2022-04-05 09:20:12 +00:00
|
|
|
import assert from 'assert';
|
2022-04-08 05:29:03 +00:00
|
|
|
import path from 'path';
|
2022-04-08 10:32:24 +00:00
|
|
|
import semver from 'semver';
|
2022-04-05 09:20:12 +00:00
|
|
|
|
|
|
|
import { Account } from './account';
|
2022-04-05 05:31:10 +00:00
|
|
|
import { Registry } from './index';
|
2022-04-08 10:32:24 +00:00
|
|
|
import { getBaseConfig, getConfig } from './testing/helper';
|
2022-04-08 05:29:03 +00:00
|
|
|
|
2022-04-08 10:32:24 +00:00
|
|
|
const WATCHER_1_ID = 'bafyreif7z4lbftuxkj7nu4bl7xihitqvhus3wmoqdkjo7lwv24j6fkfskm'
|
|
|
|
const WATCHER_2_ID = 'bafyreiaplz7n2bddg3xhkeuiavwnku7xta2s2cfyaza37ytv4vw367exo4'
|
2022-04-08 05:29:03 +00:00
|
|
|
const WATCHER_YML_PATH = path.join(__dirname, './testing/data/watcher.yml');
|
2022-04-05 05:31:10 +00:00
|
|
|
|
|
|
|
jest.setTimeout(120 * 1000);
|
|
|
|
|
2022-04-05 14:11:06 +00:00
|
|
|
const { chainId, restEndpoint, gqlEndpoint, privateKey, accountAddress, fee } = getConfig();
|
2022-04-05 05:31:10 +00:00
|
|
|
|
|
|
|
const namingTests = () => {
|
|
|
|
let registry: Registry;
|
2022-04-08 10:32:24 +00:00
|
|
|
|
2022-04-05 05:31:10 +00:00
|
|
|
let bondId: string;
|
2022-04-08 05:29:03 +00:00
|
|
|
let watcher: any;
|
|
|
|
let watcherId: string;
|
2022-04-08 10:32:24 +00:00
|
|
|
|
2022-04-05 05:31:10 +00:00
|
|
|
let authorityName: string;
|
2022-04-08 10:32:24 +00:00
|
|
|
let otherAuthorityName: string;
|
|
|
|
let otherPrivateKey: string;
|
2022-04-08 12:32:47 +00:00
|
|
|
let otherAccountAddress: string;
|
2022-04-08 10:32:24 +00:00
|
|
|
|
2022-04-08 05:29:03 +00:00
|
|
|
let wrn: string;
|
2022-04-05 05:31:10 +00:00
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
registry = new Registry(restEndpoint, gqlEndpoint, chainId);
|
|
|
|
|
|
|
|
// Create bond.
|
|
|
|
bondId = await registry.getNextBondId(accountAddress);
|
|
|
|
await registry.createBond({ denom: 'aphoton', amount: '1000000000' }, accountAddress, privateKey, fee);
|
2022-04-08 05:29:03 +00:00
|
|
|
|
|
|
|
// Create bot.
|
2022-04-08 10:32:24 +00:00
|
|
|
// TODO: Use ensureUpdatedConfig from helper.
|
|
|
|
watcher = await getBaseConfig(WATCHER_YML_PATH);
|
2022-04-08 05:29:03 +00:00
|
|
|
const result = await registry.setRecord(
|
|
|
|
{
|
|
|
|
privateKey,
|
|
|
|
bondId,
|
|
|
|
record: watcher.record
|
|
|
|
},
|
|
|
|
accountAddress,
|
|
|
|
privateKey,
|
|
|
|
fee
|
|
|
|
)
|
|
|
|
|
|
|
|
// TODO: Get id from setRecord response.
|
|
|
|
// watcherId = result.data;
|
2022-04-08 10:32:24 +00:00
|
|
|
watcherId = WATCHER_1_ID;
|
2022-04-05 05:31:10 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Reserve authority.', async () => {
|
|
|
|
authorityName = `dxos-${Date.now()}`;
|
|
|
|
await registry.reserveAuthority({ name: authorityName, owner: accountAddress }, accountAddress, privateKey, fee);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Lookup authority.', async () => {
|
|
|
|
const [record] = await registry.lookupAuthorities([authorityName]);
|
|
|
|
|
|
|
|
expect(record).toBeDefined();
|
|
|
|
expect(record.ownerAddress).not.toBe('');
|
|
|
|
expect(record.ownerPublicKey).not.toBe('');
|
|
|
|
expect(Number(record.height)).toBeGreaterThan(0);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Lookup non existing authority', async () => {
|
|
|
|
const [record] = await registry.lookupAuthorities(['does-not-exist']);
|
|
|
|
|
|
|
|
expect(record.ownerAddress).toBe('');
|
|
|
|
expect(record.ownerPublicKey).toBe('');
|
|
|
|
expect(Number(record.height)).toBe(0);
|
|
|
|
});
|
2022-04-05 09:20:12 +00:00
|
|
|
|
2022-04-11 06:58:14 +00:00
|
|
|
test('Reserve already reserved authority', async () => {
|
2022-04-05 09:20:12 +00:00
|
|
|
await expect(registry.reserveAuthority({ name: authorityName, owner: accountAddress }, accountAddress, privateKey, fee)).rejects.toThrow('Name already reserved.');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Reserve sub-authority.', async () => {
|
|
|
|
const subAuthority = `echo.${authorityName}`;
|
|
|
|
await registry.reserveAuthority({ name: subAuthority, owner: accountAddress }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const [record] = await registry.lookupAuthorities([subAuthority]);
|
|
|
|
expect(record).toBeDefined();
|
|
|
|
expect(record.ownerAddress).not.toBe('');
|
|
|
|
expect(record.ownerPublicKey).not.toBe('');
|
|
|
|
expect(Number(record.height)).toBeGreaterThan(0);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Reserve sub-authority with different owner.', async () => {
|
|
|
|
// Create another account, send tx to set public key on the account.
|
|
|
|
const mnenonic1 = Account.generateMnemonic();
|
|
|
|
const otherAccount1 = await Account.generateFromMnemonic(mnenonic1);
|
|
|
|
await otherAccount1.init()
|
|
|
|
assert(otherAccount1.formattedCosmosAddress)
|
|
|
|
await registry.sendCoins({ denom: 'aphoton', amount: '1000000000', destinationAddress: otherAccount1.formattedCosmosAddress }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const mnenonic2 = Account.generateMnemonic();
|
|
|
|
const otherAccount2 = await Account.generateFromMnemonic(mnenonic2);
|
|
|
|
await otherAccount2.init()
|
|
|
|
assert(otherAccount2.formattedCosmosAddress)
|
|
|
|
await registry.sendCoins({ denom: 'aphoton', amount: '10', destinationAddress: otherAccount2.formattedCosmosAddress }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const subAuthority = `halo.${authorityName}`;
|
|
|
|
await registry.reserveAuthority({ name: subAuthority, owner: otherAccount1.formattedCosmosAddress }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const [record] = await registry.lookupAuthorities([subAuthority]);
|
|
|
|
expect(record).toBeDefined();
|
|
|
|
expect(record.ownerAddress).toBeDefined();
|
|
|
|
expect(record.ownerAddress).toBe(otherAccount1.formattedCosmosAddress);
|
|
|
|
expect(record.ownerPublicKey).toBeDefined();
|
|
|
|
expect(Number(record.height)).toBeGreaterThan(0);
|
|
|
|
});
|
2022-04-08 05:29:03 +00:00
|
|
|
|
2022-04-11 06:58:14 +00:00
|
|
|
test('Set name for unbonded authority', async () => {
|
2022-04-08 05:29:03 +00:00
|
|
|
wrn = `wrn://${authorityName}/app/test`;
|
|
|
|
assert(watcherId)
|
|
|
|
await expect(registry.setName({ wrn, cid: watcherId }, accountAddress, privateKey, fee)).rejects.toThrow('Authority bond not found.');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Set authority bond', async () => {
|
|
|
|
await registry.setAuthorityBond({ name: authorityName, bondId }, accountAddress, privateKey, fee);
|
|
|
|
});
|
2022-04-08 10:32:24 +00:00
|
|
|
|
|
|
|
test('Set name', async () => {
|
|
|
|
wrn = `wrn://${authorityName}/app/test`;
|
|
|
|
await registry.setName({ wrn, cid: watcherId }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
// Query records should return it (some WRN points to it).
|
|
|
|
const records = await registry.queryRecords({ type: 'watcher', version: watcher.record.version });
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
// TODO: Fix queryRecords to return filtered results.
|
|
|
|
// expect(records).toHaveLength(1);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Lookup name', async () => {
|
|
|
|
const records = await registry.lookupNames([wrn]);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
|
|
|
|
const [{ latest, history }] = records;
|
|
|
|
expect(latest).toBeDefined();
|
|
|
|
expect(latest.id).toBeDefined();
|
|
|
|
expect(latest.id).toBe(watcherId);
|
|
|
|
expect(latest.height).toBeDefined();
|
|
|
|
expect(history).toBeUndefined();
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Resolve name', async () => {
|
|
|
|
const records = await registry.resolveNames([wrn]);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
|
|
|
|
const [{ attributes }] = records;
|
2022-04-08 12:32:47 +00:00
|
|
|
expect(attributes).toEqual(watcher.record);
|
2022-04-08 10:32:24 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Lookup name with history', async () => {
|
|
|
|
// TODO: Use ensureUpdatedConfig from helper.
|
|
|
|
const updatedWatcher = await getBaseConfig(WATCHER_YML_PATH);
|
|
|
|
updatedWatcher.record.version = semver.inc(updatedWatcher.record.version, 'patch');
|
|
|
|
const result = await registry.setRecord(
|
|
|
|
{
|
|
|
|
privateKey,
|
|
|
|
bondId,
|
|
|
|
record: updatedWatcher.record
|
|
|
|
},
|
|
|
|
accountAddress,
|
|
|
|
privateKey,
|
|
|
|
fee
|
|
|
|
)
|
|
|
|
|
|
|
|
// TODO: Get id from setRecord response.
|
|
|
|
// const updatedWatcherId = result.data;
|
|
|
|
const updatedWatcherId = WATCHER_2_ID;
|
|
|
|
await registry.setName({ wrn, cid: updatedWatcherId }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const records = await registry.lookupNames([wrn], true);
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
|
|
|
|
const [{ latest, history }] = records;
|
|
|
|
expect(latest).toBeDefined();
|
|
|
|
expect(latest.id).toBeDefined();
|
|
|
|
expect(latest.id).toBe(updatedWatcherId);
|
|
|
|
expect(latest.height).toBeDefined();
|
|
|
|
expect(history).toBeDefined();
|
|
|
|
expect(history).toHaveLength(1);
|
|
|
|
|
|
|
|
const [oldRecord] = history;
|
|
|
|
expect(oldRecord).toBeDefined();
|
|
|
|
expect(oldRecord.id).toBeDefined();
|
|
|
|
expect(oldRecord.id).toBe(watcherId);
|
|
|
|
expect(oldRecord.height).toBeDefined();
|
|
|
|
});
|
|
|
|
|
2022-04-11 06:58:14 +00:00
|
|
|
test('Set name without reserving authority', async () => {
|
2022-04-08 10:32:24 +00:00
|
|
|
await expect(registry.setName({ wrn: 'wrn://not-reserved/app/test', cid: watcherId }, accountAddress, privateKey, fee))
|
|
|
|
.rejects.toThrow('Name authority not found.');
|
|
|
|
});
|
|
|
|
|
|
|
|
xtest('Set name for non-owned authority', async () => {
|
|
|
|
// Create another account.
|
|
|
|
const mnenonic = Account.generateMnemonic();
|
|
|
|
const otherAccount = await Account.generateFromMnemonic(mnenonic);
|
|
|
|
await otherAccount.init()
|
|
|
|
// TODO: Get correct account address from private key.
|
2022-04-08 12:32:47 +00:00
|
|
|
assert(otherAccount.formattedCosmosAddress);
|
|
|
|
otherAccountAddress = otherAccount.formattedCosmosAddress
|
|
|
|
await registry.sendCoins({ denom: 'aphoton', amount: '1000000000', destinationAddress: otherAccountAddress }, accountAddress, privateKey, fee);
|
2022-04-08 10:32:24 +00:00
|
|
|
|
|
|
|
// Other account reserves an authority.
|
|
|
|
otherAuthorityName = `other-${Date.now()}`;
|
|
|
|
otherPrivateKey = otherAccount.privateKey.toString('hex');
|
2022-04-08 12:32:47 +00:00
|
|
|
await registry.reserveAuthority({ name: otherAuthorityName, owner: otherAccountAddress }, otherAccountAddress, otherPrivateKey, fee);
|
2022-04-08 10:32:24 +00:00
|
|
|
|
|
|
|
// Try setting name under other authority.
|
|
|
|
await expect(registry.setName({ wrn: `wrn://${otherAuthorityName}/app/test`, cid: watcherId }, accountAddress, privateKey, fee)).rejects.toThrow('Access denied.');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Lookup non existing name', async () => {
|
|
|
|
const records = await registry.lookupNames(['wrn://not-reserved/app/test']);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
const [record] = records;
|
|
|
|
expect(record).toBeNull();
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Resolve non existing name', async () => {
|
|
|
|
const records = await registry.resolveNames(['wrn://not-reserved/app/test']);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
const [record] = records;
|
|
|
|
expect(record).toBeNull();
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Delete name', async () => {
|
|
|
|
await registry.deleteName({ wrn }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
let records = await registry.lookupNames([wrn], true);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
|
|
|
|
const [{ latest }] = records;
|
|
|
|
expect(latest).toBeDefined();
|
|
|
|
expect(latest.id).toBeDefined();
|
|
|
|
expect(latest.id).toBe('');
|
|
|
|
expect(latest.height).toBeDefined();
|
|
|
|
|
|
|
|
// Query records should NOT return it (no WRN points to it).
|
|
|
|
records = await registry.queryRecords({ type: 'watcher', version: watcher.record.version });
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
// TODO: Fix queryRecords to return filtered results.
|
|
|
|
// expect(records).toHaveLength(0);
|
|
|
|
|
|
|
|
// Query all records should return it (all: true).
|
|
|
|
records = await registry.queryRecords({ type: 'watcher', version: watcher.record.version }, true);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
// expect(records).toHaveLength(1);
|
|
|
|
});
|
2022-04-08 12:32:47 +00:00
|
|
|
|
|
|
|
test('Delete already deleted name', async () => {
|
|
|
|
await registry.deleteName({ wrn }, accountAddress, privateKey, fee);
|
|
|
|
|
|
|
|
const records = await registry.lookupNames([wrn], true);
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toBeDefined();
|
|
|
|
expect(records).toHaveLength(1);
|
|
|
|
|
|
|
|
const [{ latest }] = records;
|
|
|
|
expect(latest).toBeDefined();
|
|
|
|
expect(latest.id).toBeDefined();
|
|
|
|
expect(latest.id).toBe('');
|
|
|
|
expect(latest.height).toBeDefined();
|
|
|
|
});
|
|
|
|
|
|
|
|
xtest('Delete name for non-owned authority.', async () => {
|
|
|
|
const otherBondId = await registry.getNextBondId(otherPrivateKey);
|
|
|
|
await registry.createBond({ denom: 'aphoton', amount: '10000' }, otherAccountAddress, otherPrivateKey, fee);
|
|
|
|
await registry.setAuthorityBond({ name: otherAuthorityName, bondId: otherBondId }, otherAccountAddress, otherPrivateKey, fee);
|
|
|
|
await registry.setName({ wrn: `wrn://${otherAuthorityName}/app/test`, cid: watcherId }, otherAccountAddress, otherPrivateKey, fee);
|
|
|
|
|
|
|
|
// Try deleting name under other authority.
|
|
|
|
await expect(registry.deleteName({ wrn: `wrn://${otherAuthorityName}/app/test` }, accountAddress, privateKey, fee)).rejects.toThrow('Access denied.');
|
|
|
|
});
|
2022-04-05 05:31:10 +00:00
|
|
|
};
|
|
|
|
|
2022-04-05 14:11:06 +00:00
|
|
|
if (process.env.AUCTIONS_ENABLED) {
|
2022-04-05 05:31:10 +00:00
|
|
|
// Required as jest complains if file has no tests.
|
|
|
|
test('skipping naming tests', () => {});
|
|
|
|
} else {
|
|
|
|
describe('Naming', namingTests);
|
|
|
|
}
|