-
Notifications
You must be signed in to change notification settings - Fork 585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Parse ICS20 denomination using channel identifier format #1730
Changes from 4 commits
900e20c
80117b7
f46506e
8e43aa4
e0a79fe
88eb4d2
2be1b63
8b57dc5
2e74b59
1348d37
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -76,8 +76,7 @@ func (suite *KeeperTestSuite) TestMigratorMigrateTraces() { | |
}, | ||
}, | ||
{ | ||
// the expected value will change with the implementation of the fix for #1698 | ||
"no change: non-standard port", | ||
"success: non-standard port", | ||
func() { | ||
suite.chainA.GetSimApp().TransferKeeper.SetDenomTrace( | ||
suite.chainA.GetContext(), | ||
|
@@ -87,7 +86,7 @@ func (suite *KeeperTestSuite) TestMigratorMigrateTraces() { | |
}, | ||
transfertypes.Traces{ | ||
{ | ||
BaseDenom: "customport/channel-7/uatom", Path: "transfer/channel-0/transfer/channel-1", | ||
BaseDenom: "uatom", Path: "transfer/channel-0/transfer/channel-1/customport/channel-7", | ||
}, | ||
}, | ||
}, | ||
|
@@ -108,3 +107,16 @@ func (suite *KeeperTestSuite) TestMigratorMigrateTraces() { | |
}) | ||
} | ||
} | ||
|
||
func (suite *KeeperTestSuite) TestMigratorMigrateTracesCorruptionDetection() { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Made as a separate test since it is the only test case which should panic |
||
// IBCDenom() previously would return "customport/channel-0/uatom", but now should return ibc/{hash} | ||
corruptedDenomTrace := transfertypes.DenomTrace{ | ||
BaseDenom: "customport/channel-0/uatom", Path: "", | ||
} | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. mega nit but could we separate fields onto different lines for readability, e.g. corruptedDenomTrace := transfertypes.DenomTrace{
BaseDenom: "customport/channel-0/uatom",
Path: "",
} There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. oh definitely! Didn't even notice it was two fields |
||
suite.chainA.GetSimApp().TransferKeeper.SetDenomTrace(suite.chainA.GetContext(), corruptedDenomTrace) | ||
|
||
migrator := transferkeeper.NewMigrator(suite.chainA.GetSimApp().TransferKeeper) | ||
suite.Panics(func() { | ||
migrator.MigrateTraces(suite.chainA.GetContext()) | ||
}) | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -17,20 +17,23 @@ func TestParseDenomTrace(t *testing.T) { | |
{"base denom ending with '/'", "uatom/", DenomTrace{BaseDenom: "uatom/"}}, | ||
{"base denom with single '/'s", "gamm/pool/1", DenomTrace{BaseDenom: "gamm/pool/1"}}, | ||
{"base denom with double '/'s", "gamm//pool//1", DenomTrace{BaseDenom: "gamm//pool//1"}}, | ||
{"trace info", "transfer/channelToA/uatom", DenomTrace{BaseDenom: "uatom", Path: "transfer/channelToA"}}, | ||
{"trace info with base denom ending in '/'", "transfer/channelToA/uatom/", DenomTrace{BaseDenom: "uatom/", Path: "transfer/channelToA"}}, | ||
{"trace info with single '/' in base denom", "transfer/channelToA/erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA", DenomTrace{BaseDenom: "erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA", Path: "transfer/channelToA"}}, | ||
{"trace info with multiple '/'s in base denom", "transfer/channelToA/gamm/pool/1", DenomTrace{BaseDenom: "gamm/pool/1", Path: "transfer/channelToA"}}, | ||
{"trace info with multiple double '/'s in base denom", "transfer/channelToA/gamm//pool//1", DenomTrace{BaseDenom: "gamm//pool//1", Path: "transfer/channelToA"}}, | ||
{"trace info with multiple port/channel pairs", "transfer/channelToA/transfer/channelToB/uatom", DenomTrace{BaseDenom: "uatom", Path: "transfer/channelToA/transfer/channelToB"}}, | ||
{"trace info", "transfer/channel-1/uatom", DenomTrace{BaseDenom: "uatom", Path: "transfer/channel-1"}}, | ||
{"trace info with custom port", "customtransfer/channel-1/uatom", DenomTrace{BaseDenom: "uatom", Path: "customtransfer/channel-1"}}, | ||
{"trace info with base denom ending in '/'", "transfer/channel-1/uatom/", DenomTrace{BaseDenom: "uatom/", Path: "transfer/channel-1"}}, | ||
{"trace info with single '/' in base denom", "transfer/channel-1/erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA", DenomTrace{BaseDenom: "erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA", Path: "transfer/channel-1"}}, | ||
{"trace info with multiple '/'s in base denom", "transfer/channel-1/gamm/pool/1", DenomTrace{BaseDenom: "gamm/pool/1", Path: "transfer/channel-1"}}, | ||
{"trace info with multiple double '/'s in base denom", "transfer/channel-1/gamm//pool//1", DenomTrace{BaseDenom: "gamm//pool//1", Path: "transfer/channel-1"}}, | ||
{"trace info with multiple port/channel pairs", "transfer/channel-1/transfer/channel-2/uatom", DenomTrace{BaseDenom: "uatom", Path: "transfer/channel-1/transfer/channel-2"}}, | ||
{"trace info with multiple custom ports", "customtransfer/channel-1/alternativetransfer/channel-2/uatom", DenomTrace{BaseDenom: "uatom", Path: "customtransfer/channel-1/alternativetransfer/channel-2"}}, | ||
{"incomplete path", "transfer/uatom", DenomTrace{BaseDenom: "transfer/uatom"}}, | ||
{"invalid path (1)", "transfer//uatom", DenomTrace{BaseDenom: "uatom", Path: "transfer/"}}, | ||
{"invalid path (2)", "channelToA/transfer/uatom", DenomTrace{BaseDenom: "channelToA/transfer/uatom"}}, | ||
{"invalid path (1)", "transfer//uatom", DenomTrace{BaseDenom: "transfer//uatom", Path: ""}}, | ||
{"invalid path (2)", "channel-1/transfer/uatom", DenomTrace{BaseDenom: "channel-1/transfer/uatom"}}, | ||
{"invalid path (3)", "uatom/transfer", DenomTrace{BaseDenom: "uatom/transfer"}}, | ||
{"invalid path (4)", "transfer/channelToA", DenomTrace{BaseDenom: "transfer/channelToA"}}, | ||
{"invalid path (5)", "transfer/channelToA/", DenomTrace{Path: "transfer/channelToA"}}, | ||
{"invalid path (6)", "transfer/channelToA/transfer", DenomTrace{BaseDenom: "transfer", Path: "transfer/channelToA"}}, | ||
{"invalid path (7)", "transfer/channelToA/transfer/channelToB", DenomTrace{Path: "transfer/channelToA/transfer/channelToB"}}, | ||
{"invalid path (4)", "transfer/channel-1", DenomTrace{BaseDenom: "transfer/channel-1"}}, | ||
{"invalid path (5)", "transfer/channel-1/", DenomTrace{Path: "transfer/channel-1"}}, | ||
{"invalid path (6)", "transfer/channel-1/transfer", DenomTrace{BaseDenom: "transfer", Path: "transfer/channel-1"}}, | ||
{"invalid path (7)", "transfer/channel-1/transfer/channel-2", DenomTrace{Path: "transfer/channel-1/transfer/channel-2"}}, | ||
{"invalid path (8)", "transfer/channelToA/uatom", DenomTrace{BaseDenom: "transfer/channelToA/uatom", Path: ""}}, | ||
} | ||
|
||
for _, tc := range testCases { | ||
|
@@ -46,7 +49,7 @@ func TestDenomTrace_IBCDenom(t *testing.T) { | |
expDenom string | ||
}{ | ||
{"base denom", DenomTrace{BaseDenom: "uatom"}, "uatom"}, | ||
{"trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channelToA"}, "ibc/7F1D3FCF4AE79E1554D670D1AD949A9BA4E4A3C76C63093E17E446A46061A7A2"}, | ||
{"trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channel-1"}, "ibc/C4CFF46FD6DE35CA4CF4CE031E643C8FDC9BA4B99AE598E9B0ED98FE3A2319F9"}, | ||
} | ||
|
||
for _, tc := range testCases { | ||
|
@@ -65,12 +68,12 @@ func TestDenomTrace_Validate(t *testing.T) { | |
{"base denom only with single '/'", DenomTrace{BaseDenom: "erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA"}, false}, | ||
{"base denom only with multiple '/'s", DenomTrace{BaseDenom: "gamm/pool/1"}, false}, | ||
{"empty DenomTrace", DenomTrace{}, true}, | ||
{"valid single trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channelToA"}, false}, | ||
{"valid multiple trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channelToA/transfer/channelToB"}, false}, | ||
{"valid single trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channel-1"}, false}, | ||
{"valid multiple trace info", DenomTrace{BaseDenom: "uatom", Path: "transfer/channel-1/transfer/channel-2"}, false}, | ||
{"single trace identifier", DenomTrace{BaseDenom: "uatom", Path: "transfer"}, true}, | ||
{"invalid port ID", DenomTrace{BaseDenom: "uatom", Path: "(transfer)/channelToA"}, true}, | ||
{"invalid channel ID", DenomTrace{BaseDenom: "uatom", Path: "transfer/(channelToA)"}, true}, | ||
{"empty base denom with trace", DenomTrace{BaseDenom: "", Path: "transfer/channelToA"}, true}, | ||
{"invalid port ID", DenomTrace{BaseDenom: "uatom", Path: "(transfer)/channel-1"}, true}, | ||
{"invalid channel ID", DenomTrace{BaseDenom: "uatom", Path: "transfer/(channel-1)"}, true}, | ||
{"empty base denom with trace", DenomTrace{BaseDenom: "", Path: "transfer/channel-1"}, true}, | ||
} | ||
|
||
for _, tc := range testCases { | ||
|
@@ -90,16 +93,16 @@ func TestTraces_Validate(t *testing.T) { | |
expError bool | ||
}{ | ||
{"empty Traces", Traces{}, false}, | ||
{"valid multiple trace info", Traces{{BaseDenom: "uatom", Path: "transfer/channelToA/transfer/channelToB"}}, false}, | ||
{"valid multiple trace info", Traces{{BaseDenom: "uatom", Path: "transfer/channel-1/transfer/channel-2"}}, false}, | ||
{ | ||
"valid multiple trace info", | ||
Traces{ | ||
{BaseDenom: "uatom", Path: "transfer/channelToA/transfer/channelToB"}, | ||
{BaseDenom: "uatom", Path: "transfer/channelToA/transfer/channelToB"}, | ||
{BaseDenom: "uatom", Path: "transfer/channel-1/transfer/channel-2"}, | ||
{BaseDenom: "uatom", Path: "transfer/channel-1/transfer/channel-2"}, | ||
}, | ||
true, | ||
}, | ||
{"empty base denom with trace", Traces{{BaseDenom: "", Path: "transfer/channelToA"}}, true}, | ||
{"empty base denom with trace", Traces{{BaseDenom: "", Path: "transfer/channel-1"}}, true}, | ||
} | ||
|
||
for _, tc := range testCases { | ||
|
@@ -118,26 +121,25 @@ func TestValidatePrefixedDenom(t *testing.T) { | |
denom string | ||
expError bool | ||
}{ | ||
{"prefixed denom", "transfer/channelToA/uatom", false}, | ||
{"prefixed denom with '/'", "transfer/channelToA/gamm/pool/1", false}, | ||
{"prefixed denom", "transfer/channel-1/uatom", false}, | ||
{"prefixed denom with '/'", "transfer/channel-1/gamm/pool/1", false}, | ||
{"empty prefix", "/uatom", false}, | ||
{"empty identifiers", "//uatom", false}, | ||
{"base denom", "uatom", false}, | ||
{"base denom with single '/'", "erc20/0x85bcBCd7e79Ec36f4fBBDc54F90C643d921151AA", false}, | ||
{"base denom with multiple '/'s", "gamm/pool/1", false}, | ||
{"invalid port ID", "(transfer)/channelToA/uatom", false}, | ||
{"invalid port ID", "(transfer)/channel-1/uatom", true}, | ||
{"empty denom", "", true}, | ||
{"single trace identifier", "transfer/", true}, | ||
{"invalid channel ID", "transfer/(channelToA)/uatom", true}, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. had to remove this test, the |
||
} | ||
|
||
for _, tc := range testCases { | ||
err := ValidatePrefixedDenom(tc.denom) | ||
if tc.expError { | ||
require.Error(t, err, tc.name) | ||
continue | ||
} else { | ||
require.NoError(t, err, tc.name) | ||
} | ||
require.NoError(t, err, tc.name) | ||
} | ||
} | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We expect this to not occur correct?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
correct. From my understanding, this should only be possible if any chains using the latest minor versions (1.5, 2.3, 3.1), use custom ports for transfer and allow receives of foreign assets. I'm believe there is no single case of this, but to be safe, the check is added to ensure that if this assumption is wrong we can fix the issue before it worsens