mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 12:17:58 +00:00
tuple to struct event variants (#10206)
* update sudo pallet * Update mock.rs * cargo +nightly fmt * frame-support remote-externalities * AFNPEV tips * AFNPEV bin & update sudo * cargo +nightly fmt * optional dependency remote-test feature * fmt Co-authored-by: Shawn Tabrizi <shawntabrizi@gmail.com>
This commit is contained in:
@@ -150,7 +150,7 @@ pub mod pallet {
|
||||
ensure!(sender == Self::key(), Error::<T>::RequireSudo);
|
||||
|
||||
let res = call.dispatch_bypass_filter(frame_system::RawOrigin::Root.into());
|
||||
Self::deposit_event(Event::Sudid(res.map(|_| ()).map_err(|e| e.error)));
|
||||
Self::deposit_event(Event::Sudid { sudo_result: res.map(|_| ()).map_err(|e| e.error) });
|
||||
// Sudo user does not pay a fee.
|
||||
Ok(Pays::No.into())
|
||||
}
|
||||
@@ -176,7 +176,7 @@ pub mod pallet {
|
||||
ensure!(sender == Self::key(), Error::<T>::RequireSudo);
|
||||
|
||||
let res = call.dispatch_bypass_filter(frame_system::RawOrigin::Root.into());
|
||||
Self::deposit_event(Event::Sudid(res.map(|_| ()).map_err(|e| e.error)));
|
||||
Self::deposit_event(Event::Sudid { sudo_result: res.map(|_| ()).map_err(|e| e.error) });
|
||||
// Sudo user does not pay a fee.
|
||||
Ok(Pays::No.into())
|
||||
}
|
||||
@@ -201,7 +201,7 @@ pub mod pallet {
|
||||
ensure!(sender == Self::key(), Error::<T>::RequireSudo);
|
||||
let new = T::Lookup::lookup(new)?;
|
||||
|
||||
Self::deposit_event(Event::KeyChanged(Self::key()));
|
||||
Self::deposit_event(Event::KeyChanged { new_sudoer: Self::key() });
|
||||
<Key<T>>::put(new);
|
||||
// Sudo user does not pay a fee.
|
||||
Ok(Pays::No.into())
|
||||
@@ -241,7 +241,9 @@ pub mod pallet {
|
||||
|
||||
let res = call.dispatch_bypass_filter(frame_system::RawOrigin::Signed(who).into());
|
||||
|
||||
Self::deposit_event(Event::SudoAsDone(res.map(|_| ()).map_err(|e| e.error)));
|
||||
Self::deposit_event(Event::SudoAsDone {
|
||||
sudo_result: res.map(|_| ()).map_err(|e| e.error),
|
||||
});
|
||||
// Sudo user does not pay a fee.
|
||||
Ok(Pays::No.into())
|
||||
}
|
||||
@@ -251,11 +253,11 @@ pub mod pallet {
|
||||
#[pallet::generate_deposit(pub(super) fn deposit_event)]
|
||||
pub enum Event<T: Config> {
|
||||
/// A sudo just took place. \[result\]
|
||||
Sudid(DispatchResult),
|
||||
Sudid { sudo_result: DispatchResult },
|
||||
/// The \[sudoer\] just switched identity; the old key is supplied.
|
||||
KeyChanged(T::AccountId),
|
||||
KeyChanged { new_sudoer: T::AccountId },
|
||||
/// A sudo just took place. \[result\]
|
||||
SudoAsDone(DispatchResult),
|
||||
SudoAsDone { sudo_result: DispatchResult },
|
||||
}
|
||||
|
||||
#[pallet::error]
|
||||
|
||||
@@ -58,7 +58,7 @@ pub mod logger {
|
||||
// Ensure that the `origin` is `Root`.
|
||||
ensure_root(origin)?;
|
||||
<I32Log<T>>::append(i);
|
||||
Self::deposit_event(Event::AppendI32(i, weight));
|
||||
Self::deposit_event(Event::AppendI32 { value: i, weight });
|
||||
Ok(().into())
|
||||
}
|
||||
|
||||
@@ -72,7 +72,7 @@ pub mod logger {
|
||||
let sender = ensure_signed(origin)?;
|
||||
<I32Log<T>>::append(i);
|
||||
<AccountLog<T>>::append(sender.clone());
|
||||
Self::deposit_event(Event::AppendI32AndAccount(sender, i, weight));
|
||||
Self::deposit_event(Event::AppendI32AndAccount { sender, value: i, weight });
|
||||
Ok(().into())
|
||||
}
|
||||
}
|
||||
@@ -80,8 +80,8 @@ pub mod logger {
|
||||
#[pallet::event]
|
||||
#[pallet::generate_deposit(pub(super) fn deposit_event)]
|
||||
pub enum Event<T: Config> {
|
||||
AppendI32(i32, Weight),
|
||||
AppendI32AndAccount(T::AccountId, i32, Weight),
|
||||
AppendI32 { value: i32, weight: Weight },
|
||||
AppendI32AndAccount { sender: T::AccountId, value: i32, weight: Weight },
|
||||
}
|
||||
|
||||
#[pallet::storage]
|
||||
|
||||
@@ -58,7 +58,7 @@ fn sudo_emits_events_correctly() {
|
||||
// Should emit event to indicate success when called with the root `key` and `call` is `Ok`.
|
||||
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1 }));
|
||||
assert_ok!(Sudo::sudo(Origin::signed(1), call));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::Sudid(Ok(()))));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::Sudid { sudo_result: Ok(()) }));
|
||||
})
|
||||
}
|
||||
|
||||
@@ -96,7 +96,7 @@ fn sudo_unchecked_weight_emits_events_correctly() {
|
||||
// Should emit event to indicate success when called with the root `key` and `call` is `Ok`.
|
||||
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1 }));
|
||||
assert_ok!(Sudo::sudo_unchecked_weight(Origin::signed(1), call, 1_000));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::Sudid(Ok(()))));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::Sudid { sudo_result: Ok(()) }));
|
||||
})
|
||||
}
|
||||
|
||||
@@ -123,10 +123,10 @@ fn set_key_emits_events_correctly() {
|
||||
|
||||
// A root `key` can change the root `key`.
|
||||
assert_ok!(Sudo::set_key(Origin::signed(1), 2));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged(1)));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged { new_sudoer: 1 }));
|
||||
// Double check.
|
||||
assert_ok!(Sudo::set_key(Origin::signed(2), 4));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged(2)));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged { new_sudoer: 2 }));
|
||||
});
|
||||
}
|
||||
|
||||
@@ -161,6 +161,6 @@ fn sudo_as_emits_events_correctly() {
|
||||
// A non-privileged function will work when passed to `sudo_as` with the root `key`.
|
||||
let call = Box::new(Call::Logger(LoggerCall::non_privileged_log { i: 42, weight: 1 }));
|
||||
assert_ok!(Sudo::sudo_as(Origin::signed(1), 2, call));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::SudoAsDone(Ok(()))));
|
||||
System::assert_has_event(TestEvent::Sudo(Event::SudoAsDone { sudo_result: Ok(()) }));
|
||||
});
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user