restructure tests to remove interdependence
This commit is contained in:
parent
ad03d1f8e8
commit
7ae577072a
@ -18,12 +18,6 @@ const namingTests = () => {
|
|||||||
let watcher: any;
|
let watcher: any;
|
||||||
let watcherId: string;
|
let watcherId: string;
|
||||||
|
|
||||||
let authorityName: string;
|
|
||||||
let otherAuthorityName: string;
|
|
||||||
let otherPrivateKey: string;
|
|
||||||
|
|
||||||
let crn: string;
|
|
||||||
|
|
||||||
beforeAll(async () => {
|
beforeAll(async () => {
|
||||||
registry = new Registry(gqlEndpoint, restEndpoint, chainId);
|
registry = new Registry(gqlEndpoint, restEndpoint, chainId);
|
||||||
|
|
||||||
@ -46,11 +40,24 @@ const namingTests = () => {
|
|||||||
watcherId = result.data.id;
|
watcherId = result.data.id;
|
||||||
});
|
});
|
||||||
|
|
||||||
|
describe('Authority tests', () => {
|
||||||
test('Reserve authority.', async () => {
|
test('Reserve authority.', async () => {
|
||||||
authorityName = `laconic-${Date.now()}`;
|
const authorityName = `laconic-${Date.now()}`;
|
||||||
|
|
||||||
await registry.reserveAuthority({ name: authorityName }, privateKey, fee);
|
await registry.reserveAuthority({ name: authorityName }, privateKey, fee);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
describe('With authority reserved', () => {
|
||||||
|
let authorityName: string;
|
||||||
|
let crn: string;
|
||||||
|
|
||||||
|
beforeAll(async () => {
|
||||||
|
authorityName = `laconic-${Date.now()}`;
|
||||||
|
crn = `crn://${authorityName}/app/test`;
|
||||||
|
|
||||||
|
await registry.reserveAuthority({ name: authorityName }, privateKey, fee);
|
||||||
|
})
|
||||||
|
|
||||||
test('Lookup authority.', async () => {
|
test('Lookup authority.', async () => {
|
||||||
const [record] = await registry.lookupAuthorities([authorityName]);
|
const [record] = await registry.lookupAuthorities([authorityName]);
|
||||||
|
|
||||||
@ -69,7 +76,8 @@ const namingTests = () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
test('Reserve already reserved authority', async () => {
|
test('Reserve already reserved authority', async () => {
|
||||||
await expect(registry.reserveAuthority({ name: authorityName }, privateKey, fee)).rejects.toThrow('Name already reserved.');
|
await expect(registry.reserveAuthority({ name: authorityName }, privateKey, fee)).
|
||||||
|
rejects.toThrow('Name already reserved.');
|
||||||
});
|
});
|
||||||
|
|
||||||
test('Reserve sub-authority.', async () => {
|
test('Reserve sub-authority.', async () => {
|
||||||
@ -105,23 +113,61 @@ const namingTests = () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
test('Set name for unbonded authority', async () => {
|
test('Set name for unbonded authority', async () => {
|
||||||
crn = `crn://${authorityName}/app/test`;
|
|
||||||
assert(watcherId)
|
assert(watcherId)
|
||||||
await expect(registry.setName({ crn, cid: watcherId }, privateKey, fee)).rejects.toThrow('Authority bond not found.');
|
await expect(registry.setName({ crn, cid: watcherId }, privateKey, fee)).
|
||||||
|
rejects.toThrow('Authority bond not found.');
|
||||||
});
|
});
|
||||||
|
|
||||||
test('Set authority bond', async () => {
|
test('Set authority bond', async () => {
|
||||||
await registry.setAuthorityBond({ name: authorityName, bondId }, privateKey, fee);
|
await registry.setAuthorityBond({ name: authorityName, bondId }, privateKey, fee);
|
||||||
});
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('Naming tests', () => {
|
||||||
|
let authorityName: string;
|
||||||
|
let otherAuthorityName: string;
|
||||||
|
let otherPrivateKey: string;
|
||||||
|
let otherAccount: Account;
|
||||||
|
|
||||||
|
beforeAll(async () => {
|
||||||
|
authorityName = `laconic-${Date.now()}`;
|
||||||
|
|
||||||
|
await registry.reserveAuthority({ name: authorityName }, privateKey, fee);
|
||||||
|
await registry.setAuthorityBond({ name: authorityName, bondId }, privateKey, fee);
|
||||||
|
|
||||||
|
// Create another account.
|
||||||
|
const mnenonic = Account.generateMnemonic();
|
||||||
|
otherAccount = await Account.generateFromMnemonic(mnenonic);
|
||||||
|
await registry.sendCoins({ denom: 'aphoton', amount: '1000000000', destinationAddress: otherAccount.formattedCosmosAddress }, privateKey, fee);
|
||||||
|
|
||||||
|
otherAuthorityName = `other-${Date.now()}`;
|
||||||
|
otherPrivateKey = otherAccount.privateKey.toString('hex');
|
||||||
|
});
|
||||||
|
|
||||||
test('Set name', async () => {
|
test('Set name', async () => {
|
||||||
crn = `crn://${authorityName}/app/test`;
|
const crn = `crn://${authorityName}/app/test1`;
|
||||||
|
|
||||||
await registry.setName({ crn, cid: watcherId }, privateKey, fee);
|
await registry.setName({ crn, cid: watcherId }, privateKey, fee);
|
||||||
|
|
||||||
// Query records should return it (some CRN points to it).
|
// Query records should return it (some CRN points to it).
|
||||||
const records = await registry.queryRecords({ type: 'WebsiteRegistrationRecord', version: watcher.record.version });
|
const records = await registry.queryRecords({ type: 'WebsiteRegistrationRecord', version: watcher.record.version });
|
||||||
expect(records).toBeDefined();
|
expect(records).toBeDefined();
|
||||||
expect(records).toHaveLength(1);
|
expect(records).toHaveLength(1);
|
||||||
|
|
||||||
|
await registry.deleteName({ crn }, privateKey, fee);
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('With name set', () => {
|
||||||
|
let crn: string;
|
||||||
|
|
||||||
|
beforeAll(async () => {
|
||||||
|
crn = `crn://${authorityName}/app/test2`;
|
||||||
|
await registry.setName({ crn, cid: watcherId }, privateKey, fee);
|
||||||
|
});
|
||||||
|
|
||||||
|
afterAll(async () => {
|
||||||
|
await registry.deleteName({ crn }, privateKey, fee);
|
||||||
});
|
});
|
||||||
|
|
||||||
test('Lookup name', async () => {
|
test('Lookup name', async () => {
|
||||||
@ -179,42 +225,6 @@ const namingTests = () => {
|
|||||||
expect(oldRecord.height).toBeDefined();
|
expect(oldRecord.height).toBeDefined();
|
||||||
});
|
});
|
||||||
|
|
||||||
test('Set name without reserving authority', async () => {
|
|
||||||
await expect(registry.setName({ crn: 'crn://not-reserved/app/test', cid: watcherId }, privateKey, fee))
|
|
||||||
.rejects.toThrow('Name authority not found.');
|
|
||||||
});
|
|
||||||
|
|
||||||
test('Set name for non-owned authority', async () => {
|
|
||||||
// Create another account.
|
|
||||||
const mnenonic = Account.generateMnemonic();
|
|
||||||
const otherAccount = await Account.generateFromMnemonic(mnenonic);
|
|
||||||
await registry.sendCoins({ denom: 'aphoton', amount: '1000000000', destinationAddress: otherAccount.formattedCosmosAddress }, privateKey, fee);
|
|
||||||
|
|
||||||
// Other account reserves an authority.
|
|
||||||
otherAuthorityName = `other-${Date.now()}`;
|
|
||||||
otherPrivateKey = otherAccount.privateKey.toString('hex');
|
|
||||||
await registry.reserveAuthority({ name: otherAuthorityName }, otherPrivateKey, fee);
|
|
||||||
|
|
||||||
// Try setting name under other authority.
|
|
||||||
await expect(registry.setName({ crn: `crn://${otherAuthorityName}/app/test`, cid: watcherId }, privateKey, fee)).rejects.toThrow('Access denied.');
|
|
||||||
});
|
|
||||||
|
|
||||||
test('Lookup non existing name', async () => {
|
|
||||||
const records = await registry.lookupNames(['crn://not-reserved/app/test']);
|
|
||||||
expect(records).toBeDefined();
|
|
||||||
expect(records).toHaveLength(1);
|
|
||||||
const [record] = records;
|
|
||||||
expect(record).toBeNull();
|
|
||||||
});
|
|
||||||
|
|
||||||
test('Resolve non existing name', async () => {
|
|
||||||
const records = await registry.resolveNames(['crn://not-reserved/app/test']);
|
|
||||||
expect(records).toBeDefined();
|
|
||||||
expect(records).toHaveLength(1);
|
|
||||||
const [record] = records;
|
|
||||||
expect(record).toBeNull();
|
|
||||||
});
|
|
||||||
|
|
||||||
test('Delete name', async () => {
|
test('Delete name', async () => {
|
||||||
await registry.deleteName({ crn }, privateKey, fee);
|
await registry.deleteName({ crn }, privateKey, fee);
|
||||||
|
|
||||||
@ -241,6 +251,7 @@ const namingTests = () => {
|
|||||||
|
|
||||||
test('Delete already deleted name', async () => {
|
test('Delete already deleted name', async () => {
|
||||||
await registry.deleteName({ crn }, privateKey, fee);
|
await registry.deleteName({ crn }, privateKey, fee);
|
||||||
|
await registry.deleteName({ crn }, privateKey, fee);
|
||||||
|
|
||||||
const records = await registry.lookupNames([crn], true);
|
const records = await registry.lookupNames([crn], true);
|
||||||
expect(records).toBeDefined();
|
expect(records).toBeDefined();
|
||||||
@ -252,6 +263,22 @@ const namingTests = () => {
|
|||||||
expect(latest.id).toBe('');
|
expect(latest.id).toBe('');
|
||||||
expect(latest.height).toBeDefined();
|
expect(latest.height).toBeDefined();
|
||||||
});
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
test('Set name without reserving authority', async () => {
|
||||||
|
await expect(registry.setName({ crn: 'crn://not-reserved/app/test', cid: watcherId }, privateKey, fee))
|
||||||
|
.rejects.toThrow('Name authority not found.');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('Set name for non-owned authority', async () => {
|
||||||
|
await registry.sendCoins({ denom: 'aphoton', amount: '1000000000', destinationAddress: otherAccount.formattedCosmosAddress }, privateKey, fee);
|
||||||
|
|
||||||
|
// Other account reserves an authority.
|
||||||
|
await registry.reserveAuthority({ name: otherAuthorityName }, otherPrivateKey, fee);
|
||||||
|
|
||||||
|
// Try setting name under other authority.
|
||||||
|
await expect(registry.setName({ crn: `crn://${otherAuthorityName}/app/test`, cid: watcherId }, privateKey, fee)).rejects.toThrow('Access denied.');
|
||||||
|
});
|
||||||
|
|
||||||
test('Delete name for non-owned authority.', async () => {
|
test('Delete name for non-owned authority.', async () => {
|
||||||
const otherBondId = await registry.getNextBondId(otherPrivateKey);
|
const otherBondId = await registry.getNextBondId(otherPrivateKey);
|
||||||
@ -262,6 +289,23 @@ const namingTests = () => {
|
|||||||
// Try deleting name under other authority.
|
// Try deleting name under other authority.
|
||||||
await expect(registry.deleteName({ crn: `crn://${otherAuthorityName}/app/test` }, privateKey, fee)).rejects.toThrow('Access denied.');
|
await expect(registry.deleteName({ crn: `crn://${otherAuthorityName}/app/test` }, privateKey, fee)).rejects.toThrow('Access denied.');
|
||||||
});
|
});
|
||||||
|
|
||||||
|
test('Lookup non existing name', async () => {
|
||||||
|
const records = await registry.lookupNames(['crn://not-reserved/app/test']);
|
||||||
|
expect(records).toBeDefined();
|
||||||
|
expect(records).toHaveLength(1);
|
||||||
|
const [record] = records;
|
||||||
|
expect(record).toBeNull();
|
||||||
|
});
|
||||||
|
|
||||||
|
test('Resolve non existing name', async () => {
|
||||||
|
const records = await registry.resolveNames(['crn://not-reserved/app/test']);
|
||||||
|
expect(records).toBeDefined();
|
||||||
|
expect(records).toHaveLength(1);
|
||||||
|
const [record] = records;
|
||||||
|
expect(record).toBeNull();
|
||||||
|
});
|
||||||
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
if (process.env.TEST_AUCTIONS_ENABLED) {
|
if (process.env.TEST_AUCTIONS_ENABLED) {
|
||||||
|
Loading…
Reference in New Issue
Block a user