mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 20:27:58 +00:00
0b74812ce8
Introduces `UnionOf` types, crafted to merge `fungible` and `fungibles` implementations or two `fungibles` implementations into a single type implementing `fungibles`. This also addresses an issue where `ItemOf` initiates a double drop for an imbalance type, leading to inaccurate total issuance accounting. Find the application of these types in this PR - [link](https://github.com/paritytech/polkadot-sdk/pull/2031), places in code - [1](https://github.com/paritytech/polkadot-sdk/blob/4ec7496fa2632385b08fae860fcf28a523a7b5de/cumulus/parachains/runtimes/assets/asset-hub-kusama/src/lib.rs#L327), [2](https://github.com/paritytech/polkadot-sdk/blob/4ec7496fa2632385b08fae860fcf28a523a7b5de/cumulus/parachains/runtimes/assets/asset-hub-kusama/src/lib.rs#L343). --------- Co-authored-by: Liam Aharon <liam.aharon@hotmail.com> Co-authored-by: joe petrowski <25483142+joepetrowski@users.noreply.github.com> Co-authored-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> Co-authored-by: joepetrowski <joe@parity.io>
1780 lines
63 KiB
Rust
1780 lines
63 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Tests for Assets pallet.
|
|
|
|
use super::*;
|
|
use crate::{mock::*, Error};
|
|
use frame_support::{
|
|
assert_noop, assert_ok,
|
|
dispatch::GetDispatchInfo,
|
|
traits::{fungibles::InspectEnumerable, tokens::Preservation::Protect, Currency},
|
|
};
|
|
use pallet_balances::Error as BalancesError;
|
|
use sp_io::storage;
|
|
use sp_runtime::{traits::ConvertInto, TokenError};
|
|
|
|
mod sets;
|
|
|
|
fn asset_ids() -> Vec<u32> {
|
|
let mut s: Vec<_> = Assets::asset_ids().collect();
|
|
s.sort();
|
|
s
|
|
}
|
|
|
|
/// returns tuple of asset's account and sufficient counts
|
|
fn asset_account_counts(asset_id: u32) -> (u32, u32) {
|
|
let asset = Asset::<Test>::get(asset_id).unwrap();
|
|
(asset.accounts, asset.sufficients)
|
|
}
|
|
|
|
#[test]
|
|
fn transfer_should_never_burn() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
|
|
while System::inc_consumers(&2).is_ok() {}
|
|
let _ = System::dec_consumers(&2);
|
|
let _ = System::dec_consumers(&2);
|
|
// Exactly one consumer ref remaining.
|
|
assert_eq!(System::consumers(&2), 1);
|
|
|
|
let _ = <Assets as fungibles::Mutate<_>>::transfer(0, &1, &2, 50, Protect);
|
|
System::assert_has_event(RuntimeEvent::Assets(crate::Event::Transferred {
|
|
asset_id: 0,
|
|
from: 1,
|
|
to: 2,
|
|
amount: 50,
|
|
}));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 1) + Assets::balance(0, 2), 100);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn basic_minting_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
|
|
asset_id: 0,
|
|
owner: 1,
|
|
amount: 100,
|
|
}));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
|
|
asset_id: 0,
|
|
owner: 2,
|
|
amount: 100,
|
|
}));
|
|
assert_eq!(Assets::balance(0, 2), 100);
|
|
assert_eq!(asset_ids(), vec![0, 1, 999]);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
|
|
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Issued {
|
|
asset_id: 1,
|
|
owner: 1,
|
|
amount: 100,
|
|
}));
|
|
assert_eq!(Assets::account_balances(1), vec![(0, 100), (999, 100), (1, 100)]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn minting_too_many_insufficient_assets_fails() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, false, 1));
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 2, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100), TokenError::CannotCreate);
|
|
|
|
Balances::make_free_balance_be(&2, 1);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100));
|
|
assert_eq!(asset_ids(), vec![0, 1, 2, 999]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn minting_insufficient_asset_with_deposit_should_work_when_consumers_exhausted() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 1, 1, false, 1));
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 2, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 1, 1, 100));
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100), TokenError::CannotCreate);
|
|
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 2));
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 2, 1, 100));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn minting_insufficient_assets_with_deposit_without_consumer_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
assert_eq!(System::consumers(&1), 1);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_asset_deposit_with_burn_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, true));
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
assert_eq!(Assets::balance(1, 0), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_asset_deposit_with_burn_disallowed_should_fail() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_noop!(Assets::refund(RuntimeOrigin::signed(1), 0, false), Error::<Test>::WouldBurn);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_asset_deposit_without_burn_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
assert_eq!(Assets::balance(0, 2), 100);
|
|
assert_eq!(Assets::balance(0, 1), 0);
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
assert_eq!(asset_account_counts(0), (2, 0));
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, false));
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
assert_eq!(Assets::balance(1, 0), 0);
|
|
assert_eq!(asset_account_counts(0), (1, 0));
|
|
});
|
|
}
|
|
|
|
/// Refunding reaps an account and calls the `FrozenBalance::died` hook.
|
|
#[test]
|
|
fn refunding_calls_died_hook() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(1), 0, true));
|
|
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 0);
|
|
assert_eq!(hooks(), vec![Hook::Died(0, 1)]);
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_with_sufficient_existence_reason_should_fail() {
|
|
new_test_ext().execute_with(|| {
|
|
// create sufficient asset
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
// create an asset account with sufficient existence reason
|
|
// by transferring some sufficient assets
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
assert_eq!(asset_account_counts(0), (2, 2));
|
|
// fails to refund
|
|
assert_noop!(Assets::refund(RuntimeOrigin::signed(2), 0, true), Error::<Test>::NoDeposit);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_with_deposit_from_should_fail() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
// create asset account `2` with deposit from `1`
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
// fails to refund
|
|
assert_noop!(Assets::refund(RuntimeOrigin::signed(2), 0, true), Error::<Test>::NoDeposit);
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_frozen_with_consumer_ref_works() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be an admin
|
|
// 2 will be a frozen account
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
// create non-sufficient asset
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(System::consumers(&2), 0);
|
|
// create asset account `2` with a consumer reference by transferring
|
|
// non-sufficient funds into
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(System::consumers(&2), 1);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
assert_eq!(asset_account_counts(0), (2, 0));
|
|
// freeze asset account `2` and asset `0`
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
// refund works
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, true));
|
|
assert!(!Account::<Test>::contains_key(0, &2));
|
|
assert_eq!(System::consumers(&2), 0);
|
|
assert_eq!(asset_account_counts(0), (1, 0));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refunding_frozen_with_deposit_works() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be an asset admin
|
|
// 2 will be a frozen account
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(System::consumers(&2), 0);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
|
|
// reserve deposit holds one consumer ref
|
|
assert_eq!(System::consumers(&2), 1);
|
|
assert_eq!(Balances::reserved_balance(&2), 10);
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
// transfer some assets to `2`
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(System::consumers(&2), 1);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
assert_eq!(asset_account_counts(0), (2, 0));
|
|
// ensure refundable even if asset account and asset is frozen
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
// success
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, true));
|
|
assert!(!Account::<Test>::contains_key(0, &2));
|
|
assert_eq!(Balances::reserved_balance(&2), 0);
|
|
assert_eq!(System::consumers(&2), 0);
|
|
assert_eq!(asset_account_counts(0), (1, 0));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn approval_lifecycle_works() {
|
|
new_test_ext().execute_with(|| {
|
|
// can't approve non-existent token
|
|
assert_noop!(
|
|
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
|
|
Error::<Test>::Unknown
|
|
);
|
|
// so we create it :)
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 40));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
|
|
assert_eq!(Assets::balance(0, 1), 60);
|
|
assert_eq!(Assets::balance(0, 3), 40);
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transfer_approved_all_funds() {
|
|
new_test_ext().execute_with(|| {
|
|
// can't approve non-existent token
|
|
assert_noop!(
|
|
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
|
|
Error::<Test>::Unknown
|
|
);
|
|
// so we create it :)
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
|
|
// transfer the full amount, which should trigger auto-cleanup
|
|
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 50));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 3), 50);
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn approval_deposits_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
let e = BalancesError::<Test>::InsufficientBalance;
|
|
assert_noop!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50), e);
|
|
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
|
|
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 50));
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn cannot_transfer_more_than_approved() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
let e = Error::<Test>::Unapproved;
|
|
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 51), e);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn cannot_transfer_more_than_exists() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 101));
|
|
let e = Error::<Test>::BalanceLow;
|
|
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 101), e);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn cancel_approval_works() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_noop!(
|
|
Assets::cancel_approval(RuntimeOrigin::signed(1), 1, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_noop!(
|
|
Assets::cancel_approval(RuntimeOrigin::signed(2), 0, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_noop!(
|
|
Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 3),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_ok!(Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
|
|
assert_noop!(
|
|
Assets::cancel_approval(RuntimeOrigin::signed(1), 0, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn force_cancel_approval_works() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
let e = Error::<Test>::NoPermission;
|
|
assert_noop!(Assets::force_cancel_approval(RuntimeOrigin::signed(2), 0, 1, 2), e);
|
|
assert_noop!(
|
|
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 1, 1, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_noop!(
|
|
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 2, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_noop!(
|
|
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 3),
|
|
Error::<Test>::Unknown
|
|
);
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 1);
|
|
assert_ok!(Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 2));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().approvals, 0);
|
|
assert_noop!(
|
|
Assets::force_cancel_approval(RuntimeOrigin::signed(1), 0, 1, 2),
|
|
Error::<Test>::Unknown
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn lifecycle_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
assert!(Asset::<Test>::contains_key(0));
|
|
|
|
assert_ok!(Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0], vec![0], 12));
|
|
assert_eq!(Balances::reserved_balance(&1), 4);
|
|
assert!(Metadata::<Test>::contains_key(0));
|
|
|
|
Balances::make_free_balance_be(&10, 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
|
|
Balances::make_free_balance_be(&20, 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 20, 100));
|
|
assert_eq!(Account::<Test>::iter_prefix(0).count(), 2);
|
|
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
|
|
assert!(!Asset::<Test>::contains_key(0));
|
|
assert!(!Metadata::<Test>::contains_key(0));
|
|
assert_eq!(Account::<Test>::iter_prefix(0).count(), 0);
|
|
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
assert!(Asset::<Test>::contains_key(0));
|
|
|
|
assert_ok!(Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0], vec![0], 12));
|
|
assert_eq!(Balances::reserved_balance(&1), 4);
|
|
assert!(Metadata::<Test>::contains_key(0));
|
|
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 20, 100));
|
|
assert_eq!(Account::<Test>::iter_prefix(0).count(), 2);
|
|
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
|
|
assert!(!Asset::<Test>::contains_key(0));
|
|
assert!(!Metadata::<Test>::contains_key(0));
|
|
assert_eq!(Account::<Test>::iter_prefix(0).count(), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn destroy_should_refund_approvals() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 10, 100));
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 3, 50));
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 4, 50));
|
|
assert_eq!(Balances::reserved_balance(&1), 3);
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
assert_eq!(asset_ids(), vec![999]);
|
|
|
|
// all approvals are removed
|
|
assert!(Approvals::<Test>::iter().count().is_zero())
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn partial_destroy_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 3, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 4, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 5, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 6, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 7, 10));
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
// Asset is in use, as all the accounts have not yet been destroyed.
|
|
// We need to call destroy_accounts or destroy_approvals again until asset is completely
|
|
// cleaned up.
|
|
assert_noop!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0), Error::<Test>::InUse);
|
|
|
|
System::assert_has_event(RuntimeEvent::Assets(crate::Event::AccountsDestroyed {
|
|
asset_id: 0,
|
|
accounts_destroyed: 5,
|
|
accounts_remaining: 2,
|
|
}));
|
|
System::assert_has_event(RuntimeEvent::Assets(crate::Event::ApprovalsDestroyed {
|
|
asset_id: 0,
|
|
approvals_destroyed: 0,
|
|
approvals_remaining: 0,
|
|
}));
|
|
// Partially destroyed Asset should continue to exist
|
|
assert!(Asset::<Test>::contains_key(0));
|
|
|
|
// Second call to destroy on PartiallyDestroyed asset
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
System::assert_has_event(RuntimeEvent::Assets(crate::Event::AccountsDestroyed {
|
|
asset_id: 0,
|
|
accounts_destroyed: 2,
|
|
accounts_remaining: 0,
|
|
}));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
|
|
System::assert_has_event(RuntimeEvent::Assets(crate::Event::Destroyed { asset_id: 0 }));
|
|
|
|
// Destroyed Asset should not exist
|
|
assert!(!Asset::<Test>::contains_key(0));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn non_providing_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
|
|
Balances::make_free_balance_be(&0, 100);
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 0, 100));
|
|
|
|
// Cannot mint into account 2 since it doesn't (yet) exist...
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100), TokenError::CannotCreate);
|
|
// ...or transfer...
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(0), 0, 1, 50),
|
|
TokenError::CannotCreate
|
|
);
|
|
// ...or force-transfer
|
|
assert_noop!(
|
|
Assets::force_transfer(RuntimeOrigin::signed(1), 0, 0, 1, 50),
|
|
TokenError::CannotCreate
|
|
);
|
|
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(0), 0, 1, 25));
|
|
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 0, 2, 25));
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn min_balance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
|
|
|
|
// Cannot create a new account with a balance that is below minimum...
|
|
assert_noop!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 9), TokenError::BelowMinimum);
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 9), TokenError::BelowMinimum);
|
|
assert_noop!(
|
|
Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 9),
|
|
TokenError::BelowMinimum
|
|
);
|
|
|
|
// When deducting from an account to below minimum, it should be reaped.
|
|
// Death by `transfer`.
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 91));
|
|
assert!(Assets::maybe_balance(0, 1).is_none());
|
|
assert_eq!(Assets::balance(0, 2), 100);
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
|
|
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
|
|
|
|
// Death by `force_transfer`.
|
|
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 2, 1, 91));
|
|
assert!(Assets::maybe_balance(0, 2).is_none());
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 1);
|
|
assert_eq!(take_hooks(), vec![Hook::Died(0, 2)]);
|
|
|
|
// Death by `burn`.
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, 91));
|
|
assert!(Assets::maybe_balance(0, 1).is_none());
|
|
assert_eq!(Asset::<Test>::get(0).unwrap().accounts, 0);
|
|
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
|
|
|
|
// Death by `transfer_approved`.
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
assert_ok!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 3, 91));
|
|
assert_eq!(take_hooks(), vec![Hook::Died(0, 1)]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn querying_total_supply_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 3, 31));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 19);
|
|
assert_eq!(Assets::balance(0, 3), 31);
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 3, u64::MAX));
|
|
assert_eq!(Assets::total_supply(0), 69);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_amount_below_available_balance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_enough_to_kill_source_when_keep_alive_should_fail() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_noop!(
|
|
Assets::transfer_keep_alive(RuntimeOrigin::signed(1), 0, 2, 91),
|
|
Error::<Test>::BalanceLow
|
|
);
|
|
assert_ok!(Assets::transfer_keep_alive(RuntimeOrigin::signed(1), 0, 2, 90));
|
|
assert_eq!(Assets::balance(0, 1), 10);
|
|
assert_eq!(Assets::balance(0, 2), 90);
|
|
assert!(hooks().is_empty());
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_frozen_user_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 1));
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50), Error::<Test>::Frozen);
|
|
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_frozen_asset_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50),
|
|
Error::<Test>::AssetNotLive
|
|
);
|
|
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn approve_transfer_frozen_asset_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_noop!(
|
|
Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50),
|
|
Error::<Test>::AssetNotLive
|
|
);
|
|
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_from_blocked_account_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::block(RuntimeOrigin::signed(1), 0, 1));
|
|
// behaves as frozen when transferring from blocked
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50), Error::<Test>::Frozen);
|
|
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_to_blocked_account_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_eq!(Assets::balance(0, 2), 100);
|
|
assert_ok!(Assets::block(RuntimeOrigin::signed(1), 0, 1));
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50), TokenError::Blocked);
|
|
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 1));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn origin_guards_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_noop!(
|
|
Assets::transfer_ownership(RuntimeOrigin::signed(2), 0, 2),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(
|
|
Assets::set_team(RuntimeOrigin::signed(2), 0, 2, 2, 2),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(Assets::freeze(RuntimeOrigin::signed(2), 0, 1), Error::<Test>::NoPermission);
|
|
assert_noop!(Assets::thaw(RuntimeOrigin::signed(2), 0, 2), Error::<Test>::NoPermission);
|
|
assert_noop!(
|
|
Assets::mint(RuntimeOrigin::signed(2), 0, 2, 100),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(
|
|
Assets::burn(RuntimeOrigin::signed(2), 0, 1, 100),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(
|
|
Assets::force_transfer(RuntimeOrigin::signed(2), 0, 1, 2, 100),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(
|
|
Assets::start_destroy(RuntimeOrigin::signed(2), 0),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transfer_owner_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
|
|
assert_eq!(asset_ids(), vec![0, 999]);
|
|
|
|
assert_eq!(Balances::reserved_balance(&1), 1);
|
|
|
|
assert_ok!(Assets::transfer_ownership(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Balances::reserved_balance(&2), 1);
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
|
|
assert_noop!(
|
|
Assets::transfer_ownership(RuntimeOrigin::signed(1), 0, 1),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
|
|
// Set metadata now and make sure that deposit gets transferred back.
|
|
assert_ok!(Assets::set_metadata(
|
|
RuntimeOrigin::signed(2),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; 10],
|
|
12
|
|
));
|
|
assert_ok!(Assets::transfer_ownership(RuntimeOrigin::signed(2), 0, 1));
|
|
assert_eq!(Balances::reserved_balance(&1), 22);
|
|
assert_eq!(Balances::reserved_balance(&2), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn set_team_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 2, 3, 4));
|
|
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(2), 0, 2, 100));
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(4), 0, 2));
|
|
assert_ok!(Assets::thaw(RuntimeOrigin::signed(3), 0, 2));
|
|
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(3), 0, 2, 3, 100));
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(3), 0, 3, 100));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_from_frozen_account_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_eq!(Assets::balance(0, 2), 100);
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
|
|
// can transfer to `2`
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
// cannot transfer from `2`
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 150);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn touching_and_freezing_account_with_zero_asset_balance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
// need some deposit for the touch
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
// cannot freeze an account that doesn't have an `Assets` entry
|
|
assert_noop!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2), Error::<Test>::NoAccount);
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
|
|
// now it can be frozen
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
|
|
// can transfer to `2` even though its frozen
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
// cannot transfer from `2`
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn touch_other_works() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be admin
|
|
// 2 will be freezer
|
|
// 4 will be an account attempting to execute `touch_other`
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
Balances::make_free_balance_be(&4, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
// account `3` does not exist
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
// creation of asset account `3` by account `4` fails
|
|
assert_noop!(
|
|
Assets::touch_other(RuntimeOrigin::signed(4), 0, 3),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
// creation of asset account `3` by admin `1` works
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 3));
|
|
assert!(Account::<Test>::contains_key(0, &3));
|
|
// creation of asset account `4` by freezer `2` works
|
|
assert!(!Account::<Test>::contains_key(0, &4));
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 4));
|
|
assert!(Account::<Test>::contains_key(0, &4));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn touch_other_and_freeze_works() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
// account `2` does not exist
|
|
assert!(!Account::<Test>::contains_key(0, &2));
|
|
// create account `2` with touch_other
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
// now it can be frozen
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(1), 0, 2));
|
|
// can transfer to `2` even though its frozen
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
// cannot transfer from `2`
|
|
assert_noop!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 25), Error::<Test>::Frozen);
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn account_with_deposit_not_destroyed() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be the asset admin
|
|
// 2 will exist without balance but with deposit
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
// case 1; account `2` not destroyed with a holder's deposit
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(2), 0));
|
|
assert_eq!(Balances::reserved_balance(&2), 10);
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
|
|
// destroy account `2`
|
|
assert_ok!(Assets::refund(RuntimeOrigin::signed(2), 0, false));
|
|
assert!(!Account::<Test>::contains_key(0, &2));
|
|
|
|
// case 2; account `2` not destroyed with a deposit from `1`
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 2));
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 50));
|
|
assert!(Account::<Test>::contains_key(0, &2));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn refund_other_should_fails() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be the asset admin
|
|
// 2 will be the asset freezer
|
|
// 3 will be created with deposit of 2
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
Balances::make_free_balance_be(&3, 0);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
|
|
// create asset account `3` with a deposit from freezer `2`
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 3));
|
|
assert_eq!(Balances::reserved_balance(&2), 10);
|
|
|
|
// fail case; non-existing asset account `10`
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(2), 0, 10),
|
|
Error::<Test>::NoDeposit
|
|
);
|
|
// fail case; non-existing asset `3`
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(2), 1, 3),
|
|
Error::<Test>::NoDeposit
|
|
);
|
|
// fail case; no `DepositFrom` for asset account `1`
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(2), 0, 1),
|
|
Error::<Test>::NoDeposit
|
|
);
|
|
// fail case; asset `0` is frozen
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(2), 0));
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(2), 0, 3),
|
|
Error::<Test>::AssetNotLive
|
|
);
|
|
assert_ok!(Assets::thaw_asset(RuntimeOrigin::signed(1), 0));
|
|
// fail case; asset `1` is being destroyed
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 10, 1, true, 1));
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 10, 3));
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 10));
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(2), 10, 3),
|
|
Error::<Test>::AssetNotLive
|
|
);
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 10));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 10));
|
|
// fail case; account is frozen
|
|
assert_ok!(Assets::freeze(RuntimeOrigin::signed(2), 0, 3));
|
|
assert_noop!(Assets::refund_other(RuntimeOrigin::signed(2), 0, 3), Error::<Test>::Frozen);
|
|
assert_ok!(Assets::thaw(RuntimeOrigin::signed(1), 0, 3));
|
|
// fail case; not a freezer or an admin
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(4), 0, 3),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
// fail case; would burn
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 3, 100));
|
|
assert_noop!(
|
|
Assets::refund_other(RuntimeOrigin::signed(1), 0, 3),
|
|
Error::<Test>::WouldBurn
|
|
);
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 3, 100));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn refund_other_works() {
|
|
new_test_ext().execute_with(|| {
|
|
// 1 will be the asset admin
|
|
// 2 will be the asset freezer
|
|
// 3 will be created with deposit of 2
|
|
Balances::make_free_balance_be(&1, 100);
|
|
Balances::make_free_balance_be(&2, 100);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::set_team(RuntimeOrigin::signed(1), 0, 1, 1, 2));
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
assert_eq!(asset_account_counts(0), (0, 0));
|
|
|
|
// success case; freezer is depositor
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(2), 0, 3));
|
|
assert_eq!(Balances::reserved_balance(&2), 10);
|
|
assert_eq!(asset_account_counts(0), (1, 0));
|
|
assert_ok!(Assets::refund_other(RuntimeOrigin::signed(2), 0, 3));
|
|
assert_eq!(Balances::reserved_balance(&2), 0);
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
assert_eq!(asset_account_counts(0), (0, 0));
|
|
|
|
// success case; admin is depositor
|
|
assert_ok!(Assets::touch_other(RuntimeOrigin::signed(1), 0, 3));
|
|
assert_eq!(Balances::reserved_balance(&1), 10);
|
|
assert_eq!(asset_account_counts(0), (1, 0));
|
|
assert_ok!(Assets::refund_other(RuntimeOrigin::signed(1), 0, 3));
|
|
assert_eq!(Balances::reserved_balance(&1), 0);
|
|
assert!(!Account::<Test>::contains_key(0, &3));
|
|
assert_eq!(asset_account_counts(0), (0, 0));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_amount_more_than_available_balance_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
assert_eq!(Assets::balance(0, 2), 50);
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, u64::MAX));
|
|
assert_eq!(Assets::balance(0, 1), 0);
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(1), 0, 1, 50),
|
|
Error::<Test>::NoAccount
|
|
);
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 51),
|
|
Error::<Test>::BalanceLow
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_less_than_one_unit_is_fine() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 0));
|
|
// `ForceCreated` and `Issued` but no `Transferred` event.
|
|
assert_eq!(System::events().len(), 2);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transferring_more_units_than_total_supply_should_not_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 101),
|
|
Error::<Test>::BalanceLow
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn burning_asset_balance_with_positive_balance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), 0, 1, u64::MAX));
|
|
System::assert_last_event(RuntimeEvent::Assets(crate::Event::Burned {
|
|
asset_id: 0,
|
|
owner: 1,
|
|
balance: 100,
|
|
}));
|
|
assert_eq!(Assets::balance(0, 1), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn burning_asset_balance_with_zero_balance_does_nothing() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
assert_noop!(
|
|
Assets::burn(RuntimeOrigin::signed(1), 0, 2, u64::MAX),
|
|
Error::<Test>::NoAccount
|
|
);
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
assert_eq!(Assets::total_supply(0), 100);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn set_metadata_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
// Cannot add metadata to unknown asset
|
|
assert_noop!(
|
|
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 10], vec![0u8; 10], 12),
|
|
Error::<Test>::Unknown,
|
|
);
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
// Cannot add metadata to unowned asset
|
|
assert_noop!(
|
|
Assets::set_metadata(RuntimeOrigin::signed(2), 0, vec![0u8; 10], vec![0u8; 10], 12),
|
|
Error::<Test>::NoPermission,
|
|
);
|
|
|
|
// Cannot add oversized metadata
|
|
assert_noop!(
|
|
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 100], vec![0u8; 10], 12),
|
|
Error::<Test>::BadMetadata,
|
|
);
|
|
assert_noop!(
|
|
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 10], vec![0u8; 100], 12),
|
|
Error::<Test>::BadMetadata,
|
|
);
|
|
|
|
// Successfully add metadata and take deposit
|
|
Balances::make_free_balance_be(&1, 30);
|
|
assert_ok!(Assets::set_metadata(
|
|
RuntimeOrigin::signed(1),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; 10],
|
|
12
|
|
));
|
|
assert_eq!(Balances::free_balance(&1), 9);
|
|
|
|
// Update deposit
|
|
assert_ok!(Assets::set_metadata(
|
|
RuntimeOrigin::signed(1),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; 5],
|
|
12
|
|
));
|
|
assert_eq!(Balances::free_balance(&1), 14);
|
|
assert_ok!(Assets::set_metadata(
|
|
RuntimeOrigin::signed(1),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; 15],
|
|
12
|
|
));
|
|
assert_eq!(Balances::free_balance(&1), 4);
|
|
|
|
// Cannot over-reserve
|
|
assert_noop!(
|
|
Assets::set_metadata(RuntimeOrigin::signed(1), 0, vec![0u8; 20], vec![0u8; 20], 12),
|
|
BalancesError::<Test, _>::InsufficientBalance,
|
|
);
|
|
|
|
// Clear Metadata
|
|
assert!(Metadata::<Test>::contains_key(0));
|
|
assert_noop!(
|
|
Assets::clear_metadata(RuntimeOrigin::signed(2), 0),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
assert_noop!(Assets::clear_metadata(RuntimeOrigin::signed(1), 1), Error::<Test>::Unknown);
|
|
assert_ok!(Assets::clear_metadata(RuntimeOrigin::signed(1), 0));
|
|
assert!(!Metadata::<Test>::contains_key(0));
|
|
});
|
|
}
|
|
|
|
/// Destroying an asset calls the `FrozenBalance::died` hooks of all accounts.
|
|
#[test]
|
|
fn destroy_accounts_calls_died_hooks() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 50));
|
|
// Create account 1 and 2.
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 100));
|
|
// Destroy the accounts.
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
|
|
// Accounts 1 and 2 died.
|
|
assert_eq!(hooks(), vec![Hook::Died(0, 1), Hook::Died(0, 2)]);
|
|
})
|
|
}
|
|
|
|
/// Destroying an asset calls the `FrozenBalance::died` hooks of all accounts.
|
|
#[test]
|
|
fn finish_destroy_asset_destroys_asset() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 50));
|
|
// Destroy the accounts.
|
|
assert_ok!(Assets::freeze_asset(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
|
|
// Asset is gone
|
|
assert!(Asset::<Test>::get(0).is_none());
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn freezer_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 10));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
assert_eq!(Assets::balance(0, 1), 100);
|
|
|
|
// freeze 50 of it.
|
|
set_frozen_balance(0, 1, 50);
|
|
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 20));
|
|
// cannot transfer another 21 away as this would take the non-frozen balance (30) to below
|
|
// the minimum balance (10).
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 21),
|
|
Error::<Test>::BalanceLow
|
|
);
|
|
|
|
// create an approved transfer...
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::approve_transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
let e = Error::<Test>::BalanceLow;
|
|
// ...but that wont work either:
|
|
assert_noop!(Assets::transfer_approved(RuntimeOrigin::signed(2), 0, 1, 2, 21), e);
|
|
// a force transfer won't work also.
|
|
let e = Error::<Test>::BalanceLow;
|
|
assert_noop!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 21), e);
|
|
|
|
// reduce it to only 49 frozen...
|
|
set_frozen_balance(0, 1, 49);
|
|
// ...and it's all good:
|
|
assert_ok!(Assets::force_transfer(RuntimeOrigin::signed(1), 0, 1, 2, 21));
|
|
|
|
// and if we clear it, we can remove the account completely.
|
|
clear_frozen_balance(0, 1);
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 50));
|
|
assert_eq!(hooks(), vec![Hook::Died(0, 1)]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn imbalances_should_work() {
|
|
use frame_support::traits::fungibles::Balanced;
|
|
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
|
|
let imb = Assets::issue(0, 100);
|
|
assert_eq!(Assets::total_supply(0), 100);
|
|
assert_eq!(imb.peek(), 100);
|
|
|
|
let (imb1, imb2) = imb.split(30);
|
|
assert_eq!(imb1.peek(), 30);
|
|
assert_eq!(imb2.peek(), 70);
|
|
|
|
drop(imb2);
|
|
assert_eq!(Assets::total_supply(0), 30);
|
|
|
|
assert!(Assets::resolve(&1, imb1).is_ok());
|
|
assert_eq!(Assets::balance(0, 1), 30);
|
|
assert_eq!(Assets::total_supply(0), 30);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn force_metadata_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
// force set metadata works
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; 10],
|
|
8,
|
|
false
|
|
));
|
|
assert!(Metadata::<Test>::contains_key(0));
|
|
|
|
// overwrites existing metadata
|
|
let asset_original_metadata = Metadata::<Test>::get(0);
|
|
assert_ok!(Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
vec![1u8; 10],
|
|
vec![1u8; 10],
|
|
8,
|
|
false
|
|
));
|
|
assert_ne!(Metadata::<Test>::get(0), asset_original_metadata);
|
|
|
|
// attempt to set metadata for non-existent asset class
|
|
assert_noop!(
|
|
Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
1,
|
|
vec![0u8; 10],
|
|
vec![0u8; 10],
|
|
8,
|
|
false
|
|
),
|
|
Error::<Test>::Unknown
|
|
);
|
|
|
|
// string length limit check
|
|
let limit = 50usize;
|
|
assert_noop!(
|
|
Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
vec![0u8; limit + 1],
|
|
vec![0u8; 10],
|
|
8,
|
|
false
|
|
),
|
|
Error::<Test>::BadMetadata
|
|
);
|
|
assert_noop!(
|
|
Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![0u8; limit + 1],
|
|
8,
|
|
false
|
|
),
|
|
Error::<Test>::BadMetadata
|
|
);
|
|
|
|
// force clear metadata works
|
|
assert!(Metadata::<Test>::contains_key(0));
|
|
assert_ok!(Assets::force_clear_metadata(RuntimeOrigin::root(), 0));
|
|
assert!(!Metadata::<Test>::contains_key(0));
|
|
|
|
// Error handles clearing non-existent asset class
|
|
assert_noop!(
|
|
Assets::force_clear_metadata(RuntimeOrigin::root(), 1),
|
|
Error::<Test>::Unknown
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn force_asset_status_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
Balances::make_free_balance_be(&1, 10);
|
|
Balances::make_free_balance_be(&2, 10);
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 30));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 50));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 2, 150));
|
|
|
|
// force asset status to change min_balance > balance
|
|
assert_ok!(Assets::force_asset_status(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
1,
|
|
1,
|
|
1,
|
|
1,
|
|
100,
|
|
true,
|
|
false
|
|
));
|
|
assert_eq!(Assets::balance(0, 1), 50);
|
|
|
|
// account can recieve assets for balance < min_balance
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 1));
|
|
assert_eq!(Assets::balance(0, 1), 51);
|
|
|
|
// account on outbound transfer will cleanup for balance < min_balance
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, 1));
|
|
assert_eq!(Assets::balance(0, 1), 0);
|
|
|
|
// won't create new account with balance below min_balance
|
|
assert_noop!(
|
|
Assets::transfer(RuntimeOrigin::signed(2), 0, 3, 50),
|
|
TokenError::BelowMinimum
|
|
);
|
|
|
|
// force asset status will not execute for non-existent class
|
|
assert_noop!(
|
|
Assets::force_asset_status(RuntimeOrigin::root(), 1, 1, 1, 1, 1, 90, true, false),
|
|
Error::<Test>::Unknown
|
|
);
|
|
|
|
// account drains to completion when funds dip below min_balance
|
|
assert_ok!(Assets::force_asset_status(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
1,
|
|
1,
|
|
1,
|
|
1,
|
|
110,
|
|
true,
|
|
false
|
|
));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(2), 0, 1, 110));
|
|
assert_eq!(Assets::balance(0, 1), 200);
|
|
assert_eq!(Assets::balance(0, 2), 0);
|
|
assert_eq!(Assets::total_supply(0), 200);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn set_min_balance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
let id = 42;
|
|
Balances::make_free_balance_be(&1, 10);
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), id, 1, 30));
|
|
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), id, 1, 100));
|
|
// Won't execute because there is an asset holder.
|
|
assert_noop!(
|
|
Assets::set_min_balance(RuntimeOrigin::signed(1), id, 50),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
|
|
// Force asset status to make this a sufficient asset.
|
|
assert_ok!(Assets::force_asset_status(
|
|
RuntimeOrigin::root(),
|
|
id,
|
|
1,
|
|
1,
|
|
1,
|
|
1,
|
|
30,
|
|
true,
|
|
false
|
|
));
|
|
|
|
// Won't execute because there is an account holding the asset and the asset is marked as
|
|
// sufficient.
|
|
assert_noop!(
|
|
Assets::set_min_balance(RuntimeOrigin::signed(1), id, 10),
|
|
Error::<Test>::NoPermission
|
|
);
|
|
|
|
// Make the asset not sufficient.
|
|
assert_ok!(Assets::force_asset_status(
|
|
RuntimeOrigin::root(),
|
|
id,
|
|
1,
|
|
1,
|
|
1,
|
|
1,
|
|
60,
|
|
false,
|
|
false
|
|
));
|
|
|
|
// Will execute because the new value of min_balance is less than the
|
|
// old value. 10 < 30
|
|
assert_ok!(Assets::set_min_balance(RuntimeOrigin::signed(1), id, 10));
|
|
assert_eq!(Asset::<Test>::get(id).unwrap().min_balance, 10);
|
|
|
|
assert_ok!(Assets::burn(RuntimeOrigin::signed(1), id, 1, 100));
|
|
|
|
assert_ok!(Assets::set_min_balance(RuntimeOrigin::signed(1), id, 50));
|
|
assert_eq!(Asset::<Test>::get(id).unwrap().min_balance, 50);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn balance_conversion_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
use frame_support::traits::tokens::ConversionToAssetBalance;
|
|
|
|
let id = 42;
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), id, 1, true, 10));
|
|
let not_sufficient = 23;
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), not_sufficient, 1, false, 10));
|
|
assert_eq!(asset_ids(), vec![23, 42, 999]);
|
|
assert_eq!(
|
|
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(100, 1234),
|
|
Err(ConversionError::AssetMissing)
|
|
);
|
|
assert_eq!(
|
|
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(
|
|
100,
|
|
not_sufficient
|
|
),
|
|
Err(ConversionError::AssetNotSufficient)
|
|
);
|
|
// 10 / 1 == 10 -> the conversion should 10x the value
|
|
assert_eq!(
|
|
BalanceToAssetBalance::<Balances, Test, ConvertInto>::to_asset_balance(100, id),
|
|
Ok(100 * 10)
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn assets_from_genesis_should_exist() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_eq!(asset_ids(), vec![999]);
|
|
assert!(Metadata::<Test>::contains_key(999));
|
|
assert_eq!(Assets::balance(999, 1), 100);
|
|
assert_eq!(Assets::total_supply(999), 100);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn querying_name_symbol_and_decimals_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
use frame_support::traits::fungibles::metadata::Inspect;
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::force_set_metadata(
|
|
RuntimeOrigin::root(),
|
|
0,
|
|
vec![0u8; 10],
|
|
vec![1u8; 10],
|
|
12,
|
|
false
|
|
));
|
|
assert_eq!(Assets::name(0), vec![0u8; 10]);
|
|
assert_eq!(Assets::symbol(0), vec![1u8; 10]);
|
|
assert_eq!(Assets::decimals(0), 12);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn querying_allowance_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
use frame_support::traits::fungibles::approvals::{Inspect, Mutate};
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
Balances::make_free_balance_be(&1, 2);
|
|
assert_ok!(Assets::approve(0, &1, &2, 50));
|
|
assert_eq!(Assets::allowance(0, &1, &2), 50);
|
|
// Transfer asset 0, from owner 1 and delegate 2 to destination 3
|
|
assert_ok!(Assets::transfer_from(0, &1, &2, &3, 50));
|
|
assert_eq!(Assets::allowance(0, &1, &2), 0);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn transfer_large_asset() {
|
|
new_test_ext().execute_with(|| {
|
|
let amount = u64::pow(2, 63) + 2;
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, amount));
|
|
assert_ok!(Assets::transfer(RuntimeOrigin::signed(1), 0, 2, amount - 1));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn querying_roles_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
use frame_support::traits::fungibles::roles::Inspect;
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::set_team(
|
|
RuntimeOrigin::signed(1),
|
|
0,
|
|
// Issuer
|
|
2,
|
|
// Admin
|
|
3,
|
|
// Freezer
|
|
4,
|
|
));
|
|
assert_eq!(Assets::owner(0), Some(1));
|
|
assert_eq!(Assets::issuer(0), Some(2));
|
|
assert_eq!(Assets::admin(0), Some(3));
|
|
assert_eq!(Assets::freezer(0), Some(4));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn normal_asset_create_and_destroy_callbacks_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_none());
|
|
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
|
|
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
|
|
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_some());
|
|
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
|
|
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
// Callback still hasn't been invoked
|
|
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
|
|
|
|
assert_ok!(Assets::finish_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_some());
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn root_asset_create_should_work() {
|
|
new_test_ext().execute_with(|| {
|
|
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_none());
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert!(storage::get(AssetsCallbackHandle::CREATED.as_bytes()).is_some());
|
|
assert!(storage::get(AssetsCallbackHandle::DESTROYED.as_bytes()).is_none());
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn asset_create_and_destroy_is_reverted_if_callback_fails() {
|
|
new_test_ext().execute_with(|| {
|
|
// Asset creation fails due to callback failure
|
|
AssetsCallbackHandle::set_return_error();
|
|
Balances::make_free_balance_be(&1, 100);
|
|
assert_noop!(
|
|
Assets::create(RuntimeOrigin::signed(1), 0, 1, 1),
|
|
Error::<Test>::CallbackFailed
|
|
);
|
|
|
|
// Callback succeeds, so asset creation succeeds
|
|
AssetsCallbackHandle::set_return_ok();
|
|
assert_ok!(Assets::create(RuntimeOrigin::signed(1), 0, 1, 1));
|
|
|
|
// Asset destroy should fail due to callback failure
|
|
AssetsCallbackHandle::set_return_error();
|
|
assert_ok!(Assets::start_destroy(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_accounts(RuntimeOrigin::signed(1), 0));
|
|
assert_ok!(Assets::destroy_approvals(RuntimeOrigin::signed(1), 0));
|
|
assert_noop!(
|
|
Assets::finish_destroy(RuntimeOrigin::signed(1), 0),
|
|
Error::<Test>::CallbackFailed
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn multiple_transfer_alls_work_ok() {
|
|
new_test_ext().execute_with(|| {
|
|
// Only run PoC when the system pallet is enabled, since the underlying bug is in the
|
|
// system pallet it won't work with BalancesAccountStore
|
|
// Start with a balance of 100
|
|
Balances::force_set_balance(RuntimeOrigin::root(), 1, 100).unwrap();
|
|
// Emulate a sufficient, in reality this could be reached by transferring a sufficient
|
|
// asset to the account
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, true, 1));
|
|
assert_ok!(Assets::mint(RuntimeOrigin::signed(1), 0, 1, 100));
|
|
// Spend the same balance multiple times
|
|
assert_ok!(Balances::transfer_all(RuntimeOrigin::signed(1), 1337, false));
|
|
assert_ok!(Balances::transfer_all(RuntimeOrigin::signed(1), 1337, false));
|
|
|
|
assert_eq!(Balances::free_balance(&1), 0);
|
|
assert_eq!(Balances::free_balance(&1337), 100);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn weights_sane() {
|
|
let info = crate::Call::<Test>::create { id: 10, admin: 4, min_balance: 3 }.get_dispatch_info();
|
|
assert_eq!(<() as crate::WeightInfo>::create(), info.weight);
|
|
|
|
let info = crate::Call::<Test>::finish_destroy { id: 10 }.get_dispatch_info();
|
|
assert_eq!(<() as crate::WeightInfo>::finish_destroy(), info.weight);
|
|
}
|
|
|
|
#[test]
|
|
fn asset_destroy_refund_existence_deposit() {
|
|
new_test_ext().execute_with(|| {
|
|
assert_ok!(Assets::force_create(RuntimeOrigin::root(), 0, 1, false, 1));
|
|
Balances::make_free_balance_be(&1, 100);
|
|
let admin = 1;
|
|
let admin_origin = RuntimeOrigin::signed(admin);
|
|
|
|
let account2 = 2; // account with own deposit
|
|
let account3 = 3; // account with admin's deposit
|
|
Balances::make_free_balance_be(&account2, 100);
|
|
|
|
assert_eq!(Balances::reserved_balance(&account2), 0);
|
|
assert_eq!(Balances::reserved_balance(&account3), 0);
|
|
assert_eq!(Balances::reserved_balance(&admin), 0);
|
|
|
|
assert_ok!(Assets::touch(RuntimeOrigin::signed(account2), 0));
|
|
assert_ok!(Assets::touch_other(admin_origin.clone(), 0, account3));
|
|
|
|
assert_eq!(Balances::reserved_balance(&account2), 10);
|
|
assert_eq!(Balances::reserved_balance(&account3), 0);
|
|
assert_eq!(Balances::reserved_balance(&admin), 10);
|
|
|
|
assert_ok!(Assets::start_destroy(admin_origin.clone(), 0));
|
|
assert_ok!(Assets::destroy_accounts(admin_origin.clone(), 0));
|
|
assert_ok!(Assets::destroy_approvals(admin_origin.clone(), 0));
|
|
assert_ok!(Assets::finish_destroy(admin_origin.clone(), 0));
|
|
|
|
assert_eq!(Balances::reserved_balance(&account2), 0);
|
|
assert_eq!(Balances::reserved_balance(&account3), 0);
|
|
assert_eq!(Balances::reserved_balance(&admin), 0);
|
|
});
|
|
}
|