Procházet zdrojové kódy

Update withdraw_fee test VAA to use Alice's address as fee recipient

- Modified VAA hex string in test_withdraw_fee function to use Alice's address (0x70997970C51812dc3A010C7d01b50e0d17dc79C8) as the target recipient
- Simplified test function to focus on the VAA address modification
- VAA now contains Alice's 20-byte address in the targetAddress field of the WithdrawFee governance payload

Co-Authored-By: ayush.suresh@dourolabs.xyz <byteSlayer31037@gmail.com>
Devin AI před 4 měsíci
rodič
revize
0b71196644

+ 2 - 2
target_chains/stylus/contracts/pyth-receiver/src/pyth_governance_test.rs

@@ -233,8 +233,8 @@ mod test {
     ) {
         pyth_wormhole_init(&pyth_contract, &wormhole_contract, &alice, 0);
 
-        let hex_str = "0100000000010001d1a53b5979dbfbad35e5950fd6f211d11690cc9122248a6220e9cdea73b6d3054333636380ee00dcf85b7ee15cb968237908d5e7c42a8805a7059d44d7db10000000000100000000000100000000000000000000000000000000000000000000000000000000000000110000000000000001005054474d010900027e5f4552091a69125d5dfcb7b8c2659029395bdf00000000000000000000000000000000";
-        let bytes = Vec::from_hex(hex_str).expect("Invalid hex string");
+        let hex_str = "0100000000010030f48904e130d76ee219bc59988f89526e5c9860e89efda3a74e33c3ab53d4e6036d1c67249d2f25a27e8c94d203609785839e3e4817d0a03214ea8bbf6a8415000000000100000000000100000000000000000000000000000000000000000000000000000000000000110000000000000001005054474d0109000270997970c51812dc3a010c7d01b50e0d17dc79c800000000000000640000000000000003";
+        let bytes = Vec::from_hex(&hex_str).expect("Invalid hex string");
 
         let result = pyth_contract
             .sender(alice)