diff --git a/signer/src/bitcoin/packaging.rs b/signer/src/bitcoin/packaging.rs index b2123d543..6a94a0020 100644 --- a/signer/src/bitcoin/packaging.rs +++ b/signer/src/bitcoin/packaging.rs @@ -1,9 +1,13 @@ //! Generic bin-packing functionality +use sbtc::idpack::BitmapSegmenter; +use sbtc::idpack::Segmenter; + use crate::MAX_MEMPOOL_PACKAGE_SIZE; use crate::MAX_MEMPOOL_PACKAGE_TX_COUNT; use super::utxo::MAX_BASE_TX_VSIZE; +use super::utxo::OP_RETURN_AVAILABLE_SIZE; /// The maximum vsize of all items in a package. /// @@ -22,18 +26,35 @@ use super::utxo::MAX_BASE_TX_VSIZE; const PACKAGE_MAX_VSIZE: u64 = ((MAX_MEMPOOL_PACKAGE_SIZE - MAX_MEMPOOL_PACKAGE_TX_COUNT * MAX_BASE_TX_VSIZE) / 5000) * 5000; -/// Package a list of items into bags. +/// Package a list of items into optimal bags according to specified +/// constraints. +/// +/// This function implements a variant of the Best-Fit-Decreasing bin packing +/// algorithm. Items are sorted by "weight" (votes against) in decreasing order +/// before being placed into optimal bags. +/// +/// ## Constraints +/// +/// Each bag is subject to the following constraints: +/// 1. The combined votes against cannot exceed `max_votes_against` +/// 2. The number of items requiring signatures cannot exceed +/// `max_needs_signature` +/// 3. Withdrawal IDs must fit within the OP_RETURN size limit (~77 bytes) +/// 4. The total virtual size across all bags must not exceed +/// [`PACKAGE_MAX_VSIZE`] /// -/// Each item is required to have certain "weights" that affect how it may -/// be included in a "bag". The weights are: -/// 1. The votes against. Each item is assumed to be "voted on" and each -/// bag cannot have items where the total number of votes against is -/// greater than the `max_votes_against`. -/// 2. Whether the item requires a signature. The total number of items in -/// a bag that require a signature must not exceed the -/// `max_needs_signature`. -/// 3. The items vsize, or virtual size. The aggregate vsize across all -/// bags must not exceed [`PACKAGE_MAX_VSIZE`]. +/// ## Parameters +/// - `items`: Collection of items to be packaged +/// - `max_votes_against`: Maximum allowed votes against for any bag +/// - `max_needs_signature`: Maximum number of items requiring signatures in a +/// bag +/// +/// ## Notes +/// - Items that exceed constraints individually are silently ignored +/// +/// ## Returns +/// An iterator over vectors, where each inner vector represents a bag of +/// compatible items. pub fn compute_optimal_packages( items: I, max_votes_against: u32, @@ -55,132 +76,433 @@ where // Now we just add each item into a bag, and return the // collection of bags afterward. - let mut packager = - BestFitPackager::new(max_votes_against, max_needs_signature, PACKAGE_MAX_VSIZE); + // Create config and packager + let config = PackagerConfig::new(max_votes_against, max_needs_signature); + let mut packager = BestFitPackager::new(config); + for (_, item) in item_vec { packager.insert_item(item); } - packager.bags.into_iter().map(|(_, _, items)| items) + + packager.finalize() } -/// A weighted item that can be packaged using -/// [`compute_optimal_packages`]. +/// A trait for items that can be packaged together according to specific +/// constraints. Used by [`compute_optimal_packages`]. +/// +/// This trait captures the key properties that determine whether items can be +/// combined in a single Bitcoin transaction: /// -/// The inclusion of a request in a bitcoin transaction depends on three -/// factors: /// 1. How the signers have voted on the request, /// 2. Whether we are dealing with a deposit or a withdrawal request, -/// 3. The virtual size of the request when included in a sweep -/// transaction. +/// 3. The virtual size of the request when included in a sweep transaction. +/// 4. Whether the withdrawal IDs can fit within an OP_RETURN output's +/// size limits. /// /// This trait has methods that capture all of these factors. pub trait Weighted { /// Whether the item needs a signature or not. /// - /// If a request needs a signature, then including it requires a - /// signing round and that takes time. Since we try to get all inputs - /// signed well before the arrival of the next bitcoin block, we cap - /// the number of items that need a signature. + /// If a request needs a signature, then including it requires a signing + /// round and that takes time. Since we try to get all inputs signed well + /// before the arrival of the next bitcoin block, we cap the number of items + /// that need a signature. + /// + /// ## Returns + /// `true` if this item will consume one of the limited signature slots in a + /// bag. fn needs_signature(&self) -> bool; - /// A bitmap of how the signers voted. + + /// Returns a bitmap where a bit that is set to 1 indicates a signer + /// voted against this item. /// - /// Here, we assume that if a bit is 1 then the signer that corresponds - /// to the bits position voted *against* the transaction. + /// The combined votes against (using bitwise OR) for all items in a bag + /// must not exceed the `max_votes_against` threshold. + /// + /// ## Returns + /// A bitmap representing votes against this item. fn votes(&self) -> u128; + /// The virtual size of the item in vbytes. This is supposed to be the /// total bitcoin weight of the request once signed on the bitcoin - /// blockchain. For deposits this is the input UTXO including witness - /// data, for withdrawals it's the entire output vsize. + /// blockchain. + /// + /// For deposits, this is the input UTXO size including witness data. + /// For withdrawals, this is the entire output vsize. + /// + /// ## Returns + /// The vsize in vbytes. fn vsize(&self) -> u64; + + /// The withdrawal ID for this item, if it's a withdrawal request. + /// + /// Must return `Some(_)` for withdrawals and `None` otherwise. For + /// withdrawals, the ID is used to encode a bitmap in the OP_RETURN output. + /// + /// ## Returns + /// `Some(id)` for withdrawals, `None` for other item types. + fn withdrawal_id(&self) -> Option { + None + } +} + +/// Configuration parameters for the bin packing algorithm. +/// +/// Defines the constraints applied during the packaging process to ensure +/// transactions are valid according to Bitcoin network rules and sBTC security +/// policies. +#[derive(Debug, Clone, Copy)] +struct PackagerConfig { + /// Maximum allowed votes against for any bag. + /// + /// This limits how many signers can vote against items in a single bag. If + /// the combined votes against exceeds this threshold, items are placed in + /// separate bags. + max_votes_against: u32, + /// Maximum number of items requiring signatures in a bag. + /// + /// Due to performance and timing constraints, we limit the number of items + /// that need signatures in a single bag. + max_signatures: u16, + /// Maximum virtual size for all bags combined. + /// + /// Derived from Bitcoin Core's package relay limits to ensure transactions + /// are accepted by the network. + max_total_vsize: u64, + /// Maximum available size for encoding withdrawal IDs in OP_RETURN. + /// + /// Enforcement of this limit prevents transaction rejection due to + /// oversized OP_RETURN outputs. + max_op_return_size: usize, +} + +impl PackagerConfig { + /// Create a new configuration with the given vote and signature limits. + /// + /// ## Parameters + /// - `max_votes_against`: Maximum allowed votes against for any bag + /// - `max_signatures`: Maximum number of items requiring signatures in a + /// bag + /// + /// ## Returns + /// A new `PackagerConfig` with default values for other constraints. + fn new(max_votes_against: u32, max_signatures: u16) -> Self { + Self { + max_votes_against, + max_signatures, + max_total_vsize: PACKAGE_MAX_VSIZE, + max_op_return_size: OP_RETURN_AVAILABLE_SIZE, + } + } +} + +/// A container for compatible items that can be packaged together in a Bitcoin +/// transaction. +/// +/// Each bag enforces multiple constraints including vote patterns, signature +/// requirements, and withdrawal ID size limits. +/// +/// Bags are optimized to group items with similar voting patterns when +/// possible. +#[derive(Debug, Clone)] +struct Bag { + /// Configuration constraints for this bag + config: PackagerConfig, + /// Items contained in this bag + items: Vec, + /// Combined votes bitmap (using bitwise OR) + votes_bitmap: u128, + /// Count of items requiring signatures + items_needing_signatures: u16, + /// Total virtual size of items in this bag + vsize: u64, + /// Sorted list of withdrawal IDs in this bag + withdrawal_ids: Vec, +} + +impl Bag +where + T: Weighted, +{ + /// Create a new empty bag with the provided configuration. + /// + /// ## Parameters + /// - `config`: Configuration constraints for the bag + /// + /// ## Returns + /// A new empty bag. + fn new(config: PackagerConfig) -> Self { + Bag { + config, + votes_bitmap: 0, + items_needing_signatures: 0, + vsize: 0, + items: Vec::new(), + withdrawal_ids: Vec::new(), + } + } + + /// Create a new bag from a single item. + /// + /// ## Parameters + /// - `config`: Configuration constraints for the bag + /// - `item`: Initial item to add to the bag + /// + /// ## Returns + /// A new bag containing the item. + fn with_item(config: PackagerConfig, item: T) -> Self { + let mut bag = Self::new(config); + bag.add_item(item); + bag + } + + /// Add an item to the bag. + /// + /// Updates internal state including votes, signatures needed, vsize, and + /// withdrawal IDs. + /// + /// ## Parameters + /// - `item`: Item to add to the bag + fn add_item(&mut self, item: T) { + self.votes_bitmap |= item.votes(); + self.items_needing_signatures += item.needs_signature() as u16; + self.vsize += item.vsize(); + + if let Some(id) = item.withdrawal_id() { + match self.withdrawal_ids.binary_search(&id) { + Ok(_) => {} // ID already exists, do nothing + Err(pos) => self.withdrawal_ids.insert(pos, id), + } + } + + self.items.push(item); + } + + /// Check if an item is compatible with this bag according to all + /// constraints. + /// + /// An item is compatible when: + /// 1. Combined votes against ≤ max_votes_against + /// 2. Combined signature requirements ≤ max_signatures + /// 3. Withdrawal ID (if any) fits within remaining OP_RETURN space + /// + /// ## Parameters + /// - `item`: Item to check for compatibility + /// + /// ## Returns + /// `true` if the item can be safely added to this bag. + fn is_compatible(&self, item: &T) -> bool { + self.votes_compatible(item) + && self.signatures_compatible(item) + && self.withdrawal_id_compatible(item) + } + + /// Check if an item's votes are compatible with this bag. + /// + /// ## Parameters + /// - `item`: Item to check for vote compatibility + /// + /// ## Returns + /// `true` if the combined votes don't exceed the maximum allowed. + fn votes_compatible(&self, item: &T) -> bool { + let combined_votes = self.votes_bitmap | item.votes(); + combined_votes.count_ones() <= self.config.max_votes_against + } + + /// Check if an item's signature requirement is compatible with this bag. + /// + /// ## Parameters + /// - `item`: Item to check for signature compatibility + /// + /// ## Returns + /// `true` if adding the item wouldn't exceed the signature limit. + fn signatures_compatible(&self, item: &T) -> bool { + let sig = item.needs_signature() as u16; + self.items_needing_signatures + sig <= self.config.max_signatures + } + + /// Check if an item's withdrawal ID is compatible with this bag. + /// + /// ## Parameters + /// - `item`: Item to check for withdrawal ID compatibility + /// + /// ## Returns + /// `true` if the item's withdrawal ID can fit in this bag's OP_RETURN. + fn withdrawal_id_compatible(&self, item: &T) -> bool { + let Some(id) = item.withdrawal_id() else { + return true; + }; + + self.can_add_withdrawal_id(id) + } + + /// Calculate compatibility score between item and bag (smaller is better). + /// + /// The score is based on how different the vote patterns are (using XOR). + /// Lower scores indicate items with more similar voting patterns. + /// + /// ## Parameters + /// - `item`: Item to calculate compatibility score for + /// + /// ## Returns + /// A score where lower values indicate better compatibility. + fn compatibility_score(&self, item: &T) -> u32 { + // XOR measures how different the vote patterns are + (self.votes_bitmap ^ item.votes()).count_ones() + } + + /// Check if adding a single withdrawal ID would exceed the OP_RETURN size + /// limit. + /// + /// ## Parameters + /// - `new_id`: Withdrawal ID to check + /// + /// ## Returns + /// - `true` if the ID can be added + /// - `false` if adding the ID would exceed size limits + /// + /// ## Implementation Notes + /// This method simulates adding the new withdrawal ID to the bag's existing + /// IDs while maintaining sorted order. The [`BitmapSegmenter`] is then used + /// to estimate the size of the combined IDs, which requires sorted and + /// de-duplicated IDs. + fn can_add_withdrawal_id(&self, new_id: u64) -> bool { + // If no existing IDs then the range is 0, so we can add any ID + if self.withdrawal_ids.is_empty() { + return true; + } + + // Check if ID already exists (would have no effect on size) + match self.withdrawal_ids.binary_search(&new_id) { + Ok(_) => true, // ID already in the list + Err(pos) => { + // Create combined IDs with new ID inserted at correct position + let mut combined_ids = Vec::with_capacity(self.withdrawal_ids.len() + 1); + combined_ids.extend_from_slice(&self.withdrawal_ids[0..pos]); + combined_ids.push(new_id); + combined_ids.extend_from_slice(&self.withdrawal_ids[pos..]); + + // Check if the combined IDs fit + self.can_fit_withdrawal_ids(&combined_ids) + } + } + } + + /// Check if a set of withdrawal IDs can fit within the OP_RETURN size + /// limit. + /// + /// ## Parameters + /// - `ids`: Collection of withdrawal IDs to check + /// + /// ## Returns + /// - `true` if the IDs will fit within the OP_RETURN size limits. + /// - `false` if the IDs exceed the size limits, or an error occurs during + /// estimation (for example if the id's have become unsorted or contain + /// duplicates). + fn can_fit_withdrawal_ids(&self, ids: &[u64]) -> bool { + if ids.is_empty() { + return true; + } + + BitmapSegmenter + .estimate_size(ids) + .map_or_else( + |error| { + tracing::warn!(%error, withdrawal_ids = ?ids, "error estimating packaged withdrawal id size"); + false + }, + |size| size <= self.config.max_op_return_size + ) + } } +/// Implementation of the Best-Fit bin packing algorithm for compatible items. +/// +/// This packager attempts to: +/// 1. Group items with similar voting patterns together +/// 2. Respect signature limits for each bag +/// 3. Ensure withdrawal IDs fit within OP_RETURN size limits +/// 4. Keep total virtual size within Bitcoin network limits +/// +/// ## Implementation Notes +/// - Items that exceed individual limits are silently ignored +/// - Items that would cause the total vsize to exceed limits are ignored #[derive(Debug)] struct BestFitPackager { - /// Contains all the bags and their items. The first element of the - /// tuple is a bitmap for how the signers would vote for the collection - /// of items in the associated bag, the second element is the number of - /// items that require signatures in the bag, and the third element is - /// the bag itself. - bags: Vec<(u128, u16, Vec)>, - /// Each bag has a fixed votes against threshold, this is that value. - max_votes_against: u32, - /// The maximum number of items that can require signatures in a bag, - /// regardless of the aggregated votes and their vsize. - max_needs_signature: u16, - /// The maximum total virtual size of all bags. - max_vsize: u64, - /// The total virtual size of all items across all bags. + /// All created bags of compatible items + bags: Vec>, + /// Configuration constraints + config: PackagerConfig, + /// Running total of virtual size across all bags total_vsize: u64, } impl BestFitPackager { - const fn new(max_votes_against: u32, max_needs_signature: u16, max_vsize: u64) -> Self { + fn new(config: PackagerConfig) -> Self { Self { bags: Vec::new(), - max_votes_against, - max_needs_signature, - max_vsize, + config, total_vsize: 0, } } - /// Find the best bag to insert a new item given the item's weight - /// and return the key for that bag. None is returned if no bag can - /// accommodate an item with the given weight. - fn find_best_key(&mut self, item: &T) -> Option<&mut (u128, u16, Vec)> { - let sig = item.needs_signature() as u16; - let item_votes = item.votes(); - + /// Find the best bag to insert a new item. + /// + /// "Best" is defined as the compatible bag with the lowest compatibility score. + /// + /// ## Parameters + /// - `item`: Item to find a bag for + /// + /// ## Returns + /// A mutable reference to the best bag, or `None` if no compatible bag exists. + fn find_best_bag(&mut self, item: &T) -> Option<&mut Bag> { self.bags .iter_mut() - .filter(|(aggregate_votes, num_signatures, _)| { - (aggregate_votes | item_votes).count_ones() <= self.max_votes_against - && num_signatures.saturating_add(sig) <= self.max_needs_signature - }) - .min_by_key(|(aggregate_votes, _, _)| (item_votes ^ aggregate_votes).count_ones()) + .filter(|bag| bag.is_compatible(item)) + .min_by_key(|bag| bag.compatibility_score(item)) } - /// Create a new bag for the given item. + /// Try to insert an item into the best-fit bag, or create a new one. /// - /// Note that this function creates a new bag even if the item can - /// fit into some other bag with enough capacity - fn create_new_bag(&mut self, item: T) { - self.bags - .push((item.votes(), item.needs_signature() as u16, vec![item])); - } - - /// Try to insert an item into the best-fit bag, and create a new one - /// if no bag exists that can fit the item and the item's weights are - /// within the packager's limits. + /// Items that exceed individual limits or would cause the total vsize to + /// exceed limits are silently ignored. /// - /// An item's weights exceed the packager's limits if any of the - /// following conditions hold: - /// 1. The votes against the item exceed the packager's - /// `max_votes_against`. - /// 2. Including the item would bring the total vsize over the - /// packager's `max_vsize`. + /// ## Parameters + /// - `item`: Item to insert /// - /// If the item's weights are not within the packager's limits, then it - /// is not added to any bag and is dropped. + /// ## Notes + /// - This method silently ignores items that exceed individual either + /// individual or aggregate limits (i.e. votes-against or total package + /// vsize). fn insert_item(&mut self, item: T) { - let item_votes = item.votes(); - let item_vsize = item.vsize(); - let above_limits = item_votes.count_ones() > self.max_votes_against - || self.total_vsize.saturating_add(item_vsize) > self.max_vsize; + let votes_against = item.votes().count_ones(); + let total_package_vsize = self.total_vsize + item.vsize(); - if above_limits { + // Early exits for items exceeding our bag-independent limits. + if votes_against > self.config.max_votes_against + || total_package_vsize > self.config.max_total_vsize + { return; } - self.total_vsize += item_vsize; - match self.find_best_key(&item) { - Some((votes, num_signatures, items)) => { - *votes |= item_votes; - *num_signatures += item.needs_signature() as u16; - items.push(item); - } - None => self.create_new_bag(item), - }; + // Add to total vsize + self.total_vsize += item.vsize(); + + // Use find_best_bag or create a new bag + match self.find_best_bag(&item) { + Some(bag) => bag.add_item(item), + None => self.bags.push(Bag::with_item(self.config, item)), + } + } + + /// Consumes the packager and returns an iterator over the packed item + /// groups. + /// + /// ## Returns + /// An iterator that yields each bag's contents as a `Vec`, preserving + /// the original compatibility constraints established during insertion. + fn finalize(self) -> impl Iterator> { + self.bags.into_iter().map(|bag| bag.items) } } @@ -191,16 +513,113 @@ mod tests { use bitvec::field::BitField; use test_case::test_case; - #[derive(Debug, Copy, Clone)] + impl BestFitPackager + where + T: Weighted, + { + /// Create a new bag with the given items and add it to the packager. + fn new_bag(&mut self, items: Vec) -> &mut Bag { + let bag = Bag::from_items(self.config, items); + self.bags.push(bag); + self.bags.last_mut().unwrap() + } + } + + impl Bag + where + T: Weighted, + { + /// Add multiple items to the bag. + fn add_items(&mut self, items: Vec) { + for item in items { + self.add_item(item); + } + } + + /// Create a new bag from a collection of items. + fn from_items(config: PackagerConfig, items: Vec) -> Self { + let mut bag = Bag { + config, + items: Vec::new(), + votes_bitmap: 0, + items_needing_signatures: 0, + vsize: 0, + withdrawal_ids: Vec::new(), + }; + bag.add_items(items); + bag + } + } + + #[derive(Debug, Default, Copy, Clone)] struct RequestItem { + // Votes _against_ the request. A `true` value means a vote against. votes: [bool; 5], + /// Whether this request needs a signature. needs_signature: bool, + /// The virtual size of the request. vsize: u64, + /// The withdrawal request ID for this item, if it's a withdrawal. + withdrawal_id: Option, } impl RequestItem { - fn new(votes: [bool; 5], needs_signature: bool, vsize: u64) -> Self { - Self { votes, needs_signature, vsize } + /// Create a new request item with no votes against. + fn no_votes() -> Self { + Self::default() + } + + /// Create a new request item with all votes against. + fn all_votes() -> Self { + Self { + votes: [true; 5], + ..Default::default() + } + } + + /// Create a new request item with specific votes against. + /// + /// ## Parameters + /// - `votes`: Collection of signer indices (1-based) who vote against this item + fn with_votes(votes: &[usize]) -> Self { + let mut vote_array = [false; 5]; + for &index in votes { + vote_array[index - 1] = true; + } + + Self { + votes: vote_array, + ..Default::default() + } + } + + /// Create a new request item with a single vote against. + /// + /// ## Parameters + /// - `signer`: The signer index (1-based) who votes against this item + fn with_vote(signer: usize) -> Self { + let mut votes = [false; 5]; + votes[signer - 1] = true; + Self { votes, ..Default::default() } + } + + /// Set the `needs_signature` field to true, indicating that signing + /// is required for this request. + fn sig_required(mut self) -> Self { + self.needs_signature = true; + self + } + + /// Sets the withdrawal request ID for this item. + fn wid(mut self, withdrawal_id: u64) -> Self { + self.withdrawal_id = Some(withdrawal_id); + self + } + + /// Sets the virtual size for this item. + fn vsize(mut self, vsize: u64) -> Self { + self.vsize = vsize; + self } } @@ -208,6 +627,7 @@ mod tests { fn needs_signature(&self) -> bool { self.needs_signature } + fn votes(&self) -> u128 { let mut votes = BitArray::<[u8; 16]>::ZERO; for (index, value) in self.votes.iter().copied().enumerate() { @@ -215,9 +635,14 @@ mod tests { } votes.load() } + fn vsize(&self) -> u64 { self.vsize } + + fn withdrawal_id(&self) -> Option { + self.withdrawal_id + } } struct VotesTestCase { @@ -237,15 +662,21 @@ mod tests { expected_bag_vsizes: [u64; N], } + /// Tests the complete bin-packing algorithm across multiple scenarios including: + /// - No votes against + /// - Same votes against + /// - Different votes requiring multiple bags + /// - Signature limits causing splits + /// - Size constraints being enforced #[test_case(VotesTestCase { - items: vec![RequestItem::new([false; 5], false, 0); 6], + items: vec![RequestItem::no_votes(); 6], max_needs_signature: 100, max_votes_against: 1, expected_bag_sizes: [6], expected_bag_vsizes: [0], } ; "no-votes-against-one-package")] #[test_case(VotesTestCase { - items: vec![RequestItem::new([false, false, false, false, true], false, 0); 6], + items: vec![RequestItem::with_vote(5); 6], max_needs_signature: 100, max_votes_against: 1, expected_bag_sizes: [6], @@ -253,11 +684,11 @@ mod tests { } ; "same-votes-against-one-package")] #[test_case(VotesTestCase { items: vec![ - RequestItem::new([false, false, false, false, true], false, 0), - RequestItem::new([false, false, false, false, true], false, 0), - RequestItem::new([false, false, false, true, false], false, 0), - RequestItem::new([false, false, false, true, false], false, 0), - RequestItem::new([false, false, false, false, false], false, 0), + RequestItem::with_vote(5), + RequestItem::with_vote(5), + RequestItem::with_vote(4), + RequestItem::with_vote(4), + RequestItem::no_votes(), ], max_needs_signature: 100, max_votes_against: 1, @@ -265,14 +696,14 @@ mod tests { expected_bag_vsizes: [0, 0], } ; "two-different-votes-against-two-packages")] #[test_case(VotesTestCase { - items: vec![RequestItem::new([false; 5], true, 0); 25], + items: vec![RequestItem::no_votes().sig_required(); 25], max_needs_signature: 10, max_votes_against: 1, expected_bag_sizes: [10, 10, 5], expected_bag_vsizes: [0, 0, 0], } ; "splits-when-too-many-required-signatures")] #[test_case(VotesTestCase { - items: vec![RequestItem::new([false; 5], false, 4000); 25], + items: vec![RequestItem::no_votes().vsize(4000); 25], max_needs_signature: 10, max_votes_against: 1, expected_bag_sizes: [23], @@ -280,12 +711,12 @@ mod tests { } ; "ignores-when-vsize-exceeds-max")] #[test_case(VotesTestCase { items: vec![ - RequestItem::new([false, false, false, true, true], false, 0), - RequestItem::new([false, true, true, false, false], false, 0), - RequestItem::new([true, true, false, false, false], false, 0), - RequestItem::new([true, false, false, false, false], false, 0), - RequestItem::new([false, true, false, false, false], false, 0), - RequestItem::new([false, false, true, false, false], false, 0), + RequestItem::with_votes(&[4, 5]), + RequestItem::with_votes(&[2, 3]), + RequestItem::with_votes(&[1, 2]), + RequestItem::with_vote(1), + RequestItem::with_vote(2), + RequestItem::with_vote(3), ], max_needs_signature: 100, max_votes_against: 3, @@ -311,4 +742,406 @@ mod tests { more_asserts::assert_le!(package_vsize, PACKAGE_MAX_VSIZE); } } + + /// Tests that the OP_RETURN size estimation correctly identifies both small sets that fit + /// and large sets that exceed the size limit. + #[test] + fn test_can_fit_withdrawal_ids() { + let config = PackagerConfig::new(1, 10); + let bag = Bag::::new(config); + + // Small set should fit + assert!(bag.can_fit_withdrawal_ids(&[1, 2, 3, 4, 5])); + + // Generate a large set with poor compression characteristics + // (values spaced far apart won't compress efficiently with bitmap encoding) + let large_set: Vec = (0..75).map(|i| i * 1000).collect(); + assert!(!bag.can_fit_withdrawal_ids(&large_set)); + } + + /// Tests that bags correctly collect, sort, and deduplicate withdrawal IDs. + #[test] + fn test_bag_collects_withdrawal_ids() { + // Create a bag with one withdrawal ID + let config = PackagerConfig::new(1, 10); + let mut bag = Bag::new(config); + bag.add_item(RequestItem::no_votes().wid(42)); + + assert_eq!(bag.withdrawal_ids.len(), 1); + assert_eq!(bag.withdrawal_ids[0], 42); + + // Add more IDs in non-sorted order + bag.add_items(vec![ + RequestItem::no_votes().wid(100), + RequestItem::no_votes().wid(5), // Smaller than existing IDs + RequestItem::no_votes().wid(200), + RequestItem::no_votes().wid(50), + RequestItem::no_votes(), // Not a withdrawal + RequestItem::no_votes().wid(42), // Duplicate ID + ]); + + // Verify correct number of unique IDs + assert_eq!(bag.withdrawal_ids.len(), 5); + + // Verify IDs are sorted + let expected_ids = [5, 42, 50, 100, 200]; + assert_eq!(bag.withdrawal_ids, expected_ids); + + // IDs should already be sorted, so this should work properly + assert!(bag.can_fit_withdrawal_ids(&bag.withdrawal_ids)); + } + + /// Tests that vote compatibility correctly evaluates different combinations + /// of votes against the maximum allowed threshold. Verifies both positive + /// and negative cases. + #[test_case(&[1], &[], 1 => true; "one_vote_one_max")] + #[test_case(&[1, 2], &[], 1 => false; "two_votes_one_max")] + #[test_case(&[1], &[2], 1 => false; "different_votes_exceed_max")] + #[test_case(&[1], &[1], 1 => true; "same_votes_within_max")] + #[test_case(&[1, 2], &[1], 2 => true; "combined_unique_votes_at_limit")] + fn test_votes_compatible(bag_votes: &[usize], item_votes: &[usize], max_votes: u32) -> bool { + let config = PackagerConfig::new(max_votes, 5); + let bag = Bag::from_items(config, vec![RequestItem::with_votes(bag_votes).vsize(10)]); + let item = RequestItem::with_votes(item_votes).vsize(10); + bag.votes_compatible(&item) + } + + /// Tests signature requirement compatibility across different scenarios + /// including: + /// - No signatures required + /// - At capacity + /// - Below capacity + /// - Exceeding capacity + #[test_case(0, false, 1 => true; "no_sigs_in_bag_no_sig_required")] + #[test_case(5, false, 5 => true; "max_sigs_in_bag_no_sig_required")] + #[test_case(4, true, 5 => true; "under_max_sigs_sig_required")] + #[test_case(5, true, 5 => false; "at_max_sigs_sig_required")] + fn test_signatures_compatible(bag_sigs: u16, item_needs_sig: bool, max_sigs: u16) -> bool { + let config = PackagerConfig::new(2, max_sigs); + + // Create a bag with the specified number of signatures + let mut bag = Bag::from_items( + config, + vec![], // Empty initially + ); + + // Add items requiring signatures to match bag_sigs + for _ in 0..bag_sigs { + bag.items_needing_signatures += 1; + } + + // Create item that may or may not need a signature + let mut item = RequestItem::no_votes().vsize(10); + if item_needs_sig { + item = item.sig_required(); + } + + bag.signatures_compatible(&item) + } + + /// Tests withdrawal ID compatibility for various scenarios: + /// - Empty withdrawal ID lists + /// - Small ID ranges + /// - IDs within existing ranges + /// - IDs that exceed OP_RETURN size limits + #[test_case(vec![], None => true; "no_withdrawal_id")] + #[test_case(vec![1, 2, 3], Some(4) => true; "compatible_withdrawal_id")] + #[test_case(vec![], Some(42) => true; "single_withdrawal_id")] + #[test_case((1..50).collect::>(), Some(300) => true; "many_small_ids_compatible")] + #[test_case(vec![1, 2, 4, 5], Some(3) => true; "new_id_within_existing_range")] + fn test_withdrawal_id_compatible(bag_ids: Vec, item_id: Option) -> bool { + let config = PackagerConfig::new(2, 5); + + // Create a bag with specified withdrawal IDs + let mut bag = Bag::new(config); + + // Add withdrawal IDs + for id in bag_ids { + bag.withdrawal_ids.push(id); + } + bag.withdrawal_ids.sort(); + + // Create item with optional withdrawal ID + let item = match item_id { + Some(id) => RequestItem::no_votes().wid(id).vsize(10), + None => RequestItem::no_votes().vsize(10), + }; + + bag.withdrawal_id_compatible(&item) + } + + /// Test withdrawal id compatibility at the exact OP_RETURN size boundary. + #[test] + fn test_withdrawal_id_compatible_at_exact_op_return_boundary() { + let mut ids: Vec = Vec::new(); + let mut next_id: u64 = 0; + + // Fill the ID list until we've precisely exceeded the OP_RETURN limit + while BitmapSegmenter.estimate_size(&ids).unwrap() <= OP_RETURN_AVAILABLE_SIZE { + ids.push(next_id); + next_id += 1; + } + + // At this point ids are just over the limit - remove the last one + // to get ≤ OP_RETURN_AVAILABLE_SIZE + ids.pop(); + + // Verify that the new size is at/under the limit + let safe_size = BitmapSegmenter.estimate_size(&ids).unwrap(); + more_asserts::assert_le!( + safe_size, + OP_RETURN_AVAILABLE_SIZE, + "expected safe size to be under the limit" + ); + + // The last ID in the list is now the last safe ID. Remove it so we can + // do a proper verification below + let last_safe_id = ids.pop().unwrap(); + + // Create the bag with the IDs that are just under the limit + let config = PackagerConfig::new(2, 5); + let mut bag = Bag::::new(config); + bag.withdrawal_ids = ids; + + // This ID should be compatible + let last_safe_item = RequestItem::no_votes().wid(last_safe_id); + assert!( + bag.withdrawal_id_compatible(&last_safe_item), + "expected last safe ID to be compatible" + ); + bag.withdrawal_ids.push(last_safe_id); // Re-add the ID to the bag + + // This ID should push us over the limit (next_id is the first ID that would + // exceed the limit) + let too_big_item = RequestItem::no_votes().wid(next_id); + assert!( + !bag.is_compatible(&too_big_item), + "expected too big ID to be incompatible" + ); + } + + /// Tests the combined compatibility evaluation including votes, signatures, + /// and withdrawal ID constraints. Ensures all constraints must be satisfied + /// for an item to be compatible. + #[test] + fn test_is_compatible() { + let config = PackagerConfig::new(2, 5); + + // Create a bag with 1 vote against and 2 signatures needed + let bag = Bag::from_items( + config, + vec![ + RequestItem::with_vote(1).sig_required().vsize(10), + RequestItem::no_votes().sig_required().vsize(10), + ], + ); + + // Compatible item (no additional votes against, needs signature) + assert!(bag.is_compatible(&RequestItem::with_vote(1).sig_required().vsize(10))); + + // Incompatible item (too many votes against) + assert!(!bag.is_compatible(&RequestItem::with_votes(&[2, 3]).vsize(10))); + + // Incompatible item (too many signatures needed) + let full_sig_bag = Bag::from_items( + config, + vec![RequestItem::no_votes().sig_required().vsize(10); 5], + ); + + // This would make 6 signatures, exceeding our limit of 5 + assert!(!full_sig_bag.is_compatible(&RequestItem::all_votes().sig_required().vsize(10))); + } + + /// Tests the algorithm's ability to score compatibility between items with + /// different voting patterns. Lower scores indicate more similar voting + /// patterns. + #[test_case(&[1], &[1] => 0; "identical_votes")] + #[test_case(&[2], &[1] => 2; "two_differences")] + #[test_case(&[1, 2], &[1] => 1; "one_difference")] + fn test_compatibility_score(bag_votes: &[usize], item_votes: &[usize]) -> u32 { + let config = PackagerConfig::new(5, 10); + let bag = Bag::from_items(config, vec![RequestItem::with_votes(bag_votes).vsize(10)]); + let item = RequestItem::with_votes(item_votes).vsize(10); + bag.compatibility_score(&item) + } + + /// Tests the bin-packing algorithm's ability to find the optimal bag for + /// placement based on compatibility score and constraints. Includes + /// withdrawal ID space considerations. + #[test_case( + // Simple case - finds first bag (with vote 1) + vec![RequestItem::with_vote(1)], + vec![RequestItem::with_vote(2)], + vec![RequestItem::with_vote(3)], + RequestItem::with_vote(1), + Some(0) + ; "finds_exact_match")] + #[test_case( + // Complex case - finds best compatible bag + vec![RequestItem::with_votes(&[1, 2, 3])], + vec![RequestItem::with_votes(&[1, 2])], + vec![RequestItem::with_vote(1)], + RequestItem::with_vote(1), + Some(2) + ; "finds_most_compatible_bag")] + #[test_case( + // Incompatible with all bags + vec![RequestItem::with_vote(1)], + vec![RequestItem::with_vote(2)], + vec![RequestItem::with_vote(3)], + RequestItem::all_votes(), + None + ; "incompatible_with_all_bags")] + #[test_case( + // Bag 1: Nearly full OP_RETURN (large range of IDs) + (0..580).map(|id| RequestItem::no_votes().wid(id)).collect(), + // Bag 2: Has room for more IDs (small range) + vec![RequestItem::no_votes().wid(100_000), RequestItem::no_votes().wid(100_001)], + // Bag 3: Nearly full OP_RETURN (different large range) + (1000..1580).map(|id| RequestItem::no_votes().wid(id)).collect(), + // Item with ID that fits in bag 2's range + RequestItem::no_votes().wid(100_010), + Some(1) // Should select bag 2 (index 1) + ; "selects_bag_with_room_for_withdrawal_id")] + fn test_find_best_bag( + bag1_items: Vec, + bag2_items: Vec, + bag3_items: Vec, + test_item: RequestItem, + expected_result: Option, + ) { + let config = PackagerConfig::new(2, 5); + let mut packager = BestFitPackager::::new(config); + + // Setup bags + packager.new_bag(bag1_items); + packager.new_bag(bag2_items); + packager.new_bag(bag3_items); + + // Extract the index directly using the same logic + let best_bag_index = packager + .bags + .iter() + .enumerate() + .filter(|(_, bag)| bag.is_compatible(&test_item)) + .min_by_key(|(_, bag)| bag.compatibility_score(&test_item)) + .map(|(index, _)| index); + + // Verify expected result matches the direct calculation + assert_eq!(best_bag_index, expected_result); + + // Verify the actual method returns the right bag + let best_bag = packager.find_best_bag(&test_item); + assert_eq!(best_bag.is_some(), best_bag_index.is_some()); + } + + /// Tests item insertion logic including: + /// - Creating new bags + /// - Adding to existing compatible bags + /// - Silently ignoring items that exceed limits + /// - Handling withdrawal ID constraints + #[test] + fn test_insert_item() { + let config = PackagerConfig::new(2, 5); + let mut packager = BestFitPackager::::new(config); + + // Add first item - should create a new bag + packager.insert_item(RequestItem::with_vote(1).vsize(10)); + assert_eq!(packager.bags.len(), 1); // No change + assert_eq!(packager.bags[0].items.len(), 1); // +1 + assert_eq!(packager.bags[0].vsize, 10); // 10 + + // Add compatible item (same voting, withdrawal) - should go in existing bag + packager.insert_item(RequestItem::with_vote(1).wid(1).vsize(10)); + assert_eq!(packager.bags.len(), 1); // No change + assert_eq!(packager.bags[0].items.len(), 2); // +1 + assert_eq!(packager.bags[0].vsize, 20); // +10 + + // Add compatible item (different voting) - should go in existing bag + // Note: This is compatible because the combined votes (positions 1,2) equal 2, + // which doesn't exceed our max_votes_against limit of 2 + packager.insert_item(RequestItem::with_votes(&[1, 2]).vsize(10)); + assert_eq!(packager.bags.len(), 1); // No change + assert_eq!(packager.bags[0].items.len(), 3); // +1 + assert_eq!(packager.bags[0].vsize, 30); // +10 + + // Add item that exceeds vote limit - should be ignored + packager.insert_item(RequestItem::all_votes().vsize(10)); + assert_eq!(packager.bags.len(), 1); // No change + assert_eq!(packager.bags[0].items.len(), 3); // No change + assert_eq!(packager.bags[0].vsize, 30); // No change + + // Add incompatible item (different voting pattern) - should create new bag + packager.insert_item(RequestItem::with_votes(&[4, 5]).vsize(10)); + assert_eq!(packager.bags.len(), 2); // +1 + assert_eq!(packager.bags[0].items.len(), 3); // (bag 0) No change + assert_eq!(packager.bags[1].items.len(), 1); // (bag 1) +1 + assert_eq!(packager.bags[0].vsize, 30); // (bag 0) No change + assert_eq!(packager.bags[1].vsize, 10); // (bag 1) 10 + + // Add item that exceeds vsize limit + let original_vsize = packager.total_vsize; + packager.insert_item(RequestItem::no_votes().vsize(PACKAGE_MAX_VSIZE - original_vsize + 1)); + assert_eq!(packager.bags.len(), 2); // No change + assert_eq!(packager.bags[0].items.len(), 3); // No change + assert_eq!(packager.total_vsize, original_vsize); // No change to vsize + + // Check that we can trigger the OP_RETURN size limit roll-over + (2..592).step_by(5).for_each(|id| { + packager.insert_item(RequestItem::with_votes(&[1, 2]).wid(id)); + }); + assert_eq!(packager.bags.len(), 2); // we should be really close to the limit (no change) + packager.insert_item(RequestItem::with_votes(&[1, 2]).wid(10_000)); + assert_eq!(packager.bags.len(), 3); // +1 + } + + /// End-to-end test of withdrawal ID handling in the packaging algorithm, + /// verifying that IDs are properly distributed into bags that respect OP_RETURN size limits. + #[test] + fn test_withdrawal_id_packaging() { + // Create a set of items with various withdrawal IDs + let mut items = (0..600) + .map(|id| RequestItem::no_votes().wid(id)) + .collect::>(); + items.push(RequestItem::no_votes().sig_required().vsize(10)); // Regular deposit + items.push(RequestItem::no_votes().wid(1000)); + items.push(RequestItem::no_votes().wid(2000)); + items.push(RequestItem::with_vote(1).wid(3000)); // Different vote pattern + items.push(RequestItem::no_votes().wid(10000)); // Large ID + + let bags = compute_optimal_packages(items, 1, 5).collect::>(); + + // Verify multiple bags were created due to both vote and withdrawal ID constraints + assert!(bags.len() > 1); + + // Verify each bag has the right vote pattern and withdrawal IDs + for bag in &bags { + // Check vote constraint + let combined_votes = bag.iter().fold(0u128, |acc, item| acc | item.votes()); + + // Collect withdrawal IDs + let mut withdrawal_ids: Vec = + bag.iter().filter_map(|item| item.withdrawal_id).collect(); + withdrawal_ids.sort_unstable(); + + // Verify vote constraint is maintained + assert!( + combined_votes.count_ones() <= 1, + "bag has more votes against than allowed: {}", + combined_votes.count_ones() + ); + + // Verify withdrawal IDs can fit in OP_RETURN + if !withdrawal_ids.is_empty() { + let segmenter = BitmapSegmenter; + let size = segmenter.estimate_size(&withdrawal_ids).unwrap(); + assert!( + size <= OP_RETURN_AVAILABLE_SIZE, + "withdrawal IDs exceed OP_RETURN size: {} > {}", + size, + OP_RETURN_AVAILABLE_SIZE + ); + } + } + } } diff --git a/signer/src/bitcoin/utxo.rs b/signer/src/bitcoin/utxo.rs index c0985833b..b70eda9f1 100644 --- a/signer/src/bitcoin/utxo.rs +++ b/signer/src/bitcoin/utxo.rs @@ -5,8 +5,9 @@ use std::ops::Deref as _; use std::sync::LazyLock; use bitcoin::absolute::LockTime; -use bitcoin::consensus::Encodable; +use bitcoin::consensus::Encodable as _; use bitcoin::hashes::Hash as _; +use bitcoin::script::PushBytesBuf; use bitcoin::sighash::Prevouts; use bitcoin::sighash::SighashCache; use bitcoin::taproot::LeafVersion; @@ -29,6 +30,9 @@ use bitcoin::Weight; use bitcoin::Witness; use bitvec::array::BitArray; use bitvec::field::BitField; +use sbtc::idpack::BitmapSegmenter; +use sbtc::idpack::Encodable as _; +use sbtc::idpack::Segmenter; use secp256k1::XOnlyPublicKey; use secp256k1::SECP256K1; use serde::Deserialize; @@ -86,7 +90,16 @@ const SATS_PER_VBYTE_INCREMENT: f64 = 0.001; /// The OP_RETURN version byte for deposit or withdrawal sweep /// transactions. -const OP_RETURN_VERSION: u8 = 0; +const OP_RETURN_VERSION: u8 = 1; + +/// The OP_RETURN header size (magic bytes + version) +const OP_RETURN_HEADER_SIZE: usize = 3; + +/// The maximum total size of an OP_RETURN output +const OP_RETURN_MAX_SIZE: usize = 80; + +/// The available size for encoded withdrawal IDs in OP_RETURN +pub(super) const OP_RETURN_AVAILABLE_SIZE: usize = OP_RETURN_MAX_SIZE - OP_RETURN_HEADER_SIZE; /// A dummy Schnorr signature. static DUMMY_SIGNATURE: LazyLock = LazyLock::new(|| Signature { @@ -555,33 +568,6 @@ impl WithdrawalRequest { } } - /// Return a byte array with enough data to uniquely identify this - /// withdrawal request on the Stacks blockchain. - /// - /// The data returned from this function is a concatenation of the - /// stacks block ID, the stacks transaction ID, and the request-id - /// associated with this withdrawal request. Thus, the layout of the - /// data is as follows: - /// - /// ```text - /// 0 32 64 72 - /// |-----------------|------------------------------|------------| - /// Stacks block ID Txid of Stacks withdrawal tx request-id - /// ``` - /// - /// where the request-id is encoded as an 8 byte big endian unsigned - /// integer. We need all three because a transaction can be included in - /// more than one stacks block (because of reorgs), and a transaction - /// can generate more than one withdrawal request. - fn sbtc_data(&self) -> [u8; 72] { - let mut data = [0u8; 72]; - data[..32].copy_from_slice(&self.block_hash.into_bytes()); - data[32..64].copy_from_slice(&self.txid.into_bytes()); - data[64..72].copy_from_slice(&self.request_id.to_be_bytes()); - - data - } - /// Try convert from a model::DepositRequest with some additional info. pub fn from_model(request: model::WithdrawalRequest, votes: SignerVotes) -> Self { Self { @@ -615,6 +601,9 @@ impl Weighted for WithdrawalRequest { fn vsize(&self) -> u64 { self.as_tx_output().weight().to_vbytes_ceil() } + fn withdrawal_id(&self) -> Option { + Some(self.request_id) + } } /// A reference to either a deposit or withdraw request @@ -671,6 +660,9 @@ impl Weighted for RequestRef<'_> { Self::Withdrawal(req) => req.vsize(), } } + fn withdrawal_id(&self) -> Option { + self.as_withdrawal().map(|req| req.request_id) + } } /// A struct for constructing transaction inputs and outputs from deposit @@ -1116,7 +1108,7 @@ impl<'a> UnsignedTransaction<'a> { lock_time: LockTime::ZERO, input: std::iter::once(signer_input).chain(reqs.tx_ins()).collect(), output: std::iter::once(signer_output) - .chain(Self::new_op_return_output(reqs, state)) + .chain(Some(Self::new_op_return_output(reqs, state)?)) .chain(reqs.tx_outs()) .collect(), }) @@ -1134,115 +1126,63 @@ impl<'a> UnsignedTransaction<'a> { } } - /// An OP_RETURN output with the bitmap for how the signers voted for - /// the package. + /// An OP_RETURN output with (conditionally) encoded withdrawal request IDs. /// - /// None is only returned if there are no requests in the input slice. - /// - /// The data layout for the OP_RETURN depends on whether there are - /// withdrawal requests in the input slice. If there are withdrawal - /// requests then the output data is: - /// - /// ```text - /// 0 2 3 5 21 41 - /// |-------|----|-----|--------|-------------| - /// magic op N_d bitmap merkle root - /// ``` + /// The `OP_RETURN` output has a generally-accepted 80 bytes available for + /// data (it is not constrained by the Bitcoin protocol itself but rather by + /// the miners' policy). We use this space to encode the withdrawal request + /// IDs. /// - /// A more full description of the merkle root can be found in the - /// comments for [`UnsignedTransaction::withdrawal_merkle_root`]. If - /// there are no withdrawal requests in the input slice then the layout - /// looks like: + /// ## Wire Format + /// The layout of the OP_RETURN output is as follows: /// /// ```text - /// 0 2 3 5 21 - /// |-------|----|-----|--------| - /// magic op N_d bitmap + /// 0 2 3 X<80 + /// |-------|----|--------------------------------------------| + /// magic op [encoded withdrawal IDs (variable-length)] /// ``` /// - /// In the above layout, magic is the UTF-8 encoded string "ST", op is - /// the version byte, and N_d is the of deposits in this transaction - /// encoded as a big-endian two byte unsigned integer. + /// In the above layout: + /// - magic: UTF-8 encoded string indicator (2 bytes) + /// - op: version byte (1 byte) + /// - encoded IDs: withdrawal request IDs encoded using idpack (variable + /// length, if there are withdrawals serviced by the transaction) /// - /// `None` is only returned if there are no requests in the input slice. - fn new_op_return_output(reqs: &Requests, state: &SignerBtcState) -> Option { - let sbtc_data = Self::sbtc_data(reqs, state)?; - let script_pubkey = match Self::withdrawal_merkle_root(reqs) { - Some(merkle_root) => { - let mut data: [u8; 41] = [0; 41]; - data[..21].copy_from_slice(&sbtc_data); - data[21..].copy_from_slice(&merkle_root); - - ScriptBuf::new_op_return(data) - } - None => ScriptBuf::new_op_return(sbtc_data), - }; + /// ## Returns + /// - `Some(TxOut)`: the resulting OP_RETURN output + fn new_op_return_output(reqs: &Requests, state: &SignerBtcState) -> Result { + // Create OP_RETURN data + let mut data = PushBytesBuf::with_capacity(OP_RETURN_MAX_SIZE); + data.extend_from_slice(&state.magic_bytes)?; + data.push(OP_RETURN_VERSION)?; + + // Extract all withdrawal request IDs + let withdrawal_ids: Vec = reqs.iter().filter_map(|req| req.withdrawal_id()).collect(); + + // If there are any withdrawal ID's, encode them and add them to the + // OP_RETURN data. + if !withdrawal_ids.is_empty() { + let encoded = BitmapSegmenter.package(&withdrawal_ids)?.encode(); + data.extend_from_slice(&encoded)?; + } - let value = Amount::ZERO; - Some(TxOut { value, script_pubkey }) - } + // Return an error if the data we intend on putting in the OP_RETURN + // output exceeds the maximum size. + if data.len() > OP_RETURN_MAX_SIZE { + return Err(Error::OpReturnSizeLimitExceeded { + size: data.len(), + max_size: OP_RETURN_MAX_SIZE, + }); + } - /// Return the first part of the sbtc related data included in the - /// OP_RETURN output. - /// - /// BTC sweep transactions include an OP_RETURN output with data on how - /// the signers voted for the transaction. This function returns that - /// data, which is laid out as follows: - /// - /// ```text - /// 0 2 3 5 21 - /// |-------|----|-----|----------------| - /// magic op N_d signer bitmap - /// ``` - /// - /// In the above layout, magic is the UTF-8 encoded string "ST", op is - /// the version byte, and N_d is the of deposits in this transaction - /// encoded as a big-endian two byte unsigned integer. - /// - /// `None` is only returned if there are no requests in the input - /// slice. - fn sbtc_data(reqs: &Requests, state: &SignerBtcState) -> Option<[u8; 21]> { - let bitmap: BitArray<[u8; 16]> = reqs - .iter() - .map(RequestRef::signer_bitmap) - .reduce(|bm1, bm2| bm1 | bm2)?; - let num_deposits = reqs.iter().filter_map(RequestRef::as_deposit).count() as u16; - - let mut data: [u8; 21] = [0; 21]; - // The magic_bytes is exactly 2 bytes - data[0..2].copy_from_slice(&state.magic_bytes); - // Yeah, this is one byte. - data[2..3].copy_from_slice(&[OP_RETURN_VERSION]); - // The num_deposits variable is an u16, so 2 bytes. - data[3..5].copy_from_slice(&num_deposits.to_be_bytes()); - // The bitmap is 16 bytes so this fits exactly. - data[5..].copy_from_slice(&bitmap.into_inner()); - - Some(data) - } - - /// The OP_RETURN output includes a merkle tree of the Stacks - /// transactions that lead to the inclusion of the UTXOs in this - /// transaction. - /// - /// Create the OP_RETURN UTXO for the associated withdrawal request. - /// - /// The data returned from this function is a merkle tree constructed - /// from the HASH160 of each withdrawal request's sBTC data returned by - /// the [`WithdrawalRequest::sbtc_data`]. - /// - /// For more on the rationale for this output, see this ticket: - /// . - /// - /// `None` is returned if there are no withdrawal requests in the input - /// slice. - fn withdrawal_merkle_root(reqs: &Requests) -> Option<[u8; 20]> { - let hashes = reqs - .iter() - .filter_map(RequestRef::as_withdrawal) - .map(|req| Hash160::hash(&req.sbtc_data())); + // Create OP_RETURN script and output + let script_pubkey = ScriptBuf::new_op_return(data); + let txout = TxOut { + value: Amount::ZERO, + script_pubkey, + }; - bitcoin::merkle_tree::calculate_root(hashes).map(|hash| hash.to_byte_array()) + Ok(txout) } /// Compute the final amount for the signers' UTXO given the current @@ -1615,23 +1555,21 @@ mod tests { use super::*; use bitcoin::key::TapTweak; + use bitcoin::opcodes::all::OP_RETURN; + use bitcoin::script::Instruction; use bitcoin::BlockHash; use bitcoin::CompressedPublicKey; use bitcoin::Txid; use clarity::vm::types::PrincipalData; use fake::Fake as _; use model::SignerVote; + use more_asserts::assert_ge; use rand::distributions::Distribution; use rand::distributions::Uniform; use rand::rngs::OsRng; - use rand::Rng; - use rand::SeedableRng as _; - use ripemd::Ripemd160; use sbtc::deposits::DepositScriptInputs; use secp256k1::Keypair; use secp256k1::SecretKey; - use sha2::Digest as _; - use sha2::Sha256; use stacks_common::types::chainstate::StacksAddress; use test_case::test_case; @@ -1742,66 +1680,6 @@ mod tests { } } - fn random_withdrawal(rng: &mut R, votes_against: usize) -> WithdrawalRequest { - let mut signer_bitmap: BitArray<[u8; 16]> = BitArray::ZERO; - signer_bitmap[..votes_against].fill(true); - - WithdrawalRequest { - max_fee: rng.next_u32() as u64, - signer_bitmap, - amount: rng.next_u32() as u64, - script_pubkey: generate_address(), - txid: fake::Faker.fake_with_rng(rng), - request_id: (0..u32::MAX as u64).fake_with_rng(rng), - block_hash: fake::Faker.fake_with_rng(rng), - } - } - - /// This is a naive implementation of a function that computes a merkle root - fn calculate_merkle_root(reqs: &mut [WithdrawalRequest]) -> Option<[u8; 20]> { - // The withdrawals' are sorted before inclusion as a bitcoin - // transaction output. - reqs.sort(); - let mut leafs = reqs - .iter() - .map(|req| { - // We use the Hash160 for the hash function, which is - // SHA256 followed by RIPEMD160. - let sha256_data = Sha256::digest(req.sbtc_data()); - let rip160_data = Ripemd160::digest(sha256_data); - rip160_data.as_slice().try_into().unwrap() - }) - .collect::>(); - - while leafs.len() > 1 { - leafs = leafs - .chunks(2) - .map(|nodes| { - let [leaf1, leaf2] = match nodes { - [leaf1, leaf2] => [leaf1, leaf2], - // If a leaf node does not have a partner, it gets paired with itself. - [leaf] => [leaf, leaf], - // Yeah chunks(2) return slices of size 1 or 2 here. - _ => unreachable!(), - }; - // Compute the hash160 of the two leafs - let sha256_data = Sha256::default() - .chain_update(leaf1) - .chain_update(leaf2) - .finalize(); - - Ripemd160::digest(sha256_data) - .as_slice() - .try_into() - .unwrap() - }) - .collect(); - } - - // There are either 1 or 0 elements in the leafs vector, so lets get it - leafs.pop() - } - impl BitcoinTxInfo { fn from_tx(tx: Transaction, fee: Amount) -> BitcoinTxInfo { BitcoinTxInfo { @@ -1821,6 +1699,14 @@ mod tests { } } + impl WithdrawalRequest { + /// Sets the withdrawal id for this request. + pub fn wid(mut self, id: u64) -> Self { + self.request_id = id; + self + } + } + /// This test verifies that our implementation of Bitcoin script /// verification using [`bitcoinconsensus`] works as expected. This /// functionality is used in the verification of WSTS signing after a new @@ -2104,194 +1990,119 @@ mod tests { assert!(sweep.is_err()); } - /// We aggregate the bitmaps to form a single one at the end. Check - /// that it is aggregated correctly. - #[test] - fn the_bitmaps_merge_correctly() { - const OP_RETURN: u8 = bitcoin::opcodes::all::OP_RETURN.to_u8(); - const OP_PUSHBYTES_41: u8 = bitcoin::opcodes::all::OP_PUSHBYTES_41.to_u8(); + #[test_case(&[]; "no_withdrawal_ids")] + #[test_case(&[42]; "single_withdrawal_id")] + #[test_case(&[1, 2, 3, 4, 5]; "multiple_sequential_withdrawal_ids")] + #[test_case(&[1000, 2000, 3000]; "sparse_withdrawal_ids")] + #[test_case(&(1..100).map(|i| i * 23).collect::>(); "ids_causing_multiple_transactions")] + fn test_withdrawal_id_packaging(withdrawal_ids: &[u64]) { + // Setup test environment + let public_key = XOnlyPublicKey::from_str(X_ONLY_PUBLIC_KEY1).unwrap(); + let withdrawals = withdrawal_ids + .iter() + .map(|&id| create_withdrawal(10000, 10000, 0).wid(id)) + .collect::>(); - let mut requests = SbtcRequests { - deposits: vec![create_deposit(123456, 0, 0)], - withdrawals: vec![create_withdrawal(1000, 0, 0), create_withdrawal(2000, 0, 0)], + let requests = SbtcRequests { + deposits: vec![create_deposit(100_000, 5_000, 0)], + withdrawals, signer_state: SignerBtcState { utxo: SignerUtxo { - outpoint: generate_outpoint(5500, 0), - amount: 5500, - public_key: generate_x_only_public_key(), + outpoint: generate_outpoint(500_000_000, 0), + amount: 500_000_000, + public_key, }, - fee_rate: 0.0, - public_key: generate_x_only_public_key(), + fee_rate: 1.0, + public_key, last_fees: None, - magic_bytes: [b'T', b'3'], + magic_bytes: [b'S', b'T'], }, num_signers: 10, - accept_threshold: 0, + accept_threshold: 8, sbtc_limits: SbtcLimits::unlimited(), max_deposits_per_bitcoin_tx: DEFAULT_MAX_DEPOSITS_PER_BITCOIN_TX, }; - // We'll have the deposit get two vote against, and the withdrawals - // each have three votes against. We will have each them share one - // overlapping voter. The votes look like this: - // - // 1 1 0 0 0 0 0 0 0 0 - // 0 1 1 1 0 0 0 0 0 0 - // 0 1 0 0 1 1 0 0 0 0 - // - // So the aggregated bit map should look like this - // - // 1 1 1 1 1 1 0 0 0 0 - - // Okay, this one looks like - // 1 1 0 0 0 0 0 0 0 0 - requests.deposits[0].signer_bitmap.set(0, true); - requests.deposits[0].signer_bitmap.set(1, true); - // This one looks like - // 0 1 1 1 0 0 0 0 0 0 - requests.withdrawals[0].signer_bitmap.set(1, true); - requests.withdrawals[0].signer_bitmap.set(2, true); - requests.withdrawals[0].signer_bitmap.set(3, true); - // And this one looks like - // 0 1 0 0 1 1 0 0 0 0 - requests.withdrawals[1].signer_bitmap.set(1, true); - requests.withdrawals[1].signer_bitmap.set(4, true); - requests.withdrawals[1].signer_bitmap.set(5, true); - - // This should all be in one transaction given the threshold - let mut transactions = requests.construct_transactions().unwrap(); - assert_eq!(transactions.len(), 1); + // Generate transactions + let transactions = requests + .construct_transactions() + .expect("failed to construct transactions"); + + if BitmapSegmenter.estimate_size(withdrawal_ids).unwrap() > OP_RETURN_AVAILABLE_SIZE { + // Verify multiple transactions were created + more_asserts::assert_gt!( + transactions.len(), + 1, + "should create multiple transactions for large withdrawal ID set" + ); + } else { + // Verify only one transaction was created + assert_eq!( + transactions.len(), + 1, + "should create a single transaction for small withdrawal ID set" + ); + } - let unsigned_tx = transactions.pop().unwrap(); - // We have one input for the signers' UTXO and another input for - // the deposit. - assert_eq!(unsigned_tx.tx.input.len(), 2); - // We have one output for the signers' UTXO and another for the - // OP_RETURN output, and two more for the withdrawals. - assert_eq!(unsigned_tx.tx.output.len(), 4); + // Extract all withdrawal IDs that were included across all transactions + let actual_ids: Vec = transactions + .iter() + .flat_map(|tx| tx.requests.iter().filter_map(|req| req.withdrawal_id())) + .collect(); - let sbtc_data = match unsigned_tx.tx.output[1].script_pubkey.as_bytes() { - // The data layout is detailed in the documentation for the - // UnsignedTransaction::new_op_return_output function. - [OP_RETURN, OP_PUSHBYTES_41, b'T', b'3', OP_RETURN_VERSION, 0, 1, data @ ..] => data, - _ => panic!("Invalid OP_RETURN FORMAT"), - }; - // Since there are withdrawal requests in this transaction, the - // merkle root is included at the end of the `data`, bringing its - // length from 16 to 36 bytes. - assert_eq!(sbtc_data.len(), 36); - // This is the aggregate bitmap for the votes, so it should start - // like this: - // 1 1 1 1 1 1 0 0 0 0 - // Note that the first 16 bytes are the bitmap, and the merkle root - // follows this data. - let bitmap_data = *sbtc_data.first_chunk().unwrap(); - let bitmap = BitArray::<[u8; 16]>::new(bitmap_data); - - assert_eq!(bitmap.count_ones(), 6); - // And the first six bits are all ones followed by all zeros. - assert!(bitmap[..6].all()); - assert!(!bitmap[6..].any()); - } - - #[test_case(Vec::new(), vec![create_deposit(123456, 0, 0)]; "no withdrawals, one deposits")] - #[test_case([create_withdrawal(1000, 0, 0)], Vec::new(); "one withdrawals")] - #[test_case({ - let mut rng = rand::rngs::StdRng::seed_from_u64(3); - std::iter::repeat_with(move || random_withdrawal(&mut rng, 0)).take(2) - }, Vec::new(); "two withdrawals")] - #[test_case({ - let mut rng = rand::rngs::StdRng::seed_from_u64(30); - std::iter::repeat_with(move || random_withdrawal(&mut rng, 0)).take(3) - }, Vec::new(); "three withdrawals")] - #[test_case({ - let mut rng = rand::rngs::StdRng::seed_from_u64(300); - std::iter::repeat_with(move || random_withdrawal(&mut rng, 0)).take(5) - }, Vec::new(); "five withdrawals")] - #[test_case({ - let mut rng = rand::rngs::StdRng::seed_from_u64(3000); - std::iter::repeat_with(move || random_withdrawal(&mut rng, 0)).take(20) - }, Vec::new(); "twenty withdrawals")] - fn merkle_root_in_op_return(withdrawals: I, deposits: Vec) - where - I: IntoIterator, - { - const OP_RETURN: u8 = bitcoin::opcodes::all::OP_RETURN.to_u8(); - const OP_PUSHBYTES_21: u8 = bitcoin::opcodes::all::OP_PUSHBYTES_21.to_u8(); - const OP_PUSHBYTES_41: u8 = bitcoin::opcodes::all::OP_PUSHBYTES_41.to_u8(); + // Sort both lists to compare + let mut expected_ids = withdrawal_ids.to_vec(); + expected_ids.sort(); - let mut requests = SbtcRequests { - deposits, - withdrawals: withdrawals.into_iter().collect(), - signer_state: SignerBtcState { - utxo: SignerUtxo { - outpoint: generate_outpoint(500_000_000_000, 0), - amount: 500_000_000_000, - public_key: generate_x_only_public_key(), - }, - fee_rate: 0.0, - public_key: generate_x_only_public_key(), - last_fees: None, - magic_bytes: [b'T', b'3'], - }, - num_signers: 10, - accept_threshold: 0, - sbtc_limits: SbtcLimits::unlimited(), - max_deposits_per_bitcoin_tx: DEFAULT_MAX_DEPOSITS_PER_BITCOIN_TX, - }; - - let mut transactions = requests.construct_transactions().unwrap(); - assert_eq!(transactions.len(), 1); + // Verify all withdrawal IDs are included exactly once + assert_eq!( + actual_ids, expected_ids, + "all withdrawal IDs should be included exactly once across transactions" + ); - let unsigned_tx = transactions.pop().unwrap(); - // Okay, the let's look at the raw data in our OP_RETURN UTXO - let sbtc_data = match unsigned_tx.tx.output[1].script_pubkey.as_bytes() { - // The data layout is detailed in the documentation for the - // UnsignedTransaction::new_op_return_output function when - // there are withdrawal request UTXOs. - [OP_RETURN, OP_PUSHBYTES_41, b'T', b'3', OP_RETURN_VERSION, 0, nd, data @ ..] - if *nd == requests.deposits.len() as u8 => - { - data - } - // The data layout is detailed in the documentation for the - // UnsignedTransaction::new_op_return_output function when - // there are no withdrawal request UTXOs. - [OP_RETURN, OP_PUSHBYTES_21, b'T', b'3', OP_RETURN_VERSION, 0, nd, data @ ..] - if *nd == requests.deposits.len() as u8 => - { - data - } - data => panic!("Invalid OP_RETURN FORMAT {data:?}"), - }; - // If there are no deposits or withdrawals then there is no bitmap - // and no merkle root. - - // I apologize for the nested if statements :(. - if let Some((_bitmap, actual_merkle_root)) = sbtc_data.split_first_chunk::<16>() { - // if we have 16 bytes here then we know that we have at - // least one deposit or withdrawal request. - assert!(requests.deposits.is_empty() || requests.withdrawals.is_empty()); - - // If we do not have any withdrawal requests then there is no - // merkle root for the depositors to pay for. - if requests.withdrawals.is_empty() { - assert!(actual_merkle_root.is_empty()); - } else { - // If we have a withdrawal then there is a merkle root, and - // it's constructed in a standard way. - let actual_merkle_root: [u8; 20] = actual_merkle_root.try_into().unwrap(); - let expected_merkle_root = - calculate_merkle_root(&mut requests.withdrawals).unwrap(); + // Verify each transaction has an OP_RETURN output with correct format + for tx in &transactions { + let expected_ids = tx + .requests + .iter() + .filter_map(|req| req.withdrawal_id()) + .collect::>(); + let expected_segments = BitmapSegmenter.package(&expected_ids).unwrap(); + let expected_data = expected_segments.encode(); + + let instructions = tx.tx.output[1] + .script_pubkey + .as_script() + .instructions() + .collect::, _>>() + .expect("failed to extract OP_RETURN data"); + + let [Instruction::Op(OP_RETURN), Instruction::PushBytes(data)] = + instructions.as_slice() + else { + panic!("second output should be OP_RETURN with data"); + }; - assert_eq!(actual_merkle_root, expected_merkle_root); - } - } else { - // If there isn't 16 bytes here then there is nothing. Note - // that this isn't hit in our test cases, it's only ever hit if - // there are no deposits and no withdrawals we do not create a - // transaction in that case. - assert!(sbtc_data.is_empty()); + let data = data.as_bytes(); + + // Verify the data meets minimum size requirements + assert_ge!( + data.len(), + OP_RETURN_HEADER_SIZE, + "data should contain at least the header bytes" + ); + + assert_eq!(&data[0..2], &[b'S', b'T'], "magic bytes should be 'ST'"); + assert_eq!( + data[2], OP_RETURN_VERSION, + "version should match OP_RETURN_VERSION" + ); + + assert_eq!( + &data[3..], + expected_data, + "decoded withdrawal IDs don't match expected values" + ); } } @@ -2676,8 +2487,8 @@ mod tests { create_deposit(78900, 100_000, 0), ], withdrawals: vec![ - create_withdrawal(10000, 100_000, 0), - create_withdrawal(20000, 100_000, 0), + create_withdrawal(10000, 100_000, 0).wid(1), + create_withdrawal(20000, 100_000, 0).wid(1000), ], signer_state: SignerBtcState { utxo: SignerUtxo { @@ -2696,8 +2507,12 @@ mod tests { max_deposits_per_bitcoin_tx: DEFAULT_MAX_DEPOSITS_PER_BITCOIN_TX, }; + // In the below code, we need to make sure that we take the _first_ + // transaction in each package as that is the one that will be RBF'd. + let (old_fee_total, old_fee_rate) = { - let utx = requests.construct_transactions().unwrap().pop().unwrap(); + let transactions = requests.construct_transactions().unwrap(); + let utx = transactions.first().unwrap(); let output_amounts: u64 = utx.output_amounts(); let input_amounts: u64 = utx.input_amounts(); @@ -2713,7 +2528,8 @@ mod tests { rate: old_fee_rate, }); - let utx = requests.construct_transactions().unwrap().pop().unwrap(); + let transactions = requests.construct_transactions().unwrap(); + let utx = transactions.first().unwrap(); let output_amounts: u64 = utx.output_amounts(); let input_amounts: u64 = utx.input_amounts(); @@ -2741,24 +2557,20 @@ mod tests { more_asserts::assert_le!(requests.signer_state.fee_rate, fee_rate); } - #[test_case(2; "Some deposits")] - #[test_case(0; "No deposits")] - fn unsigned_tx_digests(num_deposits: usize) { + #[test_case(2, false; "some deposits, single tx")] + #[test_case(2, true; "some deposits, multiple txs")] + #[test_case(0, false; "no deposits, single tx")] + fn unsigned_tx_digests(num_deposits: usize, multiple_txs: bool) { // Each deposit and withdrawal has a max fee greater than the current market fee rate let public_key = XOnlyPublicKey::from_str(X_ONLY_PUBLIC_KEY1).unwrap(); - let requests = SbtcRequests { + let mut requests = SbtcRequests { deposits: std::iter::repeat_with(|| create_deposit(123456, 100_000, 0)) .take(num_deposits) .collect(), - withdrawals: vec![ - create_withdrawal(10000, 100_000, 0), - create_withdrawal(20000, 100_000, 0), - create_withdrawal(30000, 100_000, 0), - create_withdrawal(40000, 100_000, 0), - create_withdrawal(50000, 100_000, 0), - create_withdrawal(60000, 100_000, 0), - create_withdrawal(70000, 100_000, 0), - ], + withdrawals: (0..600) + .step_by(10) + .map(|id| create_withdrawal(10_000, 100_000, 0).wid(id)) + .collect(), signer_state: SignerBtcState { utxo: SignerUtxo { outpoint: generate_outpoint(300_000, 0), @@ -2775,10 +2587,18 @@ mod tests { sbtc_limits: SbtcLimits::unlimited(), max_deposits_per_bitcoin_tx: DEFAULT_MAX_DEPOSITS_PER_BITCOIN_TX, }; - let mut transactions = requests.construct_transactions().unwrap(); - assert_eq!(transactions.len(), 1); + // If multiple_txs is specified, we add a withdrawal that will + // cause the transaction to be split into two. + if multiple_txs { + requests + .withdrawals + .push(create_withdrawal(70000, 100_000, 0).wid(650)); + } + let transactions = requests.construct_transactions().unwrap(); + let expected_tx_count = if multiple_txs { 2 } else { 1 }; + assert_eq!(transactions.len(), expected_tx_count); - let unsigned = transactions.pop().unwrap(); + let unsigned = transactions.first().unwrap(); let sighashes = unsigned.construct_digests().unwrap(); assert_eq!(sighashes.deposits.len(), num_deposits) @@ -3254,7 +3074,7 @@ mod tests { // ensuring lots of votes against the set of request. const MAX_WITHDRAWALS: usize = 4000; let withdrawals: Vec = (0..MAX_WITHDRAWALS) - .map(|shift| create_withdrawal(1000, 10_000, 1 << (shift % 14))) + .map(|id| create_withdrawal(1_000, 10_000, 1 << (id % 14)).wid(id as u64)) .collect(); let requests = SbtcRequests { diff --git a/signer/src/error.rs b/signer/src/error.rs index a6d79ebdb..650d2df73 100644 --- a/signer/src/error.rs +++ b/signer/src/error.rs @@ -1,6 +1,7 @@ //! Top-level error type for the signer use std::borrow::Cow; +use bitcoin::script::PushBytesError; use blockstack_lib::types::chainstate::StacksBlockId; use crate::bitcoin::validation::WithdrawalCapContext; @@ -20,6 +21,19 @@ use crate::wsts_state_machine::StateMachineId; /// Top-level signer error #[derive(Debug, thiserror::Error)] pub enum Error { + /// The length of bytes to write to an OP_RETURN output exceeds the maximum allowed size. + #[error("OP_RETURN output size limit exceeded: {size} bytes, max allowed: {max_size} bytes")] + OpReturnSizeLimitExceeded { + /// The size of the OP_RETURN output in bytes. + size: usize, + /// The maximum allowed size of the OP_RETURN output in bytes. + max_size: usize, + }, + + /// An error occurred while attempting to perform withdrawal ID segmentation. + #[error("idpack segmenter error: {0}")] + IdPackSegmenter(#[from] sbtc::idpack::SegmenterError), + /// The DKG verification state machine raised an error. #[error("the dkg verification state machine raised an error: {0}")] DkgVerification(#[source] dkg::verification::Error), @@ -160,6 +174,11 @@ pub enum Error { #[error("bitcoin validation error: {0}")] BitcoinValidation(#[from] Box), + /// An error occurred while attempting to push bytes into a bitcoin + /// `PushBytes` type. + #[error("bitcoin push-bytes error: {0}")] + BitcoinPushBytes(#[from] PushBytesError), + /// This can only be thrown when the number of bytes for a sighash or /// not exactly equal to 32. This should never occur. #[error("could not convert message in nonce request to sighash {0}")] diff --git a/signer/tests/integration/complete_deposit.rs b/signer/tests/integration/complete_deposit.rs index 383ac659a..01f1e49ce 100644 --- a/signer/tests/integration/complete_deposit.rs +++ b/signer/tests/integration/complete_deposit.rs @@ -15,6 +15,7 @@ use signer::testing; use signer::testing::context::*; use fake::Fake; +use signer::DEPOSIT_DUST_LIMIT; use crate::setup::backfill_bitcoin_blocks; use crate::setup::set_deposit_completed; @@ -490,16 +491,30 @@ async fn complete_deposit_validation_fee_too_low() { // Different: We need to update the amount to be something that // validation would reject. To do that we update our database. // - // The fee rate in this test is fixed at 10.0 sats per vbyte and the tx - // size is 235 bytes, so we lose 2350 sats to fees. The amount here is - // chosen so that 2350 + 546 is greater than it. - let deposit_amount = 2895; + // We want to trigger the AmountBelowDustLimit error by calculating a deposit amount + // that results in a value just below the dust limit after fees are subtracted: + // + // 1. Get the actual fee from the sweep transaction (info.tx_info.fee) + // 2. Calculate: deposit_amount = actual_fee + DEPOSIT_DUST_LIMIT - 1 + // + // This ensures when fee is subtracted from the deposit amount: + // deposit_amount - actual_fee = DEPOSIT_DUST_LIMIT - 1 + // + // Which is exactly 1 satoshi below the dust limit, triggering the error regardless + // of the exact transaction size or fee rate used in tests. + let deposit_amount = setup + .sweep_tx_info + .as_ref() + .map(|info| info.tx_info.fee.to_sat() + DEPOSIT_DUST_LIMIT - 1) + .expect("sweep_tx_info not set"); + sqlx::query( r#" UPDATE deposit_requests AS dr SET amount = $1 - WHERE dr.txid = $2 - AND dr.output_index = $3; + WHERE + dr.txid = $2 + AND dr.output_index = $3; "#, ) .bind(deposit_amount as i32) @@ -532,14 +547,15 @@ async fn complete_deposit_validation_fee_too_low() { err => panic!("unexpected error during validation {err}"), } - // Now a sanity check to see what happens if we are at the limit. + // Now a sanity check to see what happens if we are above the dust limit. let deposit_amount = deposit_amount + 1; sqlx::query( r#" UPDATE deposit_requests AS dr SET amount = $1 - WHERE dr.txid = $2 - AND dr.output_index = $3; + WHERE + dr.txid = $2 + AND dr.output_index = $3; "#, ) .bind(deposit_amount as i32)