caver-js
Version:
caver-js is a JavaScript API library that allows developers to interact with a Kaia node
919 lines (732 loc) • 88.7 kB
JavaScript
/*
Copyright 2020 The caver-js Authors
This file is part of the caver-js library.
The caver-js library is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
The caver-js library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with the caver-js. If not, see <http://www.gnu.org/licenses/>.
*/
const chai = require('chai')
const sinon = require('sinon')
const sinonChai = require('sinon-chai')
const chaiAsPromised = require('chai-as-promised')
const RLP = require('eth-lib/lib/rlp')
chai.use(chaiAsPromised)
chai.use(sinonChai)
const expect = chai.expect
const { propertiesForUnnecessary } = require('../utils')
const testRPCURL = require('../../testrpc')
const Caver = require('../../../index')
const Keyring = require('../../../packages/caver-wallet/src/keyring/keyringFactory')
const SingleKeyring = require('../../../packages/caver-wallet/src/keyring/singleKeyring')
const TransactionHasher = require('../../../packages/caver-transaction/src/transactionHasher/transactionHasher')
const { generateRoleBasedKeyring, checkSignature, checkFeePayerSignature } = require('../utils')
let caver
let sender
let roleBasedKeyring
const txWithExpectedValues = {}
const sandbox = sinon.createSandbox()
const input =
'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'
before(() => {
caver = new Caver(testRPCURL)
sender = caver.wallet.add(caver.wallet.keyring.generate())
roleBasedKeyring = generateRoleBasedKeyring([3, 3, 3])
txWithExpectedValues.tx = {
from: '0x294f5bc8fadbd1079b191d9c47e1f217d6c987b4',
to: '0x',
value: '0x0',
input,
gas: '0x493e0',
gasPrice: '0x5d21dba00',
chainId: 2019,
nonce: '0xe',
codeFormat: 'EVM',
humanReadable: false,
feeRatio: 30,
signatures: [
[
'0x0fe9',
'0x8a20b415ae7cd642f7682e59b63cb81068723a18eb0d8d3ba58fa7545c4fc8a5',
'0x5ba8a86f4496f124f04293d4b0afec85ab3946b039d1f6a25424217508df5867',
],
],
feePayer: '0xc56a1fafa968d64d19b4b81c306ecbab6e489743',
feePayerSignatures: [
[
'0x0fe9',
'0xa525cba1b73cbe33b4df9be7165f8731b848ce3deba607690896eda8791a1a96',
'0x5ea75b4da1b6744bb98bc2b9748d0eca5c47714ea1c09e26bebc5de386ff9958',
],
],
}
txWithExpectedValues.rlpEncodingForSigning =
'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'
txWithExpectedValues.rlpEncodingForFeePayerSigning =
'0xf90247b9022af902272a0e8505d21dba00830493e0808094294f5bc8fadbd1079b191d9c47e1f217d6c987b4b901fe608060405234801561001057600080fd5b506101de806100206000396000f3006080604052600436106100615763ffffffff7c01000000000000000000000000000000000000000000000000000000006000350416631a39d8ef81146100805780636353586b146100a757806370a08231146100ca578063fd6b7ef8146100f8575b3360009081526001602052604081208054349081019091558154019055005b34801561008c57600080fd5b5061009561010d565b60408051918252519081900360200190f35b6100c873ffffffffffffffffffffffffffffffffffffffff60043516610113565b005b3480156100d657600080fd5b5061009573ffffffffffffffffffffffffffffffffffffffff60043516610147565b34801561010457600080fd5b506100c8610159565b60005481565b73ffffffffffffffffffffffffffffffffffffffff1660009081526001602052604081208054349081019091558154019055565b60016020526000908152604090205481565b336000908152600160205260408120805490829055908111156101af57604051339082156108fc029083906000818181858888f193505050501561019c576101af565b3360009081526001602052604090208190555b505600a165627a7a72305820627ca46bb09478a015762806cc00c431230501118c7c26c30ac58c4e09e51c4f0029801e8094c56a1fafa968d64d19b4b81c306ecbab6e4897438207e38080'
txWithExpectedValues.senderTxHash = '0xa5fabe514d238298f8ed8ee1431bad33cd5d1349ffcedaf488f28474dfe62be2'
txWithExpectedValues.transactionHash = '0x4f87bc437bc048f96f3a005fba82647a468bf1fde914fe60e3772192f929b58a'
txWithExpectedValues.rlpEncoding =
'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'
})
describe('TxTypeFeeDelegatedSmartContractDeployWithRatio', () => {
let transactionObj
let getGasPriceSpy
let getHeaderSpy
let getNonceSpy
let getChainIdSpy
beforeEach(() => {
transactionObj = {
from: sender.address,
input,
feeRatio: 30,
gas: '0x15f90',
}
getGasPriceSpy = sandbox.stub(caver.transaction.klaytnCall, 'getGasPrice')
getGasPriceSpy.returns('0x5d21dba00')
getHeaderSpy = sandbox.stub(caver.transaction.klaytnCall, 'getHeaderByNumber')
getHeaderSpy.returns({ baseFeePerGas: '0x5d21dba00' })
getNonceSpy = sandbox.stub(caver.transaction.klaytnCall, 'getTransactionCount')
getNonceSpy.returns('0x3a')
getChainIdSpy = sandbox.stub(caver.transaction.klaytnCall, 'getChainId')
getChainIdSpy.returns('0x7e3')
})
afterEach(() => {
sandbox.restore()
})
context('create feeDelegatedSmartContractDeployWithRatio instance', () => {
it('CAVERJS-UNIT-TRANSACTIONFDR-225: If feeDelegatedSmartContractDeployWithRatio not define from, return error', () => {
delete transactionObj.from
const expectedError = '"from" is missing'
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-227: If feeDelegatedSmartContractDeployWithRatio not define gas, return error', () => {
delete transactionObj.gas
const expectedError = '"gas" is missing'
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-228: If feeDelegatedSmartContractDeployWithRatio not define input, return error', () => {
delete transactionObj.input
const expectedError = '"input" is missing'
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-229: If feeDelegatedSmartContractDeployWithRatio not define feeRatio, return error', () => {
delete transactionObj.feeRatio
const expectedError = '"feeRatio" is missing'
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-230: If feeDelegatedSmartContractDeployWithRatio define from property with invalid address, return error', () => {
transactionObj.from = 'invalid'
const expectedError = `Invalid address of from: ${transactionObj.from}`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-231: If feeDelegatedSmartContractDeployWithRatio define feePayer property with invalid address, return error', () => {
transactionObj.feePayer = 'invalid'
const expectedError = `Invalid address of fee payer: ${transactionObj.feePayer}`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-232: If feeDelegatedSmartContractDeployWithRatio define codeFormat property with invalid codeFormat, return error', () => {
transactionObj.codeFormat = 'nonEVM'
const expectedError = `The codeFormat(${transactionObj.codeFormat}) is invalid.`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-233: If feeDelegatedSmartContractDeployWithRatio define humanReadable property with true, return error', () => {
transactionObj.humanReadable = true
const expectedError = `HumanReadableAddress is not supported yet.`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-524: If feeDelegatedSmartContractDeployWithRatio define feeRatio property with invalid value, return error', () => {
transactionObj.feeRatio = 'nonHexString'
let expectedError = `Invalid type fo feeRatio: feeRatio should be number type or hex number string.`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = {}
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = []
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = 0
expectedError = `Invalid feeRatio: feeRatio is out of range. [1, 99]`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = 100
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = -1
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
transactionObj.feeRatio = 101
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-234: If feeDelegatedSmartContractDeployWithRatio define feePayerSignatures property without feePayer, return error', () => {
transactionObj.feePayerSignatures = [
[
'0x26',
'0xf45cf8d7f88c08e6b6ec0b3b562f34ca94283e4689021987abb6b0772ddfd80a',
'0x298fe2c5aeabb6a518f4cbb5ff39631a5d88be505d3923374f65fdcf63c2955b',
],
]
const expectedError = '"feePayer" is missing: feePayer must be defined with feePayerSignatures.'
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-235: If feeDelegatedSmartContractDeployWithRatio define unnecessary property, return error', () => {
const unnecessaries = [
propertiesForUnnecessary.to,
propertiesForUnnecessary.failKey,
propertiesForUnnecessary.account,
propertiesForUnnecessary.key,
propertiesForUnnecessary.legacyKey,
propertiesForUnnecessary.publicKey,
propertiesForUnnecessary.failKey,
propertiesForUnnecessary.multisig,
propertiesForUnnecessary.roleTransactionKey,
propertiesForUnnecessary.roleAccountUpdateKey,
propertiesForUnnecessary.roleFeePayerKey,
propertiesForUnnecessary.accessList,
propertiesForUnnecessary.maxPriorityFeePerGas,
propertiesForUnnecessary.maxFeePerGas,
]
for (let i = 0; i < unnecessaries.length; i++) {
if (i > 0) delete transactionObj[unnecessaries[i - 1].name]
transactionObj[unnecessaries[i].name] = unnecessaries[i].value
const expectedError = `"${unnecessaries[i].name}" cannot be used with ${caver.transaction.type.TxTypeFeeDelegatedSmartContractDeployWithRatio} transaction`
expect(() => caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)).to.throw(expectedError)
}
})
})
context('feeDelegatedSmartContractDeployWithRatio.getRLPEncoding', () => {
it('CAVERJS-UNIT-TRANSACTIONFDR-236: Returns RLP-encoded string', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(txWithExpectedValues.tx)
expect(tx.getRLPEncoding()).to.equal(txWithExpectedValues.rlpEncoding)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-237: getRLPEncoding should throw error when nonce is undefined', () => {
transactionObj.chainId = 2019
transactionObj.gasPrice = '0x5d21dba00'
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `nonce is undefined. Define nonce in transaction or use 'transaction.fillTransaction' to fill values.`
expect(() => tx.getRLPEncoding()).to.throw(expectedError)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-238: getRLPEncoding should throw error when gasPrice is undefined', () => {
transactionObj.chainId = 2019
transactionObj.nonce = '0x3a'
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `gasPrice is undefined. Define gasPrice in transaction or use 'transaction.fillTransaction' to fill values.`
expect(() => tx.getRLPEncoding()).to.throw(expectedError)
})
})
context('feeDelegatedSmartContractDeployWithRatio.sign', () => {
const txHash = '0xe9a11d9ef95fb437f75d07ce768d43e74f158dd54b106e7d3746ce29d545b550'
let fillTransactionSpy
let createFromPrivateKeySpy
let senderSignSpy
let appendSignaturesSpy
let hasherSpy
let tx
beforeEach(() => {
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
fillTransactionSpy = sandbox.spy(tx, 'fillTransaction')
createFromPrivateKeySpy = sandbox.spy(Keyring, 'createFromPrivateKey')
senderSignSpy = sandbox.spy(sender, 'sign')
appendSignaturesSpy = sandbox.spy(tx, 'appendSignatures')
hasherSpy = sandbox.stub(TransactionHasher, 'getHashForSignature')
hasherSpy.returns(txHash)
})
afterEach(() => {
sandbox.restore()
})
function checkFunctionCall(customHasher = false) {
expect(fillTransactionSpy).to.have.been.calledOnce
expect(appendSignaturesSpy).to.have.been.calledOnce
if (!customHasher) expect(hasherSpy).to.have.been.calledWith(tx)
}
it('CAVERJS-UNIT-TRANSACTIONFDR-240: input: keyring. should sign transaction.', async () => {
await tx.sign(sender)
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignSpy).to.have.been.calledWith(txHash, '0x7e3', 0, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-241: input: private key string. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.sign(sender.key.privateKey)
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 0, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-242: input: KlaytnWalletKey. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.sign(sender.getKlaytnWalletKey())
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 0, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-243: input: keyring, index. should sign transaction with specific index.', async () => {
const roleBasedSignSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.from = roleBasedKeyring.address
await tx.sign(roleBasedKeyring, 1)
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignSpy).to.have.been.calledWith(txHash, '0x7e3', 0, 1)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-244: input: keyring, custom hasher. should use custom hasher.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
await tx.sign(sender, customHasher)
checkFunctionCall(true)
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 0, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-245: input: keyring, index, custom hasher. should use custom hasher when sign transaction.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
const roleBasedSignSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.from = roleBasedKeyring.address
await tx.sign(roleBasedKeyring, 1, customHasher)
checkFunctionCall(true)
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 0, 1)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-246: input: keyring. should throw error when from is different.', async () => {
transactionObj.from = roleBasedKeyring.address
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `The from address of the transaction is different with the address of the keyring to use.`
await expect(tx.sign(sender)).to.be.rejectedWith(expectedError)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-247: input: rolebased keyring, index out of range. should throw error.', async () => {
transactionObj.from = roleBasedKeyring.address
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `Invalid index(10): index must be less than the length of keys(${roleBasedKeyring.keys[0].length}).`
await expect(tx.sign(roleBasedKeyring, 10)).to.be.rejectedWith(expectedError)
}).timeout(200000)
})
context('feeDelegatedSmartContractDeployWithRatio.signAsFeePayer', () => {
const txHash = '0xe9a11d9ef95fb437f75d07ce768d43e74f158dd54b106e7d3746ce29d545b550'
let fillTransactionSpy
let createFromPrivateKeySpy
let senderSignSpy
let appendSignaturesSpy
let hasherSpy
let tx
beforeEach(() => {
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
tx.feePayer = sender.address
fillTransactionSpy = sandbox.spy(tx, 'fillTransaction')
createFromPrivateKeySpy = sandbox.spy(Keyring, 'createFromPrivateKey')
senderSignSpy = sandbox.spy(sender, 'sign')
appendSignaturesSpy = sandbox.spy(tx, 'appendFeePayerSignatures')
hasherSpy = sandbox.stub(TransactionHasher, 'getHashForFeePayerSignature')
hasherSpy.returns(txHash)
})
afterEach(() => {
sandbox.restore()
})
function checkFunctionCall(customHasher = false) {
expect(fillTransactionSpy).to.have.been.calledOnce
expect(appendSignaturesSpy).to.have.been.calledOnce
if (!customHasher) expect(hasherSpy).to.have.been.calledWith(tx)
}
it('CAVERJS-UNIT-TRANSACTIONFDR-248: input: keyring. If feePayer is not defined, should be set with keyring address.', async () => {
tx.feePayer = '0x'
await tx.signAsFeePayer(sender)
expect(tx.feePayer.toLowerCase()).to.equal(sender.address.toLowerCase())
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignSpy).to.have.been.calledWith(txHash, '0x7e3', 2, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-249: input: keyring. should sign transaction.', async () => {
await tx.signAsFeePayer(sender)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignSpy).to.have.been.calledWith(txHash, '0x7e3', 2, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-250: input: private key string. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.signAsFeePayer(sender.key.privateKey)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 2, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-251: input: KlaytnWalletKey. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.signAsFeePayer(sender.getKlaytnWalletKey())
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 2, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-252: input: keyring, index. should sign transaction with specific index.', async () => {
const roleBasedSignSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.feePayer = roleBasedKeyring.address
await tx.signAsFeePayer(roleBasedKeyring, 1)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignSpy).to.have.been.calledWith(txHash, '0x7e3', 2, 1)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-253: input: keyring, custom hasher. should use custom hasher.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
const roleBasedSignSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.feePayer = roleBasedKeyring.address
await tx.signAsFeePayer(roleBasedKeyring, customHasher)
checkFunctionCall(true)
checkFeePayerSignature(tx, { expectedLength: roleBasedKeyring.keys[2].length })
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 2, undefined)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-254: input: keyring, index, custom hasher. should use custom hasher when sign transaction.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
const roleBasedSignSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.feePayer = roleBasedKeyring.address
await tx.signAsFeePayer(roleBasedKeyring, 1, customHasher)
checkFunctionCall(true)
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 2, 1)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-255: input: keyring. should throw error when feePayer is different.', async () => {
tx.feePayer = roleBasedKeyring.address
const expectedError = `The feePayer address of the transaction is different with the address of the keyring to use.`
await expect(tx.signAsFeePayer(sender)).to.be.rejectedWith(expectedError)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-256: input: rolebased keyring, index out of range. should throw error.', async () => {
transactionObj.from = roleBasedKeyring.address
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `Invalid index(10): index must be less than the length of keys(${roleBasedKeyring.keys[0].length}).`
await expect(tx.signAsFeePayer(roleBasedKeyring, 10)).to.be.rejectedWith(expectedError)
}).timeout(200000)
})
context('feeDelegatedSmartContractDeployWithRatio.sign with multiple keys', () => {
const txHash = '0xe9a11d9ef95fb437f75d07ce768d43e74f158dd54b106e7d3746ce29d545b550'
let fillTransactionSpy
let createFromPrivateKeySpy
let senderSignWithKeysSpy
let appendSignaturesSpy
let hasherSpy
let tx
beforeEach(() => {
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
fillTransactionSpy = sandbox.spy(tx, 'fillTransaction')
createFromPrivateKeySpy = sandbox.spy(Keyring, 'createFromPrivateKey')
senderSignWithKeysSpy = sandbox.spy(sender, 'sign')
appendSignaturesSpy = sandbox.spy(tx, 'appendSignatures')
hasherSpy = sandbox.stub(TransactionHasher, 'getHashForSignature')
hasherSpy.returns(txHash)
})
afterEach(() => {
sandbox.restore()
})
function checkFunctionCall(customHasher = false) {
expect(fillTransactionSpy).to.have.been.calledOnce
expect(appendSignaturesSpy).to.have.been.calledOnce
if (!customHasher) expect(hasherSpy).to.have.been.calledWith(tx)
}
it('CAVERJS-UNIT-TRANSACTIONFDR-257: input: keyring. should sign transaction.', async () => {
await tx.sign(sender)
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignWithKeysSpy).to.have.been.calledWith(txHash, '0x7e3', 0)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-258: input: private key string. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.sign(sender.key.privateKey)
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 0)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-259: input: KlaytnWalletKey. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.sign(sender.getKlaytnWalletKey())
checkFunctionCall()
checkSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 0)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-260: input: keyring, custom hasher. should use custom hasher when sign transaction.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
await tx.sign(sender, customHasher)
checkFunctionCall(true)
checkSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignWithKeysSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 0)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-261: input: keyring. should throw error when from is different.', async () => {
transactionObj.from = roleBasedKeyring.address
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const expectedError = `The from address of the transaction is different with the address of the keyring to use.`
await expect(tx.sign(sender)).to.be.rejectedWith(expectedError)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-262: input: roleBased keyring. should sign with multiple keys and append signatures', async () => {
const roleBasedSignWithKeysSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.from = roleBasedKeyring.address
await tx.sign(roleBasedKeyring)
checkFunctionCall(true)
checkSignature(tx, { expectedLength: roleBasedKeyring.keys[0].length })
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignWithKeysSpy).to.have.been.calledWith(txHash, '0x7e3', 0)
}).timeout(200000)
})
context('feeDelegatedSmartContractDeployWithRatio.signAsFeePayer with multiple keys', () => {
const txHash = '0xe9a11d9ef95fb437f75d07ce768d43e74f158dd54b106e7d3746ce29d545b550'
let fillTransactionSpy
let createFromPrivateKeySpy
let senderSignWithKeysSpy
let appendSignaturesSpy
let hasherSpy
let tx
beforeEach(() => {
tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
fillTransactionSpy = sandbox.spy(tx, 'fillTransaction')
createFromPrivateKeySpy = sandbox.spy(Keyring, 'createFromPrivateKey')
senderSignWithKeysSpy = sandbox.spy(sender, 'sign')
appendSignaturesSpy = sandbox.spy(tx, 'appendFeePayerSignatures')
hasherSpy = sandbox.stub(TransactionHasher, 'getHashForFeePayerSignature')
hasherSpy.returns(txHash)
})
afterEach(() => {
sandbox.restore()
})
function checkFunctionCall(customHasher = false) {
expect(fillTransactionSpy).to.have.been.calledOnce
expect(appendSignaturesSpy).to.have.been.calledOnce
if (!customHasher) expect(hasherSpy).to.have.been.calledWith(tx)
}
it('CAVERJS-UNIT-TRANSACTIONFDR-263: input: keyring. If feePayer is not defined, should be set with keyring address.', async () => {
tx.feePayer = '0x'
await tx.signAsFeePayer(sender)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignWithKeysSpy).to.have.been.calledWith(txHash, '0x7e3', 2)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-264: input: keyring. should sign transaction.', async () => {
await tx.signAsFeePayer(sender)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignWithKeysSpy).to.have.been.calledWith(txHash, '0x7e3', 2)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-265: input: private key string. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.signAsFeePayer(sender.key.privateKey)
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 2)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-266: input: KlaytnWalletKey. should sign transaction.', async () => {
const signProtoSpy = sandbox.spy(SingleKeyring.prototype, 'sign')
await tx.signAsFeePayer(sender.getKlaytnWalletKey())
checkFunctionCall()
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).to.have.been.calledOnce
expect(signProtoSpy).to.have.been.calledWith(txHash, '0x7e3', 2)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-267: input: keyring, custom hasher. should use custom hasher when sign transaction.', async () => {
const hashForCustomHasher = '0x9e4b4835f6ea5ce55bd1037fe92040dd070af6154aefc30d32c65364a1123cae'
const customHasher = () => hashForCustomHasher
await tx.signAsFeePayer(sender, customHasher)
checkFunctionCall(true)
checkFeePayerSignature(tx)
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(senderSignWithKeysSpy).to.have.been.calledWith(hashForCustomHasher, '0x7e3', 2)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-268: input: keyring. should throw error when feePayer is different.', async () => {
tx.feePayer = roleBasedKeyring.address
const expectedError = `The feePayer address of the transaction is different with the address of the keyring to use.`
await expect(tx.signAsFeePayer(sender)).to.be.rejectedWith(expectedError)
}).timeout(200000)
it('CAVERJS-UNIT-TRANSACTIONFDR-269: input: roleBased keyring. should sign with multiple keys and append signatures', async () => {
const roleBasedSignWithKeysSpy = sandbox.spy(roleBasedKeyring, 'sign')
tx.feePayer = roleBasedKeyring.address
await tx.signAsFeePayer(roleBasedKeyring)
checkFunctionCall(true)
checkFeePayerSignature(tx, { expectedLength: roleBasedKeyring.keys[2].length })
expect(createFromPrivateKeySpy).not.to.have.been.calledOnce
expect(roleBasedSignWithKeysSpy).to.have.been.calledWith(txHash, '0x7e3', 2)
}).timeout(200000)
})
context('feeDelegatedSmartContractDeployWithRatio.appendSignatures', () => {
afterEach(() => {
sandbox.restore()
})
it('CAVERJS-UNIT-TRANSACTIONFDR-270: If signatures is empty, appendSignatures append signatures in transaction', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
]
tx.appendSignatures(sig)
checkSignature(tx)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-271: If signatures is empty, appendSignatures append signatures with two-dimensional signature array', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
[
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
],
]
tx.appendSignatures(sig)
checkSignature(tx)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-272: If signatures is not empty, appendSignatures should append signatures', () => {
transactionObj.signatures = [
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
]
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
'0x0fea',
'0x7a5011b41cfcb6270af1b5f8aeac8aeabb1edb436f028261b5add564de694700',
'0x23ac51660b8b421bf732ef8148d0d4f19d5e29cb97be6bccb5ae505ebe89eb4a',
]
tx.appendSignatures(sig)
checkSignature(tx, { expectedLength: 2 })
})
it('CAVERJS-UNIT-TRANSACTIONFDR-273: appendSignatures should append multiple signatures', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
[
'0x0fea',
'0xbde66cceed35a576010966338b7ded961f2c160c96f928e193b47aaf4480aa07',
'0x546eb193ec138523b7fd34c4f12a1a04d0f74470e8f3bbe91ce0b4ec16e7f0d2',
],
[
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
],
]
tx.appendSignatures(sig)
checkSignature(tx, { expectedLength: 2 })
})
})
context('feeDelegatedSmartContractDeployWithRatio.appendFeePayerSignatures', () => {
beforeEach(() => {
transactionObj.feePayer = '0x90b3e9a3770481345a7f17f22f16d020bccfd33e'
})
afterEach(() => {
sandbox.restore()
})
it('CAVERJS-UNIT-TRANSACTIONFDR-274: If feePayerSignatures is empty, appendFeePayerSignatures append feePayerSignatures in transaction', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
]
tx.appendFeePayerSignatures(sig)
checkFeePayerSignature(tx)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-275: If feePayerSignatures is empty, appendFeePayerSignatures append feePayerSignatures with two-dimensional signature array', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
[
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
],
]
tx.appendFeePayerSignatures(sig)
checkFeePayerSignature(tx)
})
it('CAVERJS-UNIT-TRANSACTIONFDR-276: If feePayerSignatures is not empty, appendFeePayerSignatures should append feePayerSignatures', () => {
transactionObj.feePayerSignatures = [
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
]
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
'0x0fea',
'0x7a5011b41cfcb6270af1b5f8aeac8aeabb1edb436f028261b5add564de694700',
'0x23ac51660b8b421bf732ef8148d0d4f19d5e29cb97be6bccb5ae505ebe89eb4a',
]
tx.appendFeePayerSignatures(sig)
checkFeePayerSignature(tx, { expectedLength: 2 })
})
it('CAVERJS-UNIT-TRANSACTIONFDR-277: appendFeePayerSignatures should append multiple feePayerSignatures', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const sig = [
[
'0x0fea',
'0xbde66cceed35a576010966338b7ded961f2c160c96f928e193b47aaf4480aa07',
'0x546eb193ec138523b7fd34c4f12a1a04d0f74470e8f3bbe91ce0b4ec16e7f0d2',
],
[
'0x0fea',
'0xade9480f584fe481bf070ab758ecc010afa15debc33e1bd75af637d834073a6e',
'0x38160105d78cef4529d765941ad6637d8dcf6bd99310e165fee1c39fff2aa27e',
],
]
tx.appendFeePayerSignatures(sig)
checkFeePayerSignature(tx, { expectedLength: 2 })
})
})
context('feeDelegatedSmartContractDeployWithRatio.combineSignedRawTransactions', () => {
beforeEach(() => {
transactionObj = {
from: '0x2b2043ef30fd370997404397156ccc8d4fe6c04a',
to: '0x',
value: '0x0',
input,
gas: '0x493e0',
humanReadable: false,
codeFormat: 'EVM',
feeRatio: 30,
nonce: '0x1',
gasPrice: '0x5d21dba00',
chainId: '0x7e3',
}
})
afterEach(() => {
sandbox.restore()
})
it('CAVERJS-UNIT-TRANSACTIONFDR-278: combineSignedRawTransactions combines single signature and sets signatures in transaction', () => {
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const appendSignaturesSpy = sandbox.spy(tx, 'appendSignatures')
const getRLPEncodingSpy = sandbox.spy(tx, 'getRLPEncoding')
const rlpEncoded =
'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'
const combined = tx.combineSignedRawTransactions([rlpEncoded])
const expectedSignatures = [
[
'0x0fe9',
'0xf7c0b0d305325ae87e8d63aaa771312764931c7cf27bcd516218de5d48f63fc9',
'0x45226063f9a529afeefc10e2f0e5f5c1c551d8fb9ebb0e6cb88d6c62262e0cd2',
],
]
expect(appendSignaturesSpy).to.have.been.calledOnce
expect(getRLPEncodingSpy).to.have.been.calledOnce
expect(combined).to.equal(rlpEncoded)
checkSignature(tx, { expectedSignatures })
})
it('CAVERJS-UNIT-TRANSACTIONFDR-279: combineSignedRawTransactions combines multiple signatures and sets signatures in transaction', () => {
transactionObj.signatures = [
[
'0x0fe9',
'0xf7c0b0d305325ae87e8d63aaa771312764931c7cf27bcd516218de5d48f63fc9',
'0x45226063f9a529afeefc10e2f0e5f5c1c551d8fb9ebb0e6cb88d6c62262e0cd2',
],
]
const tx = caver.transaction.feeDelegatedSmartContractDeployWithRatio.create(transactionObj)
const rlpEncodedStrings = [
'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',
'0x2af90275018505d21dba00830493e08080942b2043ef30fd370997404397156ccc8d4fe6c04ab901fe608060405234801561001057600080fd5b506101de806100206000396000f30060806040