diff --git a/pallets/bitcoin-vaults/README.md b/pallets/bitcoin-vaults/README.md index 814c3055..630d7704 100644 --- a/pallets/bitcoin-vaults/README.md +++ b/pallets/bitcoin-vaults/README.md @@ -26,6 +26,10 @@ A storage module for Native Bitcoin Vaults on substrate. - [Sign a proposal](#sign-a-proposal) - [Finalize (and posibly broadcast) a PSBT](#finalize-and-posibly-broadcast-a-psbt) - [Broadcast a PSBT](#broadcast-a-psbt) + - [Create a Proof of Reserve](#create-a-proof-of-reserve) + - [Query a Proof of Reserve](#query-a-proof-of-reserve) + - [Save a PoR psbt](#save-a-por-psbt) + - [Finalize a PoR](#finalize-a-por) - [Polkadot-js api (javascript library)](#polkadot-js-api-javascript-library) - [Enabling Offchain Worker](#enabling-offchain-worker-1) - [Insert an xpub](#insert-an-xpub-1) @@ -43,6 +47,11 @@ A storage module for Native Bitcoin Vaults on substrate. - [Sign a proposal](#sign-a-proposal-1) - [Finalize (and posibly broadcast) a PSBT](#finalize-and-posibly-broadcast-a-psbt-1) - [Broadcast a PSBT](#broadcast-a-psbt-1) + - [Create a Proof of reserve](#create-a-proof-of-reserve-1) + - [Query a Proof of Reserve](#query-a-proof-of-reserve-1) + - [Query all PoR's](#query-all-pors) + - [Save a PoR psbt](#save-a-por-psbt-1) + - [Finalize a PoR](#finalize-a-por-1) - [Events](#events) - [Errors](#errors) - [Assumptions](#assumptions) @@ -54,6 +63,7 @@ This module provides functionality for data management regarding the Native Bitc - Query the stored, extended public keys by individual accounts (owners). - Create Bitcoin Vaults: Specify vault users to participate in your vault and threshold in order to get a transaction aproved. The output descriptors will get generated automatically by an offchain worker (requests `bdk-services`). - Sign Vault PSBT's: You can approve and sign a proposal in a vault you participate, if the number of signs gets equal or greater than the threshold, the Transaction will be executed. +- Generate proof of reserves to ensure a vault's balance. ### Terminology @@ -75,11 +85,14 @@ This module provides functionality for data management regarding the Native Bitc - `save_psbt` takes a `proposal_id` and collects a signature payload in pure bytes for it, these types of signatures are necessary to fullfill the vault's `threshold`. If successful, this process cannot be undone. - `finalize_psbt` generates a `tx_id` by taking a `proposal_id`, a `broadcast` boolean flag must be specified to determine if the transaction will be automatically transmited to the blockchain or not. - `broadcast` publishes the transaction if it wasn't on the previous step. +- `create_proof` is the first step to create a proof of reserve, it can be only one PoR per vault, and creating amother one will erase the previous one. It takes a `vault_id`, a `message` that serves as a description, and the initial `psbt`. +- `save_proof_psbt` updates the PoF with a new vault member signature, takes a `vault_id` and a `psbt`. Each member is able to post its psbt once. +- `finalize_proof` finishes the PoR flow, storing the final `psbt` linked to the `vault_id` as it marks it as finalized. ### Offchain worker dispatchable functions - -- `ocw_insert_descriptors` is only an extrinsic that is meant to be called by the pallet's offchain worker, as it makes the output descriptors insertion. -- `ocw_insert_psbts` is meant to be called by the pallet's offchain worker, it performs the psbt proposal insertion. +These type of extrinsics are meant to be called by the pallet's offchain worker, the transaction must be left unsigned while the payload has the signature. +- `ocw_insert_descriptors` makes the output descriptors insertion. +- `ocw_insert_psbts` performs the psbt proposal insertion. - `ocw_finalize_psbts` inserts the generated `tx_id` for the transaction, which can be inspected with a block explorer. ### Getters @@ -89,6 +102,7 @@ This module provides functionality for data management regarding the Native Bitc - `vaults_by_signer` - `proposals` - `proposals_by_vault` +- `proof_of_reserve` - `DefaultURL` (for bdk services) ## Usage @@ -210,6 +224,31 @@ This extrinsic is needed in case the PSBT is finalized but not broadcasted. polkadot-js-api tx.bitcoinVaults.broadcastPsbt 0x8426160f6705e480825a5bdccb2e465ad097d8a0a09981467348f884682d5675 --seed "//Alice" ``` +#### Create a Proof of Reserve + +```bash +# vault_id, message, and psbt +polkadot-js-api tx.bitcoinVaults.createProof "0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf" "" "" --seed "//Alice" +``` + +#### Query a Proof of Reserve +```bash +# vault_id +polkadot-js-api query.bitcoinVaults.proofOfReserves "0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf" +``` + +#### Save a PoR psbt +```bash +# vault_id, psbt +polkadot-js-api tx.bitcoinVaults.saveProofPsbt "0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf" "" --seed "//Alice" +``` + +#### Finalize a PoR +```bash +# vault_id, final_psbt +polkadot-js-api tx.bitcoinVaults.finalizeProof "0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf" "" --seed "//Alice" +``` + ### Polkadot-js api (javascript library) While most of the data flow is almost identical to its CLI counter part, the javascript library is much more versatile regarding queries. The API setup will be omitted. @@ -217,7 +256,7 @@ While most of the data flow is almost identical to its CLI counter part, the jav In order to enable vault-related features, an account needs to be linked to the offchain worker. This process needs to be done just once, preferably by one of the chain administrators: ```js -# key type (constant to bdks), suri, public key in hex (no method was found for parsing an address to hex) +// key type (constant to bdks), suri, public key in hex (no method was found for parsing an address to hex) const setKey = api.rpc.author.insertKey("bdks", "//Alice", "0xd43593c715fdd31c61141abd04a99fd6822c8558854ccde39a5684e7a56da27d") ``` @@ -278,7 +317,7 @@ console.log('Tx sent with hash', removeAccountXpub.toHex()); #### Insert Vault ```js -const insertVault = await api.tx.bitcoinVaults.createVault(1, "descripcion", ["5FHneW46xGXgs5mUiveU4sbTyGBzmstUspZC92UhjJM694ty"]).signAndSend(alice); +const insertVault = await api.tx.bitcoinVaults.createVault(1, "descripcion", true, ["5FHneW46xGXgs5mUiveU4sbTyGBzmstUspZC92UhjJM694ty"]).signAndSend(alice); console.log('Tx sent with hash', insertVault.toHuman()); ``` @@ -348,6 +387,46 @@ const broadcastPsbt = await api.tx.bitcoinVaults.broadcastPsbt("0x8426160f6705e4 console.log(broadcastPsbt.toHuman()); ``` +#### Create a Proof of reserve +```js +// vault_id, message, and psbt +const createProof = await api.tx.bitcoinVaults.createProof("0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf","","").signAndSend(alice); +console.log(createProof.toHuman()); +``` + +#### Query a Proof of Reserve +```js +// vault_id +const proofs = await api.query.bitcoinVaults.proofOfReserves("0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf"); +console.log(proofs.toHuman()); +``` + +#### Query all PoR's +```js +// vault_id +const proofs = await api.query.bitcoinVaults.proofOfReserves.entries(); +proofs.forEach(([key, value]) => { + console.log( + "Vault id:", + key.args.map((k) => k.toHuman()) + ); + console.log(" Proof of reserve:", value.toHuman()); +}); +``` + +#### Save a PoR psbt +```js +// vault_id, psbt +const save_proof = await api.tx.bitcoinVaults.saveProofPsbt("0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf","").signAndSend(alice) +console.log(save_proof.toHuman()); +``` +#### Finalize a PoR +```js +// vault_id, final_psbt +const finalize_proof = await api.tx.bitcoinVaults.finalizeProof("0xdc08dcf7b4e6525bdd894433ffe45644262079dec2cdd8d5293e6b78c10edbcf","").signAndSend(alice) +console.log(finalize_proof.toHuman()); +``` + ## Events ```rust diff --git a/pallets/bitcoin-vaults/src/tests.rs b/pallets/bitcoin-vaults/src/tests.rs index aec45fa6..5b7856bb 100644 --- a/pallets/bitcoin-vaults/src/tests.rs +++ b/pallets/bitcoin-vaults/src/tests.rs @@ -6,32 +6,18 @@ use crate::{ use codec::Encode; use core::convert::TryFrom; use frame_support::{assert_noop, assert_ok, BoundedVec}; +use sp_core::sr25519::Public; use sp_io::hashing::blake2_256; +use sp_runtime::DispatchResult; -fn dummy_xpub() -> BoundedVec { - BoundedVec::::try_from( - b"[adc450e3/84'/1'/0'/0]tpubDEMkzn5sBo8Nct35y2BEFhJTqhsa72yeUf5S6ymb85G6LW2okSh1fDkrMhgCtYsrsCAuspm4yVjC63VUA6qrcQ54tVm5TKwhWFBLyyCjabX/*" - .encode()) - .expect("Error on encoding the xpub key to BoundedVec") -} - -fn dummy_xpub_2() -> BoundedVec { - BoundedVec::::try_from( - b"[621c051d/123456789'/123456789'/123456789'/123456789]tpubDF3cwMypW7CJnZ4WwzwgYkd1bJzJsPTnLbFN3zdeGKfEx38jDjBzRntupghKC6A5szrjELasjrhBRXStKKUmS8wHZQxkVPN7P88iXxbC3s1/*" - .encode()) - .expect("Error on encoding the xpub key to BoundedVec") -} - -fn dummy_xpub_3() -> BoundedVec { - BoundedVec::::try_from(b"Zpub74kbYv5LXvBaJRcbSiihEEwuDiBSDztjtpSVmt6C6nB3ntbcEy4pLP3cJGVWsKbYKaAynfCwXnkuVncPGQ9Y4XwWJDWrDMUwTztdxBe7GcM" - .encode()) - .expect("Error on encoding the xpub key to BoundedVec") -} +static XPUBS: [&str;4] = ["[adc450e3/84'/1'/0'/0]tpubDEMkzn5sBo8Nct35y2BEFhJTqhsa72yeUf5S6ymb85G6LW2okSh1fDkrMhgCtYsrsCAuspm4yVjC63VUA6qrcQ54tVm5TKwhWFBLyyCjabX/*", +"[621c051d/123456789'/123456789'/123456789'/123456789]tpubDF3cwMypW7CJnZ4WwzwgYkd1bJzJsPTnLbFN3zdeGKfEx38jDjBzRntupghKC6A5szrjELasjrhBRXStKKUmS8wHZQxkVPN7P88iXxbC3s1/*", +"Zpub74kbYv5LXvBaJRcbSiihEEwuDiBSDztjtpSVmt6C6nB3ntbcEy4pLP3cJGVWsKbYKaAynfCwXnkuVncPGQ9Y4XwWJDWrDMUwTztdxBe7GcM", +"Zpub75bKLk9fCjgfELzLr2XS5TEcCXXGrci4EDwAcppFNBDwpNy53JhJS8cbRjdv39noPDKSfzK7EPC1Ciyfb7jRwY7DmiuYJ6WDr2nEL6yTkHi" +]; -fn dummy_xpub_4() -> BoundedVec { - BoundedVec::::try_from(b"Zpub75bKLk9fCjgfELzLr2XS5TEcCXXGrci4EDwAcppFNBDwpNy53JhJS8cbRjdv39noPDKSfzK7EPC1Ciyfb7jRwY7DmiuYJ6WDr2nEL6yTkHi" - .encode()) - .expect("Error on encoding the xpub key to BoundedVec") +fn gen_xpub(i: usize) -> BoundedVec { + BoundedVec::::try_from(XPUBS.get(i).unwrap().as_bytes().to_vec()).unwrap() } fn dummy_description() -> BoundedVec { @@ -55,6 +41,31 @@ fn dummy_descriptor() -> BoundedVec { let d_size: usize = OutputDescriptorMaxLen::get().try_into().unwrap(); BoundedVec::::try_from(vec![0; d_size]).unwrap() } + +fn gen_cosigners(cosigners_acc: &[u8]) -> BoundedVec { + let o = cosigners_acc.into_iter().map(|&acc| test_pub(acc)).collect::>(); + BoundedVec::::try_from(o).unwrap() +} + +fn set_xpub(acc_to_set: u8, xpub_index: usize) -> DispatchResult { + BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(acc_to_set)), gen_xpub(xpub_index)) +} + +fn create_vault( + owner_acc_index: u8, + threshold: u32, + include_owner: bool, + cosigners: &[u8], +) -> DispatchResult { + BitcoinVaults::create_vault( + RuntimeOrigin::signed(test_pub(owner_acc_index)), + threshold, + dummy_description(), + include_owner, + gen_cosigners(cosigners), + ) +} + fn make_vault_valid(vault_id: [u8; 32]) { Vaults::::mutate(vault_id, |v_option| { let v = v_option.as_mut().unwrap(); @@ -66,6 +77,16 @@ fn make_vault_valid(vault_id: [u8; 32]) { }); } +fn propose(proposer: u8, vault_id: [u8; 32], amount: u64) -> DispatchResult { + BitcoinVaults::propose( + RuntimeOrigin::signed(test_pub(proposer)), + vault_id, + dummy_testnet_recipient_address(), + amount, + dummy_description(), + ) +} + fn make_proposal_valid(proposal_id: [u8; 32]) { Proposals::::mutate(proposal_id, |p_option| { let p = p_option.as_mut().unwrap(); @@ -73,44 +94,60 @@ fn make_proposal_valid(proposal_id: [u8; 32]) { }); } +fn save_psbt(author: u8, proposal_id: [u8; 32]) -> DispatchResult { + BitcoinVaults::save_psbt(RuntimeOrigin::signed(test_pub(author)), proposal_id, dummy_psbt()) +} + +fn create_proof(author: u8, vault_id: [u8; 32]) -> DispatchResult { + BitcoinVaults::create_proof( + RuntimeOrigin::signed(test_pub(author)), + vault_id, + dummy_description(), + dummy_psbt(), + ) +} + +fn save_proof_psbt(author: u8, vault_id: [u8; 32]) -> DispatchResult { + BitcoinVaults::save_proof_psbt(RuntimeOrigin::signed(test_pub(author)), vault_id, dummy_psbt()) +} + +fn finalize_proof(author: u8, vault_id: [u8; 32]) -> DispatchResult { + BitcoinVaults::finalize_proof(RuntimeOrigin::signed(test_pub(author)), vault_id, dummy_psbt()) +} + #[test] fn set_xpub_identity_works() { new_test_ext().execute_with(|| { // Dispatch a signed extrinsic. - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); + assert_ok!(set_xpub(1, 0)); assert_eq!( BitcoinVaults::xpubs_by_owner(test_pub(1)), - Some(dummy_xpub().using_encoded(blake2_256)) + Some(gen_xpub(0).using_encoded(blake2_256)) ); + print!("{:?}", gen_xpub(1)); }); } #[test] fn inserting_same_xpub_should_fail() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_noop!( - BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub()), - Error::::XPubAlreadyTaken - ); + assert_ok!(set_xpub(1, 0)); + assert_noop!(set_xpub(2, 0), Error::::XPubAlreadyTaken); }); } #[test] fn inserting_without_removing_xpub_should_fail() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_noop!( - BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub_2()), - Error::::UserAlreadyHasXpub - ); + assert_ok!(set_xpub(1, 0)); + assert_noop!(set_xpub(1, 1), Error::::UserAlreadyHasXpub); }); } #[test] fn removing_xpub_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); + assert_ok!(set_xpub(1, 0)); assert_ok!(BitcoinVaults::remove_xpub(RuntimeOrigin::signed(test_pub(1)))); }); } @@ -118,16 +155,16 @@ fn removing_xpub_should_work() { #[test] fn replacing_xpub_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); + assert_ok!(set_xpub(1, 0)); assert_ok!(BitcoinVaults::remove_xpub(RuntimeOrigin::signed(test_pub(1)))); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 1)); }); } #[test] fn removing_twice_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); + assert_ok!(set_xpub(1, 0)); assert_ok!(BitcoinVaults::remove_xpub(RuntimeOrigin::signed(test_pub(1)))); assert_noop!( BitcoinVaults::remove_xpub(RuntimeOrigin::signed(test_pub(1))), @@ -139,18 +176,9 @@ fn removing_twice_should_not_work() { #[test] fn creating_vault_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); }); } @@ -158,20 +186,8 @@ fn creating_vault_should_work() { #[test] fn vault_without_cosigners_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - let cosigners = - BoundedVec::<::AccountId, MaxCosignersPerVault>::default( - ); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners - ), - Error::::NotEnoughCosigners - ); + assert_ok!(set_xpub(1, 0)); + assert_noop!(create_vault(1, 1, true, &[]), Error::::NotEnoughCosigners); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); }); } @@ -179,30 +195,10 @@ fn vault_without_cosigners_shouldnt_work() { #[test] fn vault_with_invalid_threshold_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 0, - dummy_description(), - true, - cosigners.clone() - ), - Error::::InvalidVaultThreshold - ); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 3, - dummy_description(), - true, - cosigners - ), - Error::::InvalidVaultThreshold - ); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_noop!(create_vault(1, 0, true, &[2]), Error::::InvalidVaultThreshold); + assert_noop!(create_vault(1, 3, true, &[2]), Error::::InvalidVaultThreshold); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); }); } @@ -210,20 +206,9 @@ fn vault_with_invalid_threshold_shouldnt_work() { #[test] fn vault_with_duplicate_members_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),test_pub(1),].to_vec()).unwrap(); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners.clone() - ), - Error::::DuplicateVaultMembers - ); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_noop!(create_vault(1, 1, true, &[1, 2]), Error::::DuplicateVaultMembers); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); assert!(BitcoinVaults::vaults_by_signer(test_pub(2)).is_empty()); }); @@ -232,42 +217,22 @@ fn vault_with_duplicate_members_shouldnt_work() { #[test] fn vault_with_duplicate_incomplete_members() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),test_pub(1),].to_vec()).unwrap(); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners.clone() - ), - Error::::DuplicateVaultMembers - ); + assert_ok!(set_xpub(1, 0)); + assert_noop!(create_vault(1, 1, true, &[1, 2]), Error::::DuplicateVaultMembers); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); assert!(BitcoinVaults::vaults_by_signer(test_pub(2)).is_empty()); }); } #[test] -fn exceeding_max_cosigners_per_vault_should_work() { +fn exceeding_max_cosigners_per_vault_should_fail() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(3)), dummy_xpub_3())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(4)), dummy_xpub_4())); - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),test_pub(3), test_pub(4)].to_vec()).unwrap(); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_ok!(set_xpub(3, 2)); + assert_ok!(set_xpub(4, 3)); assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - ), + create_vault(1, 2, true, &[2, 3, 4]), Error::::ExceedMaxCosignersPerVault ); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); @@ -277,38 +242,13 @@ fn exceeding_max_cosigners_per_vault_should_work() { #[test] fn vault_signer_without_xpub_shouldnt_exist() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - let cosigners2 = BoundedVec::< - ::AccountId, - MaxCosignersPerVault, - >::try_from([test_pub(1)].to_vec()) - .unwrap(); + assert_ok!(set_xpub(1, 0)); // Case 1: cosigner with no xpub - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners.clone() - ), - Error::::XPubNotFound - ); + assert_noop!(create_vault(1, 1, true, &[2]), Error::::XPubNotFound); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); assert!(BitcoinVaults::vaults_by_signer(test_pub(2)).is_empty()); // Case 2: owner with no xpub - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(2)), - 1, - dummy_description(), - true, - cosigners2.clone() - ), - Error::::XPubNotFound - ); + assert_noop!(create_vault(2, 1, true, &[1]), Error::::XPubNotFound); assert!(BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); assert!(BitcoinVaults::vaults_by_signer(test_pub(2)).is_empty()); }); @@ -317,49 +257,13 @@ fn vault_signer_without_xpub_shouldnt_exist() { #[test] fn signer_reached_max_vaults() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(3)), dummy_xpub_3())); - let cosigners1 = BoundedVec::< - ::AccountId, - MaxCosignersPerVault, - >::try_from([test_pub(2)].to_vec()) - .unwrap(); - let cosigners2 = BoundedVec::< - ::AccountId, - MaxCosignersPerVault, - >::try_from([test_pub(2), test_pub(3)].to_vec()) - .unwrap(); - let cosigners3 = BoundedVec::< - ::AccountId, - MaxCosignersPerVault, - >::try_from([test_pub(3)].to_vec()) - .unwrap(); - - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners1 - )); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 3, - dummy_description(), - true, - cosigners2 - )); - assert_noop!( - BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners3 - ), - Error::::SignerVaultLimit - ); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_ok!(set_xpub(3, 2)); + + assert_ok!(create_vault(1, 2, true, &[2])); + assert_ok!(create_vault(1, 3, true, &[2, 3])); + assert_noop!(create_vault(1, 2, true, &[3]), Error::::SignerVaultLimit); assert_eq!(BitcoinVaults::vaults_by_signer(test_pub(1)).len(), 2); }); @@ -368,20 +272,12 @@ fn signer_reached_max_vaults() { #[test] fn removing_vault_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(3)), dummy_xpub_3())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); + assert_ok!(set_xpub(3, 2)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),test_pub(3)].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - false, - cosigners - )); + assert_ok!(create_vault(1, 1, false, &[2, 3])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); // Try to remove xpub (vault depends on it) let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); @@ -392,19 +288,11 @@ fn removing_vault_should_work() { #[test] fn removing_vault_which_isnt_yours_shoulnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); // Try to remove xpub (vault depends on it) let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); @@ -418,19 +306,11 @@ fn removing_vault_which_isnt_yours_shoulnt_work() { #[test] fn removing_vault_and_xpub_in_order_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); // TODO: Remove vault let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); @@ -443,19 +323,11 @@ fn removing_vault_and_xpub_in_order_should_work() { #[test] fn removing_xpub_before_vault_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); // Try to remove xpub (vault depends on it) assert_noop!( @@ -468,277 +340,127 @@ fn removing_xpub_before_vault_shouldnt_work() { #[test] fn proposing_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000)); }); } #[test] fn proposing_from_external_user_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); // user 3 is not on the vault so it should expect an error - assert_noop!( - BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(3)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - ), - Error::::SignerPermissionsNeeded - ); + assert_noop!(propose(3, vault_id, 1000), Error::::SignerPermissionsNeeded); }); } #[test] fn proposing_twice_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); - assert_noop!( - BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - ), - Error::::AlreadyProposed - ); + assert_ok!(propose(1, vault_id, 1000)); + assert_noop!(propose(1, vault_id, 1000), Error::::AlreadyProposed); }); } #[test] fn exceeding_max_proposals_per_vault_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1001, - dummy_description() - )); - assert_noop!( - BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1002, - dummy_description() - ), - Error::::ExceedMaxProposalsPerVault - ); + assert_ok!(propose(1, vault_id, 1000)); + assert_ok!(propose(1, vault_id, 1001)); + assert_noop!(propose(1, vault_id, 1002), Error::::ExceedMaxProposalsPerVault); }); } #[test] fn saving_psbt_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000)); // obtaining proposal id and saving a psbt let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); - assert_ok!(BitcoinVaults::save_psbt( - RuntimeOrigin::signed(test_pub(1)), - proposal_id, - dummy_psbt() - )); + assert_ok!(save_psbt(1, proposal_id,)); }); } #[test] fn saving_psbt_to_a_nonexistent_proposal_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); // user 3 is not on the vault so it should expect an error let proposal_id = [0; 32]; - assert_noop!( - BitcoinVaults::save_psbt(RuntimeOrigin::signed(test_pub(1)), proposal_id, dummy_psbt()), - Error::::ProposalNotFound - ); + assert_noop!(save_psbt(1, proposal_id), Error::::ProposalNotFound); }); } #[test] fn saving_psbt_form_external_user_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000)); // obtaining proposal id and saving a psbt with a user that is not in the vault let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); // user 3 is not on - assert_noop!( - BitcoinVaults::save_psbt(RuntimeOrigin::signed(test_pub(3)), proposal_id, dummy_psbt()), - Error::::SignerPermissionsNeeded - ); + assert_noop!(save_psbt(3, proposal_id), Error::::SignerPermissionsNeeded); }); } #[test] fn saving_twice_psbt_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000,)); // obtaining proposal id and saving a psbt with a user that is not in the vault let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); // user 3 is not on the vaults cosigners - assert_ok!(BitcoinVaults::save_psbt( - RuntimeOrigin::signed(test_pub(1)), - proposal_id, - dummy_psbt() - )); - assert_noop!( - BitcoinVaults::save_psbt(RuntimeOrigin::signed(test_pub(1)), proposal_id, dummy_psbt()), - Error::::AlreadySigned - ); + assert_ok!(save_psbt(1, proposal_id)); + assert_noop!(save_psbt(1, proposal_id), Error::::AlreadySigned); }); } @@ -746,37 +468,19 @@ fn saving_twice_psbt_shouldnt_work() { #[test] fn finalize_psbt_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000,)); // obtaining proposal id and saving a psbt with a user that is not in the vault let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); make_proposal_valid(proposal_id); - assert_ok!(BitcoinVaults::save_psbt( - RuntimeOrigin::signed(test_pub(1)), - proposal_id, - dummy_psbt() - )); + assert_ok!(save_psbt(1, proposal_id)); // When a proposal meets the threshold changes it status to ReadyToFinalize false assert!(BitcoinVaults::proposals(proposal_id) .unwrap() @@ -788,37 +492,19 @@ fn finalize_psbt_should_work() { #[test] fn finalize_psbt_twice_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000,)); // obtaining proposal id and saving a psbt with a user that is not in the vault let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); make_proposal_valid(proposal_id); - assert_ok!(BitcoinVaults::save_psbt( - RuntimeOrigin::signed(test_pub(1)), - proposal_id, - dummy_psbt() - )); + assert_ok!(save_psbt(1, proposal_id)); // When a proposal meets the threshold changes it status to ReadyToFinalize false assert!(BitcoinVaults::proposals(proposal_id) .unwrap() @@ -834,28 +520,14 @@ fn finalize_psbt_twice_shouldnt_work() { #[test] fn finalize_psbt_without_signatures_shouldnt_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 1, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::propose( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_testnet_recipient_address(), - 1000, - dummy_description() - )); + assert_ok!(propose(1, vault_id, 1000,)); // obtaining proposal id and saving a psbt with a user that is not in the vault let proposal_id = BitcoinVaults::proposals_by_vault(vault_id).pop().unwrap(); make_proposal_valid(proposal_id); @@ -870,59 +542,30 @@ fn finalize_psbt_without_signatures_shouldnt_work() { #[test] fn proof_of_reserve_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); // user 3 is not on the vault so it should expect an error - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); + assert_ok!(create_proof(1, vault_id)); }); } #[test] fn proof_of_reserve_from_external_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); // user 3 is not on the vault so it should expect an error - assert_noop!( - BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(3)), - vault_id, - dummy_description(), - dummy_psbt() - ), - Error::::SignerPermissionsNeeded - ); + assert_noop!(create_proof(3, vault_id), Error::::SignerPermissionsNeeded); }); } #[test] @@ -930,239 +573,115 @@ fn proof_of_reserve_from_nonexistent_vault_should_not_work() { new_test_ext().execute_with(|| { let vault_id = [0; 32]; // user 3 is not on the vault so it should expect an error - assert_noop!( - BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - ), - Error::::VaultNotFound - ); + assert_noop!(create_proof(1, vault_id), Error::::VaultNotFound); }); } #[test] fn proof_of_reserve_from_invalid_vault_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); // user 3 is not on the vault so it should expect an error - assert_noop!( - BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - ), - Error::::InvalidVault - ); + assert_noop!(create_proof(1, vault_id), Error::::InvalidVault); }); } #[test] fn save_proof_psbt_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); // user 3 is not on the vault so it should expect an error - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - )); + assert_ok!(create_proof(1, vault_id)); + + assert_ok!(save_proof_psbt(1, vault_id)); }); } #[test] fn save_nonexistent_proof_psbt_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_noop!( - BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt(), - ), - Error::::ProofNotFound - ); + assert_noop!(save_proof_psbt(1, vault_id), Error::::ProofNotFound); }); } #[test] fn save_proof_psbt_invalid_vault_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); // Invalid vault error should appear first than ProofNotFound - assert_noop!( - BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt(), - ), - Error::::InvalidVault - ); + assert_noop!(save_proof_psbt(1, vault_id), Error::::InvalidVault); }); } #[test] fn save_proof_psbt_nonexistent_vault_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); let vault_id = [0; 32]; // Invalid vault error should appear first than ProofNotFound - assert_noop!( - BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - ), - Error::::VaultNotFound - ); + assert_noop!(save_proof_psbt(1, vault_id), Error::::VaultNotFound); }); } #[test] fn save_twice_proof_psbt_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt(), - )); + assert_ok!(create_proof(1, vault_id)); + assert_ok!(save_proof_psbt(1, vault_id)); - assert_noop!( - BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - ), - Error::::AlreadySigned - ); + assert_noop!(save_proof_psbt(1, vault_id,), Error::::AlreadySigned); }); } #[test] fn ready_to_finalize_proof_psbt_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - )); + assert_ok!(create_proof(1, vault_id)); + + assert_ok!(save_proof_psbt(1, vault_id)); + + assert_ok!(save_proof_psbt(2, vault_id)); assert!(ProofOfReserves::::get(vault_id).unwrap().status.is_ready_to_finalize()) }); } @@ -1170,46 +689,21 @@ fn ready_to_finalize_proof_psbt_should_work() { #[test] fn finalize_proof_psbt_should_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::finalize_proof( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - )); + assert_ok!(create_proof(1, vault_id)); + + assert_ok!(save_proof_psbt(1, vault_id)); + + assert_ok!(save_proof_psbt(2, vault_id)); + + assert_ok!(finalize_proof(2, vault_id)); assert_eq!( ProofOfReserves::::get(vault_id).unwrap().status, ProposalStatus::Broadcasted @@ -1220,125 +714,53 @@ fn finalize_proof_psbt_should_work() { #[test] fn finalize_proof_twice_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::finalize_proof( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - )); - assert_noop!( - BitcoinVaults::finalize_proof( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - ), - Error::::AlreadyBroadcasted - ); + assert_ok!(create_proof(1, vault_id)); + + assert_ok!(save_proof_psbt(1, vault_id)); + assert_ok!(save_proof_psbt(2, vault_id)); + + assert_ok!(finalize_proof(2, vault_id)); + assert_noop!(finalize_proof(2, vault_id), Error::::AlreadyBroadcasted); }); } #[test] fn finalize_incomplete_proof_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 2, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_ok!(BitcoinVaults::create_proof( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_description(), - dummy_psbt() - )); - - assert_ok!(BitcoinVaults::save_proof_psbt( - RuntimeOrigin::signed(test_pub(1)), - vault_id, - dummy_psbt() - )); - assert_noop!( - BitcoinVaults::finalize_proof( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - ), - Error::::NotEnoughSignatures - ); + assert_ok!(create_proof(1, vault_id)); + + assert_ok!(save_proof_psbt(1, vault_id)); + assert_noop!(finalize_proof(2, vault_id), Error::::NotEnoughSignatures); }); } #[test] fn finalize_nonexistent_proof_should_not_work() { new_test_ext().execute_with(|| { - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(1)), dummy_xpub())); - assert_ok!(BitcoinVaults::set_xpub(RuntimeOrigin::signed(test_pub(2)), dummy_xpub_2())); + assert_ok!(set_xpub(1, 0)); + assert_ok!(set_xpub(2, 1)); // Insert a normal vault - let cosigners = BoundedVec::<::AccountId, MaxCosignersPerVault>:: - try_from([ test_pub(2),].to_vec()).unwrap(); - assert_ok!(BitcoinVaults::create_vault( - RuntimeOrigin::signed(test_pub(1)), - 2, - dummy_description(), - true, - cosigners - )); + assert_ok!(create_vault(1, 1, true, &[2])); assert!(!BitcoinVaults::vaults_by_signer(test_pub(1)).is_empty()); let vault_id = BitcoinVaults::vaults_by_signer(test_pub(1)).pop().unwrap(); make_vault_valid(vault_id); - assert_noop!( - BitcoinVaults::finalize_proof( - RuntimeOrigin::signed(test_pub(2)), - vault_id, - dummy_psbt() - ), - Error::::ProofNotFound - ); + assert_noop!(finalize_proof(2, vault_id), Error::::ProofNotFound); }); }