forked from OpenZeppelin/openzeppelin-contracts
/
AccessControlCrossChain.test.js
57 lines (46 loc) · 1.82 KB
/
AccessControlCrossChain.test.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
const { expectRevert } = require('@openzeppelin/test-helpers');
const CrossChainHelper = require('../helpers/crosschain');
const {
shouldBehaveLikeAccessControl,
} = require('./AccessControl.behavior.js');
const crossChainRoleAlias = (role) => web3.utils.leftPad(
web3.utils.toHex(web3.utils.toBN(role).xor(web3.utils.toBN(web3.utils.soliditySha3('CROSSCHAIN_ALIAS')))),
64,
);
const AccessControlCrossChainMock = artifacts.require('AccessControlCrossChainMock');
const ROLE = web3.utils.soliditySha3('ROLE');
contract('AccessControl', function (accounts) {
CrossChainHelper.before();
beforeEach(async function () {
this.accessControl = await AccessControlCrossChainMock.new({ from: accounts[0] });
});
shouldBehaveLikeAccessControl('AccessControl', ...accounts);
describe('CrossChain enabled', function () {
beforeEach(async function () {
await this.accessControl.grantRole(ROLE, accounts[0], { from: accounts[0] });
await this.accessControl.grantRole(crossChainRoleAlias(ROLE), accounts[1], { from: accounts[0] });
});
it('check alliassing', async function () {
expect(await this.accessControl.crossChainRoleAlias(ROLE)).to.be.bignumber.equal(crossChainRoleAlias(ROLE));
});
it('Crosschain calls not authorized to non-aliased addresses', async function () {
await expectRevert(
CrossChainHelper.call(
accounts[0],
this.accessControl,
'senderProtected',
[ ROLE ],
),
`AccessControl: account ${accounts[0].toLowerCase()} is missing role ${crossChainRoleAlias(ROLE)}`,
);
});
it('Crosschain calls not authorized to non-aliased addresses', async function () {
await CrossChainHelper.call(
accounts[1],
this.accessControl,
'senderProtected',
[ ROLE ],
);
});
});
});