aboutsummaryrefslogtreecommitdiffstats
path: root/test/contract_wrapper_test.ts
diff options
context:
space:
mode:
authorFabio Berger <me@fabioberger.com>2017-05-26 23:12:22 +0800
committerFabio Berger <me@fabioberger.com>2017-05-26 23:12:22 +0800
commit555bac19cb90a83d5a0025e53341f76ff39c4373 (patch)
tree45db0a8151ef22ad69d9d42b8fc10807d1b613ac /test/contract_wrapper_test.ts
parentf4bf9fc423c4bb7f2027cdd5700de56f8f4bff96 (diff)
downloaddexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar.gz
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar.bz2
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar.lz
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar.xz
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.tar.zst
dexon-sol-tools-555bac19cb90a83d5a0025e53341f76ff39c4373.zip
Setup blockchain snapshotting before/after every test, implemented unit tests for exchangeWrapper.isValidSignature
Diffstat (limited to 'test/contract_wrapper_test.ts')
-rw-r--r--test/contract_wrapper_test.ts99
1 files changed, 99 insertions, 0 deletions
diff --git a/test/contract_wrapper_test.ts b/test/contract_wrapper_test.ts
new file mode 100644
index 000000000..65eceb827
--- /dev/null
+++ b/test/contract_wrapper_test.ts
@@ -0,0 +1,99 @@
+import 'mocha';
+import * as chai from 'chai';
+import chaiAsPromised = require('chai-as-promised');
+import {web3Factory} from './utils/web3_factory';
+import * as Web3 from 'web3';
+import {ExchangeWrapper} from '../src/ts/contract_wrappers/exchange_wrapper';
+import {BlockchainClean} from './utils/blockchain_clean';
+import {Web3Wrapper} from './../src/ts/web3_wrapper';
+
+const expect = chai.expect;
+chai.use(chaiAsPromised);
+const blockchainClean = new BlockchainClean();
+
+describe('ExchangeWrapper', () => {
+ let web3Wrapper: Web3Wrapper;
+ let exchangeWrapper: ExchangeWrapper;
+ before(async () => {
+ const web3 = web3Factory.create();
+ web3Wrapper = new Web3Wrapper(web3);
+ exchangeWrapper = new ExchangeWrapper(web3Wrapper);
+ });
+ beforeEach(async () => {
+ await blockchainClean.setupAsync();
+ });
+ afterEach(async () => {
+ await blockchainClean.restoreAsync();
+ });
+ describe('#isValidSignatureAsync', () => {
+ // The Exchange smart contract `isValidSignature` method only validates orderHashes and assumes
+ // the length of the data is exactly 32 bytes. Thus for these tests, we use data of this size.
+ const dataHex = '0x6927e990021d23b1eb7b8789f6a6feaf98fe104bb0cf8259421b79f9a34222b0';
+ const signature = {
+ v: 27,
+ r: '0x61a3ed31b43c8780e905a260a35faefcc527be7516aa11c0256729b5b351bc33',
+ s: '0x40349190569279751135161d22529dc25add4f6069af05be04cacbda2ace2254',
+ };
+ const address = '0x5409ed021d9299bf6814279a6a1411a7e866a631';
+ describe('should throw if passed a malformed signature', () => {
+ it('malformed v', async () => {
+ const malformedSignature = {
+ v: 34,
+ r: signature.r,
+ s: signature.s,
+ };
+ expect(exchangeWrapper.isValidSignatureAsync(dataHex, malformedSignature, address))
+ .to.be.rejected;
+ });
+ it('r lacks 0x prefix', () => {
+ const malformedR = signature.r.replace('0x', '');
+ const malformedSignature = {
+ v: signature.v,
+ r: malformedR,
+ s: signature.s,
+ };
+ expect(exchangeWrapper.isValidSignatureAsync(dataHex, malformedSignature, address))
+ .to.be.rejected;
+ });
+ it('r is too short', () => {
+ const malformedR = signature.r.substr(10);
+ const malformedSignature = {
+ v: signature.v,
+ r: malformedR,
+ s: signature.s.replace('0', 'z'),
+ };
+ expect(exchangeWrapper.isValidSignatureAsync(dataHex, malformedSignature, address))
+ .to.be.rejected;
+ });
+ it('s is not hex', () => {
+ const malformedS = signature.s.replace('0', 'z');
+ const malformedSignature = {
+ v: signature.v,
+ r: signature.r,
+ s: malformedS,
+ };
+ expect(exchangeWrapper.isValidSignatureAsync(dataHex, malformedSignature, address))
+ .to.be.rejected;
+ });
+ });
+ it('should return false if the data doesn\'t pertain to the signature & address', async () => {
+ const isValid = await exchangeWrapper.isValidSignatureAsync('0x0', signature, address);
+ expect(isValid).to.be.false;
+ });
+ it('should return false if the address doesn\'t pertain to the signature & dataHex', async () => {
+ const validUnrelatedAddress = '0x8b0292B11a196601eD2ce54B665CaFEca0347D42';
+ const isValid = await exchangeWrapper.isValidSignatureAsync(dataHex, signature, validUnrelatedAddress);
+ expect(isValid).to.be.false;
+ });
+ it('should return false if the signature doesn\'t pertain to the dataHex & address', async () => {
+ const wrongSignature = Object.assign({}, signature, {v: 28});
+ const isValid = await exchangeWrapper.isValidSignatureAsync(dataHex, wrongSignature, address);
+ expect(isValid).to.be.false;
+ });
+ it('should return true if the signature does pertain to the dataHex & address', async () => {
+ const isValid = await exchangeWrapper.isValidSignatureAsync(dataHex, signature, address);
+ console.log('isValid', isValid);
+ expect(isValid).to.be.true;
+ });
+ });
+});