aboutsummaryrefslogtreecommitdiffstats
path: root/packages/contracts/test/token_transfer_proxy/auth.ts
diff options
context:
space:
mode:
authorLeonid Logvinov <logvinov.leon@gmail.com>2018-01-19 20:27:15 +0800
committerLeonid Logvinov <logvinov.leon@gmail.com>2018-01-30 23:01:35 +0800
commit6463cda2045fe9caca3cb3908aa0c66f0bfe683a (patch)
tree6ac6826c29b8d85c226487239ea253aaa2d60f4c /packages/contracts/test/token_transfer_proxy/auth.ts
parentd004df56e38726ed7f1b775da33d8f37aae270db (diff)
downloaddexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.gz
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.bz2
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.lz
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.xz
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.tar.zst
dexon-sol-tools-6463cda2045fe9caca3cb3908aa0c66f0bfe683a.zip
Remove truffle from tokenTransferProxy tests
Diffstat (limited to 'packages/contracts/test/token_transfer_proxy/auth.ts')
-rw-r--r--packages/contracts/test/token_transfer_proxy/auth.ts99
1 files changed, 99 insertions, 0 deletions
diff --git a/packages/contracts/test/token_transfer_proxy/auth.ts b/packages/contracts/test/token_transfer_proxy/auth.ts
new file mode 100644
index 000000000..aa0ad2fc5
--- /dev/null
+++ b/packages/contracts/test/token_transfer_proxy/auth.ts
@@ -0,0 +1,99 @@
+import * as chai from 'chai';
+
+import { constants } from '../../util/constants';
+import { ContractInstance } from '../../util/types';
+import { chaiSetup } from '../utils/chai_setup';
+
+chaiSetup.configure();
+const expect = chai.expect;
+const TokenTransferProxy = artifacts.require('./db/TokenTransferProxy.sol');
+
+contract('TokenTransferProxy', (accounts: string[]) => {
+ const owner = accounts[0];
+ const notOwner = accounts[1];
+
+ let tokenTransferProxy: ContractInstance;
+ let authorized: string;
+ let notAuthorized = owner;
+
+ before(async () => {
+ tokenTransferProxy = await TokenTransferProxy.deployed();
+ });
+
+ describe('addAuthorizedAddress', () => {
+ it('should throw if not called by owner', async () => {
+ return expect(tokenTransferProxy.addAuthorizedAddress(notOwner, { from: notOwner })).to.be.rejectedWith(
+ constants.REVERT,
+ );
+ });
+
+ it('should allow owner to add an authorized address', async () => {
+ await tokenTransferProxy.addAuthorizedAddress(notAuthorized, {
+ from: owner,
+ });
+ authorized = notAuthorized;
+ notAuthorized = null;
+ const isAuthorized = await tokenTransferProxy.authorized.call(authorized);
+ expect(isAuthorized).to.be.true();
+ });
+
+ it('should throw if owner attempts to authorize a duplicate address', async () => {
+ return expect(tokenTransferProxy.addAuthorizedAddress(authorized, { from: owner })).to.be.rejectedWith(
+ constants.REVERT,
+ );
+ });
+ });
+
+ describe('removeAuthorizedAddress', () => {
+ it('should throw if not called by owner', async () => {
+ return expect(
+ tokenTransferProxy.removeAuthorizedAddress(authorized, {
+ from: notOwner,
+ }),
+ ).to.be.rejectedWith(constants.REVERT);
+ });
+
+ it('should allow owner to remove an authorized address', async () => {
+ await tokenTransferProxy.removeAuthorizedAddress(authorized, {
+ from: owner,
+ });
+ notAuthorized = authorized;
+ authorized = null;
+
+ const isAuthorized = await tokenTransferProxy.authorized.call(notAuthorized);
+ expect(isAuthorized).to.be.false();
+ });
+
+ it('should throw if owner attempts to remove an address that is not authorized', async () => {
+ return expect(
+ tokenTransferProxy.removeAuthorizedAddress(notAuthorized, {
+ from: owner,
+ }),
+ ).to.be.rejectedWith(constants.REVERT);
+ });
+ });
+
+ describe('getAuthorizedAddresses', () => {
+ it('should return all authorized addresses', async () => {
+ const initial = await tokenTransferProxy.getAuthorizedAddresses();
+ expect(initial).to.have.length(1);
+ await tokenTransferProxy.addAuthorizedAddress(notAuthorized, {
+ from: owner,
+ });
+
+ authorized = notAuthorized;
+ notAuthorized = null;
+ const afterAdd = await tokenTransferProxy.getAuthorizedAddresses();
+ expect(afterAdd).to.have.length(2);
+ expect(afterAdd).to.include(authorized);
+
+ await tokenTransferProxy.removeAuthorizedAddress(authorized, {
+ from: owner,
+ });
+ notAuthorized = authorized;
+ authorized = null;
+ const afterRemove = await tokenTransferProxy.getAuthorizedAddresses();
+ expect(afterRemove).to.have.length(1);
+ });
+ });
+});