diff --git a/buidler.config.6.11.js b/buidler.config.6.11.js new file mode 100644 index 000000000..7a8b5462c --- /dev/null +++ b/buidler.config.6.11.js @@ -0,0 +1,32 @@ +const { usePlugin } = require('@nomiclabs/buidler/config') + +usePlugin('@nomiclabs/buidler-truffle5') +usePlugin('@nomiclabs/buidler-ganache') +usePlugin('buidler-gas-reporter') +usePlugin('solidity-coverage') + +module.exports = { + networks: { + localhost: { + url: 'http://localhost:8545' + }, + coverage: { + url: 'http://localhost:8555' + } + }, + solc: { + version: '0.6.11', + optimizer: { + enabled: true, + runs: 200 + } + }, + paths: { + sources: './contracts/0.6.11', + cache: './cache/v6' + }, + gasReporter: { + enabled: !!process.env.REPORT_GAS, + currency: 'USD' + } +} diff --git a/contracts/0.6.11/deposit_contract.sol b/contracts/0.6.11/deposit_contract.sol new file mode 100644 index 000000000..21d0b895a --- /dev/null +++ b/contracts/0.6.11/deposit_contract.sol @@ -0,0 +1,178 @@ +// ┏━━━┓━┏┓━┏┓━━┏━━━┓━━┏━━━┓━━━━┏━━━┓━━━━━━━━━━━━━━━━━━━┏┓━━━━━┏━━━┓━━━━━━━━━┏┓━━━━━━━━━━━━━━┏┓━ +// ┃┏━━┛┏┛┗┓┃┃━━┃┏━┓┃━━┃┏━┓┃━━━━┗┓┏┓┃━━━━━━━━━━━━━━━━━━┏┛┗┓━━━━┃┏━┓┃━━━━━━━━┏┛┗┓━━━━━━━━━━━━┏┛┗┓ +// ┃┗━━┓┗┓┏┛┃┗━┓┗┛┏┛┃━━┃┃━┃┃━━━━━┃┃┃┃┏━━┓┏━━┓┏━━┓┏━━┓┏┓┗┓┏┛━━━━┃┃━┗┛┏━━┓┏━┓━┗┓┏┛┏━┓┏━━┓━┏━━┓┗┓┏┛ +// ┃┏━━┛━┃┃━┃┏┓┃┏━┛┏┛━━┃┃━┃┃━━━━━┃┃┃┃┃┏┓┃┃┏┓┃┃┏┓┃┃━━┫┣┫━┃┃━━━━━┃┃━┏┓┃┏┓┃┃┏┓┓━┃┃━┃┏┛┗━┓┃━┃┏━┛━┃┃━ +// ┃┗━━┓━┃┗┓┃┃┃┃┃┃┗━┓┏┓┃┗━┛┃━━━━┏┛┗┛┃┃┃━┫┃┗┛┃┃┗┛┃┣━━┃┃┃━┃┗┓━━━━┃┗━┛┃┃┗┛┃┃┃┃┃━┃┗┓┃┃━┃┗┛┗┓┃┗━┓━┃┗┓ +// ┗━━━┛━┗━┛┗┛┗┛┗━━━┛┗┛┗━━━┛━━━━┗━━━┛┗━━┛┃┏━┛┗━━┛┗━━┛┗┛━┗━┛━━━━┗━━━┛┗━━┛┗┛┗┛━┗━┛┗┛━┗━━━┛┗━━┛━┗━┛ +// ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┃┃━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ +// ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┗┛━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ + +// SPDX-License-Identifier: CC0-1.0 + +pragma solidity 0.6.11; + +// This interface is designed to be compatible with the Vyper version. +/// @notice This is the Ethereum 2.0 deposit contract interface. +/// For more information see the Phase 0 specification under https://github.com/ethereum/eth2.0-specs +interface IDepositContract { + /// @notice A processed deposit event. + event DepositEvent( + bytes pubkey, + bytes withdrawal_credentials, + bytes amount, + bytes signature, + bytes index + ); + + /// @notice Submit a Phase 0 DepositData object. + /// @param pubkey A BLS12-381 public key. + /// @param withdrawal_credentials Commitment to a public key for withdrawals. + /// @param signature A BLS12-381 signature. + /// @param deposit_data_root The SHA-256 hash of the SSZ-encoded DepositData object. + /// Used as a protection against malformed input. + function deposit( + bytes calldata pubkey, + bytes calldata withdrawal_credentials, + bytes calldata signature, + bytes32 deposit_data_root + ) external payable; + + /// @notice Query the current deposit root hash. + /// @return The deposit root hash. + function get_deposit_root() external view returns (bytes32); + + /// @notice Query the current deposit count. + /// @return The deposit count encoded as a little endian 64-bit number. + function get_deposit_count() external view returns (bytes memory); +} + +// Based on official specification in https://eips.ethereum.org/EIPS/eip-165 +interface ERC165 { + /// @notice Query if a contract implements an interface + /// @param interfaceId The interface identifier, as specified in ERC-165 + /// @dev Interface identification is specified in ERC-165. This function + /// uses less than 30,000 gas. + /// @return `true` if the contract implements `interfaceId` and + /// `interfaceId` is not 0xffffffff, `false` otherwise + function supportsInterface(bytes4 interfaceId) external pure returns (bool); +} + +// This is a rewrite of the Vyper Eth2.0 deposit contract in Solidity. +// It tries to stay as close as possible to the original source code. +/// @notice This is the Ethereum 2.0 deposit contract interface. +/// For more information see the Phase 0 specification under https://github.com/ethereum/eth2.0-specs +contract DepositContract is IDepositContract, ERC165 { + uint constant DEPOSIT_CONTRACT_TREE_DEPTH = 32; + // NOTE: this also ensures `deposit_count` will fit into 64-bits + uint constant MAX_DEPOSIT_COUNT = 2**DEPOSIT_CONTRACT_TREE_DEPTH - 1; + + bytes32[DEPOSIT_CONTRACT_TREE_DEPTH] branch; + uint256 deposit_count; + + bytes32[DEPOSIT_CONTRACT_TREE_DEPTH] zero_hashes; + + constructor() public { + // Compute hashes in empty sparse Merkle tree + for (uint height = 0; height < DEPOSIT_CONTRACT_TREE_DEPTH - 1; height++) + zero_hashes[height + 1] = sha256(abi.encodePacked(zero_hashes[height], zero_hashes[height])); + } + + function get_deposit_root() override external view returns (bytes32) { + bytes32 node; + uint size = deposit_count; + for (uint height = 0; height < DEPOSIT_CONTRACT_TREE_DEPTH; height++) { + if ((size & 1) == 1) + node = sha256(abi.encodePacked(branch[height], node)); + else + node = sha256(abi.encodePacked(node, zero_hashes[height])); + size /= 2; + } + return sha256(abi.encodePacked( + node, + to_little_endian_64(uint64(deposit_count)), + bytes24(0) + )); + } + + function get_deposit_count() override external view returns (bytes memory) { + return to_little_endian_64(uint64(deposit_count)); + } + + function deposit( + bytes calldata pubkey, + bytes calldata withdrawal_credentials, + bytes calldata signature, + bytes32 deposit_data_root + ) override external payable { + // Extended ABI length checks since dynamic types are used. + require(pubkey.length == 48, "DepositContract: invalid pubkey length"); + require(withdrawal_credentials.length == 32, "DepositContract: invalid withdrawal_credentials length"); + require(signature.length == 96, "DepositContract: invalid signature length"); + + // Check deposit amount + require(msg.value >= 1 ether, "DepositContract: deposit value too low"); + require(msg.value % 1 gwei == 0, "DepositContract: deposit value not multiple of gwei"); + uint deposit_amount = msg.value / 1 gwei; + require(deposit_amount <= type(uint64).max, "DepositContract: deposit value too high"); + + // Emit `DepositEvent` log + bytes memory amount = to_little_endian_64(uint64(deposit_amount)); + emit DepositEvent( + pubkey, + withdrawal_credentials, + amount, + signature, + to_little_endian_64(uint64(deposit_count)) + ); + + // Compute deposit data root (`DepositData` hash tree root) + bytes32 pubkey_root = sha256(abi.encodePacked(pubkey, bytes16(0))); + bytes32 signature_root = sha256(abi.encodePacked( + sha256(abi.encodePacked(signature[:64])), + sha256(abi.encodePacked(signature[64:], bytes32(0))) + )); + bytes32 node = sha256(abi.encodePacked( + sha256(abi.encodePacked(pubkey_root, withdrawal_credentials)), + sha256(abi.encodePacked(amount, bytes24(0), signature_root)) + )); + + // Verify computed and expected deposit data roots match + require(node == deposit_data_root, "DepositContract: reconstructed DepositData does not match supplied deposit_data_root"); + + // Avoid overflowing the Merkle tree (and prevent edge case in computing `branch`) + require(deposit_count < MAX_DEPOSIT_COUNT, "DepositContract: merkle tree full"); + + // Add deposit data root to Merkle tree (update a single `branch` node) + deposit_count += 1; + uint size = deposit_count; + for (uint height = 0; height < DEPOSIT_CONTRACT_TREE_DEPTH; height++) { + if ((size & 1) == 1) { + branch[height] = node; + return; + } + node = sha256(abi.encodePacked(branch[height], node)); + size /= 2; + } + // As the loop should always end prematurely with the `return` statement, + // this code should be unreachable. We assert `false` just to be safe. + assert(false); + } + + function supportsInterface(bytes4 interfaceId) override external pure returns (bool) { + return interfaceId == type(ERC165).interfaceId || interfaceId == type(IDepositContract).interfaceId; + } + + function to_little_endian_64(uint64 value) internal pure returns (bytes memory ret) { + ret = new bytes(8); + bytes8 bytesValue = bytes8(value); + // Byteswapping during copying to bytes. + ret[0] = bytesValue[7]; + ret[1] = bytesValue[6]; + ret[2] = bytesValue[5]; + ret[3] = bytesValue[4]; + ret[4] = bytesValue[3]; + ret[5] = bytesValue[2]; + ret[6] = bytesValue[1]; + ret[7] = bytesValue[0]; + } +} diff --git a/package.json b/package.json index d87ddb35d..2ef545902 100644 --- a/package.json +++ b/package.json @@ -24,7 +24,7 @@ "estimate-deposit-loop-gas": "yarn run test:unit ./estimate_deposit_loop_gas.js", "compile": "yarn run compile:4 && yarn run compile:6", "compile:4": "buidler compile", - "compile:6": "buidler compile --config buidler.config.6.js --force", + "compile:6": "buidler compile --config buidler.config.6.js --force && buidler compile --config buidler.config.6.11.js --force", "deploy": "yarn run deploy:dev", "deploy:dev": "yarn run deploy:apm:dev && deploy:apps:dev && deploy:tmpl:dev && deploy:dao:dev", "deploy:apm:dev": "ENS=0x5f6f7e8cc7346a11ca2def8f827b7a0b612c56a1 DAO_FACTORY=0x5d94e3e7aec542ab0f9129b9a7badeb5b3ca0f77 buidler run ./scripts/deploy-apm.js --network localhost", diff --git a/test/deposit.test.js b/test/deposit.test.js new file mode 100644 index 000000000..acf9494c5 --- /dev/null +++ b/test/deposit.test.js @@ -0,0 +1,494 @@ +const { newDao, newApp } = require('./0.4.24/helpers/dao') +const { assertBn, assertRevert } = require('@aragon/contract-helpers-test/src/asserts') +const { ZERO_ADDRESS, bn } = require('@aragon/contract-helpers-test') +const { BN } = require('bn.js') + +const StETH = artifacts.require('StETH.sol') // we can just import due to StETH imported in test_helpers/Imports.sol +const StakingProvidersRegistry = artifacts.require('StakingProvidersRegistry') + +const DePool = artifacts.require('TestDePool.sol') +const OracleMock = artifacts.require('OracleMock.sol') +const DepositContract = artifacts.require('DepositContract') + +const ADDRESS_1 = '0x0000000000000000000000000000000000000001' +const ADDRESS_2 = '0x0000000000000000000000000000000000000002' +const ADDRESS_3 = '0x0000000000000000000000000000000000000003' +const ADDRESS_4 = '0x0000000000000000000000000000000000000004' + +const UNLIMITED = 1000000000 + +const pad = (hex, bytesLength) => { + const absentZeroes = bytesLength * 2 + 2 - hex.length + if (absentZeroes > 0) hex = '0x' + '0'.repeat(absentZeroes) + hex.substr(2) + return hex +} + +const hexConcat = (first, ...rest) => { + let result = first.startsWith('0x') ? first : '0x' + first + rest.forEach((item) => { + result += item.startsWith('0x') ? item.substr(2) : item + }) + return result +} + +const changeEndianness = (string) => { + string = string.replace('0x', '') + const result = [] + let len = string.length - 2 + while (len >= 0) { + result.push(string.substr(len, 2)) + len -= 2 + } + return '0x' + result.join('') +} + +// Divides a BN by 1e15 +const div15 = (bn) => bn.div(new BN(1000000)).div(new BN(1000000)).div(new BN(1000)) + +const ETH = (value) => web3.utils.toWei(value + '', 'ether') +const tokens = ETH + +contract('DePool with official deposit contract', ([appManager, voting, user1, user2, user3, nobody]) => { + let appBase, stEthBase, stakingProvidersRegistryBase, app, token, oracle, depositContract, sps + let treasuryAddr, insuranceAddr + + before('deploy base app', async () => { + // Deploy the app's base contract. + appBase = await DePool.new() + stEthBase = await StETH.new() + oracle = await OracleMock.new() + stakingProvidersRegistryBase = await StakingProvidersRegistry.new() + }) + + beforeEach('deploy dao and app', async () => { + depositContract = await DepositContract.new() + const { dao, acl } = await newDao(appManager) + + // StakingProvidersRegistry + let proxyAddress = await newApp(dao, 'staking-providers-registry', stakingProvidersRegistryBase.address, appManager) + sps = await StakingProvidersRegistry.at(proxyAddress) + await sps.initialize() + + // Instantiate a proxy for the app, using the base contract as its logic implementation. + proxyAddress = await newApp(dao, 'depool', appBase.address, appManager) + app = await DePool.at(proxyAddress) + + // token + proxyAddress = await newApp(dao, 'steth', stEthBase.address, appManager) + token = await StETH.at(proxyAddress) + await token.initialize(app.address) + + // Set up the app's permissions. + await acl.createPermission(voting, app.address, await app.PAUSE_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, app.address, await app.MANAGE_FEE(), appManager, { from: appManager }) + await acl.createPermission(voting, app.address, await app.MANAGE_WITHDRAWAL_KEY(), appManager, { from: appManager }) + await acl.createPermission(voting, app.address, await app.SET_DEPOSIT_ITERATION_LIMIT(), appManager, { from: appManager }) + + await acl.createPermission(app.address, token.address, await token.MINT_ROLE(), appManager, { from: appManager }) + await acl.createPermission(app.address, token.address, await token.BURN_ROLE(), appManager, { from: appManager }) + + await acl.createPermission(voting, sps.address, await sps.SET_POOL(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.MANAGE_SIGNING_KEYS(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.ADD_STAKING_PROVIDER_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.SET_STAKING_PROVIDER_ACTIVE_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.SET_STAKING_PROVIDER_NAME_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.SET_STAKING_PROVIDER_ADDRESS_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.SET_STAKING_PROVIDER_LIMIT_ROLE(), appManager, { from: appManager }) + await acl.createPermission(voting, sps.address, await sps.REPORT_STOPPED_VALIDATORS_ROLE(), appManager, { from: appManager }) + + // Initialize the app's proxy. + await app.initialize(token.address, depositContract.address, oracle.address, sps.address, 10) + treasuryAddr = await app.getTreasury() + insuranceAddr = await app.getInsuranceFund() + + await oracle.setPool(app.address) + // await depositContract.reset() + await sps.setPool(app.address, { from: voting }) + }) + + const checkStat = async ({ deposited, remote }) => { + const stat = await app.getEther2Stat() + assertBn(stat.deposited, deposited, 'deposited ether check') + assertBn(stat.remote, remote, 'remote ether check') + } + + // Assert reward distribution. The values must be divided by 1e15. + const checkRewards = async ({ treasury, insurance, sp }) => { + const [treasury_b, insurance_b, sps_b, a1, a2, a3, a4] = await Promise.all([ + token.balanceOf(treasuryAddr), + token.balanceOf(insuranceAddr), + token.balanceOf(sps.address), + token.balanceOf(ADDRESS_1), + token.balanceOf(ADDRESS_2), + token.balanceOf(ADDRESS_3), + token.balanceOf(ADDRESS_4) + ]) + + assertBn(div15(treasury_b), treasury, 'treasury token balance check') + assertBn(div15(insurance_b), insurance, 'insurance fund token balance check') + assertBn(div15(sps_b.add(a1).add(a2).add(a3).add(a4)), sp, 'staking providers token balance check') + } + + it('deposit works', async () => { + await sps.addStakingProvider('1', ADDRESS_1, UNLIMITED, { from: voting }) + await sps.addStakingProvider('2', ADDRESS_2, UNLIMITED, { from: voting }) + + await app.setWithdrawalCredentials(pad('0x0202', 32), { from: voting }) + await sps.addSigningKeys(0, 1, pad('0x010203', 48), pad('0x01', 96), { from: voting }) + await sps.addSigningKeys( + 0, + 3, + hexConcat(pad('0x010204', 48), pad('0x010205', 48), pad('0x010206', 48)), + hexConcat(pad('0x01', 96), pad('0x01', 96), pad('0x01', 96)), + { from: voting } + ) + + // +1 ETH + await web3.eth.sendTransaction({ to: app.address, from: user1, value: ETH(1) }) + await checkStat({ deposited: 0, remote: 0 }) + assertBn(bn(await app.toLittleEndian64(await depositContract.get_deposit_count())), 0) + assertBn(await app.getTotalControlledEther(), ETH(1)) + assertBn(await app.getBufferedEther(), ETH(1)) + assertBn(await token.balanceOf(user1), tokens(1)) + assertBn(await token.totalSupply(), tokens(1)) + + // +2 ETH + await app.submit(ZERO_ADDRESS, { from: user2, value: ETH(2) }) // another form of a deposit call + await checkStat({ deposited: 0, remote: 0 }) + assertBn(bn(await depositContract.get_deposit_count()), 0) + assertBn(await app.getTotalControlledEther(), ETH(3)) + assertBn(await app.getBufferedEther(), ETH(3)) + assertBn(await token.balanceOf(user2), tokens(2)) + assertBn(await token.totalSupply(), tokens(3)) + + // +30 ETH + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(30) }) + await checkStat({ deposited: ETH(32), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(33)) + assertBn(await app.getBufferedEther(), ETH(1)) + assertBn(await token.balanceOf(user1), tokens(1)) + assertBn(await token.balanceOf(user2), tokens(2)) + assertBn(await token.balanceOf(user3), tokens(30)) + assertBn(await token.totalSupply(), tokens(33)) + + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 1) + + // +100 ETH + await web3.eth.sendTransaction({ to: app.address, from: user1, value: ETH(100) }) + await checkStat({ deposited: ETH(128), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(133)) + assertBn(await app.getBufferedEther(), ETH(5)) + assertBn(await token.balanceOf(user1), tokens(101)) + assertBn(await token.balanceOf(user2), tokens(2)) + assertBn(await token.balanceOf(user3), tokens(30)) + assertBn(await token.totalSupply(), tokens(133)) + + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 4) + }) + + it('key removal is taken into account during deposit', async () => { + await sps.addStakingProvider('1', ADDRESS_1, UNLIMITED, { from: voting }) + await sps.addStakingProvider('2', ADDRESS_2, UNLIMITED, { from: voting }) + + await app.setWithdrawalCredentials(pad('0x0202', 32), { from: voting }) + await sps.addSigningKeys(0, 1, pad('0x010203', 48), pad('0x01', 96), { from: voting }) + await sps.addSigningKeys( + 0, + 3, + hexConcat(pad('0x010204', 48), pad('0x010205', 48), pad('0x010206', 48)), + hexConcat(pad('0x01', 96), pad('0x01', 96), pad('0x01', 96)), + { from: voting } + ) + + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(33) }) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 1) + await assertRevert(sps.removeSigningKey(0, 0, { from: voting }), 'KEY_WAS_USED') + + await sps.removeSigningKey(0, 1, { from: voting }) + + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(100) }) + await assertRevert(sps.removeSigningKey(0, 1, { from: voting }), 'KEY_WAS_USED') + await assertRevert(sps.removeSigningKey(0, 2, { from: voting }), 'KEY_WAS_USED') + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + assertBn(await app.getTotalControlledEther(), ETH(133)) + assertBn(await app.getBufferedEther(), ETH(37)) + }) + + it('SP filtering during deposit works when doing a huge deposit', async () => { + await app.setWithdrawalCredentials(pad('0x0202', 32), { from: voting }) + + await sps.addStakingProvider('good', ADDRESS_1, UNLIMITED, { from: voting }) // 0 + await sps.addSigningKeys(0, 2, hexConcat(pad('0x0001', 48), pad('0x0002', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('limited', ADDRESS_2, 1, { from: voting }) // 1 + await sps.addSigningKeys(1, 2, hexConcat(pad('0x0101', 48), pad('0x0102', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('deactivated', ADDRESS_3, UNLIMITED, { from: voting }) // 2 + await sps.addSigningKeys(2, 2, hexConcat(pad('0x0201', 48), pad('0x0202', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + await sps.setStakingProviderActive(2, false, { from: voting }) + + await sps.addStakingProvider('short on keys', ADDRESS_4, UNLIMITED, { from: voting }) // 3 + + await app.setFee(5000, { from: voting }) + await app.setFeeDistribution(3000, 2000, 5000, { from: voting }) + + // Deposit huge chunk + await web3.eth.sendTransaction({ to: app.address, from: user1, value: ETH(32 * 3 + 50) }) + await checkStat({ deposited: ETH(96), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(146)) + assertBn(await app.getBufferedEther(), ETH(50)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Next deposit changes nothing + await web3.eth.sendTransaction({ to: app.address, from: user2, value: ETH(32) }) + await checkStat({ deposited: ETH(96), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(178)) + assertBn(await app.getBufferedEther(), ETH(82)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // #1 goes below the limit + await sps.reportStoppedValidators(1, 1, { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(1) }) + await checkStat({ deposited: ETH(128), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(179)) + assertBn(await app.getBufferedEther(), ETH(51)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 4) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Adding a key will help + await sps.addSigningKeys(0, 1, pad('0x0003', 48), pad('0x01', 96), { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(1) }) + await checkStat({ deposited: ETH(160), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(180)) + assertBn(await app.getBufferedEther(), ETH(20)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 5) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 3) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Reactivation of #2 + await sps.setStakingProviderActive(2, true, { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(12) }) + await checkStat({ deposited: ETH(192), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(192)) + assertBn(await app.getBufferedEther(), ETH(0)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 6) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 3) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + }) + + it('SP filtering during deposit works when doing small deposits', async () => { + await app.setWithdrawalCredentials(pad('0x0202', 32), { from: voting }) + + await sps.addStakingProvider('good', ADDRESS_1, UNLIMITED, { from: voting }) // 0 + await sps.addSigningKeys(0, 2, hexConcat(pad('0x0001', 48), pad('0x0002', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('limited', ADDRESS_2, 1, { from: voting }) // 1 + await sps.addSigningKeys(1, 2, hexConcat(pad('0x0101', 48), pad('0x0102', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('deactivated', ADDRESS_3, UNLIMITED, { from: voting }) // 2 + await sps.addSigningKeys(2, 2, hexConcat(pad('0x0201', 48), pad('0x0202', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + await sps.setStakingProviderActive(2, false, { from: voting }) + + await sps.addStakingProvider('short on keys', ADDRESS_4, UNLIMITED, { from: voting }) // 3 + + await app.setFee(5000, { from: voting }) + await app.setFeeDistribution(3000, 2000, 5000, { from: voting }) + + // Small deposits + for (let i = 0; i < 14; i++) await web3.eth.sendTransaction({ to: app.address, from: user1, value: ETH(10) }) + await web3.eth.sendTransaction({ to: app.address, from: user1, value: ETH(6) }) + + await checkStat({ deposited: ETH(96), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(146)) + assertBn(await app.getBufferedEther(), ETH(50)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Next deposit changes nothing + await web3.eth.sendTransaction({ to: app.address, from: user2, value: ETH(32) }) + await checkStat({ deposited: ETH(96), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(178)) + assertBn(await app.getBufferedEther(), ETH(82)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // #1 goes below the limit + await sps.reportStoppedValidators(1, 1, { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(1) }) + await checkStat({ deposited: ETH(128), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(179)) + assertBn(await app.getBufferedEther(), ETH(51)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 4) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Adding a key will help + await sps.addSigningKeys(0, 1, pad('0x0003', 48), pad('0x01', 96), { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(1) }) + await checkStat({ deposited: ETH(160), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(180)) + assertBn(await app.getBufferedEther(), ETH(20)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 5) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 3) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Reactivation of #2 + await sps.setStakingProviderActive(2, true, { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user3, value: ETH(12) }) + await checkStat({ deposited: ETH(192), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(192)) + assertBn(await app.getBufferedEther(), ETH(0)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 6) + + assertBn(await sps.getTotalSigningKeyCount(0, { from: nobody }), 3) + assertBn(await sps.getTotalSigningKeyCount(1, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getTotalSigningKeyCount(3, { from: nobody }), 0) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 0) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + }) + + it('Deposit finds the right SP', async () => { + await app.setWithdrawalCredentials(pad('0x0202', 32), { from: voting }) + + await sps.addStakingProvider('good', ADDRESS_1, UNLIMITED, { from: voting }) // 0 + await sps.addSigningKeys(0, 2, hexConcat(pad('0x0001', 48), pad('0x0002', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('2nd good', ADDRESS_2, UNLIMITED, { from: voting }) // 1 + await sps.addSigningKeys(1, 2, hexConcat(pad('0x0101', 48), pad('0x0102', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + + await sps.addStakingProvider('deactivated', ADDRESS_3, UNLIMITED, { from: voting }) // 2 + await sps.addSigningKeys(2, 2, hexConcat(pad('0x0201', 48), pad('0x0202', 48)), hexConcat(pad('0x01', 96), pad('0x01', 96)), { + from: voting + }) + await sps.setStakingProviderActive(2, false, { from: voting }) + + await sps.addStakingProvider('short on keys', ADDRESS_4, UNLIMITED, { from: voting }) // 3 + + await app.setFee(5000, { from: voting }) + await app.setFeeDistribution(3000, 2000, 5000, { from: voting }) + + // #1 and #0 get the funds + await web3.eth.sendTransaction({ to: app.address, from: user2, value: ETH(64) }) + await checkStat({ deposited: ETH(64), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(64)) + assertBn(await app.getBufferedEther(), ETH(0)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 2) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 2) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + + // Reactivation of #2 - has the smallest stake + await sps.setStakingProviderActive(2, true, { from: voting }) + await web3.eth.sendTransaction({ to: app.address, from: user2, value: ETH(36) }) + await checkStat({ deposited: ETH(96), remote: 0 }) + assertBn(await app.getTotalControlledEther(), ETH(100)) + assertBn(await app.getBufferedEther(), ETH(4)) + assertBn(bn(changeEndianness(await depositContract.get_deposit_count())), 3) + + assertBn(await sps.getUnusedSigningKeyCount(0, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(1, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(2, { from: nobody }), 1) + assertBn(await sps.getUnusedSigningKeyCount(3, { from: nobody }), 0) + }) +})