diff options
author | Alex Browne <stephenalexbrowne@gmail.com> | 2018-08-09 09:28:15 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-08-09 09:28:15 +0800 |
commit | 53713188fee57391040c24cc627fdc5ab8982d2e (patch) | |
tree | 8bfcf59197506af235f772cb8fc78f6315932c4f /packages/contracts/test | |
parent | 03fb73d1d2017b41551f47552a5ca06f0dfb0f08 (diff) | |
parent | c4c37cafa0d8a77bfdc01b1cc111ba0101e86c8b (diff) | |
download | dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar.gz dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar.bz2 dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar.lz dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar.xz dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.tar.zst dexon-sol-tools-53713188fee57391040c24cc627fdc5ab8982d2e.zip |
Merge pull request #915 from 0xProject/feature/encode-decode-checks
Add strictArgumentEncodingCheck to BaseContract and use it in contract templates
Diffstat (limited to 'packages/contracts/test')
-rw-r--r-- | packages/contracts/test/exchange/signature_validator.ts | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/packages/contracts/test/exchange/signature_validator.ts b/packages/contracts/test/exchange/signature_validator.ts index f2bb42c75..bef0547bd 100644 --- a/packages/contracts/test/exchange/signature_validator.ts +++ b/packages/contracts/test/exchange/signature_validator.ts @@ -113,7 +113,7 @@ describe('MixinSignatureValidator', () => { it('should revert when signature type is unsupported', async () => { const unsupportedSignatureType = SignatureType.NSignatureTypes; - const unsupportedSignatureHex = `0x${unsupportedSignatureType}`; + const unsupportedSignatureHex = '0x' + Buffer.from([unsupportedSignatureType]).toString('hex'); const orderHashHex = orderHashUtils.getOrderHashHex(signedOrder); return expectContractCallFailed( signatureValidator.publicIsValidSignature.callAsync( @@ -126,7 +126,7 @@ describe('MixinSignatureValidator', () => { }); it('should revert when SignatureType=Illegal', async () => { - const unsupportedSignatureHex = `0x${SignatureType.Illegal}`; + const unsupportedSignatureHex = '0x' + Buffer.from([SignatureType.Illegal]).toString('hex'); const orderHashHex = orderHashUtils.getOrderHashHex(signedOrder); return expectContractCallFailed( signatureValidator.publicIsValidSignature.callAsync( @@ -139,7 +139,7 @@ describe('MixinSignatureValidator', () => { }); it('should return false when SignatureType=Invalid and signature has a length of zero', async () => { - const signatureHex = `0x${SignatureType.Invalid}`; + const signatureHex = '0x' + Buffer.from([SignatureType.Invalid]).toString('hex'); const orderHashHex = orderHashUtils.getOrderHashHex(signedOrder); const isValidSignature = await signatureValidator.publicIsValidSignature.callAsync( orderHashHex, |