diff options
author | Leonid Logvinov <logvinov.leon@gmail.com> | 2018-01-19 20:27:15 +0800 |
---|---|---|
committer | Leonid Logvinov <logvinov.leon@gmail.com> | 2018-01-30 23:01:35 +0800 |
commit | 6463cda2045fe9caca3cb3908aa0c66f0bfe683a (patch) | |
tree | 6ac6826c29b8d85c226487239ea253aaa2d60f4c /packages/contracts/test/token_transfer_proxy/auth.ts | |
parent | d004df56e38726ed7f1b775da33d8f37aae270db (diff) | |
download | dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.gz dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.bz2 dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.lz dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.xz dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.zst dexon-0x-contracts-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.zip |
Remove truffle from tokenTransferProxy tests
Diffstat (limited to 'packages/contracts/test/token_transfer_proxy/auth.ts')
-rw-r--r-- | packages/contracts/test/token_transfer_proxy/auth.ts | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/packages/contracts/test/token_transfer_proxy/auth.ts b/packages/contracts/test/token_transfer_proxy/auth.ts new file mode 100644 index 000000000..aa0ad2fc5 --- /dev/null +++ b/packages/contracts/test/token_transfer_proxy/auth.ts @@ -0,0 +1,99 @@ +import * as chai from 'chai'; + +import { constants } from '../../util/constants'; +import { ContractInstance } from '../../util/types'; +import { chaiSetup } from '../utils/chai_setup'; + +chaiSetup.configure(); +const expect = chai.expect; +const TokenTransferProxy = artifacts.require('./db/TokenTransferProxy.sol'); + +contract('TokenTransferProxy', (accounts: string[]) => { + const owner = accounts[0]; + const notOwner = accounts[1]; + + let tokenTransferProxy: ContractInstance; + let authorized: string; + let notAuthorized = owner; + + before(async () => { + tokenTransferProxy = await TokenTransferProxy.deployed(); + }); + + describe('addAuthorizedAddress', () => { + it('should throw if not called by owner', async () => { + return expect(tokenTransferProxy.addAuthorizedAddress(notOwner, { from: notOwner })).to.be.rejectedWith( + constants.REVERT, + ); + }); + + it('should allow owner to add an authorized address', async () => { + await tokenTransferProxy.addAuthorizedAddress(notAuthorized, { + from: owner, + }); + authorized = notAuthorized; + notAuthorized = null; + const isAuthorized = await tokenTransferProxy.authorized.call(authorized); + expect(isAuthorized).to.be.true(); + }); + + it('should throw if owner attempts to authorize a duplicate address', async () => { + return expect(tokenTransferProxy.addAuthorizedAddress(authorized, { from: owner })).to.be.rejectedWith( + constants.REVERT, + ); + }); + }); + + describe('removeAuthorizedAddress', () => { + it('should throw if not called by owner', async () => { + return expect( + tokenTransferProxy.removeAuthorizedAddress(authorized, { + from: notOwner, + }), + ).to.be.rejectedWith(constants.REVERT); + }); + + it('should allow owner to remove an authorized address', async () => { + await tokenTransferProxy.removeAuthorizedAddress(authorized, { + from: owner, + }); + notAuthorized = authorized; + authorized = null; + + const isAuthorized = await tokenTransferProxy.authorized.call(notAuthorized); + expect(isAuthorized).to.be.false(); + }); + + it('should throw if owner attempts to remove an address that is not authorized', async () => { + return expect( + tokenTransferProxy.removeAuthorizedAddress(notAuthorized, { + from: owner, + }), + ).to.be.rejectedWith(constants.REVERT); + }); + }); + + describe('getAuthorizedAddresses', () => { + it('should return all authorized addresses', async () => { + const initial = await tokenTransferProxy.getAuthorizedAddresses(); + expect(initial).to.have.length(1); + await tokenTransferProxy.addAuthorizedAddress(notAuthorized, { + from: owner, + }); + + authorized = notAuthorized; + notAuthorized = null; + const afterAdd = await tokenTransferProxy.getAuthorizedAddresses(); + expect(afterAdd).to.have.length(2); + expect(afterAdd).to.include(authorized); + + await tokenTransferProxy.removeAuthorizedAddress(authorized, { + from: owner, + }); + notAuthorized = authorized; + authorized = null; + const afterRemove = await tokenTransferProxy.getAuthorizedAddresses(); + expect(afterRemove).to.have.length(1); + }); + }); +}); |