|
@@ -1,507 +1,45 @@
|
|
-const { time } = require('@openzeppelin/test-helpers');
|
|
|
|
-const {
|
|
|
|
- time: { setNextBlockTimestamp },
|
|
|
|
- setStorageAt,
|
|
|
|
- mine,
|
|
|
|
-} = require('@nomicfoundation/hardhat-network-helpers');
|
|
|
|
-const { impersonate } = require('../../helpers/account');
|
|
|
|
|
|
+const { mine } = require('@nomicfoundation/hardhat-network-helpers');
|
|
const { expectRevertCustomError } = require('../../helpers/customError');
|
|
const { expectRevertCustomError } = require('../../helpers/customError');
|
|
-const { EXPIRATION, EXECUTION_ID_STORAGE_SLOT } = require('../../helpers/access-manager');
|
|
|
|
-
|
|
|
|
-// ============ COMMON PATHS ============
|
|
|
|
-
|
|
|
|
-const COMMON_IS_EXECUTING_PATH = {
|
|
|
|
- executing() {
|
|
|
|
- it('succeeds', async function () {
|
|
|
|
- await web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller });
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- notExecuting() {
|
|
|
|
- it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerUnauthorizedAccount',
|
|
|
|
- [this.caller, this.role.id],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
-};
|
|
|
|
-
|
|
|
|
-const COMMON_GET_ACCESS_PATH = {
|
|
|
|
- requiredRoleIsGranted: {
|
|
|
|
- roleGrantingIsDelayed: {
|
|
|
|
- callerHasAnExecutionDelay: {
|
|
|
|
- beforeGrantDelay() {
|
|
|
|
- it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerUnauthorizedAccount',
|
|
|
|
- [this.caller, this.role.id],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- afterGrantDelay: undefined, // Diverges if there's an operation delay or not
|
|
|
|
- },
|
|
|
|
- callerHasNoExecutionDelay: {
|
|
|
|
- beforeGrantDelay() {
|
|
|
|
- it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerUnauthorizedAccount',
|
|
|
|
- [this.caller, this.role.id],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- afterGrantDelay() {
|
|
|
|
- it('succeeds called directly', async function () {
|
|
|
|
- await web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- it('succeeds via execute', async function () {
|
|
|
|
- await this.manager.execute(this.target.address, this.calldata, { from: this.caller });
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- roleGrantingIsNotDelayed: {
|
|
|
|
- callerHasAnExecutionDelay: undefined, // Diverges if there's an operation to schedule or not
|
|
|
|
- callerHasNoExecutionDelay() {
|
|
|
|
- it('succeeds called directly', async function () {
|
|
|
|
- await web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- it('succeeds via execute', async function () {
|
|
|
|
- await this.manager.execute(this.target.address, this.calldata, { from: this.caller });
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- requiredRoleIsNotGranted() {
|
|
|
|
- it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerUnauthorizedAccount',
|
|
|
|
- [this.caller, this.role.id],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
-};
|
|
|
|
-
|
|
|
|
-const COMMON_SCHEDULABLE_PATH = {
|
|
|
|
- scheduled: {
|
|
|
|
- before() {
|
|
|
|
- it('reverts as AccessManagerNotReady', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerNotReady',
|
|
|
|
- [this.operationId],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- after() {
|
|
|
|
- it('succeeds called directly', async function () {
|
|
|
|
- await web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- it('succeeds via execute', async function () {
|
|
|
|
- await this.manager.execute(this.target.address, this.calldata, { from: this.caller });
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- expired() {
|
|
|
|
- it('reverts as AccessManagerExpired', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerExpired',
|
|
|
|
- [this.operationId],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- notScheduled() {
|
|
|
|
- it('reverts as AccessManagerNotScheduled', async function () {
|
|
|
|
- await expectRevertCustomError(
|
|
|
|
- web3.eth.sendTransaction({ to: this.target.address, data: this.calldata, from: this.caller }),
|
|
|
|
- 'AccessManagerNotScheduled',
|
|
|
|
- [this.operationId],
|
|
|
|
- );
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
-};
|
|
|
|
-
|
|
|
|
-const COMMON_SCHEDULABLE_PATH_IF_ZERO_DELAY = {
|
|
|
|
- scheduled: {
|
|
|
|
- before() {
|
|
|
|
- it.skip('is not reachable without a delay');
|
|
|
|
- },
|
|
|
|
- after() {
|
|
|
|
- it.skip('is not reachable without a delay');
|
|
|
|
- },
|
|
|
|
- expired() {
|
|
|
|
- it.skip('is not reachable without a delay');
|
|
|
|
- },
|
|
|
|
- },
|
|
|
|
- notScheduled() {
|
|
|
|
- it('succeeds', async function () {
|
|
|
|
- await this.manager.execute(this.target.address, this.calldata, { from: this.caller });
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
-};
|
|
|
|
-
|
|
|
|
-// ============ MODE HELPERS ============
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,target}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeClosable({ closed, open }) {
|
|
|
|
- describe('when the manager is closed', function () {
|
|
|
|
- beforeEach('close', async function () {
|
|
|
|
- await this.manager.$_setTargetClosed(this.target.address, true);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- closed();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when the manager is open', function () {
|
|
|
|
- beforeEach('open', async function () {
|
|
|
|
- await this.manager.$_setTargetClosed(this.target.address, false);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- open();
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// ============ DELAY HELPERS ============
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{delay}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeDelay(type, { before, after }) {
|
|
|
|
- beforeEach('define timestamp when delay takes effect', async function () {
|
|
|
|
- const timestamp = await time.latest();
|
|
|
|
- this.delayEffect = timestamp.add(this.delay);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe(`when ${type} delay has not taken effect yet`, function () {
|
|
|
|
- beforeEach(`set next block timestamp before ${type} takes effect`, async function () {
|
|
|
|
- await setNextBlockTimestamp(this.delayEffect.subn(1));
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- before();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe(`when ${type} delay has taken effect`, function () {
|
|
|
|
- beforeEach(`set next block timestamp when ${type} takes effect`, async function () {
|
|
|
|
- await setNextBlockTimestamp(this.delayEffect);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- after();
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// ============ OPERATION HELPERS ============
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,scheduleIn,caller,target,calldata}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeSchedulableOperation({ scheduled: { before, after, expired }, notScheduled }) {
|
|
|
|
- describe('when operation is scheduled', function () {
|
|
|
|
- beforeEach('schedule operation', async function () {
|
|
|
|
- await impersonate(this.caller); // May be a contract
|
|
|
|
- const { operationId } = await scheduleOperation(this.manager, {
|
|
|
|
- caller: this.caller,
|
|
|
|
- target: this.target.address,
|
|
|
|
- calldata: this.calldata,
|
|
|
|
- delay: this.scheduleIn,
|
|
|
|
- });
|
|
|
|
- this.operationId = operationId;
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when operation is not ready for execution', function () {
|
|
|
|
- beforeEach('set next block time before operation is ready', async function () {
|
|
|
|
- this.scheduledAt = await time.latest();
|
|
|
|
- const schedule = await this.manager.getSchedule(this.operationId);
|
|
|
|
- await setNextBlockTimestamp(schedule.subn(1));
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- before();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when operation is ready for execution', function () {
|
|
|
|
- beforeEach('set next block time when operation is ready for execution', async function () {
|
|
|
|
- this.scheduledAt = await time.latest();
|
|
|
|
- const schedule = await this.manager.getSchedule(this.operationId);
|
|
|
|
- await setNextBlockTimestamp(schedule);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- after();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when operation has expired', function () {
|
|
|
|
- beforeEach('set next block time when operation expired', async function () {
|
|
|
|
- this.scheduledAt = await time.latest();
|
|
|
|
- const schedule = await this.manager.getSchedule(this.operationId);
|
|
|
|
- await setNextBlockTimestamp(schedule.add(EXPIRATION));
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- expired();
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when operation is not scheduled', function () {
|
|
|
|
- beforeEach('set expected operationId', async function () {
|
|
|
|
- this.operationId = await this.manager.hashOperation(this.caller, this.target.address, this.calldata);
|
|
|
|
-
|
|
|
|
- // Assert operation is not scheduled
|
|
|
|
- expect(await this.manager.getSchedule(this.operationId)).to.be.bignumber.equal(web3.utils.toBN(0));
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- notScheduled();
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,roles,target,calldata}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeARestrictedOperation({ callerIsNotTheManager, callerIsTheManager }) {
|
|
|
|
- describe('when the call comes from the manager (msg.sender == manager)', function () {
|
|
|
|
- beforeEach('define caller as manager', async function () {
|
|
|
|
- this.caller = this.manager.address;
|
|
|
|
- await impersonate(this.caller);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeCanCallExecuting(callerIsTheManager);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when the call does not come from the manager (msg.sender != manager)', function () {
|
|
|
|
- beforeEach('define non manager caller', function () {
|
|
|
|
- this.caller = this.roles.SOME.members[0];
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- callerIsNotTheManager();
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,roles,executionDelay,operationDelay,target}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeDelayedOperation() {
|
|
|
|
- describe('with operation delay', function () {
|
|
|
|
- describe('when operation delay is greater than execution delay', function () {
|
|
|
|
- beforeEach('set operation delay', async function () {
|
|
|
|
- this.operationDelay = this.executionDelay.add(time.duration.hours(1));
|
|
|
|
- await this.manager.$_setTargetAdminDelay(this.target.address, this.operationDelay);
|
|
|
|
- this.scheduleIn = this.operationDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when operation delay is shorter than execution delay', function () {
|
|
|
|
- beforeEach('set operation delay', async function () {
|
|
|
|
- this.operationDelay = this.executionDelay.sub(time.duration.hours(1));
|
|
|
|
- await this.manager.$_setTargetAdminDelay(this.target.address, this.operationDelay);
|
|
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('without operation delay', function () {
|
|
|
|
- beforeEach('set operation delay', async function () {
|
|
|
|
- this.operationDelay = web3.utils.toBN(0);
|
|
|
|
- await this.manager.$_setTargetAdminDelay(this.target.address, this.operationDelay);
|
|
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// ============ METHOD HELPERS ============
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,roles,role,target,calldata}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeCanCall({
|
|
|
|
- closed,
|
|
|
|
- open: {
|
|
|
|
- callerIsTheManager,
|
|
|
|
- callerIsNotTheManager: { publicRoleIsRequired, specificRoleIsRequired },
|
|
|
|
- },
|
|
|
|
-}) {
|
|
|
|
- shouldBehaveLikeClosable({
|
|
|
|
- closed,
|
|
|
|
- open() {
|
|
|
|
- shouldBehaveLikeARestrictedOperation({
|
|
|
|
- callerIsTheManager,
|
|
|
|
- callerIsNotTheManager() {
|
|
|
|
- shouldBehaveLikeHasRole({
|
|
|
|
- publicRoleIsRequired,
|
|
|
|
- specificRoleIsRequired,
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- });
|
|
|
|
- },
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{target,calldata}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeCanCallExecuting({ executing, notExecuting }) {
|
|
|
|
- describe('when _executionId is in storage for target and selector', function () {
|
|
|
|
- beforeEach('set _executionId flag from calldata and target', async function () {
|
|
|
|
- const executionId = await web3.utils.keccak256(
|
|
|
|
- web3.eth.abi.encodeParameters(['address', 'bytes4'], [this.target.address, this.calldata.substring(0, 10)]),
|
|
|
|
- );
|
|
|
|
- await setStorageAt(this.manager.address, EXECUTION_ID_STORAGE_SLOT, executionId);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- executing();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when _executionId does not match target and selector', notExecuting);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{target,calldata,roles,role}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeHasRole({ publicRoleIsRequired, specificRoleIsRequired }) {
|
|
|
|
- describe('when the function requires the caller to be granted with the PUBLIC_ROLE', function () {
|
|
|
|
- beforeEach('set target function role as PUBLIC_ROLE', async function () {
|
|
|
|
- this.role = this.roles.PUBLIC;
|
|
|
|
- await this.manager.$_setTargetFunctionRole(this.target.address, this.calldata.substring(0, 10), this.role.id, {
|
|
|
|
- from: this.roles.ADMIN.members[0],
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- publicRoleIsRequired();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when the function requires the caller to be granted with a role other than PUBLIC_ROLE', function () {
|
|
|
|
- beforeEach('set target function role as PUBLIC_ROLE', async function () {
|
|
|
|
- await this.manager.$_setTargetFunctionRole(this.target.address, this.calldata.substring(0, 10), this.role.id, {
|
|
|
|
- from: this.roles.ADMIN.members[0],
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeGetAccess(specificRoleIsRequired);
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager,role,caller}
|
|
|
|
- */
|
|
|
|
-function shouldBehaveLikeGetAccess({
|
|
|
|
- requiredRoleIsGranted: {
|
|
|
|
- roleGrantingIsDelayed: {
|
|
|
|
- // Because both grant and execution delay are set within the same $_grantRole call
|
|
|
|
- // it's not possible to create a set of tests that diverge between grant and execution delay.
|
|
|
|
- // Therefore, the shouldBehaveLikeDelay arguments are renamed for clarity:
|
|
|
|
- // before => beforeGrantDelay
|
|
|
|
- // after => afterGrantDelay
|
|
|
|
- callerHasAnExecutionDelay: { beforeGrantDelay: case1, afterGrantDelay: case2 },
|
|
|
|
- callerHasNoExecutionDelay: { beforeGrantDelay: case3, afterGrantDelay: case4 },
|
|
|
|
- },
|
|
|
|
- roleGrantingIsNotDelayed: { callerHasAnExecutionDelay: case5, callerHasNoExecutionDelay: case6 },
|
|
|
|
- },
|
|
|
|
- requiredRoleIsNotGranted,
|
|
|
|
-}) {
|
|
|
|
- describe('when the required role is granted to the caller', function () {
|
|
|
|
- describe('when role granting is delayed', function () {
|
|
|
|
- beforeEach('define delay', function () {
|
|
|
|
- this.grantDelay = time.duration.minutes(3);
|
|
|
|
- this.delay = this.grantDelay; // For shouldBehaveLikeDelay
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when caller has an execution delay', function () {
|
|
|
|
- beforeEach('set role and delay', async function () {
|
|
|
|
- this.executionDelay = time.duration.hours(10);
|
|
|
|
- this.delay = this.grantDelay;
|
|
|
|
- await this.manager.$_grantRole(this.role.id, this.caller, this.grantDelay, this.executionDelay);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeDelay('grant', { before: case1, after: case2 });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when caller has no execution delay', function () {
|
|
|
|
- beforeEach('set role and delay', async function () {
|
|
|
|
- this.executionDelay = web3.utils.toBN(0);
|
|
|
|
- await this.manager.$_grantRole(this.role.id, this.caller, this.grantDelay, this.executionDelay);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- shouldBehaveLikeDelay('grant', { before: case3, after: case4 });
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when role granting is not delayed', function () {
|
|
|
|
- beforeEach('define delay', function () {
|
|
|
|
- this.grantDelay = web3.utils.toBN(0);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when caller has an execution delay', function () {
|
|
|
|
- beforeEach('set role and delay', async function () {
|
|
|
|
- this.executionDelay = time.duration.hours(10);
|
|
|
|
- await this.manager.$_grantRole(this.role.id, this.caller, this.grantDelay, this.executionDelay);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- case5();
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when caller has no execution delay', function () {
|
|
|
|
- beforeEach('set role and delay', async function () {
|
|
|
|
- this.executionDelay = web3.utils.toBN(0);
|
|
|
|
- await this.manager.$_grantRole(this.role.id, this.caller, this.grantDelay, this.executionDelay);
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- case6();
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- describe('when role is not granted', function () {
|
|
|
|
- // Because this helper can be composed with other helpers, it's possible
|
|
|
|
- // that role has been set already by another helper.
|
|
|
|
- // Although this is highly unlikely, we check for it here to avoid false positives.
|
|
|
|
- beforeEach('assert role is unset', async function () {
|
|
|
|
- const { since } = await this.manager.getAccess(this.role.id, this.caller);
|
|
|
|
- expect(since).to.be.bignumber.equal(web3.utils.toBN(0));
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- requiredRoleIsNotGranted();
|
|
|
|
- });
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// ============ ADMIN OPERATION HELPERS ============
|
|
|
|
|
|
+const {
|
|
|
|
+ LIKE_COMMON_IS_EXECUTING,
|
|
|
|
+ LIKE_COMMON_GET_ACCESS,
|
|
|
|
+ LIKE_COMMON_SCHEDULABLE,
|
|
|
|
+ testAsSchedulableOperation,
|
|
|
|
+ testAsRestrictedOperation,
|
|
|
|
+ testAsDelayedOperation,
|
|
|
|
+ testAsCanCall,
|
|
|
|
+ testAsHasRole,
|
|
|
|
+} = require('./AccessManager.predicate');
|
|
|
|
+
|
|
|
|
+// ============ ADMIN OPERATION ============
|
|
|
|
|
|
/**
|
|
/**
|
|
* @requires this.{manager,roles,calldata,role}
|
|
* @requires this.{manager,roles,calldata,role}
|
|
*/
|
|
*/
|
|
function shouldBehaveLikeDelayedAdminOperation() {
|
|
function shouldBehaveLikeDelayedAdminOperation() {
|
|
- const getAccessPath = COMMON_GET_ACCESS_PATH;
|
|
|
|
|
|
+ const getAccessPath = LIKE_COMMON_GET_ACCESS;
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
// Consume previously set delay
|
|
// Consume previously set delay
|
|
await mine();
|
|
await mine();
|
|
});
|
|
});
|
|
- shouldBehaveLikeDelayedOperation();
|
|
|
|
|
|
+ testAsDelayedOperation();
|
|
};
|
|
};
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
beforeEach('set execution delay', async function () {
|
|
beforeEach('set execution delay', async function () {
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeDelayedOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsDelayedOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
|
|
|
|
beforeEach('set target as manager', function () {
|
|
beforeEach('set target as manager', function () {
|
|
this.target = this.manager;
|
|
this.target = this.manager;
|
|
});
|
|
});
|
|
|
|
|
|
- shouldBehaveLikeARestrictedOperation({
|
|
|
|
- callerIsTheManager: COMMON_IS_EXECUTING_PATH,
|
|
|
|
|
|
+ testAsRestrictedOperation({
|
|
|
|
+ callerIsTheManager: LIKE_COMMON_IS_EXECUTING,
|
|
callerIsNotTheManager() {
|
|
callerIsNotTheManager() {
|
|
- shouldBehaveLikeHasRole({
|
|
|
|
|
|
+ testAsHasRole({
|
|
publicRoleIsRequired() {
|
|
publicRoleIsRequired() {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
await expectRevertCustomError(
|
|
await expectRevertCustomError(
|
|
@@ -524,29 +62,29 @@ function shouldBehaveLikeDelayedAdminOperation() {
|
|
* @requires this.{manager,roles,calldata,role}
|
|
* @requires this.{manager,roles,calldata,role}
|
|
*/
|
|
*/
|
|
function shouldBehaveLikeNotDelayedAdminOperation() {
|
|
function shouldBehaveLikeNotDelayedAdminOperation() {
|
|
- const getAccessPath = COMMON_GET_ACCESS_PATH;
|
|
|
|
|
|
+ const getAccessPath = LIKE_COMMON_GET_ACCESS;
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
beforeEach('set execution delay', async function () {
|
|
beforeEach('set execution delay', async function () {
|
|
await mine();
|
|
await mine();
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
beforeEach('set execution delay', async function () {
|
|
beforeEach('set execution delay', async function () {
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
|
|
|
|
beforeEach('set target as manager', function () {
|
|
beforeEach('set target as manager', function () {
|
|
this.target = this.manager;
|
|
this.target = this.manager;
|
|
});
|
|
});
|
|
|
|
|
|
- shouldBehaveLikeARestrictedOperation({
|
|
|
|
- callerIsTheManager: COMMON_IS_EXECUTING_PATH,
|
|
|
|
|
|
+ testAsRestrictedOperation({
|
|
|
|
+ callerIsTheManager: LIKE_COMMON_IS_EXECUTING,
|
|
callerIsNotTheManager() {
|
|
callerIsNotTheManager() {
|
|
- shouldBehaveLikeHasRole({
|
|
|
|
|
|
+ testAsHasRole({
|
|
publicRoleIsRequired() {
|
|
publicRoleIsRequired() {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
await expectRevertCustomError(
|
|
await expectRevertCustomError(
|
|
@@ -566,29 +104,29 @@ function shouldBehaveLikeNotDelayedAdminOperation() {
|
|
* @requires this.{manager,roles,calldata,role}
|
|
* @requires this.{manager,roles,calldata,role}
|
|
*/
|
|
*/
|
|
function shouldBehaveLikeRoleAdminOperation(roleAdmin) {
|
|
function shouldBehaveLikeRoleAdminOperation(roleAdmin) {
|
|
- const getAccessPath = COMMON_GET_ACCESS_PATH;
|
|
|
|
|
|
+ const getAccessPath = LIKE_COMMON_GET_ACCESS;
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.afterGrantDelay = function () {
|
|
beforeEach('set operation delay', async function () {
|
|
beforeEach('set operation delay', async function () {
|
|
await mine();
|
|
await mine();
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
beforeEach('set execution delay', async function () {
|
|
beforeEach('set execution delay', async function () {
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
|
|
|
|
beforeEach('set target as manager', function () {
|
|
beforeEach('set target as manager', function () {
|
|
this.target = this.manager;
|
|
this.target = this.manager;
|
|
});
|
|
});
|
|
|
|
|
|
- shouldBehaveLikeARestrictedOperation({
|
|
|
|
- callerIsTheManager: COMMON_IS_EXECUTING_PATH,
|
|
|
|
|
|
+ testAsRestrictedOperation({
|
|
|
|
+ callerIsTheManager: LIKE_COMMON_IS_EXECUTING,
|
|
callerIsNotTheManager() {
|
|
callerIsNotTheManager() {
|
|
- shouldBehaveLikeHasRole({
|
|
|
|
|
|
+ testAsHasRole({
|
|
publicRoleIsRequired() {
|
|
publicRoleIsRequired() {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
it('reverts as AccessManagerUnauthorizedAccount', async function () {
|
|
await expectRevertCustomError(
|
|
await expectRevertCustomError(
|
|
@@ -604,7 +142,7 @@ function shouldBehaveLikeRoleAdminOperation(roleAdmin) {
|
|
});
|
|
});
|
|
}
|
|
}
|
|
|
|
|
|
-// ============ RESTRICTED OPERATION HELPERS ============
|
|
|
|
|
|
+// ============ RESTRICTED OPERATION ============
|
|
|
|
|
|
/**
|
|
/**
|
|
* @requires this.{manager,roles,calldata,role}
|
|
* @requires this.{manager,roles,calldata,role}
|
|
@@ -620,7 +158,7 @@ function shouldBehaveLikeAManagedRestrictedOperation() {
|
|
});
|
|
});
|
|
}
|
|
}
|
|
|
|
|
|
- const getAccessPath = COMMON_GET_ACCESS_PATH;
|
|
|
|
|
|
+ const getAccessPath = LIKE_COMMON_GET_ACCESS;
|
|
|
|
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.beforeGrantDelay =
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsDelayed.callerHasAnExecutionDelay.beforeGrantDelay =
|
|
revertUnauthorized;
|
|
revertUnauthorized;
|
|
@@ -632,21 +170,21 @@ function shouldBehaveLikeAManagedRestrictedOperation() {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
// Consume previously set delay
|
|
// Consume previously set delay
|
|
await mine();
|
|
await mine();
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
getAccessPath.requiredRoleIsGranted.roleGrantingIsNotDelayed.callerHasAnExecutionDelay = function () {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
beforeEach('consume previously set grant delay', async function () {
|
|
- this.scheduleIn = this.executionDelay; // For shouldBehaveLikeSchedulableOperation
|
|
|
|
|
|
+ this.scheduleIn = this.executionDelay; // For testAsSchedulableOperation
|
|
});
|
|
});
|
|
- shouldBehaveLikeSchedulableOperation(COMMON_SCHEDULABLE_PATH);
|
|
|
|
|
|
+ testAsSchedulableOperation(LIKE_COMMON_SCHEDULABLE);
|
|
};
|
|
};
|
|
|
|
|
|
- const isExecutingPath = COMMON_IS_EXECUTING_PATH;
|
|
|
|
|
|
+ const isExecutingPath = LIKE_COMMON_IS_EXECUTING;
|
|
isExecutingPath.notExecuting = revertUnauthorized;
|
|
isExecutingPath.notExecuting = revertUnauthorized;
|
|
|
|
|
|
- shouldBehaveLikeCanCall({
|
|
|
|
|
|
+ testAsCanCall({
|
|
closed: revertUnauthorized,
|
|
closed: revertUnauthorized,
|
|
open: {
|
|
open: {
|
|
callerIsTheManager: isExecutingPath,
|
|
callerIsTheManager: isExecutingPath,
|
|
@@ -666,46 +204,9 @@ function shouldBehaveLikeAManagedRestrictedOperation() {
|
|
});
|
|
});
|
|
}
|
|
}
|
|
|
|
|
|
-// ============ HELPERS ============
|
|
|
|
-
|
|
|
|
-/**
|
|
|
|
- * @requires this.{manager, caller, target, calldata}
|
|
|
|
- */
|
|
|
|
-async function scheduleOperation(manager, { caller, target, calldata, delay }) {
|
|
|
|
- const timestamp = await time.latest();
|
|
|
|
- const scheduledAt = timestamp.addn(1);
|
|
|
|
- await setNextBlockTimestamp(scheduledAt); // Fix next block timestamp for predictability
|
|
|
|
- const { receipt } = await manager.schedule(target, calldata, scheduledAt.add(delay), {
|
|
|
|
- from: caller,
|
|
|
|
- });
|
|
|
|
-
|
|
|
|
- return {
|
|
|
|
- receipt,
|
|
|
|
- scheduledAt,
|
|
|
|
- operationId: await manager.hashOperation(caller, target, calldata),
|
|
|
|
- };
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
module.exports = {
|
|
module.exports = {
|
|
- // COMMON PATHS
|
|
|
|
- COMMON_SCHEDULABLE_PATH,
|
|
|
|
- COMMON_SCHEDULABLE_PATH_IF_ZERO_DELAY,
|
|
|
|
- // MODE HELPERS
|
|
|
|
- shouldBehaveLikeClosable,
|
|
|
|
- // DELAY HELPERS
|
|
|
|
- shouldBehaveLikeDelay,
|
|
|
|
- // OPERATION HELPERS
|
|
|
|
- shouldBehaveLikeSchedulableOperation,
|
|
|
|
- // METHOD HELPERS
|
|
|
|
- shouldBehaveLikeCanCall,
|
|
|
|
- shouldBehaveLikeGetAccess,
|
|
|
|
- shouldBehaveLikeHasRole,
|
|
|
|
- // ADMIN OPERATION HELPERS
|
|
|
|
shouldBehaveLikeDelayedAdminOperation,
|
|
shouldBehaveLikeDelayedAdminOperation,
|
|
shouldBehaveLikeNotDelayedAdminOperation,
|
|
shouldBehaveLikeNotDelayedAdminOperation,
|
|
shouldBehaveLikeRoleAdminOperation,
|
|
shouldBehaveLikeRoleAdminOperation,
|
|
- // RESTRICTED OPERATION HELPERS
|
|
|
|
shouldBehaveLikeAManagedRestrictedOperation,
|
|
shouldBehaveLikeAManagedRestrictedOperation,
|
|
- // HELPERS
|
|
|
|
- scheduleOperation,
|
|
|
|
};
|
|
};
|