Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(x/auth): facultative vesting as well in simulation #22721

Merged
merged 2 commits into from
Dec 3, 2024

Conversation

julienrbrt
Copy link
Member

@julienrbrt julienrbrt commented Dec 2, 2024

Description

Noticed when migrating a chain to use simsx (ignite/cli#4432).
Now that the vesting module is not so mandatory, we don't recommend adding it to new chains and use the lockup account.

This fixes the fact that it would still create vesting account in simulation while no vesting module was on the chain. Causing sims to panic.


Author Checklist

All items are required. Please add a note to the item if the item is not applicable and
please add links to any relevant follow up issues.

I have...

  • included the correct type prefix in the PR title, you can find examples of the prefixes below:
  • confirmed ! in the type prefix if API or client breaking change
  • targeted the correct branch (see PR Targeting)
  • provided a link to the relevant issue or specification
  • reviewed "Files changed" and left comments if necessary
  • included the necessary unit and integration tests
  • added a changelog entry to CHANGELOG.md
  • updated the relevant documentation or specification, including comments for documenting Go code
  • confirmed all CI checks have passed

Reviewers Checklist

All items are required. Please add a note if the item is not applicable and please add
your handle next to the items reviewed if you only reviewed selected items.

Please see Pull Request Reviewer section in the contributing guide for more information on how to review a pull request.

I have...

  • confirmed the correct type prefix in the PR title
  • confirmed all author checklist items have been addressed
  • reviewed state machine logic, API design and naming, documentation is accurate, tests and test coverage

Summary by CodeRabbit

  • New Features
    • Enhanced account generation logic to allow for the creation of base accounts when the vesting module is disabled.
  • Bug Fixes
    • Improved control flow for account creation based on the simulation state.

@julienrbrt julienrbrt added the backport/v0.52.x PR scheduled for inclusion in the v0.52's next stable release label Dec 2, 2024
Copy link
Contributor

coderabbitai bot commented Dec 2, 2024

📝 Walkthrough

Walkthrough

The changes introduced in this pull request modify the RandomGenesisAccounts function within the x/auth/simulation/genesis.go file. A conditional check has been added to determine the presence of the vesting module in the simulation state. If the vesting module is not present, the function will create and assign a BaseAccount to the genesisAccs slice. This adjustment allows for the generation of only base accounts when the vesting module is disabled, while maintaining the existing logic for creating vesting accounts when the module is present.

Changes

File Path Change Summary
x/auth/simulation/genesis.go Added a conditional check in RandomGenesisAccounts to create BaseAccount if the vesting module is disabled. Existing logic for vesting accounts remains unchanged.

Possibly related PRs

Suggested labels

C:x/accounts

Suggested reviewers

  • facundomedica
  • testinginprod
  • sontrinh16
  • aaronc
  • kocubinski

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

github-actions bot commented Dec 2, 2024

@julienrbrt your pull request is missing a changelog!

@julienrbrt julienrbrt changed the title fix(x/auth): faculative vesting as well in simulation fix(x/auth): facultative vesting as well in simulation Dec 2, 2024
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (2)
x/auth/simulation/genesis.go (2)

29-35: Consider adding a comment explaining the check order.

The placement of the vesting module check before the validator bonding check is logical, but it would be helpful to document why this order is important.

+// First check if vesting module is enabled before proceeding with any vesting-related logic
+// This ensures we don't attempt to create vesting accounts when the module is not available
 // check if vesting module is enabled
 // if not, just use base account
 if _, ok := simState.GenState["vesting"]; !ok {

29-34: Consider documenting simulation behavior changes.

This change affects the distribution of account types in simulations. Consider:

  1. Adding a comment in the function documentation explaining the conditional vesting account creation
  2. Updating simulation documentation to reflect this behavior
  3. Adding test cases that verify simulation behavior both with and without the vesting module
📜 Review details

Configuration used: .coderabbit.yml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 9d9c19c and c852325.

📒 Files selected for processing (1)
  • x/auth/simulation/genesis.go (1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
x/auth/simulation/genesis.go (1)

Pattern **/*.go: Review the Golang code for conformity with the Uber Golang style guide, highlighting any deviations.

🔇 Additional comments (1)
x/auth/simulation/genesis.go (1)

29-34: LGTM! Clean implementation of facultative vesting check.

The implementation correctly handles the case where the vesting module is not present by falling back to base accounts, which aligns with the PR objective of preventing panics in simulation.

Let's verify that this is the only place where vesting accounts are created during simulation:

✅ Verification successful

Verified: The vesting check implementation is correctly placed

After reviewing the complete file content, I can confirm that this is indeed the only place where vesting accounts are created during simulation. The RandomGenesisAccounts function is the designated location for creating different types of accounts during genesis simulation, and the new check properly gates the creation of vesting accounts based on module availability.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for other potential vesting account creation points in simulation
rg -g '**/*simulation*.go' "vestingtypes\.New(Continuous|Delayed|Period)VestingAccount"

Length of output: 89


Script:

#!/bin/bash
# Let's try a broader search for vesting-related code in simulation files
rg -g '**/*simulation*.go' -i "vesting" -A 3 -B 3

Length of output: 49


Script:

#!/bin/bash
# Let's search for the file content to understand the context better
cat x/auth/simulation/genesis.go

Length of output: 4647

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (1)
x/auth/simulation/genesis.go (1)

29-34: Enhance module presence check with constants and documentation

The conditional check for the vesting module is correct and addresses the PR objective. However, consider these improvements:

  1. Define the module name as a constant to avoid string literals
  2. Add a more detailed comment explaining why this check prevents simulation panics
+// ModuleName for vesting
+const VestingModuleName = "vesting"

 // check if vesting module is enabled
-// if not, just use base account
+// Skip vesting account creation if the vesting module is not enabled in simulation
+// to prevent panics when simulating chains that don't use vesting
-if _, ok := simState.GenState["vesting"]; !ok {
+if _, ok := simState.GenState[VestingModuleName]; !ok {
📜 Review details

Configuration used: .coderabbit.yml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 9d9c19c and c852325.

📒 Files selected for processing (1)
  • x/auth/simulation/genesis.go (1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
x/auth/simulation/genesis.go (1)

Pattern **/*.go: Review the Golang code for conformity with the Uber Golang style guide, highlighting any deviations.

🔇 Additional comments (2)
x/auth/simulation/genesis.go (2)

31-34: LGTM: Clean integration with existing vesting logic

The placement and integration of the vesting module check is well-structured:

  • Early exit prevents unnecessary processing
  • Maintains existing functionality when vesting is enabled
  • Preserves simulation behavior for supported configurations

Also applies to: 35-77


29-34: Verify the fix prevents simulation panics

Let's confirm this resolves the simulation panic issue by checking for similar patterns or related code.

✅ Verification successful

Fix is properly implemented and prevents simulation panics

The code changes effectively prevent simulation panics by:

  • Correctly checking for vesting module availability before attempting to create vesting accounts
  • Maintaining proper account initialization when vesting is disabled
  • Preserving the existing simulation logic for cases where vesting is enabled

The implementation is verified through:

  • The presence of proper error handling in the RandomGenesisAccounts function
  • Consistent usage across simulation tests
  • No other locations in the codebase requiring similar vesting-related simulation fixes
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for other potential vesting-related simulation code that might need similar checks
rg -g '*.go' -l 'simState.*GenState.*vesting' --type go

# Look for any other direct vesting module references in simulation code
rg -g '*.go' -l 'vestingtypes.*simulation' --type go

# Check for any related test files that might need updates
fd -g '*_test.go' -x grep -l 'RandomGenesisAccounts'

Length of output: 688


Script:

#!/bin/bash
# Let's check the implementation of RandomGenesisAccounts in genesis.go and its test
cat x/auth/simulation/genesis.go x/auth/simulation/genesis_test.go

# Check if there are any simulation-related test failures or panics being handled
rg -g '*.go' -A 5 'simulation.*panic' --type go

# Look for any vesting-related simulation tests
rg -g '*_test.go' -A 5 'vesting.*simulation' --type go

Length of output: 8470

@julienrbrt julienrbrt added this pull request to the merge queue Dec 3, 2024
Merged via the queue into main with commit 4d1adcf Dec 3, 2024
82 of 83 checks passed
@julienrbrt julienrbrt deleted the julien/faculative-vesting branch December 3, 2024 08:40
mergify bot pushed a commit that referenced this pull request Dec 3, 2024
julienrbrt added a commit that referenced this pull request Dec 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/v0.52.x PR scheduled for inclusion in the v0.52's next stable release C:Simulations C:x/auth
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants