236 lines
6.2 KiB
Go
236 lines
6.2 KiB
Go
package tx
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/cosmos/cosmos-sdk/testutil/testdata"
|
|
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
|
|
|
|
tx2 "github.com/cosmos/cosmos-sdk/types/tx"
|
|
|
|
"github.com/cosmos/cosmos-sdk/types/tx/signing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
codectypes "github.com/cosmos/cosmos-sdk/codec/types"
|
|
"github.com/cosmos/cosmos-sdk/std"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
)
|
|
|
|
func TestTxBuilder(t *testing.T) {
|
|
_, pubkey, addr := testdata.KeyTestPubAddr()
|
|
|
|
marshaler := codec.NewHybridCodec(codec.New(), codectypes.NewInterfaceRegistry())
|
|
tx := newBuilder(std.DefaultPublicKeyCodec{})
|
|
|
|
cdc := std.DefaultPublicKeyCodec{}
|
|
|
|
memo := "sometestmemo"
|
|
|
|
msgs := []sdk.Msg{testdata.NewTestMsg(addr)}
|
|
|
|
pk, err := cdc.Encode(pubkey)
|
|
require.NoError(t, err)
|
|
|
|
var signerInfo []*tx2.SignerInfo
|
|
signerInfo = append(signerInfo, &tx2.SignerInfo{
|
|
PublicKey: pk,
|
|
ModeInfo: &tx2.ModeInfo{
|
|
Sum: &tx2.ModeInfo_Single_{
|
|
Single: &tx2.ModeInfo_Single{
|
|
Mode: signing.SignMode_SIGN_MODE_DIRECT,
|
|
},
|
|
},
|
|
},
|
|
})
|
|
|
|
var sig signing.SignatureV2
|
|
sig = signing.SignatureV2{
|
|
PubKey: pubkey,
|
|
Data: &signing.SingleSignatureData{
|
|
SignMode: signing.SignMode_SIGN_MODE_DIRECT,
|
|
Signature: pubkey.Bytes(),
|
|
},
|
|
}
|
|
|
|
fee := tx2.Fee{Amount: sdk.NewCoins(sdk.NewInt64Coin("atom", 150)), GasLimit: 20000}
|
|
|
|
t.Log("verify that authInfo bytes encoded with DefaultTxEncoder and decoded with DefaultTxDecoder can be retrieved from GetAuthInfoBytes")
|
|
authInfo := &tx2.AuthInfo{
|
|
Fee: &fee,
|
|
SignerInfos: signerInfo,
|
|
}
|
|
|
|
authInfoBytes := marshaler.MustMarshalBinaryBare(authInfo)
|
|
|
|
require.NotEmpty(t, authInfoBytes)
|
|
|
|
t.Log("verify that body bytes encoded with DefaultTxEncoder and decoded with DefaultTxDecoder can be retrieved from GetBodyBytes")
|
|
anys := make([]*codectypes.Any, len(msgs))
|
|
|
|
for i, msg := range msgs {
|
|
var err error
|
|
anys[i], err = codectypes.NewAnyWithValue(msg)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
txBody := &tx2.TxBody{
|
|
Memo: memo,
|
|
Messages: anys,
|
|
}
|
|
bodyBytes := marshaler.MustMarshalBinaryBare(txBody)
|
|
require.NotEmpty(t, bodyBytes)
|
|
require.Empty(t, tx.GetBodyBytes())
|
|
|
|
t.Log("verify that calling the SetMsgs, SetMemo results in the correct GetBodyBytes")
|
|
require.NotEqual(t, bodyBytes, tx.GetBodyBytes())
|
|
err = tx.SetMsgs(msgs...)
|
|
require.NoError(t, err)
|
|
require.NotEqual(t, bodyBytes, tx.GetBodyBytes())
|
|
tx.SetMemo(memo)
|
|
require.Equal(t, bodyBytes, tx.GetBodyBytes())
|
|
require.Equal(t, len(msgs), len(tx.GetMsgs()))
|
|
require.Equal(t, 0, len(tx.GetPubKeys()))
|
|
|
|
t.Log("verify that updated AuthInfo results in the correct GetAuthInfoBytes and GetPubKeys")
|
|
require.NotEqual(t, authInfoBytes, tx.GetAuthInfoBytes())
|
|
tx.SetFeeAmount(fee.Amount)
|
|
require.NotEqual(t, authInfoBytes, tx.GetAuthInfoBytes())
|
|
tx.SetGasLimit(fee.GasLimit)
|
|
require.NotEqual(t, authInfoBytes, tx.GetAuthInfoBytes())
|
|
err = tx.SetSignatures(sig)
|
|
require.NoError(t, err)
|
|
|
|
// once fee, gas and signerInfos are all set, AuthInfo bytes should match
|
|
require.Equal(t, authInfoBytes, tx.GetAuthInfoBytes())
|
|
|
|
require.Equal(t, len(msgs), len(tx.GetMsgs()))
|
|
require.Equal(t, 1, len(tx.GetPubKeys()))
|
|
require.Equal(t, pubkey.Bytes(), tx.GetPubKeys()[0].Bytes())
|
|
|
|
tx = &builder{}
|
|
require.NotPanics(t, func() {
|
|
_ = tx.GetMsgs()
|
|
})
|
|
}
|
|
|
|
func TestBuilderValidateBasic(t *testing.T) {
|
|
// keys and addresses
|
|
_, pubKey1, addr1 := testdata.KeyTestPubAddr()
|
|
_, pubKey2, addr2 := testdata.KeyTestPubAddr()
|
|
|
|
// msg and signatures
|
|
msg1 := testdata.NewTestMsg(addr1, addr2)
|
|
feeAmount := testdata.NewTestFeeAmount()
|
|
msgs := []sdk.Msg{msg1}
|
|
|
|
// require to fail validation upon invalid fee
|
|
badFeeAmount := testdata.NewTestFeeAmount()
|
|
badFeeAmount[0].Amount = sdk.NewInt(-5)
|
|
bldr := newBuilder(std.DefaultPublicKeyCodec{})
|
|
|
|
var sig1, sig2 signing.SignatureV2
|
|
sig1 = signing.SignatureV2{
|
|
PubKey: pubKey1,
|
|
Data: &signing.SingleSignatureData{
|
|
SignMode: signing.SignMode_SIGN_MODE_DIRECT,
|
|
Signature: pubKey1.Bytes(),
|
|
},
|
|
}
|
|
|
|
sig2 = signing.SignatureV2{
|
|
PubKey: pubKey2,
|
|
Data: &signing.SingleSignatureData{
|
|
SignMode: signing.SignMode_SIGN_MODE_DIRECT,
|
|
Signature: pubKey2.Bytes(),
|
|
},
|
|
}
|
|
|
|
err := bldr.SetMsgs(msgs...)
|
|
require.NoError(t, err)
|
|
bldr.SetGasLimit(200000)
|
|
err = bldr.SetSignatures(sig1, sig2)
|
|
require.NoError(t, err)
|
|
bldr.SetFeeAmount(badFeeAmount)
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
_, code, _ := sdkerrors.ABCIInfo(err, false)
|
|
require.Equal(t, sdkerrors.ErrInsufficientFee.ABCICode(), code)
|
|
|
|
// require to fail validation when no signatures exist
|
|
err = bldr.SetSignatures()
|
|
require.NoError(t, err)
|
|
bldr.SetFeeAmount(feeAmount)
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
_, code, _ = sdkerrors.ABCIInfo(err, false)
|
|
require.Equal(t, sdkerrors.ErrNoSignatures.ABCICode(), code)
|
|
|
|
// require to fail with nil values for tx, authinfo
|
|
err = bldr.SetMsgs(msgs...)
|
|
require.NoError(t, err)
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
|
|
// require to fail validation when signatures do not match expected signers
|
|
err = bldr.SetSignatures(sig1)
|
|
require.NoError(t, err)
|
|
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
_, code, _ = sdkerrors.ABCIInfo(err, false)
|
|
require.Equal(t, sdkerrors.ErrUnauthorized.ABCICode(), code)
|
|
|
|
require.Error(t, err)
|
|
bldr.SetFeeAmount(feeAmount)
|
|
err = bldr.SetSignatures(sig1, sig2)
|
|
require.NoError(t, err)
|
|
err = bldr.ValidateBasic()
|
|
require.NoError(t, err)
|
|
|
|
// gas limit too high
|
|
bldr.SetGasLimit(MaxGasWanted + 1)
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
bldr.SetGasLimit(MaxGasWanted - 1)
|
|
err = bldr.ValidateBasic()
|
|
require.NoError(t, err)
|
|
|
|
// bad builder structs
|
|
|
|
// missing body
|
|
body := bldr.tx.Body
|
|
bldr.tx.Body = nil
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
bldr.tx.Body = body
|
|
err = bldr.ValidateBasic()
|
|
require.NoError(t, err)
|
|
|
|
// missing fee
|
|
f := bldr.tx.AuthInfo.Fee
|
|
bldr.tx.AuthInfo.Fee = nil
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
bldr.tx.AuthInfo.Fee = f
|
|
err = bldr.ValidateBasic()
|
|
require.NoError(t, err)
|
|
|
|
// missing AuthInfo
|
|
authInfo := bldr.tx.AuthInfo
|
|
bldr.tx.AuthInfo = nil
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
bldr.tx.AuthInfo = authInfo
|
|
err = bldr.ValidateBasic()
|
|
require.NoError(t, err)
|
|
|
|
// missing tx
|
|
bldr.tx = nil
|
|
err = bldr.ValidateBasic()
|
|
require.Error(t, err)
|
|
}
|