mirror of
https://github.com/vacp2p/linea-monorepo.git
synced 2026-01-09 04:08:01 -05:00
* first pass contracts and makefile cleanup * remove unused 4844 test files * Remove Goerli references * lint fixing * lint fixing * remove more Goerli references * correct folder paths for L2 service tests * fix pathing and hardhat version * reinstate deleted file * correct file pathing
216 lines
7.6 KiB
TypeScript
216 lines
7.6 KiB
TypeScript
import { SignerWithAddress } from "@nomicfoundation/hardhat-ethers/signers";
|
|
import { loadFixture } from "@nomicfoundation/hardhat-network-helpers";
|
|
import { expect } from "chai";
|
|
import { ethers } from "hardhat";
|
|
import { LineaVoyageXP } from "../../typechain-types";
|
|
import { DEFAULT_ADMIN_ROLE, MINTER_ROLE } from "../common/constants";
|
|
import { deployFromFactory } from "../common/deployment";
|
|
import { buildAccessErrorMessage, expectRevertWithCustomError, expectRevertWithReason } from "../common/helpers";
|
|
|
|
describe("Linea Voyage XP Token Tests", () => {
|
|
let contract: LineaVoyageXP;
|
|
let minter: SignerWithAddress;
|
|
let deployer: SignerWithAddress;
|
|
|
|
async function deployLineaVoyageXPFixture() {
|
|
return deployFromFactory("LineaVoyageXP", minter.address) as Promise<LineaVoyageXP>;
|
|
}
|
|
|
|
before(async () => {
|
|
[deployer, minter] = await ethers.getSigners();
|
|
});
|
|
|
|
beforeEach(async () => {
|
|
contract = await loadFixture(deployLineaVoyageXPFixture);
|
|
});
|
|
|
|
describe("Initialization and roles", () => {
|
|
it("minter should have the 'MINTER_ROLE' role", async () => {
|
|
expect(await contract.hasRole(MINTER_ROLE, minter.address)).to.be.true;
|
|
});
|
|
|
|
it("minter address should have the 'DEFAULT_ADMIN_ROLE' role", async () => {
|
|
expect(await contract.hasRole(DEFAULT_ADMIN_ROLE, minter.address)).to.be.true;
|
|
});
|
|
|
|
it("deployer should NOT have the 'MINTER_ROLE' role", async () => {
|
|
expect(await contract.hasRole(MINTER_ROLE, deployer.address)).to.be.false;
|
|
});
|
|
|
|
it("deployer should NOT have the 'DEFAULT_ADMIN_ROLE' role", async () => {
|
|
expect(await contract.hasRole(DEFAULT_ADMIN_ROLE, deployer.address)).to.be.false;
|
|
});
|
|
});
|
|
|
|
// commented out for linter, but leaving placeholders
|
|
|
|
describe("Single minting", () => {
|
|
it("non-minter cannot mint tokens", async () => {
|
|
await expectRevertWithReason(
|
|
contract.connect(deployer).mint(deployer.address, 1000n),
|
|
buildAccessErrorMessage(deployer, MINTER_ROLE),
|
|
);
|
|
});
|
|
|
|
it("minter can mint tokens", async () => {
|
|
await contract.connect(minter).mint(deployer.address, 1000n);
|
|
|
|
expect(await contract.balanceOf(deployer.address)).to.be.equal(1000n);
|
|
});
|
|
});
|
|
|
|
describe("Batch minting with one amount", () => {
|
|
it("non-minter cannot mint tokens", async () => {
|
|
await expectRevertWithReason(
|
|
contract.batchMint([deployer.address], 1000n),
|
|
buildAccessErrorMessage(deployer, MINTER_ROLE),
|
|
);
|
|
});
|
|
|
|
it("minter can mint tokens for one address", async () => {
|
|
await contract.connect(minter).batchMint([deployer.address], 1000n);
|
|
|
|
expect(await contract.balanceOf(deployer.address)).to.be.equal(1000n);
|
|
});
|
|
|
|
it("minter can mint tokens for multiple address", async () => {
|
|
await contract.connect(minter).batchMint([minter.address, deployer.address], 1000n);
|
|
|
|
expect(await contract.balanceOf(deployer.address)).to.be.equal(1000n);
|
|
expect(await contract.balanceOf(minter.address)).to.be.equal(1000n);
|
|
});
|
|
});
|
|
|
|
describe("Batch minting with varying amounts", () => {
|
|
it("non-minter cannot mint tokens", async () => {
|
|
await expectRevertWithReason(
|
|
contract.batchMintMultiple([deployer.address], [1000n]),
|
|
buildAccessErrorMessage(deployer, MINTER_ROLE),
|
|
);
|
|
});
|
|
|
|
it("minter can mint tokens for one address", async () => {
|
|
await contract.connect(minter).batchMintMultiple([deployer.address], [1000n]);
|
|
|
|
expect(await contract.balanceOf(deployer.address)).to.be.equal(1000n);
|
|
});
|
|
|
|
it("minter can mint tokens for multiple address with different amounts", async () => {
|
|
await contract.connect(minter).batchMintMultiple([minter.address, deployer.address], [1000n, 2000n]);
|
|
|
|
expect(await contract.balanceOf(deployer.address)).to.be.equal(2000n);
|
|
expect(await contract.balanceOf(minter.address)).to.be.equal(1000n);
|
|
});
|
|
|
|
it("cannot mint when array lengths are different", async () => {
|
|
await expectRevertWithReason(
|
|
contract.connect(minter).batchMintMultiple([minter.address, deployer.address], [1000n]),
|
|
"Array lengths do not match",
|
|
);
|
|
});
|
|
});
|
|
|
|
describe("Tokens are SoulBound", () => {
|
|
it("cannot approve token amounts", async () => {
|
|
await expectRevertWithCustomError(
|
|
contract,
|
|
contract.connect(deployer).approve(minter.address, 1000n),
|
|
"TokenIsSoulBound",
|
|
);
|
|
});
|
|
|
|
it("cannot transfer token amounts", async () => {
|
|
await expectRevertWithCustomError(
|
|
contract,
|
|
contract.connect(deployer).transfer(minter.address, 1000n),
|
|
"TokenIsSoulBound",
|
|
);
|
|
});
|
|
|
|
it("cannot transfer from allowance amounts", async () => {
|
|
await expectRevertWithCustomError(
|
|
contract,
|
|
contract.connect(deployer).transferFrom(deployer.address, minter.address, 1000n),
|
|
"TokenIsSoulBound",
|
|
);
|
|
});
|
|
|
|
it("cannot increase token allowance amounts", async () => {
|
|
await expectRevertWithCustomError(
|
|
contract,
|
|
contract.connect(deployer).increaseAllowance(minter.address, 1000n),
|
|
"TokenIsSoulBound",
|
|
);
|
|
});
|
|
|
|
it("cannot decrease token allowance amounts", async () => {
|
|
await expectRevertWithCustomError(
|
|
contract,
|
|
contract.connect(deployer).decreaseAllowance(minter.address, 1000n),
|
|
"TokenIsSoulBound",
|
|
);
|
|
});
|
|
});
|
|
|
|
describe("Role management", () => {
|
|
it("can renounce DEFAULT_ADMIN_ROLE role and not grant roles", async () => {
|
|
await contract.connect(minter).renounceRole(DEFAULT_ADMIN_ROLE, minter.address);
|
|
|
|
await expectRevertWithReason(
|
|
contract.connect(minter).grantRole(DEFAULT_ADMIN_ROLE, minter.address),
|
|
buildAccessErrorMessage(minter, DEFAULT_ADMIN_ROLE),
|
|
);
|
|
});
|
|
|
|
it("can renounce MINTER_ROLE role and not mint single address tokens", async () => {
|
|
await contract.connect(minter).renounceRole(MINTER_ROLE, minter.address);
|
|
|
|
await expectRevertWithReason(
|
|
contract.connect(minter).mint(deployer.address, 1000n),
|
|
buildAccessErrorMessage(minter, MINTER_ROLE),
|
|
);
|
|
});
|
|
|
|
it("can renounce MINTER_ROLE role and not mint multiple address tokens", async () => {
|
|
await contract.connect(minter).renounceRole(MINTER_ROLE, minter.address);
|
|
|
|
await expectRevertWithReason(
|
|
contract.connect(minter).batchMint([deployer.address], 1000n),
|
|
buildAccessErrorMessage(minter, MINTER_ROLE),
|
|
);
|
|
});
|
|
|
|
it("can renounce MINTER_ROLE role and not mint multiple address tokens with different amounts", async () => {
|
|
await contract.connect(minter).renounceRole(MINTER_ROLE, minter.address);
|
|
|
|
await expectRevertWithReason(
|
|
contract.connect(minter).batchMintMultiple([deployer.address], [1000n]),
|
|
buildAccessErrorMessage(minter, MINTER_ROLE),
|
|
);
|
|
});
|
|
});
|
|
|
|
describe.skip("Gas limitations", () => {
|
|
it("Can mint for 1000 addresses with the same amount", async () => {
|
|
const randomWallets = [];
|
|
for (let i = 0; i < 1000; i++) {
|
|
randomWallets.push(ethers.Wallet.createRandom().address);
|
|
}
|
|
|
|
await contract.connect(minter).batchMint(randomWallets, 1000n, { gasLimit: 26000000 });
|
|
}).timeout(200_000);
|
|
|
|
it("Can mint for 1000 addresses with the different amounts amount", async () => {
|
|
const randomWallets = [];
|
|
const amounts = [];
|
|
|
|
for (let i = 0; i < 1000; i++) {
|
|
randomWallets.push(ethers.Wallet.createRandom().address);
|
|
amounts.push(BigInt(i + 100));
|
|
}
|
|
|
|
await contract.connect(minter).batchMintMultiple(randomWallets, amounts, { gasLimit: 26000000 });
|
|
}).timeout(200_000);
|
|
});
|
|
});
|