Some checks failed
Build SimApp / build (amd64) (push) Waiting to run
Build SimApp / build (arm64) (push) Waiting to run
CodeQL / Analyze (push) Waiting to run
Build & Push / build (push) Waiting to run
Run Gosec / Gosec (push) Waiting to run
Lint / golangci-lint (push) Waiting to run
Checks dependencies and mocks generation / Check go mod tidy (push) Waiting to run
Checks dependencies and mocks generation / Check up to date mocks (push) Waiting to run
System Tests / setup (push) Waiting to run
System Tests / test-system (push) Blocked by required conditions
System Tests / test-system-legacy (push) Blocked by required conditions
Tests / Code Coverage / split-test-files (push) Waiting to run
Tests / Code Coverage / tests (00) (push) Blocked by required conditions
Tests / Code Coverage / tests (01) (push) Blocked by required conditions
Tests / Code Coverage / tests (02) (push) Blocked by required conditions
Tests / Code Coverage / tests (03) (push) Blocked by required conditions
Tests / Code Coverage / test-integration (push) Waiting to run
Tests / Code Coverage / test-e2e (push) Waiting to run
Tests / Code Coverage / repo-analysis (push) Blocked by required conditions
Tests / Code Coverage / test-sim-nondeterminism (push) Waiting to run
Tests / Code Coverage / test-clientv2 (push) Waiting to run
Tests / Code Coverage / test-core (push) Waiting to run
Tests / Code Coverage / test-depinject (push) Waiting to run
Tests / Code Coverage / test-errors (push) Waiting to run
Tests / Code Coverage / test-math (push) Waiting to run
Tests / Code Coverage / test-schema (push) Waiting to run
Tests / Code Coverage / test-collections (push) Waiting to run
Tests / Code Coverage / test-cosmovisor (push) Waiting to run
Tests / Code Coverage / test-confix (push) Waiting to run
Tests / Code Coverage / test-store (push) Waiting to run
Tests / Code Coverage / test-log (push) Waiting to run
Tests / Code Coverage / test-x-tx (push) Waiting to run
Tests / Code Coverage / test-x-nft (push) Waiting to run
Tests / Code Coverage / test-x-circuit (push) Waiting to run
Tests / Code Coverage / test-x-feegrant (push) Waiting to run
Tests / Code Coverage / test-x-evidence (push) Waiting to run
Tests / Code Coverage / test-x-upgrade (push) Waiting to run
Tests / Code Coverage / test-tools-benchmark (push) Waiting to run
Build & Push SDK Proto Builder / build (push) Has been cancelled
174 lines
5.2 KiB
Go
174 lines
5.2 KiB
Go
package tx
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
protov2 "google.golang.org/protobuf/proto"
|
|
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
codectypes "github.com/cosmos/cosmos-sdk/codec/types"
|
|
"github.com/cosmos/cosmos-sdk/testutil/testdata"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
txtypes "github.com/cosmos/cosmos-sdk/types/tx"
|
|
signingtypes "github.com/cosmos/cosmos-sdk/types/tx/signing"
|
|
"github.com/cosmos/cosmos-sdk/x/auth/signing"
|
|
)
|
|
|
|
func TestDirectModeHandler(t *testing.T) {
|
|
privKey, pubkey, addr := testdata.KeyTestPubAddr()
|
|
interfaceRegistry := codectypes.NewInterfaceRegistry()
|
|
interfaceRegistry.RegisterImplementations((*sdk.Msg)(nil), &testdata.TestMsg{})
|
|
marshaler := codec.NewProtoCodec(interfaceRegistry)
|
|
|
|
txConfig := NewTxConfig(marshaler, []signingtypes.SignMode{signingtypes.SignMode_SIGN_MODE_DIRECT})
|
|
txBuilder := txConfig.NewTxBuilder()
|
|
|
|
memo := "sometestmemo"
|
|
msgs := []sdk.Msg{testdata.NewTestMsg(addr)}
|
|
accSeq := uint64(2) // Arbitrary account sequence
|
|
any, err := codectypes.NewAnyWithValue(pubkey)
|
|
require.NoError(t, err)
|
|
|
|
var signerInfo []*txtypes.SignerInfo
|
|
signerInfo = append(signerInfo, &txtypes.SignerInfo{
|
|
PublicKey: any,
|
|
ModeInfo: &txtypes.ModeInfo{
|
|
Sum: &txtypes.ModeInfo_Single_{
|
|
Single: &txtypes.ModeInfo_Single{
|
|
Mode: signingtypes.SignMode_SIGN_MODE_DIRECT,
|
|
},
|
|
},
|
|
},
|
|
Sequence: accSeq,
|
|
})
|
|
|
|
sigData := &signingtypes.SingleSignatureData{
|
|
SignMode: signingtypes.SignMode_SIGN_MODE_DIRECT,
|
|
}
|
|
sig := signingtypes.SignatureV2{
|
|
PubKey: pubkey,
|
|
Data: sigData,
|
|
Sequence: accSeq,
|
|
}
|
|
|
|
fee := txtypes.Fee{Amount: sdk.NewCoins(sdk.NewInt64Coin("atom", 150)), GasLimit: 20000}
|
|
|
|
err = txBuilder.SetMsgs(msgs...)
|
|
require.NoError(t, err)
|
|
txBuilder.SetMemo(memo)
|
|
txBuilder.SetFeeAmount(fee.Amount)
|
|
txBuilder.SetGasLimit(fee.GasLimit)
|
|
|
|
err = txBuilder.SetSignatures(sig)
|
|
require.NoError(t, err)
|
|
|
|
t.Log("verify modes and default-mode")
|
|
defaultSignMode, err := signing.APISignModeToInternal(txConfig.SignModeHandler().DefaultMode())
|
|
require.NoError(t, err)
|
|
require.Equal(t, defaultSignMode, signingtypes.SignMode_SIGN_MODE_DIRECT)
|
|
require.Len(t, txConfig.SignModeHandler().SupportedModes(), 1)
|
|
|
|
signingData := signing.SignerData{
|
|
Address: addr.String(),
|
|
ChainID: "test-chain",
|
|
AccountNumber: 1,
|
|
PubKey: pubkey,
|
|
}
|
|
|
|
signBytes, err := signing.GetSignBytesAdapter(
|
|
context.Background(), txConfig.SignModeHandler(), defaultSignMode, signingData,
|
|
txBuilder.GetTx())
|
|
require.NoError(t, err)
|
|
require.NotNil(t, signBytes)
|
|
|
|
authInfo := &txtypes.AuthInfo{
|
|
Fee: &fee,
|
|
SignerInfos: signerInfo,
|
|
}
|
|
|
|
authInfoBytes := marshaler.MustMarshal(authInfo)
|
|
|
|
anys := make([]*codectypes.Any, len(msgs))
|
|
|
|
for i, msg := range msgs {
|
|
var err error
|
|
anys[i], err = codectypes.NewAnyWithValue(msg)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
txBody := &txtypes.TxBody{
|
|
Memo: memo,
|
|
Messages: anys,
|
|
}
|
|
bodyBytes := marshaler.MustMarshal(txBody)
|
|
|
|
t.Log("verify GetSignBytes with generating sign bytes by marshaling SignDoc")
|
|
signDoc := txtypes.SignDoc{
|
|
AccountNumber: 1,
|
|
AuthInfoBytes: authInfoBytes,
|
|
BodyBytes: bodyBytes,
|
|
ChainId: "test-chain",
|
|
}
|
|
|
|
expectedSignBytes, err := signDoc.Marshal()
|
|
require.NoError(t, err)
|
|
require.Equal(t, expectedSignBytes, signBytes)
|
|
|
|
t.Log("verify that setting signature doesn't change sign bytes")
|
|
sigData.Signature, err = privKey.Sign(signBytes)
|
|
require.NoError(t, err)
|
|
err = txBuilder.SetSignatures(sig)
|
|
require.NoError(t, err)
|
|
signBytes, err = signing.GetSignBytesAdapter(
|
|
context.Background(), txConfig.SignModeHandler(), defaultSignMode, signingData,
|
|
txBuilder.GetTx())
|
|
require.NoError(t, err)
|
|
require.Equal(t, expectedSignBytes, signBytes)
|
|
|
|
t.Log("verify GetSignBytes with false txBody data")
|
|
signDoc.BodyBytes = []byte("dfafdasfds")
|
|
expectedSignBytes, err = signDoc.Marshal()
|
|
require.NoError(t, err)
|
|
require.NotEqual(t, expectedSignBytes, signBytes)
|
|
}
|
|
|
|
func TestDirectModeHandler_nonDIRECT_MODE(t *testing.T) {
|
|
invalidModes := []signingtypes.SignMode{
|
|
signingtypes.SignMode_SIGN_MODE_TEXTUAL,
|
|
signingtypes.SignMode_SIGN_MODE_LEGACY_AMINO_JSON,
|
|
signingtypes.SignMode_SIGN_MODE_UNSPECIFIED,
|
|
}
|
|
for _, invalidMode := range invalidModes {
|
|
t.Run(invalidMode.String(), func(t *testing.T) {
|
|
var dh signModeDirectHandler
|
|
var signingData signing.SignerData
|
|
_, err := dh.GetSignBytes(invalidMode, signingData, nil)
|
|
require.Error(t, err)
|
|
wantErr := fmt.Errorf("expected %s, got %s", signingtypes.SignMode_SIGN_MODE_DIRECT, invalidMode)
|
|
require.Equal(t, err, wantErr)
|
|
})
|
|
}
|
|
}
|
|
|
|
type nonProtoTx int
|
|
|
|
func (npt *nonProtoTx) GetMsgs() []sdk.Msg { return nil }
|
|
func (npt *nonProtoTx) GetMsgsV2() ([]protov2.Message, error) { return nil, nil }
|
|
func (npt *nonProtoTx) ValidateBasic() error { return nil }
|
|
|
|
var _ sdk.Tx = (*nonProtoTx)(nil)
|
|
|
|
func TestDirectModeHandler_nonProtoTx(t *testing.T) {
|
|
var dh signModeDirectHandler
|
|
var signingData signing.SignerData
|
|
tx := new(nonProtoTx)
|
|
_, err := dh.GetSignBytes(signingtypes.SignMode_SIGN_MODE_DIRECT, signingData, tx)
|
|
require.Error(t, err)
|
|
wantErr := fmt.Errorf("can only handle a protobuf Tx, got %T", tx)
|
|
require.Equal(t, err, wantErr)
|
|
}
|