-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: Add support for all the contracts on
test/helpers
so it's eas…
…y to build E2E tests (#115)
- v0.6.0-rc2
- v0.6.0-rc1
- v0.5.2
- v0.5.2-rc2
- v0.5.2-rc1
- v0.5.1
- v0.5.1-rc4
- v0.5.1-rc3
- v0.5.1-rc2
- v0.5.1-rc1
- v0.5.0-beta11
- v0.5.0-beta10
- v0.5.0-beta9
- v0.5.0-beta8
- v0.5.0-beta7
- v0.5.0-beta6
- v0.5.0-beta5
- v0.5.0-beta4
- v0.5.0-beta3
- v0.5.0-beta2
- v0.4.2
- v0.4.2-rc2
- v0.4.2-rc1
- v0.4.1
- v0.4.0
- v0.4.0-rc2
- v0.4.0-beta10
- v0.4.0-beta9
- v0.4.0-beta8
- v0.4.0-beta7
- v0.4.0-beta6
- v0.4.0-beta5
- v0.4.0-beta4
- v0.4.0-beta3
- v0.4.0-beta2
- v0.4.0-beta1
- v0.3.2
- v0.3.1
- v0.3.1-rc1
- v0.3.0-rc2
- v0.3.0-rc1
Showing
10 changed files
with
387 additions
and
609 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,199 @@ | ||
package aggoraclehelpers | ||
|
||
import ( | ||
"context" | ||
"path" | ||
"testing" | ||
"time" | ||
|
||
"github.com/0xPolygon/cdk-contracts-tooling/contracts/elderberry-paris/polygonzkevmbridgev2" | ||
gerContractL1 "github.com/0xPolygon/cdk-contracts-tooling/contracts/manual/globalexitrootnopush0" | ||
gerContractEVMChain "github.com/0xPolygon/cdk-contracts-tooling/contracts/manual/pessimisticglobalexitrootnopush0" | ||
"github.com/0xPolygon/cdk/aggoracle" | ||
"github.com/0xPolygon/cdk/aggoracle/chaingersender" | ||
"github.com/0xPolygon/cdk/etherman" | ||
"github.com/0xPolygon/cdk/l1infotreesync" | ||
"github.com/0xPolygon/cdk/log" | ||
"github.com/0xPolygon/cdk/reorgdetector" | ||
"github.com/0xPolygon/cdk/test/helpers" | ||
"github.com/ethereum/go-ethereum/accounts/abi/bind" | ||
"github.com/ethereum/go-ethereum/common" | ||
"github.com/ethereum/go-ethereum/crypto" | ||
"github.com/ethereum/go-ethereum/ethclient/simulated" | ||
"github.com/stretchr/testify/require" | ||
) | ||
|
||
const ( | ||
NetworkIDL2 = uint32(1) | ||
syncBlockChunkSize = 10 | ||
retries = 3 | ||
periodRetry = time.Millisecond * 100 | ||
) | ||
|
||
type AggoracleWithEVMChainEnv struct { | ||
L1Client *simulated.Backend | ||
L2Client *simulated.Backend | ||
L1InfoTreeSync *l1infotreesync.L1InfoTreeSync | ||
GERL1Contract *gerContractL1.Globalexitrootnopush0 | ||
GERL1Addr common.Address | ||
GERL2Contract *gerContractEVMChain.Pessimisticglobalexitrootnopush0 | ||
GERL2Addr common.Address | ||
AuthL1 *bind.TransactOpts | ||
AuthL2 *bind.TransactOpts | ||
AggOracle *aggoracle.AggOracle | ||
AggOracleSender aggoracle.ChainSender | ||
ReorgDetector *reorgdetector.ReorgDetector | ||
BridgeL1Contract *polygonzkevmbridgev2.Polygonzkevmbridgev2 | ||
BridgeL1Addr common.Address | ||
BridgeL2Contract *polygonzkevmbridgev2.Polygonzkevmbridgev2 | ||
BridgeL2Addr common.Address | ||
NetworkIDL2 uint32 | ||
EthTxManMockL2 *helpers.EthTxManagerMock | ||
} | ||
|
||
func SetupAggoracleWithEVMChain(t *testing.T) *AggoracleWithEVMChainEnv { | ||
t.Helper() | ||
|
||
ctx := context.Background() | ||
l1Client, syncer, gerL1Contract, gerL1Addr, bridgeL1Contract, bridgeL1Addr, authL1, rd := CommonSetup(t) | ||
sender, l2Client, gerL2Contract, gerL2Addr, bridgeL2Contract, bridgeL2Addr, authL2, ethTxManMockL2 := EVMSetup(t) | ||
oracle, err := aggoracle.New( | ||
log.GetDefaultLogger(), sender, | ||
l1Client.Client(), syncer, | ||
etherman.LatestBlock, time.Millisecond*20) //nolint:mnd | ||
require.NoError(t, err) | ||
go oracle.Start(ctx) | ||
|
||
return &AggoracleWithEVMChainEnv{ | ||
L1Client: l1Client, | ||
L2Client: l2Client, | ||
L1InfoTreeSync: syncer, | ||
GERL1Contract: gerL1Contract, | ||
GERL1Addr: gerL1Addr, | ||
GERL2Contract: gerL2Contract, | ||
GERL2Addr: gerL2Addr, | ||
AuthL1: authL1, | ||
AuthL2: authL2, | ||
AggOracle: oracle, | ||
AggOracleSender: sender, | ||
ReorgDetector: rd, | ||
BridgeL1Contract: bridgeL1Contract, | ||
BridgeL1Addr: bridgeL1Addr, | ||
BridgeL2Contract: bridgeL2Contract, | ||
BridgeL2Addr: bridgeL2Addr, | ||
NetworkIDL2: NetworkIDL2, | ||
EthTxManMockL2: ethTxManMockL2, | ||
} | ||
} | ||
|
||
func CommonSetup(t *testing.T) ( | ||
*simulated.Backend, | ||
*l1infotreesync.L1InfoTreeSync, | ||
*gerContractL1.Globalexitrootnopush0, | ||
common.Address, | ||
*polygonzkevmbridgev2.Polygonzkevmbridgev2, | ||
common.Address, | ||
*bind.TransactOpts, | ||
*reorgdetector.ReorgDetector, | ||
) { | ||
t.Helper() | ||
|
||
// Config and spin up | ||
ctx := context.Background() | ||
|
||
// Simulated L1 | ||
l1Client, authL1, gerL1Addr, gerL1Contract, bridgeL1Addr, bridgeL1Contract := newSimulatedL1(t) | ||
|
||
// Reorg detector | ||
dbPathReorgDetector := t.TempDir() | ||
reorg, err := reorgdetector.New(l1Client.Client(), reorgdetector.Config{DBPath: dbPathReorgDetector}) | ||
require.NoError(t, err) | ||
|
||
// Syncer | ||
dbPathSyncer := path.Join(t.TempDir(), "file::memory:?cache=shared") | ||
syncer, err := l1infotreesync.New(ctx, dbPathSyncer, | ||
gerL1Addr, common.Address{}, | ||
syncBlockChunkSize, etherman.LatestBlock, | ||
reorg, l1Client.Client(), | ||
time.Millisecond, 0, periodRetry, retries, l1infotreesync.FlagAllowWrongContractsAddrs) | ||
require.NoError(t, err) | ||
go syncer.Start(ctx) | ||
|
||
return l1Client, syncer, gerL1Contract, gerL1Addr, bridgeL1Contract, bridgeL1Addr, authL1, reorg | ||
} | ||
|
||
func EVMSetup(t *testing.T) ( | ||
aggoracle.ChainSender, | ||
*simulated.Backend, | ||
*gerContractEVMChain.Pessimisticglobalexitrootnopush0, | ||
common.Address, | ||
*polygonzkevmbridgev2.Polygonzkevmbridgev2, | ||
common.Address, | ||
*bind.TransactOpts, | ||
*helpers.EthTxManagerMock, | ||
) { | ||
t.Helper() | ||
|
||
l2Client, authL2, gerL2Addr, gerL2Sc, bridgeL2Addr, bridgeL2Sc := newSimulatedEVMAggSovereignChain(t) | ||
ethTxManMock := helpers.NewEthTxManMock(t, l2Client, authL2) | ||
sender, err := chaingersender.NewEVMChainGERSender(log.GetDefaultLogger(), | ||
gerL2Addr, authL2.From, l2Client.Client(), ethTxManMock, 0, time.Millisecond*50) //nolint:mnd | ||
require.NoError(t, err) | ||
|
||
return sender, l2Client, gerL2Sc, gerL2Addr, bridgeL2Sc, bridgeL2Addr, authL2, ethTxManMock | ||
} | ||
|
||
func newSimulatedL1(t *testing.T) ( | ||
*simulated.Backend, | ||
*bind.TransactOpts, | ||
common.Address, | ||
*gerContractL1.Globalexitrootnopush0, | ||
common.Address, | ||
*polygonzkevmbridgev2.Polygonzkevmbridgev2, | ||
) { | ||
t.Helper() | ||
|
||
client, setup := helpers.SimulatedBackend(t, nil, 0) | ||
|
||
precalculatedAddr := crypto.CreateAddress(setup.DeployerAuth.From, 2) //nolint:mnd | ||
|
||
gerAddr, _, gerContract, err := gerContractL1.DeployGlobalexitrootnopush0(setup.DeployerAuth, client.Client(), | ||
setup.UserAuth.From, setup.EBZkevmBridgeProxyAddr) | ||
require.NoError(t, err) | ||
client.Commit() | ||
|
||
require.Equal(t, precalculatedAddr, gerAddr) | ||
|
||
return client, setup.UserAuth, gerAddr, gerContract, setup.EBZkevmBridgeProxyAddr, setup.EBZkevmBridgeProxyContract | ||
} | ||
|
||
func newSimulatedEVMAggSovereignChain(t *testing.T) ( | ||
*simulated.Backend, | ||
*bind.TransactOpts, | ||
common.Address, | ||
*gerContractEVMChain.Pessimisticglobalexitrootnopush0, | ||
common.Address, | ||
*polygonzkevmbridgev2.Polygonzkevmbridgev2, | ||
) { | ||
t.Helper() | ||
|
||
client, setup := helpers.SimulatedBackend(t, nil, NetworkIDL2) | ||
|
||
precalculatedAddr := crypto.CreateAddress(setup.DeployerAuth.From, 2) //nolint:mnd | ||
|
||
gerAddr, _, gerContract, err := gerContractEVMChain.DeployPessimisticglobalexitrootnopush0( | ||
setup.DeployerAuth, client.Client(), setup.UserAuth.From) | ||
require.NoError(t, err) | ||
client.Commit() | ||
|
||
globalExitRootSetterRole := common.HexToHash("0x7b95520991dfda409891be0afa2635b63540f92ee996fda0bf695a166e5c5176") | ||
_, err = gerContract.GrantRole(setup.DeployerAuth, globalExitRootSetterRole, setup.UserAuth.From) | ||
require.NoError(t, err) | ||
client.Commit() | ||
|
||
hasRole, _ := gerContract.HasRole(&bind.CallOpts{Pending: false}, globalExitRootSetterRole, setup.UserAuth.From) | ||
require.True(t, hasRole) | ||
require.Equal(t, precalculatedAddr, gerAddr) | ||
|
||
return client, setup.UserAuth, gerAddr, gerContract, setup.EBZkevmBridgeProxyAddr, setup.EBZkevmBridgeProxyContract | ||
} |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters