claim_attest` validate_unsigned_claim_attest { let c in ...; // Crate signature let attest_c = u32::max_value() - c; let secret_key = secp256k1::SecretKey::parse(&keccak_256(&attest_c.encode())).unwrap(); let account: T::AccountId = account("user", c, SEED); let signature = sig::(&secret_key, &account.encode(), StatementKind::Regular.to_text()); let call = Call::::claim_attest(account, signature, StatementKind::Regular.to_text().to_vec()); let source = sp_runtime::transaction_validity::TransactionSource::External; }: { super::Module::::validate_unsigned(source, &call)? } validate_prevalidate_attests { let c in ...; let attest_c = u32::max_value() - c; let secret_key = secp256k1::SecretKey::parse(&keccak_256(&attest_c.encode())).unwrap(); let eth_address = eth(&secret_key); let account: T::AccountId = account("user", c, SEED); Preclaims::::insert(&account, eth_address); let call = super::Call::attest(StatementKind::Regular.to_text().to_vec()); // We have to copy the validate statement here because of trait issues... :( let validate = |who: &T::AccountId, call: &super::Call| -> DispatchResult { if let Call::attest(attested_statement) = call { let signer = Preclaims::::get(who).ok_or("signer has no claim")?; if let Some(s) = Signing::get(signer) { ensure!(&attested_statement[..] == s.to_text(), "invalid statement"); } } Ok(()) }; }: { validate(&account, &call)? } // Benchmark the time it takes to do `repeat` number of keccak256 hashes keccak256 { let i in 0 .. 10_000; let bytes = (i).encode(); }: { for index in 0 .. i { let _hash = keccak_256(&bytes); } } // Benchmark the time it takes to do `repeat` number of `eth_recover` eth_recover { let i in 0 .. 1_000; // Crate signature let secret_key = secp256k1::SecretKey::parse(&keccak_256(&i.encode())).unwrap(); let account: T::AccountId = account("user", i, SEED); let signature = sig::(&secret_key, &account.encode(), &[][..]); let data = account.using_encoded(to_ascii_hex); let extra = StatementKind::default().to_text(); }: { for _ in 0 .. i { assert!(super::Module::::eth_recover(&signature, &data, extra).is_some()); } } } #[cfg(test)] mod tests { use super::*; use crate::claims::tests::{new_test_ext, Test}; use frame_support::assert_ok; #[test] fn test_benchmarks() { new_test_ext().execute_with(|| { assert_ok!(test_benchmark_claim::()); assert_ok!(test_benchmark_mint_claim::()); assert_ok!(test_benchmark_claim_attest::()); assert_ok!(test_benchmark_attest::()); assert_ok!(test_benchmark_validate_unsigned_claim::()); assert_ok!(test_benchmark_validate_unsigned_claim_attest::()); assert_ok!(test_benchmark_validate_prevalidate_attests::()); assert_ok!(test_benchmark_keccak256::()); assert_ok!(test_benchmark_eth_recover::()); }); } } }