Files
pezkuwi-subxt/substrate/frame/assets/src/tests.rs
T
Muharem 0b74812ce8 UnionOf types for merged fungible and fungibles implementations (#2033)
Introduces `UnionOf` types, crafted to merge `fungible` and `fungibles`
implementations or two `fungibles` implementations into a single type
implementing `fungibles`.

This also addresses an issue where `ItemOf` initiates a double drop for
an imbalance type, leading to inaccurate total issuance accounting.

Find the application of these types in this PR -
[link](https://github.com/paritytech/polkadot-sdk/pull/2031), places in
code -
[1](https://github.com/paritytech/polkadot-sdk/blob/4ec7496fa2632385b08fae860fcf28a523a7b5de/cumulus/parachains/runtimes/assets/asset-hub-kusama/src/lib.rs#L327),
[2](https://github.com/paritytech/polkadot-sdk/blob/4ec7496fa2632385b08fae860fcf28a523a7b5de/cumulus/parachains/runtimes/assets/asset-hub-kusama/src/lib.rs#L343).

---------

Co-authored-by: Liam Aharon <liam.aharon@hotmail.com>
Co-authored-by: joe petrowski <25483142+joepetrowski@users.noreply.github.com>
Co-authored-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io>
Co-authored-by: joepetrowski <joe@parity.io>
2023-12-19 13:51:05 +01:00

1780 lines
63 KiB
Rust

// This file is part of Substrate.
// Copyright (C) Parity Technologies (UK) Ltd.
// SPDX-License-Identifier: Apache-2.0
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! Tests for Assets pallet.
use super::*;
use crate::{mock::*, Error};
use frame_support::{
assert_noop, assert_ok,
dispatch::GetDispatchInfo,
traits::{fungibles::InspectEnumerable, tokens::Preservation::Protect, Currency},
};
use pallet_balances::Error as BalancesError;
use sp_io::storage;
use sp_runtime::{traits::ConvertInto, TokenError};
mod sets;
fn asset_ids() -> Vec<u32> {
let mut s: Vec<_> = Assets::asset_ids().collect();
s.sort();
s
}
/// returns tuple of asset's account and sufficient counts
fn asset_account_counts(asset_id: u32) -> (u32, u32) {
let asset = Asset::<Test>::get(asset_id).unwrap();
(asset.accounts, asset.sufficients)
}
#[test]
fn transfer_should_never_burn() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
while System::inc_consumers(&2).is_ok() {}
let _ = System::dec_consumers(&2);
let _ = System::dec_consumers(&2);
// Exactly one consumer ref remaining.
assert_eq!(System::consumers(&2), 1);
let _ = <Assets as fungibles::Mutate<_>>::transfer(0, &1, &2, 50, Protect);
System::assert_has_event(RuntimeEvent::Assets(crate::Event::Transferred {
asset_id: 0,
from: 1,
to: 2,
amount: 50,
}));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 1) + Assets::balance(0, 2), 100);
});
}
#[test]
fn basic_minting_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
asset_id: 0,
owner: 1,
amount: 100,
}));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
asset_id: 0,
owner: 2,
amount: 100,
}));
assert_eq!(Assets::balance(0, 2), 100);
assert_eq!(asset_ids(), vec![0, 1, 999]);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
asset_id: 1,
owner: 1,
amount: 100,
}));
assert_eq!(Assets::account_balances(1), vec![(0, 100), (999, 100), (1, 100)]);
});
}
#[test]
fn minting_too_many_insufficient_assets_fails() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, false, 1));
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 2, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100), TokenError::CannotCreate);
Balances::make_free_balance_be(&2, 1);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100));
assert_eq!(asset_ids(), vec![0, 1, 2, 999]);
});
}
#[test]
fn minting_insufficient_asset_with_deposit_should_work_when_consumers_exhausted() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, false, 1));
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 2, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100), TokenError::CannotCreate);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 2));
assert_eq!(Balances::reserved_balance(&1), 10);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100));
});
}
#[test]
fn minting_insufficient_assets_with_deposit_without_consumer_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Balances::reserved_balance(&1), 10);
assert_eq!(System::consumers(&1), 1);
});
}
#[test]
fn refunding_asset_deposit_with_burn_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, true));
assert_eq!(Balances::reserved_balance(&1), 0);
assert_eq!(Assets::balance(1, 0), 0);
});
}
#[test]
fn refunding_asset_deposit_with_burn_disallowed_should_fail() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_noop!(Assets::refund(RuntimeOrigin::signed(1), 0, false), Error::<Test>::WouldBurn);
});
}
#[test]
fn refunding_asset_deposit_without_burn_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 100));
assert_eq!(Assets::balance(0, 2), 100);
assert_eq!(Assets::balance(0, 1), 0);
assert_eq!(Balances::reserved_balance(&1), 10);
assert_eq!(asset_account_counts(0), (2, 0));
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, false));
assert_eq!(Balances::reserved_balance(&1), 0);
assert_eq!(Assets::balance(1, 0), 0);
assert_eq!(asset_account_counts(0), (1, 0));
});
}
/// Refunding reaps an account and calls the `FrozenBalance::died` hook.
#[test]
fn refunding_calls_died_hook() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, true));
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 0);
assert_eq!(hooks(), vec![Hook::Died(0, 1)]);
assert_eq!(asset_ids(), vec![0, 999]);
});
}
#[test]
fn refunding_with_sufficient_existence_reason_should_fail() {
new_test_ext().execute_with(|| {
// create sufficient asset
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
// create an asset account with sufficient existence reason
// by transferring some sufficient assets
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
assert_eq!(asset_account_counts(0), (2, 2));
// fails to refund
assert_noop!(Assets::refund(RuntimeOrigin::signed(2), 0, true), Error::<Test>::NoDeposit);
});
}
#[test]
fn refunding_with_deposit_from_should_fail() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
// create asset account `2` with deposit from `1`
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Balances::reserved_balance(&1), 10);
// fails to refund
assert_noop!(Assets::refund(RuntimeOrigin::signed(2), 0, true), Error::<Test>::NoDeposit);
assert!(Account::<Test>::contains_key(0, &2));
});
}
#[test]
fn refunding_frozen_with_consumer_ref_works() {
new_test_ext().execute_with(|| {
// 1 will be an admin
// 2 will be a frozen account
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
// create non-sufficient asset
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(System::consumers(&2), 0);
// create asset account `2` with a consumer reference by transferring
// non-sufficient funds into
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(System::consumers(&2), 1);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
assert_eq!(asset_account_counts(0), (2, 0));
// freeze asset account `2` and asset `0`
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
// refund works
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, true));
assert!(!Account::<Test>::contains_key(0, &2));
assert_eq!(System::consumers(&2), 0);
assert_eq!(asset_account_counts(0), (1, 0));
});
}
#[test]
fn refunding_frozen_with_deposit_works() {
new_test_ext().execute_with(|| {
// 1 will be an asset admin
// 2 will be a frozen account
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(System::consumers(&2), 0);
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
// reserve deposit holds one consumer ref
assert_eq!(System::consumers(&2), 1);
assert_eq!(Balances::reserved_balance(&2), 10);
assert!(Account::<Test>::contains_key(0, &2));
// transfer some assets to `2`
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(System::consumers(&2), 1);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
assert_eq!(asset_account_counts(0), (2, 0));
// ensure refundable even if asset account and asset is frozen
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
// success
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, true));
assert!(!Account::<Test>::contains_key(0, &2));
assert_eq!(Balances::reserved_balance(&2), 0);
assert_eq!(System::consumers(&2), 0);
assert_eq!(asset_account_counts(0), (1, 0));
});
}
#[test]
fn approval_lifecycle_works() {
new_test_ext().execute_with(|| {
// can't approve non-existent token
assert_noop!(
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
Error::<Test>::Unknown
);
// so we create it :)
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_eq!(Balances::reserved_balance(&1), 1);
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 40));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
assert_eq!(Assets::balance(0, 1), 60);
assert_eq!(Assets::balance(0, 3), 40);
assert_eq!(Balances::reserved_balance(&1), 0);
assert_eq!(asset_ids(), vec![0, 999]);
});
}
#[test]
fn transfer_approved_all_funds() {
new_test_ext().execute_with(|| {
// can't approve non-existent token
assert_noop!(
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
Error::<Test>::Unknown
);
// so we create it :)
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_eq!(Balances::reserved_balance(&1), 1);
// transfer the full amount, which should trigger auto-cleanup
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 50));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 3), 50);
assert_eq!(Balances::reserved_balance(&1), 0);
});
}
#[test]
fn approval_deposits_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
let e = BalancesError::<Test>::InsufficientBalance;
assert_noop!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50), e);
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Balances::reserved_balance(&1), 1);
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 50));
assert_eq!(Balances::reserved_balance(&1), 0);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Balances::reserved_balance(&1), 0);
});
}
#[test]
fn cannot_transfer_more_than_approved() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
let e = Error::<Test>::Unapproved;
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 51), e);
});
}
#[test]
fn cannot_transfer_more_than_exists() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 101));
let e = Error::<Test>::BalanceLow;
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 101), e);
});
}
#[test]
fn cancel_approval_works() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_noop!(
Assets::cancel_approval(RuntimeOrigin::signed(1), 1, 2),
Error::<Test>::Unknown
);
assert_noop!(
Assets::cancel_approval(RuntimeOrigin::signed(2), 0, 2),
Error::<Test>::Unknown
);
assert_noop!(
Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 3),
Error::<Test>::Unknown
);
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
assert_noop!(
Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2),
Error::<Test>::Unknown
);
});
}
#[test]
fn force_cancel_approval_works() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
let e = Error::<Test>::NoPermission;
assert_noop!(Assets::force_cancel_approval(RuntimeOrigin::signed(2), 0, 1, 2), e);
assert_noop!(
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 1, 1, 2),
Error::<Test>::Unknown
);
assert_noop!(
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 2, 2),
Error::<Test>::Unknown
);
assert_noop!(
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 3),
Error::<Test>::Unknown
);
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
assert_ok!(Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 2));
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
assert_noop!(
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 2),
Error::<Test>::Unknown
);
});
}
#[test]
fn lifecycle_should_work() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
assert_eq!(Balances::reserved_balance(&1), 1);
assert!(Asset::<Test>::contains_key(0));
assert_ok!(Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0], vec![0], 12));
assert_eq!(Balances::reserved_balance(&1), 4);
assert!(Metadata::<Test>::contains_key(0));
Balances::make_free_balance_be(&10, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
Balances::make_free_balance_be(&20, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 20, 100));
assert_eq!(Account::<Test>::iter_prefix(0).count(), 2);
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
assert_eq!(Balances::reserved_balance(&1), 0);
assert!(!Asset::<Test>::contains_key(0));
assert!(!Metadata::<Test>::contains_key(0));
assert_eq!(Account::<Test>::iter_prefix(0).count(), 0);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
assert_eq!(Balances::reserved_balance(&1), 1);
assert!(Asset::<Test>::contains_key(0));
assert_ok!(Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0], vec![0], 12));
assert_eq!(Balances::reserved_balance(&1), 4);
assert!(Metadata::<Test>::contains_key(0));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 20, 100));
assert_eq!(Account::<Test>::iter_prefix(0).count(), 2);
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
assert_eq!(Balances::reserved_balance(&1), 0);
assert!(!Asset::<Test>::contains_key(0));
assert!(!Metadata::<Test>::contains_key(0));
assert_eq!(Account::<Test>::iter_prefix(0).count(), 0);
});
}
#[test]
fn destroy_should_refund_approvals() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 3, 50));
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 4, 50));
assert_eq!(Balances::reserved_balance(&1), 3);
assert_eq!(asset_ids(), vec![0, 999]);
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
assert_eq!(Balances::reserved_balance(&1), 0);
assert_eq!(asset_ids(), vec![999]);
// all approvals are removed
assert!(Approvals::<Test>::iter().count().is_zero())
});
}
#[test]
fn partial_destroy_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 3, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 4, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 5, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 6, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 7, 10));
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
// Asset is in use, as all the accounts have not yet been destroyed.
// We need to call destroy_accounts or destroy_approvals again until asset is completely
// cleaned up.
assert_noop!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0), Error::<Test>::InUse);
System::assert_has_event(RuntimeEvent::Assets(crate::Event::AccountsDestroyed {
asset_id: 0,
accounts_destroyed: 5,
accounts_remaining: 2,
}));
System::assert_has_event(RuntimeEvent::Assets(crate::Event::ApprovalsDestroyed {
asset_id: 0,
approvals_destroyed: 0,
approvals_remaining: 0,
}));
// Partially destroyed Asset should continue to exist
assert!(Asset::<Test>::contains_key(0));
// Second call to destroy on PartiallyDestroyed asset
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
System::assert_has_event(RuntimeEvent::Assets(crate::Event::AccountsDestroyed {
asset_id: 0,
accounts_destroyed: 2,
accounts_remaining: 0,
}));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
System::assert_has_event(RuntimeEvent::Assets(crate::Event::Destroyed { asset_id: 0 }));
// Destroyed Asset should not exist
assert!(!Asset::<Test>::contains_key(0));
})
}
#[test]
fn non_providing_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&0, 100);
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 0, 100));
// Cannot mint into account 2 since it doesn't (yet) exist...
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
// ...or transfer...
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(0), 0, 1, 50),
TokenError::CannotCreate
);
// ...or force-transfer
assert_noop!(
Assets::force_transfer(RuntimeOrigin::signed(1), 0, 0, 1, 50),
TokenError::CannotCreate
);
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(0), 0, 1, 25));
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 0, 2, 25));
assert_eq!(asset_ids(), vec![0, 999]);
});
}
#[test]
fn min_balance_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
// Cannot create a new account with a balance that is below minimum...
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 9), TokenError::BelowMinimum);
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 9), TokenError::BelowMinimum);
assert_noop!(
Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 9),
TokenError::BelowMinimum
);
// When deducting from an account to below minimum, it should be reaped.
// Death by `transfer`.
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 91));
assert!(Assets::maybe_balance(0, 1).is_none());
assert_eq!(Assets::balance(0, 2), 100);
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
// Death by `force_transfer`.
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 2, 1, 91));
assert!(Assets::maybe_balance(0, 2).is_none());
assert_eq!(Assets::balance(0, 1), 100);
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
assert_eq!(take_hooks(), vec![Hook::Died(0, 2)]);
// Death by `burn`.
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, 91));
assert!(Assets::maybe_balance(0, 1).is_none());
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 0);
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
// Death by `transfer_approved`.
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 100));
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 91));
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
});
}
#[test]
fn querying_total_supply_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 3, 31));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 19);
assert_eq!(Assets::balance(0, 3), 31);
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 3, u64::MAX));
assert_eq!(Assets::total_supply(0), 69);
});
}
#[test]
fn transferring_amount_below_available_balance_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
});
}
#[test]
fn transferring_enough_to_kill_source_when_keep_alive_should_fail() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_noop!(
Assets::transfer_keep_alive(RuntimeOrigin::signed(1), 0, 2, 91),
Error::<Test>::BalanceLow
);
assert_ok!(Assets::transfer_keep_alive(RuntimeOrigin::signed(1), 0, 2, 90));
assert_eq!(Assets::balance(0, 1), 10);
assert_eq!(Assets::balance(0, 2), 90);
assert!(hooks().is_empty());
assert_eq!(asset_ids(), vec![0, 999]);
});
}
#[test]
fn transferring_frozen_user_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 1));
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50), Error::<Test>::Frozen);
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
});
}
#[test]
fn transferring_frozen_asset_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50),
Error::<Test>::AssetNotLive
);
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
});
}
#[test]
fn approve_transfer_frozen_asset_should_not_work() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_noop!(
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
Error::<Test>::AssetNotLive
);
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
});
}
#[test]
fn transferring_from_blocked_account_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::block(RuntimeOrigin::signed(1), 0, 1));
// behaves as frozen when transferring from blocked
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50), Error::<Test>::Frozen);
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
});
}
#[test]
fn transferring_to_blocked_account_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_eq!(Assets::balance(0, 2), 100);
assert_ok!(Assets::block(RuntimeOrigin::signed(1), 0, 1));
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50), TokenError::Blocked);
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
});
}
#[test]
fn origin_guards_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_noop!(
Assets::transfer_ownership(RuntimeOrigin::signed(2), 0, 2),
Error::<Test>::NoPermission
);
assert_noop!(
Assets::set_team(RuntimeOrigin::signed(2), 0, 2, 2, 2),
Error::<Test>::NoPermission
);
assert_noop!(Assets::freeze(RuntimeOrigin::signed(2), 0, 1), Error::<Test>::NoPermission);
assert_noop!(Assets::thaw(RuntimeOrigin::signed(2), 0, 2), Error::<Test>::NoPermission);
assert_noop!(
Assets::mint(RuntimeOrigin::signed(2), 0, 2, 100),
Error::<Test>::NoPermission
);
assert_noop!(
Assets::burn(RuntimeOrigin::signed(2), 0, 1, 100),
Error::<Test>::NoPermission
);
assert_noop!(
Assets::force_transfer(RuntimeOrigin::signed(2), 0, 1, 2, 100),
Error::<Test>::NoPermission
);
assert_noop!(
Assets::start_destroy(RuntimeOrigin::signed(2), 0),
Error::<Test>::NoPermission
);
});
}
#[test]
fn transfer_owner_should_work() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
assert_eq!(asset_ids(), vec![0, 999]);
assert_eq!(Balances::reserved_balance(&1), 1);
assert_ok!(Assets::transfer_ownership(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Balances::reserved_balance(&2), 1);
assert_eq!(Balances::reserved_balance(&1), 0);
assert_noop!(
Assets::transfer_ownership(RuntimeOrigin::signed(1), 0, 1),
Error::<Test>::NoPermission
);
// Set metadata now and make sure that deposit gets transferred back.
assert_ok!(Assets::set_metadata(
RuntimeOrigin::signed(2),
0,
vec![0u8; 10],
vec![0u8; 10],
12
));
assert_ok!(Assets::transfer_ownership(RuntimeOrigin::signed(2), 0, 1));
assert_eq!(Balances::reserved_balance(&1), 22);
assert_eq!(Balances::reserved_balance(&2), 0);
});
}
#[test]
fn set_team_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 2, 3, 4));
assert_ok!(Assets::mint(RuntimeOrigin::signed(2), 0, 2, 100));
assert_ok!(Assets::freeze(RuntimeOrigin::signed(4), 0, 2));
assert_ok!(Assets::thaw(RuntimeOrigin::signed(3), 0, 2));
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(3), 0, 2, 3, 100));
assert_ok!(Assets::burn(RuntimeOrigin::signed(3), 0, 3, 100));
});
}
#[test]
fn transferring_from_frozen_account_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_eq!(Assets::balance(0, 2), 100);
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
// can transfer to `2`
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
// cannot transfer from `2`
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 150);
});
}
#[test]
fn touching_and_freezing_account_with_zero_asset_balance_should_work() {
new_test_ext().execute_with(|| {
// need some deposit for the touch
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_eq!(Assets::balance(0, 2), 0);
// cannot freeze an account that doesn't have an `Assets` entry
assert_noop!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2), Error::<Test>::NoAccount);
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
// now it can be frozen
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
// can transfer to `2` even though its frozen
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
// cannot transfer from `2`
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
});
}
#[test]
fn touch_other_works() {
new_test_ext().execute_with(|| {
// 1 will be admin
// 2 will be freezer
// 4 will be an account attempting to execute `touch_other`
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
Balances::make_free_balance_be(&4, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
// account `3` does not exist
assert!(!Account::<Test>::contains_key(0, &3));
// creation of asset account `3` by account `4` fails
assert_noop!(
Assets::touch_other(RuntimeOrigin::signed(4), 0, 3),
Error::<Test>::NoPermission
);
// creation of asset account `3` by admin `1` works
assert!(!Account::<Test>::contains_key(0, &3));
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 3));
assert!(Account::<Test>::contains_key(0, &3));
// creation of asset account `4` by freezer `2` works
assert!(!Account::<Test>::contains_key(0, &4));
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 4));
assert!(Account::<Test>::contains_key(0, &4));
});
}
#[test]
fn touch_other_and_freeze_works() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
// account `2` does not exist
assert!(!Account::<Test>::contains_key(0, &2));
// create account `2` with touch_other
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
assert!(Account::<Test>::contains_key(0, &2));
// now it can be frozen
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
// can transfer to `2` even though its frozen
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
// cannot transfer from `2`
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
});
}
#[test]
fn account_with_deposit_not_destroyed() {
new_test_ext().execute_with(|| {
// 1 will be the asset admin
// 2 will exist without balance but with deposit
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_eq!(Assets::balance(0, 2), 0);
// case 1; account `2` not destroyed with a holder's deposit
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
assert_eq!(Balances::reserved_balance(&2), 10);
assert!(Account::<Test>::contains_key(0, &2));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
assert_eq!(Assets::balance(0, 2), 0);
assert!(Account::<Test>::contains_key(0, &2));
// destroy account `2`
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, false));
assert!(!Account::<Test>::contains_key(0, &2));
// case 2; account `2` not destroyed with a deposit from `1`
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
assert_eq!(Balances::reserved_balance(&1), 10);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
assert!(Account::<Test>::contains_key(0, &2));
});
}
#[test]
fn refund_other_should_fails() {
new_test_ext().execute_with(|| {
// 1 will be the asset admin
// 2 will be the asset freezer
// 3 will be created with deposit of 2
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
Balances::make_free_balance_be(&3, 0);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
assert!(!Account::<Test>::contains_key(0, &3));
// create asset account `3` with a deposit from freezer `2`
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 3));
assert_eq!(Balances::reserved_balance(&2), 10);
// fail case; non-existing asset account `10`
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(2), 0, 10),
Error::<Test>::NoDeposit
);
// fail case; non-existing asset `3`
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(2), 1, 3),
Error::<Test>::NoDeposit
);
// fail case; no `DepositFrom` for asset account `1`
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(2), 0, 1),
Error::<Test>::NoDeposit
);
// fail case; asset `0` is frozen
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(2), 0));
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(2), 0, 3),
Error::<Test>::AssetNotLive
);
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
// fail case; asset `1` is being destroyed
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 10, 1, true, 1));
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 10, 3));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 10));
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(2), 10, 3),
Error::<Test>::AssetNotLive
);
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 10));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 10));
// fail case; account is frozen
assert_ok!(Assets::freeze(RuntimeOrigin::signed(2), 0, 3));
assert_noop!(Assets::refund_other(RuntimeOrigin::signed(2), 0, 3), Error::<Test>::Frozen);
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 3));
// fail case; not a freezer or an admin
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(4), 0, 3),
Error::<Test>::NoPermission
);
// fail case; would burn
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 3, 100));
assert_noop!(
Assets::refund_other(RuntimeOrigin::signed(1), 0, 3),
Error::<Test>::WouldBurn
);
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 3, 100));
})
}
#[test]
fn refund_other_works() {
new_test_ext().execute_with(|| {
// 1 will be the asset admin
// 2 will be the asset freezer
// 3 will be created with deposit of 2
Balances::make_free_balance_be(&1, 100);
Balances::make_free_balance_be(&2, 100);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
assert!(!Account::<Test>::contains_key(0, &3));
assert_eq!(asset_account_counts(0), (0, 0));
// success case; freezer is depositor
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 3));
assert_eq!(Balances::reserved_balance(&2), 10);
assert_eq!(asset_account_counts(0), (1, 0));
assert_ok!(Assets::refund_other(RuntimeOrigin::signed(2), 0, 3));
assert_eq!(Balances::reserved_balance(&2), 0);
assert!(!Account::<Test>::contains_key(0, &3));
assert_eq!(asset_account_counts(0), (0, 0));
// success case; admin is depositor
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 3));
assert_eq!(Balances::reserved_balance(&1), 10);
assert_eq!(asset_account_counts(0), (1, 0));
assert_ok!(Assets::refund_other(RuntimeOrigin::signed(1), 0, 3));
assert_eq!(Balances::reserved_balance(&1), 0);
assert!(!Account::<Test>::contains_key(0, &3));
assert_eq!(asset_account_counts(0), (0, 0));
})
}
#[test]
fn transferring_amount_more_than_available_balance_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(Assets::balance(0, 1), 50);
assert_eq!(Assets::balance(0, 2), 50);
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, u64::MAX));
assert_eq!(Assets::balance(0, 1), 0);
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(1), 0, 1, 50),
Error::<Test>::NoAccount
);
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 51),
Error::<Test>::BalanceLow
);
});
}
#[test]
fn transferring_less_than_one_unit_is_fine() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 0));
// `ForceCreated` and `Issued` but no `Transferred` event.
assert_eq!(System::events().len(), 2);
});
}
#[test]
fn transferring_more_units_than_total_supply_should_not_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 101),
Error::<Test>::BalanceLow
);
});
}
#[test]
fn burning_asset_balance_with_positive_balance_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, u64::MAX));
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Burned {
asset_id: 0,
owner: 1,
balance: 100,
}));
assert_eq!(Assets::balance(0, 1), 0);
});
}
#[test]
fn burning_asset_balance_with_zero_balance_does_nothing() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 2), 0);
assert_noop!(
Assets::burn(RuntimeOrigin::signed(1), 0, 2, u64::MAX),
Error::<Test>::NoAccount
);
assert_eq!(Assets::balance(0, 2), 0);
assert_eq!(Assets::total_supply(0), 100);
});
}
#[test]
fn set_metadata_should_work() {
new_test_ext().execute_with(|| {
// Cannot add metadata to unknown asset
assert_noop!(
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 10], vec![0u8; 10], 12),
Error::<Test>::Unknown,
);
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
// Cannot add metadata to unowned asset
assert_noop!(
Assets::set_metadata(RuntimeOrigin::signed(2), 0, vec![0u8; 10], vec![0u8; 10], 12),
Error::<Test>::NoPermission,
);
// Cannot add oversized metadata
assert_noop!(
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 100], vec![0u8; 10], 12),
Error::<Test>::BadMetadata,
);
assert_noop!(
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 10], vec![0u8; 100], 12),
Error::<Test>::BadMetadata,
);
// Successfully add metadata and take deposit
Balances::make_free_balance_be(&1, 30);
assert_ok!(Assets::set_metadata(
RuntimeOrigin::signed(1),
0,
vec![0u8; 10],
vec![0u8; 10],
12
));
assert_eq!(Balances::free_balance(&1), 9);
// Update deposit
assert_ok!(Assets::set_metadata(
RuntimeOrigin::signed(1),
0,
vec![0u8; 10],
vec![0u8; 5],
12
));
assert_eq!(Balances::free_balance(&1), 14);
assert_ok!(Assets::set_metadata(
RuntimeOrigin::signed(1),
0,
vec![0u8; 10],
vec![0u8; 15],
12
));
assert_eq!(Balances::free_balance(&1), 4);
// Cannot over-reserve
assert_noop!(
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 20], vec![0u8; 20], 12),
BalancesError::<Test, _>::InsufficientBalance,
);
// Clear Metadata
assert!(Metadata::<Test>::contains_key(0));
assert_noop!(
Assets::clear_metadata(RuntimeOrigin::signed(2), 0),
Error::<Test>::NoPermission
);
assert_noop!(Assets::clear_metadata(RuntimeOrigin::signed(1), 1), Error::<Test>::Unknown);
assert_ok!(Assets::clear_metadata(RuntimeOrigin::signed(1), 0));
assert!(!Metadata::<Test>::contains_key(0));
});
}
/// Destroying an asset calls the `FrozenBalance::died` hooks of all accounts.
#[test]
fn destroy_accounts_calls_died_hooks() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 50));
// Create account 1 and 2.
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
// Destroy the accounts.
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
// Accounts 1 and 2 died.
assert_eq!(hooks(), vec![Hook::Died(0, 1), Hook::Died(0, 2)]);
})
}
/// Destroying an asset calls the `FrozenBalance::died` hooks of all accounts.
#[test]
fn finish_destroy_asset_destroys_asset() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 50));
// Destroy the accounts.
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
// Asset is gone
assert!(Asset::<Test>::get(0).is_none());
})
}
#[test]
fn freezer_should_work() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
assert_eq!(Assets::balance(0, 1), 100);
// freeze 50 of it.
set_frozen_balance(0, 1, 50);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 20));
// cannot transfer another 21 away as this would take the non-frozen balance (30) to below
// the minimum balance (10).
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 21),
Error::<Test>::BalanceLow
);
// create an approved transfer...
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
let e = Error::<Test>::BalanceLow;
// ...but that wont work either:
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 2, 21), e);
// a force transfer won't work also.
let e = Error::<Test>::BalanceLow;
assert_noop!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 21), e);
// reduce it to only 49 frozen...
set_frozen_balance(0, 1, 49);
// ...and it's all good:
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 21));
// and if we clear it, we can remove the account completely.
clear_frozen_balance(0, 1);
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
assert_eq!(hooks(), vec![Hook::Died(0, 1)]);
});
}
#[test]
fn imbalances_should_work() {
use frame_support::traits::fungibles::Balanced;
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
let imb = Assets::issue(0, 100);
assert_eq!(Assets::total_supply(0), 100);
assert_eq!(imb.peek(), 100);
let (imb1, imb2) = imb.split(30);
assert_eq!(imb1.peek(), 30);
assert_eq!(imb2.peek(), 70);
drop(imb2);
assert_eq!(Assets::total_supply(0), 30);
assert!(Assets::resolve(&1, imb1).is_ok());
assert_eq!(Assets::balance(0, 1), 30);
assert_eq!(Assets::total_supply(0), 30);
});
}
#[test]
fn force_metadata_should_work() {
new_test_ext().execute_with(|| {
// force set metadata works
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::force_set_metadata(
RuntimeOrigin::root(),
0,
vec![0u8; 10],
vec![0u8; 10],
8,
false
));
assert!(Metadata::<Test>::contains_key(0));
// overwrites existing metadata
let asset_original_metadata = Metadata::<Test>::get(0);
assert_ok!(Assets::force_set_metadata(
RuntimeOrigin::root(),
0,
vec![1u8; 10],
vec![1u8; 10],
8,
false
));
assert_ne!(Metadata::<Test>::get(0), asset_original_metadata);
// attempt to set metadata for non-existent asset class
assert_noop!(
Assets::force_set_metadata(
RuntimeOrigin::root(),
1,
vec![0u8; 10],
vec![0u8; 10],
8,
false
),
Error::<Test>::Unknown
);
// string length limit check
let limit = 50usize;
assert_noop!(
Assets::force_set_metadata(
RuntimeOrigin::root(),
0,
vec![0u8; limit + 1],
vec![0u8; 10],
8,
false
),
Error::<Test>::BadMetadata
);
assert_noop!(
Assets::force_set_metadata(
RuntimeOrigin::root(),
0,
vec![0u8; 10],
vec![0u8; limit + 1],
8,
false
),
Error::<Test>::BadMetadata
);
// force clear metadata works
assert!(Metadata::<Test>::contains_key(0));
assert_ok!(Assets::force_clear_metadata(RuntimeOrigin::root(), 0));
assert!(!Metadata::<Test>::contains_key(0));
// Error handles clearing non-existent asset class
assert_noop!(
Assets::force_clear_metadata(RuntimeOrigin::root(), 1),
Error::<Test>::Unknown
);
});
}
#[test]
fn force_asset_status_should_work() {
new_test_ext().execute_with(|| {
Balances::make_free_balance_be(&1, 10);
Balances::make_free_balance_be(&2, 10);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 30));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 50));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 150));
// force asset status to change min_balance > balance
assert_ok!(Assets::force_asset_status(
RuntimeOrigin::root(),
0,
1,
1,
1,
1,
100,
true,
false
));
assert_eq!(Assets::balance(0, 1), 50);
// account can recieve assets for balance < min_balance
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 1));
assert_eq!(Assets::balance(0, 1), 51);
// account on outbound transfer will cleanup for balance < min_balance
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 1));
assert_eq!(Assets::balance(0, 1), 0);
// won't create new account with balance below min_balance
assert_noop!(
Assets::transfer(RuntimeOrigin::signed(2), 0, 3, 50),
TokenError::BelowMinimum
);
// force asset status will not execute for non-existent class
assert_noop!(
Assets::force_asset_status(RuntimeOrigin::root(), 1, 1, 1, 1, 1, 90, true, false),
Error::<Test>::Unknown
);
// account drains to completion when funds dip below min_balance
assert_ok!(Assets::force_asset_status(
RuntimeOrigin::root(),
0,
1,
1,
1,
1,
110,
true,
false
));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 110));
assert_eq!(Assets::balance(0, 1), 200);
assert_eq!(Assets::balance(0, 2), 0);
assert_eq!(Assets::total_supply(0), 200);
});
}
#[test]
fn set_min_balance_should_work() {
new_test_ext().execute_with(|| {
let id = 42;
Balances::make_free_balance_be(&1, 10);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), id, 1, 30));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), id, 1, 100));
// Won't execute because there is an asset holder.
assert_noop!(
Assets::set_min_balance(RuntimeOrigin::signed(1), id, 50),
Error::<Test>::NoPermission
);
// Force asset status to make this a sufficient asset.
assert_ok!(Assets::force_asset_status(
RuntimeOrigin::root(),
id,
1,
1,
1,
1,
30,
true,
false
));
// Won't execute because there is an account holding the asset and the asset is marked as
// sufficient.
assert_noop!(
Assets::set_min_balance(RuntimeOrigin::signed(1), id, 10),
Error::<Test>::NoPermission
);
// Make the asset not sufficient.
assert_ok!(Assets::force_asset_status(
RuntimeOrigin::root(),
id,
1,
1,
1,
1,
60,
false,
false
));
// Will execute because the new value of min_balance is less than the
// old value. 10 < 30
assert_ok!(Assets::set_min_balance(RuntimeOrigin::signed(1), id, 10));
assert_eq!(Asset::<Test>::get(id).unwrap().min_balance, 10);
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), id, 1, 100));
assert_ok!(Assets::set_min_balance(RuntimeOrigin::signed(1), id, 50));
assert_eq!(Asset::<Test>::get(id).unwrap().min_balance, 50);
});
}
#[test]
fn balance_conversion_should_work() {
new_test_ext().execute_with(|| {
use frame_support::traits::tokens::ConversionToAssetBalance;
let id = 42;
assert_ok!(Assets::force_create(RuntimeOrigin::root(), id, 1, true, 10));
let not_sufficient = 23;
assert_ok!(Assets::force_create(RuntimeOrigin::root(), not_sufficient, 1, false, 10));
assert_eq!(asset_ids(), vec![23, 42, 999]);
assert_eq!(
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(100, 1234),
Err(ConversionError::AssetMissing)
);
assert_eq!(
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(
100,
not_sufficient
),
Err(ConversionError::AssetNotSufficient)
);
// 10 / 1 == 10 -> the conversion should 10x the value
assert_eq!(
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(100, id),
Ok(100 * 10)
);
});
}
#[test]
fn assets_from_genesis_should_exist() {
new_test_ext().execute_with(|| {
assert_eq!(asset_ids(), vec![999]);
assert!(Metadata::<Test>::contains_key(999));
assert_eq!(Assets::balance(999, 1), 100);
assert_eq!(Assets::total_supply(999), 100);
});
}
#[test]
fn querying_name_symbol_and_decimals_should_work() {
new_test_ext().execute_with(|| {
use frame_support::traits::fungibles::metadata::Inspect;
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::force_set_metadata(
RuntimeOrigin::root(),
0,
vec![0u8; 10],
vec![1u8; 10],
12,
false
));
assert_eq!(Assets::name(0), vec![0u8; 10]);
assert_eq!(Assets::symbol(0), vec![1u8; 10]);
assert_eq!(Assets::decimals(0), 12);
});
}
#[test]
fn querying_allowance_should_work() {
new_test_ext().execute_with(|| {
use frame_support::traits::fungibles::approvals::{Inspect, Mutate};
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
Balances::make_free_balance_be(&1, 2);
assert_ok!(Assets::approve(0, &1, &2, 50));
assert_eq!(Assets::allowance(0, &1, &2), 50);
// Transfer asset 0, from owner 1 and delegate 2 to destination 3
assert_ok!(Assets::transfer_from(0, &1, &2, &3, 50));
assert_eq!(Assets::allowance(0, &1, &2), 0);
});
}
#[test]
fn transfer_large_asset() {
new_test_ext().execute_with(|| {
let amount = u64::pow(2, 63) + 2;
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, amount));
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, amount - 1));
})
}
#[test]
fn querying_roles_should_work() {
new_test_ext().execute_with(|| {
use frame_support::traits::fungibles::roles::Inspect;
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::set_team(
RuntimeOrigin::signed(1),
0,
// Issuer
2,
// Admin
3,
// Freezer
4,
));
assert_eq!(Assets::owner(0), Some(1));
assert_eq!(Assets::issuer(0), Some(2));
assert_eq!(Assets::admin(0), Some(3));
assert_eq!(Assets::freezer(0), Some(4));
});
}
#[test]
fn normal_asset_create_and_destroy_callbacks_should_work() {
new_test_ext().execute_with(|| {
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_none());
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
Balances::make_free_balance_be(&1, 100);
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_some());
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
// Callback still hasn't been invoked
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_some());
});
}
#[test]
fn root_asset_create_should_work() {
new_test_ext().execute_with(|| {
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_none());
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_some());
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
});
}
#[test]
fn asset_create_and_destroy_is_reverted_if_callback_fails() {
new_test_ext().execute_with(|| {
// Asset creation fails due to callback failure
AssetsCallbackHandle::set_return_error();
Balances::make_free_balance_be(&1, 100);
assert_noop!(
Assets::create(RuntimeOrigin::signed(1), 0, 1, 1),
Error::<Test>::CallbackFailed
);
// Callback succeeds, so asset creation succeeds
AssetsCallbackHandle::set_return_ok();
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
// Asset destroy should fail due to callback failure
AssetsCallbackHandle::set_return_error();
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
assert_noop!(
Assets::finish_destroy(RuntimeOrigin::signed(1), 0),
Error::<Test>::CallbackFailed
);
});
}
#[test]
fn multiple_transfer_alls_work_ok() {
new_test_ext().execute_with(|| {
// Only run PoC when the system pallet is enabled, since the underlying bug is in the
// system pallet it won't work with BalancesAccountStore
// Start with a balance of 100
Balances::force_set_balance(RuntimeOrigin::root(), 1, 100).unwrap();
// Emulate a sufficient, in reality this could be reached by transferring a sufficient
// asset to the account
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
// Spend the same balance multiple times
assert_ok!(Balances::transfer_all(RuntimeOrigin::signed(1), 1337, false));
assert_ok!(Balances::transfer_all(RuntimeOrigin::signed(1), 1337, false));
assert_eq!(Balances::free_balance(&1), 0);
assert_eq!(Balances::free_balance(&1337), 100);
});
}
#[test]
fn weights_sane() {
let info = crate::Call::<Test>::create { id: 10, admin: 4, min_balance: 3 }.get_dispatch_info();
assert_eq!(<() as crate::WeightInfo>::create(), info.weight);
let info = crate::Call::<Test>::finish_destroy { id: 10 }.get_dispatch_info();
assert_eq!(<() as crate::WeightInfo>::finish_destroy(), info.weight);
}
#[test]
fn asset_destroy_refund_existence_deposit() {
new_test_ext().execute_with(|| {
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
Balances::make_free_balance_be(&1, 100);
let admin = 1;
let admin_origin = RuntimeOrigin::signed(admin);
let account2 = 2; // account with own deposit
let account3 = 3; // account with admin's deposit
Balances::make_free_balance_be(&account2, 100);
assert_eq!(Balances::reserved_balance(&account2), 0);
assert_eq!(Balances::reserved_balance(&account3), 0);
assert_eq!(Balances::reserved_balance(&admin), 0);
assert_ok!(Assets::touch(RuntimeOrigin::signed(account2), 0));
assert_ok!(Assets::touch_other(admin_origin.clone(), 0, account3));
assert_eq!(Balances::reserved_balance(&account2), 10);
assert_eq!(Balances::reserved_balance(&account3), 0);
assert_eq!(Balances::reserved_balance(&admin), 10);
assert_ok!(Assets::start_destroy(admin_origin.clone(), 0));
assert_ok!(Assets::destroy_accounts(admin_origin.clone(), 0));
assert_ok!(Assets::destroy_approvals(admin_origin.clone(), 0));
assert_ok!(Assets::finish_destroy(admin_origin.clone(), 0));
assert_eq!(Balances::reserved_balance(&account2), 0);
assert_eq!(Balances::reserved_balance(&account3), 0);
assert_eq!(Balances::reserved_balance(&admin), 0);
});
}