* Start cosmos-sdk v0.47 integration (#1136) * Upgrade to sdk v0.47 branch * More integration work * SDK version upgrade; fixes * More fixes * Fixes * Deactivate failing tests * SDK + ibc-go version upgrades * limix gas fix (cherry picked from commit f7f841768e5051d96d243b42ce4f231a33020326) * with valset in bench (cherry picked from commit 35b2a8fd2c23d6160fca540771fd348913f7f143) * Revert staking query handler; fix tests * Minor cleanup * Rebased * Address linter issues * Set legacy router proper * Deactivate failing test. Race condition needs to handled in SDK * Address some code smells * Bump sdk version * Use gov v1 internally for votes * Activate test after sdk fix * Add group test * Add config template for wasm fields * Add Rust backtrace flag for more debug output on simulations * Set unique node folder for tests * Revert "Add Rust backtrace flag for more debug output on simulations" This reverts commit 218c3c6ce137dc02f7bc38391408d3460fb27e6f. * Simulations * Run also im/export + deterministic sims * Add package prefix to interfaces * Add signer annotation (https://github.com/cosmos/cosmos-sdk/issues/10933), minor cleanup * Bump sdk version * Review comments Co-authored-by: vuong <nguyenvuong1122000@gmail.com> * Bump bufbuild/buf-setup-action from 1.11.0 to 1.12.0 Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.11.0 to 1.12.0. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.11.0...v1.12.0) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> (cherry picked from commitf4905955b5) * Remove intertx for vanilla ICA * fix msg format in EVENTS.md (cherry picked from commit38d466adfd) * Better to sdk coin convertion (#1164) * Better to sdk coin convertion * Review feedback (cherry picked from commita925a9ed61) * Disallow only address permission (#1163) * Remove AccessTypeOnlyAddress for store msg * Remove AccessTypeOnlyAddress for update config msg * Review feedback Co-authored-by: Simon Warta <2603011+webmaster128@users.noreply.github.com> Co-authored-by: Simon Warta <2603011+webmaster128@users.noreply.github.com> (cherry picked from commit8991633de2) * Integrate wasmvm v1.2.0 (backport #1161) (#1175) * Integrate wasmvm v1.2.0 (#1161) * Bump wasmvm version * Bump wasm test contracts * Encode weighted votes * Encode instantiate2 * Handle code info query; better wasmvm errors * Fix readme * Make linter happy * add non cgo build * Review comments * Bump wasmvm to release version Co-authored-by: jhernandezb <contact@jhernandez.me> (cherry picked from commit957b38e0a5) # Conflicts: # x/wasm/keeper/handler_plugin_encoders.go # x/wasm/keeper/handler_plugin_encoders_test.go # x/wasm/keeper/keeper.go # x/wasm/keeper/keeper_test.go * Adress merge conflicts Co-authored-by: Alexander Peters <alpe@users.noreply.github.com> * Bump bufbuild/buf-setup-action from 1.12.0 to 1.13.0 Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.12.0 to 1.13.0. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.12.0...v1.13.0) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> (cherry picked from commitffa0e5e5e1) * Emit events for setContractAdmin + setAccessConfig (#1179) (cherry picked from commitc9e7830ac1) * Dependency upgrades (#1172) * Bump sdk version to lastest * Bump ibc-go version to lastest * Remove channel hack * Update to ibc-go v7 + protoVer=0.11.5 * Bump bufbuild/buf-setup-action from 1.13.0 to 1.13.1 Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.13.0 to 1.13.1. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.13.0...v1.13.1) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> (cherry picked from commitde27e7f82f) * Fix typos (backport #1185) (#1194) * Fix typos (cherry picked from commitc88b8194cb) # Conflicts: # proto/cosmwasm/wasm/v1/tx.proto * Fix merge conflict --------- Co-authored-by: Alex Peters <alpe@users.noreply.github.com> * Bump bufbuild/buf-setup-action from 1.13.1 to 1.14.0 (#1200) Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.13.1 to 1.14.0. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.13.1...v1.14.0) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> (cherry picked from commitf3fc31c386) * list-contract-by-code bugfix (cherry picked from commit2ccffed778) * fix: stargate querier does not reset the state (cherry picked from commitfd0323541d) * test: add unit test (cherry picked from commit6d8018ac59) * Add Windows client support (#1197) * Add Windows client support * Separate server and windows client --------- Co-authored-by: Alex Peters <alpe@users.noreply.github.com> (cherry picked from commit8a20779518) * Bump bufbuild/buf-setup-action from 1.14.0 to 1.15.0 Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.14.0 to 1.15.0. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.14.0...v1.15.0) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> (cherry picked from commite5fab3da5a) * Rename windows client binary (cherry picked from commitde09c7fe2b) * Return IBC packet sequence number (backport #1225) (#1233) * Return IBC packet sequence number (#1225) * Return IBC packet sequence number * Fix review feedbacks * Remove names to return values in DispatchMsg method * Fix comments (cherry picked from commit4f1c57fc12) # Conflicts: # x/wasm/keeper/handler_plugin.go * Fix merge conflict --------- Co-authored-by: pinosu <95283998+pinosu@users.noreply.github.com> Co-authored-by: Alex Peters <alpe@users.noreply.github.com> * Test rust panic for regression (cherry picked from commita52e604966) * Fix client checksum verification (#1234) * Fix client checksum verification * Review comments (cherry picked from commit1a8019b380) # Conflicts: # x/wasm/client/cli/gov_tx.go * Fix merge conflict * Fix linters * Configure sonarcloud analysis (cherry picked from commit85cf1614fb) * Bump bufbuild/buf-setup-action from 1.15.0 to 1.15.1 Bumps [bufbuild/buf-setup-action](https://github.com/bufbuild/buf-setup-action) from 1.15.0 to 1.15.1. - [Release notes](https://github.com/bufbuild/buf-setup-action/releases) - [Commits](https://github.com/bufbuild/buf-setup-action/compare/v1.15.0...v1.15.1) --- updated-dependencies: - dependency-name: bufbuild/buf-setup-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> (cherry picked from commit730ea5a1cf) * Make `CaptureIbcEvents` in ibctesting public. Before this change, it wasn't possible to implement the `chain.SendMsgs` method without [copying](https://github.com/public-awesome/ics721/blob/main/e2e/suite_helpers.go#L81-L98) them over. (cherry picked from commitb64fa078a3) * Upgrade to wasmvm 1.2.1 (backport #1245) (#1254) * Upgrade to wasmvm 1.2.1 (#1245) * Use wasmvm store adapter * Bump wasmvm to v1.2.1 (cherry picked from commit850f901b2e) # Conflicts: # go.mod # go.sum # x/wasm/keeper/keeper.go * Resolve conflicts --------- Co-authored-by: Alexander Peters <alpe@users.noreply.github.com> * WIP All cometbft (#1244) * Dep upgrade; use CometBft * Remove duplicte message events * Add changelog for v0.31.0 (#1188) * Start changelog for v0.31.0 * Add ICA upgrade * Add proto version link to buf.build * Update changelog (#1239) * Update changelog * Update changelog with latest changes * Set release date --------- Co-authored-by: pinosu <95283998+pinosu@users.noreply.github.com> (cherry picked from commitbc0e817912) * Remove new message type event * Support msg update params gov proposal (#1247) * Add MsgUpdateParams support * Implement UpdateParams msg * Fix test UpdateParams * Add migration test * Fix * Fix lint issues * Revert changes according to review feedback * Remove more x/params dependencies * Remove x/params from genesis test * Formatting * Restore old changes * fix lint * Fix tests and restructure migrations * Rename alias for convention --------- Co-authored-by: Alex Peters <alpe@users.noreply.github.com> * Fix test data generator (#1263) * linting 47 pr (#1261) * lint cosmwasm for sdk 47 * fix * remove setGenesis * remove additional unused functions * pass tests * use SDK's errors module * unecessary conversions * unnecessary conversions * remove unneeded event manager * complete linting of tests for 47 * add test for reimportation * check errors * Update x/wasm/keeper/proposal_integration_test.go Co-authored-by: Alexander Peters <alpe@users.noreply.github.com> * apply suggestion * suggestions * lints * don't return error in when making new transactions * no todo's in the code * Fix test data generator * Update x/wasm/types/genesis_test.go Co-authored-by: Alexander Peters <alpe@users.noreply.github.com> * use the full string invalid address (2 words) always --------- Co-authored-by: Alexander Peters <alpe@users.noreply.github.com> * Regenerate from proto; remove dead code; polish code * Set SDK version to v0.47x.0 (#1262) * Set SDK version to v0.47x.0 * Set chainID * Minor updates * Set chainID for simulations * Buf mod update * Use sdk tag instead of hash in buf * Bump ibc-go to v7.0.0 * faddat/re merge main (#1274) undefined --------- Co-authored-by: vuong <nguyenvuong1122000@gmail.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: llllllluc <58892938+llllllluc@users.noreply.github.com> Co-authored-by: mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> Co-authored-by: Gjermund Garaba <gjermund@garaba.net> Co-authored-by: Nikhil Suri <nikhilsuri@comcast.net> Co-authored-by: Paul <p22626262@gmail.com> Co-authored-by: pinosu <95283998+pinosu@users.noreply.github.com> Co-authored-by: ekez <zekemedley@gmail.com> Co-authored-by: Jacob Gadikian <jacobgadikian@gmail.com>
927 lines
30 KiB
Go
927 lines
30 KiB
Go
package keeper
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"errors"
|
|
"os"
|
|
"testing"
|
|
|
|
wasmvm "github.com/CosmWasm/wasmvm"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
govkeeper "github.com/cosmos/cosmos-sdk/x/gov/keeper"
|
|
govtypes "github.com/cosmos/cosmos-sdk/x/gov/types"
|
|
v1 "github.com/cosmos/cosmos-sdk/x/gov/types/v1"
|
|
"github.com/cosmos/cosmos-sdk/x/gov/types/v1beta1"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/CosmWasm/wasmd/x/wasm/keeper/wasmtesting"
|
|
"github.com/CosmWasm/wasmd/x/wasm/types"
|
|
)
|
|
|
|
const myTestLabel = "testing"
|
|
|
|
func TestStoreCodeProposal(t *testing.T) {
|
|
parentCtx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(parentCtx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
rawWasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
gzippedWasmCode, err := os.ReadFile("./testdata/hackatom.wasm.gzip")
|
|
require.NoError(t, err)
|
|
checksum, err := hex.DecodeString("beb3de5e9b93b52e514c74ce87ccddb594b9bcd33b7f1af1bb6da63fc883917b")
|
|
require.NoError(t, err)
|
|
|
|
specs := map[string]struct {
|
|
codeID int64
|
|
code []byte
|
|
unpinCode bool
|
|
}{
|
|
"upload with pinning (default)": {
|
|
unpinCode: false,
|
|
code: rawWasmCode,
|
|
},
|
|
"upload with code unpin": {
|
|
unpinCode: true,
|
|
code: rawWasmCode,
|
|
},
|
|
"upload with raw wasm code": {
|
|
code: rawWasmCode,
|
|
},
|
|
"upload with zipped wasm code": {
|
|
code: gzippedWasmCode,
|
|
},
|
|
}
|
|
|
|
for msg, spec := range specs {
|
|
t.Run(msg, func(t *testing.T) {
|
|
ctx, _ := parentCtx.CacheContext()
|
|
myActorAddress := RandomBech32AccountAddress(t)
|
|
|
|
src := types.StoreCodeProposalFixture(func(p *types.StoreCodeProposal) {
|
|
p.RunAs = myActorAddress
|
|
p.WASMByteCode = spec.code
|
|
p.UnpinCode = spec.unpinCode
|
|
p.CodeHash = checksum
|
|
})
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx, src, myActorAddress, keepers)
|
|
|
|
// then
|
|
cInfo := wasmKeeper.GetCodeInfo(ctx, 1)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, myActorAddress, cInfo.Creator)
|
|
assert.Equal(t, !spec.unpinCode, wasmKeeper.IsPinnedCode(ctx, 1))
|
|
|
|
storedCode, err := wasmKeeper.GetByteCode(ctx, 1)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, rawWasmCode, storedCode)
|
|
})
|
|
}
|
|
}
|
|
|
|
func mustSubmitAndExecuteLegacyProposal(t *testing.T, ctx sdk.Context, content v1beta1.Content, myActorAddress string, keepers TestKeepers) {
|
|
t.Helper()
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
// ignore all submit events
|
|
contentMsg, err := submitLegacyProposal(t, ctx.WithEventManager(sdk.NewEventManager()), content, myActorAddress, govAuthority, msgServer)
|
|
require.NoError(t, err)
|
|
|
|
_, err = msgServer.ExecLegacyContent(sdk.WrapSDKContext(ctx), v1.NewMsgExecLegacyContent(contentMsg.Content, govAuthority))
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// does not fail on submit proposal
|
|
func submitLegacyProposal(t *testing.T, ctx sdk.Context, content v1beta1.Content, myActorAddress string, govAuthority string, msgServer v1.MsgServer) (*v1.MsgExecLegacyContent, error) {
|
|
t.Helper()
|
|
contentMsg, err := v1.NewLegacyContent(content, govAuthority)
|
|
require.NoError(t, err)
|
|
|
|
proposal, err := v1.NewMsgSubmitProposal(
|
|
[]sdk.Msg{contentMsg},
|
|
sdk.Coins{},
|
|
myActorAddress,
|
|
"",
|
|
"my title",
|
|
"my description",
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
// when stored
|
|
_, err = msgServer.SubmitProposal(sdk.WrapSDKContext(ctx), proposal)
|
|
return contentMsg, err
|
|
}
|
|
|
|
func TestInstantiateProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, wasmKeeper.importCode(ctx, 1,
|
|
types.CodeInfoFixture(types.WithSHA256CodeHash(wasmCode)),
|
|
wasmCode),
|
|
)
|
|
|
|
var (
|
|
oneAddress sdk.AccAddress = bytes.Repeat([]byte{0x1}, types.ContractAddrLen)
|
|
otherAddress sdk.AccAddress = bytes.Repeat([]byte{0x2}, types.ContractAddrLen)
|
|
)
|
|
src := types.InstantiateContractProposalFixture(func(p *types.InstantiateContractProposal) {
|
|
p.CodeID = firstCodeID
|
|
p.RunAs = oneAddress.String()
|
|
p.Admin = otherAddress.String()
|
|
p.Label = myTestLabel
|
|
})
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, oneAddress.String(), keepers)
|
|
|
|
// then
|
|
contractAddr, err := sdk.AccAddressFromBech32("cosmos14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9s4hmalr")
|
|
require.NoError(t, err)
|
|
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddr)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, uint64(1), cInfo.CodeID)
|
|
assert.Equal(t, oneAddress.String(), cInfo.Creator)
|
|
assert.Equal(t, otherAddress.String(), cInfo.Admin)
|
|
assert.Equal(t, myTestLabel, cInfo.Label)
|
|
expHistory := []types.ContractCodeHistoryEntry{{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: src.CodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
Msg: src.Msg,
|
|
}}
|
|
assert.Equal(t, expHistory, wasmKeeper.GetContractHistory(ctx, contractAddr))
|
|
// and event
|
|
require.Len(t, em.Events(), 3, "%#v", em.Events())
|
|
require.Equal(t, types.EventTypeInstantiate, em.Events()[0].Type)
|
|
require.Equal(t, types.WasmModuleEventType, em.Events()[1].Type)
|
|
require.Equal(t, types.EventTypeGovContractResult, em.Events()[2].Type)
|
|
require.Len(t, em.Events()[2].Attributes, 1)
|
|
require.NotEmpty(t, em.Events()[2].Attributes[0])
|
|
}
|
|
|
|
func TestInstantiate2Proposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
codeInfo := types.CodeInfoFixture(types.WithSHA256CodeHash(wasmCode))
|
|
err = wasmKeeper.importCode(ctx, 1, codeInfo, wasmCode)
|
|
require.NoError(t, err)
|
|
|
|
var (
|
|
oneAddress sdk.AccAddress = bytes.Repeat([]byte{0x1}, types.ContractAddrLen)
|
|
otherAddress sdk.AccAddress = bytes.Repeat([]byte{0x2}, types.ContractAddrLen)
|
|
label = "label"
|
|
salt = []byte("mySalt")
|
|
)
|
|
src := types.InstantiateContract2ProposalFixture(func(p *types.InstantiateContract2Proposal) {
|
|
p.CodeID = firstCodeID
|
|
p.RunAs = oneAddress.String()
|
|
p.Admin = otherAddress.String()
|
|
p.Label = label
|
|
p.Salt = salt
|
|
})
|
|
contractAddress := BuildContractAddressPredictable(codeInfo.CodeHash, oneAddress, salt, []byte{})
|
|
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, oneAddress.String(), keepers)
|
|
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddress)
|
|
require.NotNil(t, cInfo)
|
|
|
|
assert.Equal(t, uint64(1), cInfo.CodeID)
|
|
assert.Equal(t, oneAddress.String(), cInfo.Creator)
|
|
assert.Equal(t, otherAddress.String(), cInfo.Admin)
|
|
assert.Equal(t, "label", cInfo.Label)
|
|
expHistory := []types.ContractCodeHistoryEntry{{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: src.CodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
Msg: src.Msg,
|
|
}}
|
|
assert.Equal(t, expHistory, wasmKeeper.GetContractHistory(ctx, contractAddress))
|
|
// and event
|
|
require.Len(t, em.Events(), 3, prettyEvents(t, em.Events()))
|
|
require.Equal(t, types.EventTypeInstantiate, em.Events()[0].Type)
|
|
require.Equal(t, types.WasmModuleEventType, em.Events()[1].Type)
|
|
require.Equal(t, types.EventTypeGovContractResult, em.Events()[2].Type)
|
|
require.Len(t, em.Events()[2].Attributes, 1)
|
|
require.NotEmpty(t, em.Events()[2].Attributes[0])
|
|
}
|
|
|
|
func TestInstantiateProposal_NoAdmin(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, wasmKeeper.importCode(ctx, 1,
|
|
types.CodeInfoFixture(types.WithSHA256CodeHash(wasmCode)),
|
|
wasmCode),
|
|
)
|
|
|
|
var oneAddress sdk.AccAddress = bytes.Repeat([]byte{0x1}, types.ContractAddrLen)
|
|
|
|
specs := map[string]struct {
|
|
srcAdmin string
|
|
expErr bool
|
|
}{
|
|
"empty admin": {
|
|
srcAdmin: "",
|
|
},
|
|
"invalid admin": {
|
|
srcAdmin: "invalid",
|
|
expErr: true,
|
|
},
|
|
}
|
|
for name, spec := range specs {
|
|
t.Run(name, func(t *testing.T) {
|
|
src := types.InstantiateContractProposalFixture(func(p *types.InstantiateContractProposal) {
|
|
p.CodeID = firstCodeID
|
|
p.RunAs = oneAddress.String()
|
|
p.Admin = spec.srcAdmin
|
|
p.Label = myTestLabel
|
|
})
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
// when
|
|
contentMsg, gotErr := submitLegacyProposal(t, ctx, src, oneAddress.String(), govAuthority, msgServer)
|
|
// then
|
|
if spec.expErr {
|
|
require.Error(t, gotErr)
|
|
return
|
|
}
|
|
require.NoError(t, gotErr)
|
|
// and when
|
|
em := sdk.NewEventManager()
|
|
_, err = msgServer.ExecLegacyContent(sdk.WrapSDKContext(ctx.WithEventManager(em)), v1.NewMsgExecLegacyContent(contentMsg.Content, govAuthority))
|
|
// then
|
|
require.NoError(t, err)
|
|
contractAddr, err := sdk.AccAddressFromBech32("cosmos14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9s4hmalr")
|
|
require.NoError(t, err)
|
|
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddr)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, uint64(1), cInfo.CodeID)
|
|
assert.Equal(t, oneAddress.String(), cInfo.Creator)
|
|
assert.Equal(t, "", cInfo.Admin)
|
|
assert.Equal(t, myTestLabel, cInfo.Label)
|
|
expHistory := []types.ContractCodeHistoryEntry{{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: src.CodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
Msg: src.Msg,
|
|
}}
|
|
assert.Equal(t, expHistory, wasmKeeper.GetContractHistory(ctx, contractAddr))
|
|
// and event
|
|
require.Len(t, em.Events(), 3, "%#v", em.Events())
|
|
require.Equal(t, types.EventTypeInstantiate, em.Events()[0].Type)
|
|
require.Equal(t, types.WasmModuleEventType, em.Events()[1].Type)
|
|
require.Equal(t, types.EventTypeGovContractResult, em.Events()[2].Type)
|
|
require.Len(t, em.Events()[2].Attributes, 1)
|
|
require.NotEmpty(t, em.Events()[2].Attributes[0])
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestStoreAndInstantiateContractProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
checksum, err := hex.DecodeString("beb3de5e9b93b52e514c74ce87ccddb594b9bcd33b7f1af1bb6da63fc883917b")
|
|
require.NoError(t, err)
|
|
|
|
var (
|
|
oneAddress sdk.AccAddress = bytes.Repeat([]byte{0x1}, types.ContractAddrLen)
|
|
otherAddress sdk.AccAddress = bytes.Repeat([]byte{0x2}, types.ContractAddrLen)
|
|
)
|
|
|
|
src := types.StoreAndInstantiateContractProposalFixture(func(p *types.StoreAndInstantiateContractProposal) {
|
|
p.WASMByteCode = wasmCode
|
|
p.RunAs = oneAddress.String()
|
|
p.Admin = otherAddress.String()
|
|
p.Label = myTestLabel
|
|
p.CodeHash = checksum
|
|
})
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, oneAddress.String(), keepers)
|
|
|
|
// then
|
|
contractAddr, err := sdk.AccAddressFromBech32("cosmos14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9s4hmalr")
|
|
require.NoError(t, err)
|
|
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddr)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, oneAddress.String(), cInfo.Creator)
|
|
assert.Equal(t, otherAddress.String(), cInfo.Admin)
|
|
assert.Equal(t, myTestLabel, cInfo.Label)
|
|
expHistory := []types.ContractCodeHistoryEntry{{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: cInfo.CodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
Msg: src.Msg,
|
|
}}
|
|
assert.Equal(t, expHistory, wasmKeeper.GetContractHistory(ctx, contractAddr))
|
|
// and event
|
|
require.Len(t, em.Events(), 5, "%#v", em.Events())
|
|
require.Equal(t, types.EventTypeStoreCode, em.Events()[0].Type)
|
|
require.Equal(t, types.EventTypePinCode, em.Events()[1].Type)
|
|
require.Equal(t, types.EventTypeInstantiate, em.Events()[2].Type)
|
|
require.Equal(t, types.WasmModuleEventType, em.Events()[3].Type)
|
|
require.Equal(t, types.EventTypeGovContractResult, em.Events()[4].Type)
|
|
require.Len(t, em.Events()[4].Attributes, 1)
|
|
require.NotEmpty(t, em.Events()[4].Attributes[0])
|
|
}
|
|
|
|
func TestMigrateProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
codeInfoFixture := types.CodeInfoFixture(types.WithSHA256CodeHash(wasmCode))
|
|
require.NoError(t, wasmKeeper.importCode(ctx, 1, codeInfoFixture, wasmCode))
|
|
require.NoError(t, wasmKeeper.importCode(ctx, 2, codeInfoFixture, wasmCode))
|
|
|
|
var (
|
|
anyAddress = DeterministicAccountAddress(t, 1)
|
|
otherAddress = DeterministicAccountAddress(t, 2)
|
|
contractAddr = BuildContractAddressClassic(1, 1)
|
|
)
|
|
|
|
contractInfo := types.ContractInfoFixture(func(c *types.ContractInfo) {
|
|
c.Label = myTestLabel
|
|
c.Admin = anyAddress.String()
|
|
c.Created = types.NewAbsoluteTxPosition(ctx)
|
|
})
|
|
entries := []types.ContractCodeHistoryEntry{
|
|
{Operation: types.ContractCodeHistoryOperationTypeInit, CodeID: 1, Updated: contractInfo.Created},
|
|
}
|
|
key, err := hex.DecodeString("636F6E666967")
|
|
require.NoError(t, err)
|
|
m := types.Model{Key: key, Value: []byte(`{"verifier":"AAAAAAAAAAAAAAAAAAAAAAAAAAA=","beneficiary":"AAAAAAAAAAAAAAAAAAAAAAAAAAA=","funder":"AQEBAQEBAQEBAQEBAQEBAQEBAQE="}`)}
|
|
require.NoError(t, wasmKeeper.importContract(ctx, contractAddr, &contractInfo, []types.Model{m}, entries))
|
|
|
|
migMsg := struct {
|
|
Verifier sdk.AccAddress `json:"verifier"`
|
|
}{Verifier: otherAddress}
|
|
migMsgBz, err := json.Marshal(migMsg)
|
|
require.NoError(t, err)
|
|
|
|
src := &types.MigrateContractProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
CodeID: 2,
|
|
Contract: contractAddr.String(),
|
|
Msg: migMsgBz,
|
|
}
|
|
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, anyAddress.String(), keepers)
|
|
|
|
// then
|
|
require.NoError(t, err)
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddr)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, uint64(2), cInfo.CodeID)
|
|
assert.Equal(t, anyAddress.String(), cInfo.Admin)
|
|
assert.Equal(t, myTestLabel, cInfo.Label)
|
|
expHistory := []types.ContractCodeHistoryEntry{{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: firstCodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
}, {
|
|
Operation: types.ContractCodeHistoryOperationTypeMigrate,
|
|
CodeID: src.CodeID,
|
|
Updated: types.NewAbsoluteTxPosition(ctx),
|
|
Msg: src.Msg,
|
|
}}
|
|
assert.Equal(t, expHistory, wasmKeeper.GetContractHistory(ctx, contractAddr))
|
|
// and events emitted
|
|
require.Len(t, em.Events(), 2)
|
|
assert.Equal(t, types.EventTypeMigrate, em.Events()[0].Type)
|
|
require.Equal(t, types.EventTypeGovContractResult, em.Events()[1].Type)
|
|
require.Len(t, em.Events()[1].Attributes, 1)
|
|
assert.Equal(t, types.AttributeKeyResultDataHex, em.Events()[1].Attributes[0].Key)
|
|
}
|
|
|
|
func TestExecuteProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
bankKeeper := keepers.BankKeeper
|
|
|
|
exampleContract := InstantiateHackatomExampleContract(t, ctx, keepers)
|
|
contractAddr := exampleContract.Contract
|
|
|
|
// check balance
|
|
bal := bankKeeper.GetBalance(ctx, contractAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(100))
|
|
|
|
releaseMsg := struct {
|
|
Release struct{} `json:"release"`
|
|
}{}
|
|
releaseMsgBz, err := json.Marshal(releaseMsg)
|
|
require.NoError(t, err)
|
|
|
|
// try with runAs that doesn't have pemission
|
|
badSrc := &types.ExecuteContractProposal{
|
|
Title: "First",
|
|
Description: "Beneficiary has no permission to run",
|
|
Contract: contractAddr.String(),
|
|
Msg: releaseMsgBz,
|
|
RunAs: exampleContract.BeneficiaryAddr.String(),
|
|
}
|
|
|
|
// fails on store - this doesn't have permission
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
_, err = submitLegacyProposal(t, ctx, badSrc, exampleContract.BeneficiaryAddr.String(), govAuthority, msgServer)
|
|
require.Error(t, err)
|
|
|
|
// balance should not change
|
|
bal = bankKeeper.GetBalance(ctx, contractAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(100))
|
|
|
|
// try again with the proper run-as
|
|
src := &types.ExecuteContractProposal{
|
|
Title: "Second",
|
|
Description: "Verifier can execute",
|
|
Contract: contractAddr.String(),
|
|
Msg: releaseMsgBz,
|
|
RunAs: exampleContract.VerifierAddr.String(),
|
|
}
|
|
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, exampleContract.BeneficiaryAddr.String(), keepers)
|
|
|
|
// balance should be empty (proper release)
|
|
bal = bankKeeper.GetBalance(ctx, contractAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(0))
|
|
}
|
|
|
|
func TestSudoProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
bankKeeper := keepers.BankKeeper
|
|
|
|
exampleContract := InstantiateHackatomExampleContract(t, ctx, keepers)
|
|
contractAddr := exampleContract.Contract
|
|
_, anyAddr := keyPubAddr()
|
|
|
|
// check balance
|
|
bal := bankKeeper.GetBalance(ctx, contractAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(100))
|
|
bal = bankKeeper.GetBalance(ctx, anyAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(0))
|
|
|
|
type StealMsg struct {
|
|
Recipient string `json:"recipient"`
|
|
Amount []sdk.Coin `json:"amount"`
|
|
}
|
|
stealMsg := struct {
|
|
Steal StealMsg `json:"steal_funds"`
|
|
}{Steal: StealMsg{
|
|
Recipient: anyAddr.String(),
|
|
Amount: []sdk.Coin{sdk.NewInt64Coin("denom", 75)},
|
|
}}
|
|
stealMsgBz, err := json.Marshal(stealMsg)
|
|
require.NoError(t, err)
|
|
|
|
// sudo can do anything
|
|
src := &types.SudoContractProposal{
|
|
Title: "Sudo",
|
|
Description: "Steal funds for the verifier",
|
|
Contract: contractAddr.String(),
|
|
Msg: stealMsgBz,
|
|
}
|
|
|
|
em := sdk.NewEventManager()
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx.WithEventManager(em), src, exampleContract.BeneficiaryAddr.String(), keepers)
|
|
|
|
// balance should be empty (and verifier richer)
|
|
bal = bankKeeper.GetBalance(ctx, contractAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(25))
|
|
bal = bankKeeper.GetBalance(ctx, anyAddr, "denom")
|
|
require.Equal(t, bal.Amount, sdk.NewInt(75))
|
|
}
|
|
|
|
func TestAdminProposals(t *testing.T) {
|
|
var (
|
|
otherAddress sdk.AccAddress = bytes.Repeat([]byte{0x2}, types.ContractAddrLen)
|
|
contractAddr = BuildContractAddressClassic(1, 1)
|
|
)
|
|
wasmCode, err := os.ReadFile("./testdata/hackatom.wasm")
|
|
require.NoError(t, err)
|
|
|
|
specs := map[string]struct {
|
|
state types.ContractInfo
|
|
srcProposal v1beta1.Content
|
|
expAdmin sdk.AccAddress
|
|
}{
|
|
"update with different admin": {
|
|
state: types.ContractInfoFixture(),
|
|
srcProposal: &types.UpdateAdminProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
Contract: contractAddr.String(),
|
|
NewAdmin: otherAddress.String(),
|
|
},
|
|
expAdmin: otherAddress,
|
|
},
|
|
"update with old admin empty": {
|
|
state: types.ContractInfoFixture(func(info *types.ContractInfo) {
|
|
info.Admin = ""
|
|
}),
|
|
srcProposal: &types.UpdateAdminProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
Contract: contractAddr.String(),
|
|
NewAdmin: otherAddress.String(),
|
|
},
|
|
expAdmin: otherAddress,
|
|
},
|
|
"clear admin": {
|
|
state: types.ContractInfoFixture(),
|
|
srcProposal: &types.ClearAdminProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
Contract: contractAddr.String(),
|
|
},
|
|
expAdmin: nil,
|
|
},
|
|
"clear with old admin empty": {
|
|
state: types.ContractInfoFixture(func(info *types.ContractInfo) {
|
|
info.Admin = ""
|
|
}),
|
|
srcProposal: &types.ClearAdminProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
Contract: contractAddr.String(),
|
|
},
|
|
expAdmin: nil,
|
|
},
|
|
}
|
|
for msg, spec := range specs {
|
|
t.Run(msg, func(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
err := wasmKeeper.SetParams(ctx, types.Params{
|
|
CodeUploadAccess: types.AllowNobody,
|
|
InstantiateDefaultPermission: types.AccessTypeNobody,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
codeInfo := types.CodeInfoFixture(types.WithSHA256CodeHash(wasmCode))
|
|
require.NoError(t, wasmKeeper.importCode(ctx, 1, codeInfo, wasmCode))
|
|
|
|
entries := []types.ContractCodeHistoryEntry{
|
|
{
|
|
Operation: types.ContractCodeHistoryOperationTypeInit,
|
|
CodeID: 1,
|
|
Updated: spec.state.Created,
|
|
},
|
|
}
|
|
|
|
require.NoError(t, wasmKeeper.importContract(ctx, contractAddr, &spec.state, []types.Model{}, entries))
|
|
|
|
// when
|
|
mustSubmitAndExecuteLegacyProposal(t, ctx, spec.srcProposal, otherAddress.String(), keepers)
|
|
|
|
// then
|
|
cInfo := wasmKeeper.GetContractInfo(ctx, contractAddr)
|
|
require.NotNil(t, cInfo)
|
|
assert.Equal(t, spec.expAdmin.String(), cInfo.Admin)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestPinCodesProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
|
|
mock := wasmtesting.MockWasmer{
|
|
CreateFn: wasmtesting.NoOpCreateFn,
|
|
AnalyzeCodeFn: wasmtesting.WithoutIBCAnalyzeFn,
|
|
}
|
|
var (
|
|
hackatom = StoreHackatomExampleContract(t, ctx, keepers)
|
|
hackatomDuplicate = StoreHackatomExampleContract(t, ctx, keepers)
|
|
otherContract = StoreRandomContract(t, ctx, keepers, &mock)
|
|
gotPinnedChecksums []wasmvm.Checksum
|
|
)
|
|
checksumCollector := func(checksum wasmvm.Checksum) error {
|
|
gotPinnedChecksums = append(gotPinnedChecksums, checksum)
|
|
return nil
|
|
}
|
|
specs := map[string]struct {
|
|
srcCodeIDs []uint64
|
|
mockFn func(checksum wasmvm.Checksum) error
|
|
expPinned []wasmvm.Checksum
|
|
expErr bool
|
|
}{
|
|
"pin one": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"pin multiple": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID, otherContract.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"pin same code id": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID, hackatomDuplicate.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"pin non existing code id": {
|
|
srcCodeIDs: []uint64{999},
|
|
mockFn: checksumCollector,
|
|
expErr: true,
|
|
},
|
|
"pin empty code id list": {
|
|
srcCodeIDs: []uint64{},
|
|
mockFn: checksumCollector,
|
|
expErr: true,
|
|
},
|
|
"wasmvm failed with error": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID},
|
|
mockFn: func(_ wasmvm.Checksum) error {
|
|
return errors.New("test, ignore")
|
|
},
|
|
expErr: true,
|
|
},
|
|
}
|
|
parentCtx := ctx
|
|
for msg, spec := range specs {
|
|
t.Run(msg, func(t *testing.T) {
|
|
myActorAddress := RandomBech32AccountAddress(t)
|
|
gotPinnedChecksums = nil
|
|
ctx, _ := parentCtx.CacheContext()
|
|
mock.PinFn = spec.mockFn
|
|
proposal := &types.PinCodesProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
CodeIDs: spec.srcCodeIDs,
|
|
}
|
|
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
|
|
// when
|
|
contentMsg, gotErr := submitLegacyProposal(t, ctx, proposal, myActorAddress, govAuthority, msgServer)
|
|
if spec.expErr {
|
|
require.Error(t, gotErr)
|
|
return
|
|
}
|
|
require.NoError(t, gotErr)
|
|
|
|
// and proposal execute
|
|
_, err := msgServer.ExecLegacyContent(sdk.WrapSDKContext(ctx), v1.NewMsgExecLegacyContent(contentMsg.Content, govAuthority))
|
|
require.NoError(t, err)
|
|
|
|
// then
|
|
for i := range spec.srcCodeIDs {
|
|
c := wasmKeeper.GetCodeInfo(ctx, spec.srcCodeIDs[i])
|
|
require.Equal(t, wasmvm.Checksum(c.CodeHash), gotPinnedChecksums[i])
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestUnpinCodesProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
|
|
mock := wasmtesting.MockWasmer{
|
|
CreateFn: wasmtesting.NoOpCreateFn,
|
|
AnalyzeCodeFn: wasmtesting.WithoutIBCAnalyzeFn,
|
|
}
|
|
var (
|
|
hackatom = StoreHackatomExampleContract(t, ctx, keepers)
|
|
hackatomDuplicate = StoreHackatomExampleContract(t, ctx, keepers)
|
|
otherContract = StoreRandomContract(t, ctx, keepers, &mock)
|
|
gotUnpinnedChecksums []wasmvm.Checksum
|
|
)
|
|
checksumCollector := func(checksum wasmvm.Checksum) error {
|
|
gotUnpinnedChecksums = append(gotUnpinnedChecksums, checksum)
|
|
return nil
|
|
}
|
|
specs := map[string]struct {
|
|
srcCodeIDs []uint64
|
|
mockFn func(checksum wasmvm.Checksum) error
|
|
expUnpinned []wasmvm.Checksum
|
|
expErr bool
|
|
}{
|
|
"unpin one": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"unpin multiple": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID, otherContract.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"unpin same code id": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID, hackatomDuplicate.CodeID},
|
|
mockFn: checksumCollector,
|
|
},
|
|
"unpin non existing code id": {
|
|
srcCodeIDs: []uint64{999},
|
|
mockFn: checksumCollector,
|
|
expErr: true,
|
|
},
|
|
"unpin empty code id list": {
|
|
srcCodeIDs: []uint64{},
|
|
mockFn: checksumCollector,
|
|
expErr: true,
|
|
},
|
|
"wasmvm failed with error": {
|
|
srcCodeIDs: []uint64{hackatom.CodeID},
|
|
mockFn: func(_ wasmvm.Checksum) error {
|
|
return errors.New("test, ignore")
|
|
},
|
|
expErr: true,
|
|
},
|
|
}
|
|
parentCtx := ctx
|
|
for msg, spec := range specs {
|
|
t.Run(msg, func(t *testing.T) {
|
|
gotUnpinnedChecksums = nil
|
|
ctx, _ := parentCtx.CacheContext()
|
|
mock.UnpinFn = spec.mockFn
|
|
proposal := &types.UnpinCodesProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
CodeIDs: spec.srcCodeIDs,
|
|
}
|
|
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
|
|
// when
|
|
contentMsg, gotErr := submitLegacyProposal(t, ctx, proposal, RandomBech32AccountAddress(t), govAuthority, msgServer)
|
|
if spec.expErr {
|
|
require.Error(t, gotErr)
|
|
return
|
|
}
|
|
require.NoError(t, gotErr)
|
|
|
|
// and proposal execute
|
|
_, err := msgServer.ExecLegacyContent(sdk.WrapSDKContext(ctx), v1.NewMsgExecLegacyContent(contentMsg.Content, govAuthority))
|
|
require.NoError(t, err)
|
|
|
|
// then
|
|
for i := range spec.srcCodeIDs {
|
|
c := wasmKeeper.GetCodeInfo(ctx, spec.srcCodeIDs[i])
|
|
require.Equal(t, wasmvm.Checksum(c.CodeHash), gotUnpinnedChecksums[i])
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestUpdateInstantiateConfigProposal(t *testing.T) {
|
|
ctx, keepers := CreateTestInput(t, false, "staking")
|
|
wasmKeeper := keepers.WasmKeeper
|
|
|
|
mock := wasmtesting.MockWasmer{
|
|
CreateFn: wasmtesting.NoOpCreateFn,
|
|
AnalyzeCodeFn: wasmtesting.WithoutIBCAnalyzeFn,
|
|
}
|
|
anyAddress, err := sdk.AccAddressFromBech32("cosmos100dejzacpanrldpjjwksjm62shqhyss44jf5xz")
|
|
require.NoError(t, err)
|
|
|
|
withAddressAccessConfig := types.AccessTypeAnyOfAddresses.With(anyAddress)
|
|
var (
|
|
nobody = StoreRandomContractWithAccessConfig(t, ctx, keepers, &mock, &types.AllowNobody)
|
|
everybody = StoreRandomContractWithAccessConfig(t, ctx, keepers, &mock, &types.AllowEverybody)
|
|
withAddress = StoreRandomContractWithAccessConfig(t, ctx, keepers, &mock, &withAddressAccessConfig)
|
|
)
|
|
|
|
specs := map[string]struct {
|
|
accessConfigUpdates []types.AccessConfigUpdate
|
|
expErr bool
|
|
}{
|
|
"update one": {
|
|
accessConfigUpdates: []types.AccessConfigUpdate{
|
|
{CodeID: nobody.CodeID, InstantiatePermission: types.AllowEverybody},
|
|
},
|
|
},
|
|
"update multiple": {
|
|
accessConfigUpdates: []types.AccessConfigUpdate{
|
|
{CodeID: everybody.CodeID, InstantiatePermission: types.AllowNobody},
|
|
{CodeID: nobody.CodeID, InstantiatePermission: withAddressAccessConfig},
|
|
{CodeID: withAddress.CodeID, InstantiatePermission: types.AllowEverybody},
|
|
},
|
|
},
|
|
"update same code id": {
|
|
accessConfigUpdates: []types.AccessConfigUpdate{
|
|
{CodeID: everybody.CodeID, InstantiatePermission: types.AllowNobody},
|
|
{CodeID: everybody.CodeID, InstantiatePermission: types.AllowEverybody},
|
|
},
|
|
expErr: true,
|
|
},
|
|
"update non existing code id": {
|
|
accessConfigUpdates: []types.AccessConfigUpdate{
|
|
{CodeID: 100, InstantiatePermission: types.AllowNobody},
|
|
{CodeID: everybody.CodeID, InstantiatePermission: types.AllowEverybody},
|
|
},
|
|
expErr: true,
|
|
},
|
|
"update empty list": {
|
|
accessConfigUpdates: make([]types.AccessConfigUpdate, 0),
|
|
expErr: true,
|
|
},
|
|
}
|
|
parentCtx := ctx
|
|
for msg, spec := range specs {
|
|
t.Run(msg, func(t *testing.T) {
|
|
ctx, _ := parentCtx.CacheContext()
|
|
|
|
updates := make([]types.AccessConfigUpdate, 0)
|
|
for _, cu := range spec.accessConfigUpdates {
|
|
updates = append(updates, types.AccessConfigUpdate{
|
|
CodeID: cu.CodeID,
|
|
InstantiatePermission: cu.InstantiatePermission,
|
|
})
|
|
}
|
|
|
|
govAuthority := keepers.AccountKeeper.GetModuleAddress(govtypes.ModuleName).String()
|
|
msgServer := govkeeper.NewMsgServerImpl(keepers.GovKeeper)
|
|
proposal := &types.UpdateInstantiateConfigProposal{
|
|
Title: "Foo",
|
|
Description: "Bar",
|
|
AccessConfigUpdates: updates,
|
|
}
|
|
|
|
// when
|
|
contentMsg, gotErr := submitLegacyProposal(t, ctx, proposal, RandomBech32AccountAddress(t), govAuthority, msgServer)
|
|
if spec.expErr {
|
|
require.Error(t, gotErr)
|
|
return
|
|
}
|
|
require.NoError(t, gotErr)
|
|
|
|
// and proposal execute
|
|
_, err := msgServer.ExecLegacyContent(sdk.WrapSDKContext(ctx), v1.NewMsgExecLegacyContent(contentMsg.Content, govAuthority))
|
|
require.NoError(t, err)
|
|
|
|
// then
|
|
for i := range spec.accessConfigUpdates {
|
|
c := wasmKeeper.GetCodeInfo(ctx, spec.accessConfigUpdates[i].CodeID)
|
|
require.Equal(t, spec.accessConfigUpdates[i].InstantiatePermission, c.InstantiateConfig)
|
|
}
|
|
})
|
|
}
|
|
}
|