mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-09 21:08:01 +00:00
49b6dfd2e5
* Cargo.lock after merge * Restore scale-info feature * Fully qualify TypeInfo derive * Skip PendingSwap T * Add missing skip_type_params attr * metadata docs features * Reduce pallet event attribute to struct * Cargo.lock * Update frame/balances/src/tests_composite.rs Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> * Line widths check * Cargo.lock * Add scale-info/std * Update frame/system/src/lib.rs Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> * Use `skip_type_params` to remove `TypeInfo` requirements on checks * Revert "Remove unused Call metadata stuff" This reverts commit 41311f85 * Skip BalanceSwapAction type parameter * Remove unused event metadata macro * Update frame-metadata * Update primitives/npos-elections/compact/src/codec.rs Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> * Manual TypeInfo for Header * Remove TypeInfo requirement for consts in BoundedVec etc. * Another TypeInfo bound removed * review: fix indentation * TypeInfo impls for Identity types * Add some todos to add custom TypeInfo impls * Update frame/support/procedural/src/pallet/expand/pallet_struct.rs Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> * Add some todos to add custom TypeInfo impls * Add a test for manual Data TypeInfo impl * Add custom TypeInfo impl for Vote * Era custom TypeInfo crimes * Revert finality-grandpa version to 0.14.z * review: renamed module to pallet_constants_metadata * New line at end of file * Add missing scale-info/std * Update frame/support/src/storage/types/mod.rs Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> * Remove StorageEntryType::Map unused flag * Add missing scale-info dependency after merge * SignedExtension::AdditionalSigned metadata * Update frame-metadata, use abbreviated docs and args fields * Update frame/example/Cargo.toml Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> * Add scale_info/std and remove unused scale-info dependency * Remove scale-info dependency * Remove treasury pallet::metadata * Remove redundant Event test * Add back scale-info as dev dependency * fix error metadata when no error defined in decl_module * Add Module3 to tests * Fix metadata test * Add docs feature to frame-support test * WIP fixing pallet metadata test * Remove redundant FunctionMetadata, FunctionArgumentMetadata as per https://github.com/paritytech/frame-metadata/pull/20 * Use main branch of frame-metadata * Use patch of scale-info for latest changes * Use latest patched scale-info * Manual TypeInfo for DigestItem * Manual TypeInfo for DigestItem * Update scale-info * Skip __Ignore variants for Error, depends on https://github.com/paritytech/scale-info/pull/117 * Named fields for FRAME v2 pallet Call variants * Named fields for FRAME v1 pallet Call variants * Add missing scale-info dependency * WIP expand benchmark call variant * fix benchmark with new function create a new function for each variant of a pallet call. This function is called by benchmarking macro in order not to break call creation with unnamed argument * fix tests * more fix * Fix staking tests * Fix offchain workers calls * Cherry pick rustfmt.toml from master * cargo +nightly-2021-06-22 fmt --all * Update to new call variant structs * More call variant struct updates * Remove unused import * More call variant structs * More call variant structs * Even more call variant structs * Mooar variant structs * Evermore variant structs * Call variant structs ad infinitum * Fmt * More call variants * Last call variant * Call variants all done? * Fix SS58Prefix type * Potential workaround for BitFlags<IdentityFields> TypeInfo * Enable docs capturing for Call, Event, and Error types * Fix IdentityFields TypeInfo * Remove metadata-docs feature * Add capture_docs = true for legacy Call, Event and Error types * Fmt * Fix metadata test type * Update benchmarks with call struct variants * Fmt * More test fixes * Fmt * Fix benches * Use latest capture_docs attr * Latest scale_info * Fmt * review: change &Vec to &[] * Remove pallet metadata attr * review: remove commented out test code * review: skip_type_params trailing comma suggestion * Update to scale-info 0.10.0 * Update construct_runtime ui tests, different because of metadata TypeInfo impls * Add some TypeInfo derives for UI tests * Update storage ensure span ui stderrs * Update call argument bound ui tests Possibly changed because change from tuple to struct variants? * Add scale-info dev dependency * Update to latest finality-grandpa release * review: missing newline * review: missing scale-info/std * review: remove duplicate scale-info/std * review: remove fully qualified TypeInfo * review: add missing scale-info/std * review: remove unnecessary imports. * Fmt * Use crates.io RC version of frame-metadata * Remove scale-info/std because it is a dev dependency * Add missing scale_info dev-dependency for test * Delete empty metadata folder * Fix sp_std import * review: improve manual UncheckedExtrinsic TypeInfo impl * review: use full scale-info for dev-dependency * Remove DefaultByteGetter impl * review: derive TypeInfo for generic header * Fmt * Update primitives/runtime/src/generic/unchecked_extrinsic.rs Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> * Update primitives/runtime/src/generic/unchecked_extrinsic.rs Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> * Update bin/node/executor/Cargo.toml Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com> * Update frame/identity/src/types.rs Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com> * Update frame/support/src/dispatch.rs Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com> * Remove redundant derive * Simplify scale-info dependency * Strip underscore prefix from call variant struct names * Another underscore field * More underscore fields * Another underscore field * Update to frame-metadata 14.0.0-rc.2 with combined StorageEntryType::Map * Fmt * Revert weights formatting * Fix up some tests * Fix up some tests for StorageEntryTypeMetadata * scale-info dev dependency * Fix test error * Add missing TypeInfo derives * Add back missing scale-info dependency * Add back missing scale-info dependency * Fix npos compact impls * Cargo.lock * Fmt * Fix errors * Fmt * Fix renamed raw_solution field * Fix error * Fmt * Fix some benchmarks * Fmt * Stray R * Fix * Add missing TypeInfos * ui test fix * Fix line widths * Revert "ui test fix" This reverts commit 2d15ec058a216e3f92d713f1174603a2bb1eac65. * Upgrade to scale-info 0.11.0 * Revert "Upgrade to scale-info 0.11.0" This reverts commit 047bb179085a0059c36cd20ab405f55cf0867e28. * Add Runtime type * Update to scale-info 0.12 * Update to scale-info 1.0 * Update frame-metadata to version 14.0.0 * Patch finality-grandpa until release available * Fix metadata tests * Fix metadata tests * Fmt * Remove patched finality-grandpa * Fix tests, use scale_info imports * Fix pallet tests * Add BlockNumber TypeInfo bound * ui test fix * Cargo.lock * Remove pallet metadata * Cargo.lock * Add missing scale-info dependency * Remove pallet event metadata * Fix error * Fix collective errors * Semicolol * Fmt * Remove another metadata attribute * Add new variant to custom digest TypeInfo * Fmt * Cargo.lock from master * Remove comma lol * Fix example call error * Fix example call error properly Co-authored-by: Guillaume Thiolliere <gui.thiolliere@gmail.com> Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> Co-authored-by: Shawn Tabrizi <shawntabrizi@gmail.com> Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com>
167 lines
6.3 KiB
Rust
167 lines
6.3 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2020-2021 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Tests for the module.
|
|
|
|
use super::*;
|
|
use frame_support::{assert_noop, assert_ok};
|
|
use mock::{
|
|
new_test_ext, Call, Event as TestEvent, Logger, LoggerCall, Origin, Sudo, SudoCall, System,
|
|
Test,
|
|
};
|
|
|
|
#[test]
|
|
fn test_setup_works() {
|
|
// Environment setup, logger storage, and sudo `key` retrieval should work as expected.
|
|
new_test_ext(1).execute_with(|| {
|
|
assert_eq!(Sudo::key(), 1u64);
|
|
assert!(Logger::i32_log().is_empty());
|
|
assert!(Logger::account_log().is_empty());
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_basics() {
|
|
// Configure a default test environment and set the root `key` to 1.
|
|
new_test_ext(1).execute_with(|| {
|
|
// A privileged function should work when `sudo` is passed the root `key` as `origin`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1_000 }));
|
|
assert_ok!(Sudo::sudo(Origin::signed(1), call));
|
|
assert_eq!(Logger::i32_log(), vec![42i32]);
|
|
|
|
// A privileged function should not work when `sudo` is passed a non-root `key` as `origin`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1_000 }));
|
|
assert_noop!(Sudo::sudo(Origin::signed(2), call), Error::<Test>::RequireSudo);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_emits_events_correctly() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// Set block number to 1 because events are not emitted on block 0.
|
|
System::set_block_number(1);
|
|
|
|
// Should emit event to indicate success when called with the root `key` and `call` is `Ok`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1 }));
|
|
assert_ok!(Sudo::sudo(Origin::signed(1), call));
|
|
System::assert_has_event(TestEvent::Sudo(Event::Sudid(Ok(()))));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_unchecked_weight_basics() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// A privileged function should work when `sudo` is passed the root `key` as origin.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1_000 }));
|
|
assert_ok!(Sudo::sudo_unchecked_weight(Origin::signed(1), call, 1_000));
|
|
assert_eq!(Logger::i32_log(), vec![42i32]);
|
|
|
|
// A privileged function should not work when called with a non-root `key`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1_000 }));
|
|
assert_noop!(
|
|
Sudo::sudo_unchecked_weight(Origin::signed(2), call, 1_000),
|
|
Error::<Test>::RequireSudo,
|
|
);
|
|
// `I32Log` is unchanged after unsuccessful call.
|
|
assert_eq!(Logger::i32_log(), vec![42i32]);
|
|
|
|
// Controls the dispatched weight.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1 }));
|
|
let sudo_unchecked_weight_call = SudoCall::sudo_unchecked_weight { call, weight: 1_000 };
|
|
let info = sudo_unchecked_weight_call.get_dispatch_info();
|
|
assert_eq!(info.weight, 1_000);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_unchecked_weight_emits_events_correctly() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// Set block number to 1 because events are not emitted on block 0.
|
|
System::set_block_number(1);
|
|
|
|
// Should emit event to indicate success when called with the root `key` and `call` is `Ok`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1 }));
|
|
assert_ok!(Sudo::sudo_unchecked_weight(Origin::signed(1), call, 1_000));
|
|
System::assert_has_event(TestEvent::Sudo(Event::Sudid(Ok(()))));
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn set_key_basics() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// A root `key` can change the root `key`
|
|
assert_ok!(Sudo::set_key(Origin::signed(1), 2));
|
|
assert_eq!(Sudo::key(), 2u64);
|
|
});
|
|
|
|
new_test_ext(1).execute_with(|| {
|
|
// A non-root `key` will trigger a `RequireSudo` error and a non-root `key` cannot change
|
|
// the root `key`.
|
|
assert_noop!(Sudo::set_key(Origin::signed(2), 3), Error::<Test>::RequireSudo);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn set_key_emits_events_correctly() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// Set block number to 1 because events are not emitted on block 0.
|
|
System::set_block_number(1);
|
|
|
|
// A root `key` can change the root `key`.
|
|
assert_ok!(Sudo::set_key(Origin::signed(1), 2));
|
|
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged(1)));
|
|
// Double check.
|
|
assert_ok!(Sudo::set_key(Origin::signed(2), 4));
|
|
System::assert_has_event(TestEvent::Sudo(Event::KeyChanged(2)));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_as_basics() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// A privileged function will not work when passed to `sudo_as`.
|
|
let call = Box::new(Call::Logger(LoggerCall::privileged_i32_log { i: 42, weight: 1_000 }));
|
|
assert_ok!(Sudo::sudo_as(Origin::signed(1), 2, call));
|
|
assert!(Logger::i32_log().is_empty());
|
|
assert!(Logger::account_log().is_empty());
|
|
|
|
// A non-privileged function should not work when called with a non-root `key`.
|
|
let call = Box::new(Call::Logger(LoggerCall::non_privileged_log { i: 42, weight: 1 }));
|
|
assert_noop!(Sudo::sudo_as(Origin::signed(3), 2, call), Error::<Test>::RequireSudo);
|
|
|
|
// A non-privileged function will work when passed to `sudo_as` with the root `key`.
|
|
let call = Box::new(Call::Logger(LoggerCall::non_privileged_log { i: 42, weight: 1 }));
|
|
assert_ok!(Sudo::sudo_as(Origin::signed(1), 2, call));
|
|
assert_eq!(Logger::i32_log(), vec![42i32]);
|
|
// The correct user makes the call within `sudo_as`.
|
|
assert_eq!(Logger::account_log(), vec![2]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn sudo_as_emits_events_correctly() {
|
|
new_test_ext(1).execute_with(|| {
|
|
// Set block number to 1 because events are not emitted on block 0.
|
|
System::set_block_number(1);
|
|
|
|
// A non-privileged function will work when passed to `sudo_as` with the root `key`.
|
|
let call = Box::new(Call::Logger(LoggerCall::non_privileged_log { i: 42, weight: 1 }));
|
|
assert_ok!(Sudo::sudo_as(Origin::signed(1), 2, call));
|
|
System::assert_has_event(TestEvent::Sudo(Event::SudoAsDone(Ok(()))));
|
|
});
|
|
}
|