.unwrap() in tests instead of assert!()ing .is_ok() for a better failure message

This commit is contained in:
Michael Vines 2019-01-28 14:52:35 -08:00
parent 53afa64634
commit bfaf5634a1
19 changed files with 36 additions and 62 deletions

View File

@ -80,7 +80,7 @@ fn bench_banking_stage_multi_accounts(bencher: &mut Bencher) {
0, 0,
); );
let x = bank.process_transaction(&fund); let x = bank.process_transaction(&fund);
assert!(x.is_ok()); x.unwrap();
}); });
//sanity check, make sure all the transactions can execute sequentially //sanity check, make sure all the transactions can execute sequentially
transactions.iter().for_each(|tx| { transactions.iter().for_each(|tx| {
@ -190,7 +190,7 @@ fn bench_banking_stage_multi_programs(bencher: &mut Bencher) {
genesis_block.last_id(), genesis_block.last_id(),
0, 0,
); );
assert!(bank.process_transaction(&fund).is_ok()); bank.process_transaction(&fund).unwrap();
}); });
//sanity check, make sure all the transactions can execute sequentially //sanity check, make sure all the transactions can execute sequentially
transactions.iter().for_each(|tx| { transactions.iter().for_each(|tx| {

View File

@ -424,8 +424,6 @@ mod tests {
let mut drone = Drone::new(keypair, None, None); let mut drone = Drone::new(keypair, None, None);
let response = drone.process_drone_request(&bytes); let response = drone.process_drone_request(&bytes);
assert!(response.is_ok());
let response_vec = response.unwrap().to_vec(); let response_vec = response.unwrap().to_vec();
assert_eq!(expected_vec_with_length, response_vec); assert_eq!(expected_vec_with_length, response_vec);

View File

@ -494,7 +494,7 @@ mod test {
amount: 123, amount: 123,
delegate: None, delegate: None,
}); });
assert!(account.serialize(&mut userdata).is_ok()); account.serialize(&mut userdata).unwrap();
assert_eq!(TokenProgram::deserialize(&userdata), Ok(account)); assert_eq!(TokenProgram::deserialize(&userdata), Ok(account));
let account = TokenProgram::Token(TokenInfo { let account = TokenProgram::Token(TokenInfo {
@ -503,7 +503,7 @@ mod test {
name: "A test token".to_string(), name: "A test token".to_string(),
symbol: "TEST".to_string(), symbol: "TEST".to_string(),
}); });
assert!(account.serialize(&mut userdata).is_ok()); account.serialize(&mut userdata).unwrap();
assert_eq!(TokenProgram::deserialize(&userdata), Ok(account)); assert_eq!(TokenProgram::deserialize(&userdata), Ok(account));
} }

View File

@ -307,7 +307,7 @@ mod test {
ENTRIES_PER_SEGMENT, ENTRIES_PER_SEGMENT,
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_mining_proof( let tx = Transaction::storage_new_mining_proof(
&keypair, &keypair,
@ -317,7 +317,7 @@ mod test {
Signature::default(), Signature::default(),
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
} }
#[test] #[test]
@ -336,7 +336,7 @@ mod test {
ENTRIES_PER_SEGMENT, ENTRIES_PER_SEGMENT,
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_mining_proof( let tx = Transaction::storage_new_mining_proof(
&keypair, &keypair,
@ -345,7 +345,7 @@ mod test {
entry_height, entry_height,
Signature::default(), Signature::default(),
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_advertise_last_id( let tx = Transaction::storage_new_advertise_last_id(
&keypair, &keypair,
@ -353,7 +353,7 @@ mod test {
Hash::default(), Hash::default(),
ENTRIES_PER_SEGMENT * 2, ENTRIES_PER_SEGMENT * 2,
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_proof_validation( let tx = Transaction::storage_new_proof_validation(
&keypair, &keypair,
@ -361,7 +361,7 @@ mod test {
entry_height, entry_height,
vec![ProofStatus::Valid], vec![ProofStatus::Valid],
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_advertise_last_id( let tx = Transaction::storage_new_advertise_last_id(
&keypair, &keypair,
@ -369,10 +369,10 @@ mod test {
Hash::default(), Hash::default(),
ENTRIES_PER_SEGMENT * 3, ENTRIES_PER_SEGMENT * 3,
); );
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
let tx = Transaction::storage_new_reward_claim(&keypair, Hash::default(), entry_height); let tx = Transaction::storage_new_reward_claim(&keypair, Hash::default(), entry_height);
assert!(test_transaction(&tx, &mut accounts).is_ok()); test_transaction(&tx, &mut accounts).unwrap();
assert!(accounts[0].tokens == TOTAL_VALIDATOR_REWARDS); assert!(accounts[0].tokens == TOTAL_VALIDATOR_REWARDS);
} }

View File

@ -1859,7 +1859,7 @@ mod tests {
ENTRIES_PER_SEGMENT, ENTRIES_PER_SEGMENT,
); );
assert!(bank.process_transaction(&tx).is_ok()); bank.process_transaction(&tx).unwrap();
let entry_height = 0; let entry_height = 0;
@ -1871,7 +1871,7 @@ mod tests {
Signature::default(), Signature::default(),
); );
assert!(bank.process_transaction(&tx).is_ok()); bank.process_transaction(&tx).unwrap();
assert_eq!(bank.get_storage_entry_height(), ENTRIES_PER_SEGMENT); assert_eq!(bank.get_storage_entry_height(), ENTRIES_PER_SEGMENT);
assert_eq!(bank.get_storage_last_id(), storage_last_id); assert_eq!(bank.get_storage_last_id(), storage_last_id);

View File

@ -157,7 +157,7 @@ mod tests {
"abcd1234abcd1234abcd1234abcd1234 abcd1234abcd1234abcd1234abcd1234 "abcd1234abcd1234abcd1234abcd1234 abcd1234abcd1234abcd1234abcd1234
abcd1234abcd1234abcd1234abcd1234 abcd1234abcd1234abcd1234abcd1234" abcd1234abcd1234abcd1234abcd1234 abcd1234abcd1234abcd1234abcd1234"
); );
assert!(chacha_cbc_encrypt_ledger(&db_ledger, 0, out_path, &mut key).is_ok()); chacha_cbc_encrypt_ledger(&db_ledger, 0, out_path, &mut key).unwrap();
let mut out_file = File::open(out_path).unwrap(); let mut out_file = File::open(out_path).unwrap();
let mut buf = vec![]; let mut buf = vec![];
let size = out_file.read_to_end(&mut buf).unwrap(); let size = out_file.read_to_end(&mut buf).unwrap();

View File

@ -141,7 +141,7 @@ mod tests {
); );
let mut cpu_iv = ivecs.clone(); let mut cpu_iv = ivecs.clone();
assert!(chacha_cbc_encrypt_ledger(&db_ledger, 0, out_path, &mut cpu_iv,).is_ok()); chacha_cbc_encrypt_ledger(&db_ledger, 0, out_path, &mut cpu_iv).unwrap();
let ref_hash = sample_file(&out_path, &samples).unwrap(); let ref_hash = sample_file(&out_path, &samples).unwrap();
@ -178,7 +178,7 @@ mod tests {
); );
ivec[0] = i; ivec[0] = i;
ivecs.extend(ivec.clone().iter()); ivecs.extend(ivec.clone().iter());
assert!(chacha_cbc_encrypt_ledger(&db_ledger.clone(), 0, out_path, &mut ivec,).is_ok()); chacha_cbc_encrypt_ledger(&db_ledger.clone(), 0, out_path, &mut ivec).unwrap();
ref_hashes.push(sample_file(&out_path, &samples).unwrap()); ref_hashes.push(sample_file(&out_path, &samples).unwrap());
info!( info!(

View File

@ -540,7 +540,7 @@ mod test {
assert_eq!(res.err(), Some(CrdsGossipError::BadPruneDestination)); assert_eq!(res.err(), Some(CrdsGossipError::BadPruneDestination));
//correct dest //correct dest
res = crds_gossip.process_prune_msg(ci.id, id, &[prune_pubkey], now, now); res = crds_gossip.process_prune_msg(ci.id, id, &[prune_pubkey], now, now);
assert!(res.is_ok()); res.unwrap();
//test timeout //test timeout
let timeout = now + crds_gossip.push.prune_timeout * 2; let timeout = now + crds_gossip.push.prune_timeout * 2;
res = crds_gossip.process_prune_msg(ci.id, id, &[prune_pubkey], now, timeout); res = crds_gossip.process_prune_msg(ci.id, id, &[prune_pubkey], now, timeout);

View File

@ -1365,7 +1365,7 @@ mod tests {
let ledger_path = get_tmp_ledger_path("test_genesis_and_entry_iterator"); let ledger_path = get_tmp_ledger_path("test_genesis_and_entry_iterator");
{ {
assert!(genesis(&ledger_path, &Keypair::new(), &entries).is_ok()); genesis(&ledger_path, &Keypair::new(), &entries).unwrap();
let ledger = DbLedger::open(&ledger_path).expect("open failed"); let ledger = DbLedger::open(&ledger_path).expect("open failed");
@ -1383,7 +1383,7 @@ mod tests {
let ledger_path = get_tmp_ledger_path("test_genesis_and_entry_iterator"); let ledger_path = get_tmp_ledger_path("test_genesis_and_entry_iterator");
{ {
// put entries except last 2 into ledger // put entries except last 2 into ledger
assert!(genesis(&ledger_path, &Keypair::new(), &entries[..entries.len() - 2]).is_ok()); genesis(&ledger_path, &Keypair::new(), &entries[..entries.len() - 2]).unwrap();
let ledger = DbLedger::open(&ledger_path).expect("open failed"); let ledger = DbLedger::open(&ledger_path).expect("open failed");

View File

@ -132,16 +132,16 @@ mod tests {
//send some data //send some data
let h1 = hash(b"hello world!"); let h1 = hash(b"hello world!");
let tx = test_tx(); let tx = test_tx();
assert!(poh_recorder.record(h1, vec![tx.clone()]).is_ok()); poh_recorder.record(h1, vec![tx.clone()]).unwrap();
//get some events //get some events
let e = entry_receiver.recv().unwrap(); let e = entry_receiver.recv().unwrap();
assert_eq!(e[0].tick_height, 1); assert_eq!(e[0].tick_height, 1);
assert!(poh_recorder.tick().is_ok()); poh_recorder.tick().unwrap();
let e = entry_receiver.recv().unwrap(); let e = entry_receiver.recv().unwrap();
assert_eq!(e[0].tick_height, 2); assert_eq!(e[0].tick_height, 2);
assert!(poh_recorder.tick().is_ok()); poh_recorder.tick().unwrap();
let e = entry_receiver.recv().unwrap(); let e = entry_receiver.recv().unwrap();
assert_eq!(e[0].tick_height, 3); assert_eq!(e[0].tick_height, 3);

View File

@ -152,7 +152,7 @@ mod tests {
// send some data // send some data
let h1 = hash(b"hello world!"); let h1 = hash(b"hello world!");
let tx = test_tx(); let tx = test_tx();
assert!(poh_recorder.record(h1, vec![tx]).is_ok()); poh_recorder.record(h1, vec![tx]).unwrap();
if exit.load(Ordering::Relaxed) { if exit.load(Ordering::Relaxed) {
break Ok(()); break Ok(());
@ -198,8 +198,8 @@ mod tests {
} }
exit.store(true, Ordering::Relaxed); exit.store(true, Ordering::Relaxed);
poh_service.exit(); poh_service.exit();
assert!(poh_service.join().is_ok()); let _ = poh_service.join().unwrap();
assert!(entry_producer.join().is_ok()); let _ = entry_producer.join().unwrap();
} }
} }

View File

@ -433,7 +433,6 @@ mod tests {
let num_samples = (string.len() * num_strings / size_of::<Hash>()) as u64; let num_samples = (string.len() * num_strings / size_of::<Hash>()) as u64;
let samples: Vec<_> = (0..num_samples).collect(); let samples: Vec<_> = (0..num_samples).collect();
let res = sample_file(&in_path, samples.as_slice()); let res = sample_file(&in_path, samples.as_slice());
assert!(res.is_ok());
let ref_hash: Hash = Hash::new(&[ let ref_hash: Hash = Hash::new(&[
173, 251, 182, 165, 10, 54, 33, 150, 133, 226, 106, 150, 99, 192, 179, 1, 230, 144, 173, 251, 182, 165, 10, 54, 33, 150, 133, 226, 106, 150, 99, 192, 179, 1, 230, 144,
151, 126, 18, 191, 54, 67, 249, 140, 230, 160, 56, 30, 170, 52, 151, 126, 18, 191, 54, 67, 249, 140, 230, 160, 56, 30, 170, 52,

View File

@ -434,7 +434,6 @@ mod tests {
// Test signature confirmation notification // Test signature confirmation notification
let string = receiver.poll(); let string = receiver.poll();
assert!(string.is_ok());
if let Async::Ready(Some(response)) = string.unwrap() { if let Async::Ready(Some(response)) = string.unwrap() {
let expected = format!(r#"{{"jsonrpc":"2.0","method":"signatureNotification","params":{{"result":"Confirmed","subscription":0}}}}"#); let expected = format!(r#"{{"jsonrpc":"2.0","method":"signatureNotification","params":{{"result":"Confirmed","subscription":0}}}}"#);
assert_eq!(expected, response); assert_eq!(expected, response);
@ -540,7 +539,6 @@ mod tests {
// Test signature confirmation notification #1 // Test signature confirmation notification #1
let string = receiver.poll(); let string = receiver.poll();
assert!(string.is_ok());
let expected_userdata = arc_bank let expected_userdata = arc_bank
.get_account(&contract_state.pubkey()) .get_account(&contract_state.pubkey())
@ -583,7 +581,6 @@ mod tests {
// Test signature confirmation notification #2 // Test signature confirmation notification #2
let string = receiver.poll(); let string = receiver.poll();
assert!(string.is_ok());
let expected_userdata = arc_bank let expected_userdata = arc_bank
.get_account(&contract_state.pubkey()) .get_account(&contract_state.pubkey())
.unwrap() .unwrap()
@ -642,7 +639,6 @@ mod tests {
} }
}); });
let string = receiver.poll(); let string = receiver.poll();
assert!(string.is_ok());
if let Async::Ready(Some(response)) = string.unwrap() { if let Async::Ready(Some(response)) = string.unwrap() {
assert_eq!(serde_json::to_string(&expected).unwrap(), response); assert_eq!(serde_json::to_string(&expected).unwrap(), response);
} }
@ -728,7 +724,6 @@ mod tests {
let account = bank.get_account(&alice.pubkey()).unwrap(); let account = bank.get_account(&alice.pubkey()).unwrap();
subscriptions.check_account(&alice.pubkey(), &account); subscriptions.check_account(&alice.pubkey(), &account);
let string = transport_receiver.poll(); let string = transport_receiver.poll();
assert!(string.is_ok());
if let Async::Ready(Some(response)) = string.unwrap() { if let Async::Ready(Some(response)) = string.unwrap() {
let expected = format!(r#"{{"jsonrpc":"2.0","method":"accountNotification","params":{{"result":{{"executable":false,"loader":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"owner":[129,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"tokens":1,"userdata":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]}},"subscription":0}}}}"#); let expected = format!(r#"{{"jsonrpc":"2.0","method":"accountNotification","params":{{"result":{{"executable":false,"loader":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"owner":[129,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"tokens":1,"userdata":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]}},"subscription":0}}}}"#);
assert_eq!(expected, response); assert_eq!(expected, response);
@ -766,7 +761,6 @@ mod tests {
subscriptions.check_signature(&signature, &Ok(())); subscriptions.check_signature(&signature, &Ok(()));
let string = transport_receiver.poll(); let string = transport_receiver.poll();
assert!(string.is_ok());
if let Async::Ready(Some(response)) = string.unwrap() { if let Async::Ready(Some(response)) = string.unwrap() {
let expected = format!(r#"{{"jsonrpc":"2.0","method":"signatureNotification","params":{{"result":"Confirmed","subscription":0}}}}"#); let expected = format!(r#"{{"jsonrpc":"2.0","method":"signatureNotification","params":{{"result":"Confirmed","subscription":0}}}}"#);
assert_eq!(expected, response); assert_eq!(expected, response);

View File

@ -269,11 +269,9 @@ mod tests {
RpcRequest::GetBalance, RpcRequest::GetBalance,
Some(json!(["deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhx"])), Some(json!(["deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhx"])),
); );
assert!(balance.is_ok());
assert_eq!(balance.unwrap().as_u64().unwrap(), 50); assert_eq!(balance.unwrap().as_u64().unwrap(), 50);
let last_id = rpc_client.make_rpc_request(2, RpcRequest::GetLastId, None); let last_id = rpc_client.make_rpc_request(2, RpcRequest::GetLastId, None);
assert!(last_id.is_ok());
assert_eq!( assert_eq!(
last_id.unwrap().as_str().unwrap(), last_id.unwrap().as_str().unwrap(),
"deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhx" "deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhx"
@ -321,7 +319,6 @@ mod tests {
Some(json!(["deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhw"])), Some(json!(["deadbeefXjn8o3yroDHxUtKsZZgoy4GPkPPXfouKNHhw"])),
10, 10,
); );
assert!(balance.is_ok());
assert_eq!(balance.unwrap().as_u64().unwrap(), 5); assert_eq!(balance.unwrap().as_u64().unwrap(), 5);
} }
} }

View File

@ -564,7 +564,7 @@ mod tests {
let last_id = client.get_last_id(); let last_id = client.get_last_id();
let signature = client.transfer(500, &alice, bob_pubkey, &last_id).unwrap(); let signature = client.transfer(500, &alice, bob_pubkey, &last_id).unwrap();
assert!(client.poll_for_signature(&signature).is_ok()); client.poll_for_signature(&signature).unwrap();
server.close().unwrap(); server.close().unwrap();
remove_dir_all(ledger_path).unwrap(); remove_dir_all(ledger_path).unwrap();
@ -584,7 +584,7 @@ mod tests {
.transfer(500, &alice, validator_keypair.pubkey(), &last_id) .transfer(500, &alice, validator_keypair.pubkey(), &last_id)
.unwrap(); .unwrap();
assert!(client.poll_for_signature(&signature).is_ok()); client.poll_for_signature(&signature).unwrap();
// Create and register the vote account // Create and register the vote account
let validator_vote_account_keypair = Keypair::new(); let validator_vote_account_keypair = Keypair::new();
@ -594,7 +594,7 @@ mod tests {
let transaction = let transaction =
VoteTransaction::vote_account_new(&validator_keypair, vote_account_id, last_id, 1, 1); VoteTransaction::vote_account_new(&validator_keypair, vote_account_id, last_id, 1, 1);
let signature = client.transfer_signed(&transaction).unwrap(); let signature = client.transfer_signed(&transaction).unwrap();
assert!(client.poll_for_signature(&signature).is_ok()); client.poll_for_signature(&signature).unwrap();
let balance = retry_get_balance(&mut client, &vote_account_id, Some(1)) let balance = retry_get_balance(&mut client, &vote_account_id, Some(1))
.expect("Expected balance for new account to exist"); .expect("Expected balance for new account to exist");
@ -648,17 +648,16 @@ mod tests {
let signature = client let signature = client
.transfer(500, &alice, bob_keypair.pubkey(), &last_id) .transfer(500, &alice, bob_keypair.pubkey(), &last_id)
.unwrap(); .unwrap();
assert!(client.poll_for_signature(&signature).is_ok()); client.poll_for_signature(&signature).unwrap();
let balance = client.poll_get_balance(&bob_keypair.pubkey()); let balance = client.poll_get_balance(&bob_keypair.pubkey());
assert!(balance.is_ok());
assert_eq!(balance.unwrap(), 500); assert_eq!(balance.unwrap(), 500);
// take them away // take them away
let signature = client let signature = client
.transfer(500, &bob_keypair, alice.pubkey(), &last_id) .transfer(500, &bob_keypair, alice.pubkey(), &last_id)
.unwrap(); .unwrap();
assert!(client.poll_for_signature(&signature).is_ok()); client.poll_for_signature(&signature).unwrap();
let balance = client.poll_get_balance(&alice.pubkey()); let balance = client.poll_get_balance(&alice.pubkey());
assert_eq!(balance.unwrap(), 10_000); assert_eq!(balance.unwrap(), 10_000);

View File

@ -254,7 +254,7 @@ mod test {
assert!(signer assert!(signer
.send_validator_vote(&bank, &cluster_info, &sender) .send_validator_vote(&bank, &cluster_info, &sender)
.is_ok()); .is_ok());
assert!(receiver.recv_timeout(Duration::from_millis(400)).is_ok()); receiver.recv_timeout(Duration::from_millis(400)).unwrap();
assert_eq!(signer.unsent_votes.read().unwrap().len(), 0); assert_eq!(signer.unsent_votes.read().unwrap().len(), 0);
} }

View File

@ -1192,7 +1192,6 @@ mod tests {
let bob_pubkey = Keypair::new().pubkey(); let bob_pubkey = Keypair::new().pubkey();
config.command = WalletCommand::Pay(10, bob_pubkey, None, None, None, None); config.command = WalletCommand::Pay(10, bob_pubkey, None, None, None, None);
let signature = process_command(&config); let signature = process_command(&config);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
let date_string = "\"2018-09-19T17:30:59Z\""; let date_string = "\"2018-09-19T17:30:59Z\"";
@ -1206,7 +1205,6 @@ mod tests {
None, None,
); );
let result = process_command(&config); let result = process_command(&config);
assert!(result.is_ok());
let json: Value = serde_json::from_str(&result.unwrap()).unwrap(); let json: Value = serde_json::from_str(&result.unwrap()).unwrap();
assert_eq!( assert_eq!(
json.as_object() json.as_object()
@ -1228,7 +1226,6 @@ mod tests {
Some(config.id.pubkey()), Some(config.id.pubkey()),
); );
let result = process_command(&config); let result = process_command(&config);
assert!(result.is_ok());
let json: Value = serde_json::from_str(&result.unwrap()).unwrap(); let json: Value = serde_json::from_str(&result.unwrap()).unwrap();
assert_eq!( assert_eq!(
json.as_object() json.as_object()
@ -1243,13 +1240,11 @@ mod tests {
let process_id = Keypair::new().pubkey(); let process_id = Keypair::new().pubkey();
config.command = WalletCommand::TimeElapsed(bob_pubkey, process_id, dt); config.command = WalletCommand::TimeElapsed(bob_pubkey, process_id, dt);
let signature = process_command(&config); let signature = process_command(&config);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
let witness = Keypair::new().pubkey(); let witness = Keypair::new().pubkey();
config.command = WalletCommand::Witness(bob_pubkey, witness); config.command = WalletCommand::Witness(bob_pubkey, witness);
let signature = process_command(&config); let signature = process_command(&config);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
// Need airdrop cases // Need airdrop cases
@ -1259,13 +1254,11 @@ mod tests {
config.rpc_client = Some(RpcClient::new("airdrop".to_string())); config.rpc_client = Some(RpcClient::new("airdrop".to_string()));
config.command = WalletCommand::TimeElapsed(bob_pubkey, process_id, dt); config.command = WalletCommand::TimeElapsed(bob_pubkey, process_id, dt);
let signature = process_command(&config); let signature = process_command(&config);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
let witness = Keypair::new().pubkey(); let witness = Keypair::new().pubkey();
config.command = WalletCommand::Witness(bob_pubkey, witness); config.command = WalletCommand::Witness(bob_pubkey, witness);
let signature = process_command(&config); let signature = process_command(&config);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
// Failture cases // Failture cases
@ -1325,7 +1318,6 @@ mod tests {
config.command = WalletCommand::Deploy(pathbuf.to_str().unwrap().to_string()); config.command = WalletCommand::Deploy(pathbuf.to_str().unwrap().to_string());
let result = process_command(&config); let result = process_command(&config);
assert!(result.is_ok());
let json: Value = serde_json::from_str(&result.unwrap()).unwrap(); let json: Value = serde_json::from_str(&result.unwrap()).unwrap();
let program_id = json let program_id = json
.as_object() .as_object()
@ -1360,7 +1352,7 @@ mod tests {
let keypair_vec: Vec<u8> = serde_json::from_str(&serialized_keypair).unwrap(); let keypair_vec: Vec<u8> = serde_json::from_str(&serialized_keypair).unwrap();
assert!(Path::new(&outfile).exists()); assert!(Path::new(&outfile).exists());
assert_eq!(keypair_vec, read_pkcs8(&outfile).unwrap()); assert_eq!(keypair_vec, read_pkcs8(&outfile).unwrap());
assert!(read_keypair(&outfile).is_ok()); read_keypair(&outfile).unwrap();
assert_eq!( assert_eq!(
read_keypair(&outfile).unwrap().pubkey().as_ref().len(), read_keypair(&outfile).unwrap().pubkey().as_ref().len(),
mem::size_of::<Pubkey>() mem::size_of::<Pubkey>()
@ -1377,7 +1369,6 @@ mod tests {
let expected_last_id = Hash::new(&vec); let expected_last_id = Hash::new(&vec);
let last_id = get_last_id(&rpc_client); let last_id = get_last_id(&rpc_client);
assert!(last_id.is_ok());
assert_eq!(last_id.unwrap(), expected_last_id); assert_eq!(last_id.unwrap(), expected_last_id);
let rpc_client = RpcClient::new("fails".to_string()); let rpc_client = RpcClient::new("fails".to_string());
@ -1396,7 +1387,6 @@ mod tests {
let tx = Transaction::system_new(&key, to, 50, last_id); let tx = Transaction::system_new(&key, to, 50, last_id);
let signature = send_tx(&rpc_client, &tx); let signature = send_tx(&rpc_client, &tx);
assert!(signature.is_ok());
assert_eq!(signature.unwrap(), SIGNATURE.to_string()); assert_eq!(signature.unwrap(), SIGNATURE.to_string());
let rpc_client = RpcClient::new("fails".to_string()); let rpc_client = RpcClient::new("fails".to_string());
@ -1410,7 +1400,6 @@ mod tests {
let rpc_client = RpcClient::new("succeeds".to_string()); let rpc_client = RpcClient::new("succeeds".to_string());
let signature = "good_signature"; let signature = "good_signature";
let status = confirm_tx(&rpc_client, &signature); let status = confirm_tx(&rpc_client, &signature);
assert!(status.is_ok());
assert_eq!(status.unwrap(), RpcSignatureStatus::Confirmed); assert_eq!(status.unwrap(), RpcSignatureStatus::Confirmed);
let rpc_client = RpcClient::new("bad_sig_status".to_string()); let rpc_client = RpcClient::new("bad_sig_status".to_string());
@ -1436,7 +1425,7 @@ mod tests {
let signer = Keypair::new(); let signer = Keypair::new();
let result = send_and_confirm_tx(&rpc_client, &mut tx, &signer); let result = send_and_confirm_tx(&rpc_client, &mut tx, &signer);
assert!(result.is_ok()); result.unwrap();
let rpc_client = RpcClient::new("account_in_use".to_string()); let rpc_client = RpcClient::new("account_in_use".to_string());
let result = send_and_confirm_tx(&rpc_client, &mut tx, &signer); let result = send_and_confirm_tx(&rpc_client, &mut tx, &signer);

View File

@ -30,13 +30,11 @@ fn test_wallet_deploy_program() {
config.drone_port = drone_addr.port(); config.drone_port = drone_addr.port();
config.rpc_port = leader_data.rpc.port(); config.rpc_port = leader_data.rpc.port();
config.command = WalletCommand::Airdrop(50); config.command = WalletCommand::Airdrop(50);
let response = process_command(&config); process_command(&config).unwrap();
assert!(response.is_ok());
config.command = WalletCommand::Deploy(pathbuf.to_str().unwrap().to_string()); config.command = WalletCommand::Deploy(pathbuf.to_str().unwrap().to_string());
let response = process_command(&config); let response = process_command(&config);
assert!(response.is_ok());
let json: Value = serde_json::from_str(&response.unwrap()).unwrap(); let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
let program_id_str = json let program_id_str = json
.as_object() .as_object()

View File

@ -22,7 +22,7 @@ fn test_wallet_request_airdrop() {
bob_config.command = WalletCommand::Airdrop(50); bob_config.command = WalletCommand::Airdrop(50);
let sig_response = process_command(&bob_config); let sig_response = process_command(&bob_config);
assert!(sig_response.is_ok()); sig_response.unwrap();
let rpc_client = RpcClient::new_from_socket(leader_data.rpc); let rpc_client = RpcClient::new_from_socket(leader_data.rpc);