@aztec/end-to-end 4.0.0-nightly.20260113 → 4.0.0-nightly.20260114
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bench/client_flows/client_flows_benchmark.d.ts +10 -10
- package/dest/bench/client_flows/client_flows_benchmark.d.ts.map +1 -1
- package/dest/bench/client_flows/client_flows_benchmark.js +98 -133
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.d.ts +5 -6
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.d.ts.map +1 -1
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.js +94 -112
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.d.ts +5 -5
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.d.ts.map +1 -1
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.js +60 -62
- package/dest/e2e_deploy_contract/deploy_test.d.ts +4 -3
- package/dest/e2e_deploy_contract/deploy_test.d.ts.map +1 -1
- package/dest/e2e_deploy_contract/deploy_test.js +15 -13
- package/dest/e2e_fees/bridging_race.notest.js +2 -4
- package/dest/e2e_fees/fees_test.d.ts +11 -11
- package/dest/e2e_fees/fees_test.d.ts.map +1 -1
- package/dest/e2e_fees/fees_test.js +118 -139
- package/dest/e2e_l1_publisher/write_json.d.ts +1 -1
- package/dest/e2e_l1_publisher/write_json.d.ts.map +1 -1
- package/dest/e2e_l1_publisher/write_json.js +1 -0
- package/dest/e2e_nested_contract/nested_contract_test.d.ts +5 -8
- package/dest/e2e_nested_contract/nested_contract_test.d.ts.map +1 -1
- package/dest/e2e_nested_contract/nested_contract_test.js +29 -40
- package/dest/e2e_p2p/inactivity_slash_test.js +1 -1
- package/dest/e2e_p2p/p2p_network.d.ts +5 -3
- package/dest/e2e_p2p/p2p_network.d.ts.map +1 -1
- package/dest/e2e_p2p/p2p_network.js +99 -102
- package/dest/e2e_token_contract/token_contract_test.d.ts +15 -8
- package/dest/e2e_token_contract/token_contract_test.d.ts.map +1 -1
- package/dest/e2e_token_contract/token_contract_test.js +88 -92
- package/dest/fixtures/e2e_prover_test.d.ts +7 -13
- package/dest/fixtures/e2e_prover_test.d.ts.map +1 -1
- package/dest/fixtures/e2e_prover_test.js +78 -91
- package/dest/fixtures/snapshot_manager.d.ts +10 -44
- package/dest/fixtures/snapshot_manager.d.ts.map +1 -1
- package/dest/fixtures/snapshot_manager.js +12 -255
- package/dest/fixtures/utils.js +3 -3
- package/dest/quality_of_service/prometheus_client.d.ts +38 -0
- package/dest/quality_of_service/prometheus_client.d.ts.map +1 -0
- package/dest/quality_of_service/prometheus_client.js +67 -0
- package/dest/spartan/tx_metrics.d.ts +4 -1
- package/dest/spartan/tx_metrics.d.ts.map +1 -1
- package/dest/spartan/tx_metrics.js +21 -1
- package/dest/spartan/utils.d.ts +5 -1
- package/dest/spartan/utils.d.ts.map +1 -1
- package/dest/spartan/utils.js +25 -8
- package/package.json +38 -38
- package/src/bench/client_flows/client_flows_benchmark.ts +134 -192
- package/src/e2e_blacklist_token_contract/blacklist_token_contract_test.ts +104 -136
- package/src/e2e_cross_chain_messaging/cross_chain_messaging_test.ts +91 -103
- package/src/e2e_deploy_contract/deploy_test.ts +18 -14
- package/src/e2e_fees/bridging_race.notest.ts +2 -5
- package/src/e2e_fees/fees_test.ts +165 -210
- package/src/e2e_l1_publisher/write_json.ts +1 -0
- package/src/e2e_nested_contract/nested_contract_test.ts +30 -54
- package/src/e2e_p2p/inactivity_slash_test.ts +1 -1
- package/src/e2e_p2p/p2p_network.ts +149 -165
- package/src/e2e_token_contract/token_contract_test.ts +104 -113
- package/src/fixtures/e2e_prover_test.ts +97 -130
- package/src/fixtures/snapshot_manager.ts +12 -325
- package/src/fixtures/utils.ts +3 -3
- package/src/quality_of_service/prometheus_client.ts +113 -0
- package/src/spartan/tx_metrics.ts +21 -1
- package/src/spartan/utils.ts +26 -8
|
@@ -21,7 +21,7 @@ import getPort from 'get-port';
|
|
|
21
21
|
import { getAddress, getContract } from 'viem';
|
|
22
22
|
import { privateKeyToAccount } from 'viem/accounts';
|
|
23
23
|
import { ATTESTER_PRIVATE_KEYS_START_INDEX, createValidatorConfig, generatePrivateKeys } from '../fixtures/setup_p2p_test.js';
|
|
24
|
-
import {
|
|
24
|
+
import { deployAccounts, setupFromFresh, teardown } from '../fixtures/snapshot_manager.js';
|
|
25
25
|
import { getPrivateKeyFromIndex, getSponsoredFPCAddress } from '../fixtures/utils.js';
|
|
26
26
|
import { getEndToEndTestTelemetryClient } from '../fixtures/with_telemetry_utils.js';
|
|
27
27
|
// Use a fixed bootstrap node private key so that we can re-use the same snapshot and the nodes can find each other
|
|
@@ -40,7 +40,7 @@ export class P2PNetworkTest {
|
|
|
40
40
|
numberOfValidators;
|
|
41
41
|
numberOfNodes;
|
|
42
42
|
metricsPort;
|
|
43
|
-
|
|
43
|
+
context;
|
|
44
44
|
baseAccountPrivateKey;
|
|
45
45
|
baseAccount;
|
|
46
46
|
logger;
|
|
@@ -57,6 +57,9 @@ export class P2PNetworkTest {
|
|
|
57
57
|
defaultAccountAddress;
|
|
58
58
|
spamContract;
|
|
59
59
|
bootstrapNode;
|
|
60
|
+
// Store setup options for use in setup()
|
|
61
|
+
setupOptions;
|
|
62
|
+
deployL1ContractsArgs;
|
|
60
63
|
constructor(testName, bootstrapNodeEnr, bootNodePort, numberOfValidators, initialValidatorConfig, numberOfNodes = 0, // If set enable metrics collection
|
|
61
64
|
metricsPort, startProverNode){
|
|
62
65
|
this.testName = testName;
|
|
@@ -78,7 +81,8 @@ export class P2PNetworkTest {
|
|
|
78
81
|
this.attesterPrivateKeys = generatePrivateKeys(ATTESTER_PRIVATE_KEYS_START_INDEX + numberOfNodes, numberOfValidators);
|
|
79
82
|
this.attesterPublicKeys = this.attesterPrivateKeys.map((privateKey)=>privateKeyToAccount(privateKey).address);
|
|
80
83
|
const zkPassportParams = ZkPassportProofParams.random();
|
|
81
|
-
|
|
84
|
+
// Store setup options for later use
|
|
85
|
+
this.setupOptions = {
|
|
82
86
|
...initialValidatorConfig,
|
|
83
87
|
ethereumSlotDuration: initialValidatorConfig.ethereumSlotDuration ?? l1ContractsConfig.ethereumSlotDuration,
|
|
84
88
|
aztecEpochDuration: initialValidatorConfig.aztecEpochDuration ?? l1ContractsConfig.aztecEpochDuration,
|
|
@@ -90,7 +94,8 @@ export class P2PNetworkTest {
|
|
|
90
94
|
metricsPort: metricsPort,
|
|
91
95
|
numberOfInitialFundedAccounts: 2,
|
|
92
96
|
startProverNode
|
|
93
|
-
}
|
|
97
|
+
};
|
|
98
|
+
this.deployL1ContractsArgs = {
|
|
94
99
|
...initialValidatorConfig,
|
|
95
100
|
aztecEpochDuration: initialValidatorConfig.aztecEpochDuration ?? l1ContractsConfig.aztecEpochDuration,
|
|
96
101
|
slashingRoundSizeInEpochs: initialValidatorConfig.slashingRoundSizeInEpochs ?? l1ContractsConfig.slashingRoundSizeInEpochs,
|
|
@@ -104,7 +109,7 @@ export class P2PNetworkTest {
|
|
|
104
109
|
zkPassportDomain: zkPassportParams.domain,
|
|
105
110
|
zkPassportScope: zkPassportParams.scope
|
|
106
111
|
}
|
|
107
|
-
}
|
|
112
|
+
};
|
|
108
113
|
}
|
|
109
114
|
static async create({ testName, numberOfNodes, numberOfValidators, basePort, metricsPort, initialConfig, startProverNode }) {
|
|
110
115
|
const port = basePort || await getPort();
|
|
@@ -115,17 +120,16 @@ export class P2PNetworkTest {
|
|
|
115
120
|
}
|
|
116
121
|
get fundedAccount() {
|
|
117
122
|
if (!this.deployedAccounts[0]) {
|
|
118
|
-
throw new Error('Call
|
|
123
|
+
throw new Error('Call setupAccount to create a funded account.');
|
|
119
124
|
}
|
|
120
125
|
return this.deployedAccounts[0];
|
|
121
126
|
}
|
|
122
127
|
async addBootstrapNode() {
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
});
|
|
128
|
+
this.logger.info('Adding bootstrap node');
|
|
129
|
+
const telemetry = await getEndToEndTestTelemetryClient(this.metricsPort);
|
|
130
|
+
this.bootstrapNode = await createBootstrapNodeFromPrivateKey(BOOTSTRAP_NODE_PRIVATE_KEY, this.bootNodePort, telemetry, this.context.aztecNodeConfig);
|
|
131
|
+
// Overwrite enr with updated info
|
|
132
|
+
this.bootstrapNodeEnr = this.bootstrapNode.getENR().encodeTxt();
|
|
129
133
|
}
|
|
130
134
|
getValidators() {
|
|
131
135
|
const validators = [];
|
|
@@ -143,101 +147,92 @@ export class P2PNetworkTest {
|
|
|
143
147
|
validators
|
|
144
148
|
};
|
|
145
149
|
}
|
|
146
|
-
async
|
|
150
|
+
async applyBaseSetup() {
|
|
147
151
|
await this.addBootstrapNode();
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
};
|
|
152
|
+
this.logger.info('Adding validators');
|
|
153
|
+
const rollup = getContract({
|
|
154
|
+
address: this.context.deployL1ContractsValues.l1ContractAddresses.rollupAddress.toString(),
|
|
155
|
+
abi: RollupAbi,
|
|
156
|
+
client: this.context.deployL1ContractsValues.l1Client
|
|
157
|
+
});
|
|
158
|
+
this.logger.info(`Adding ${this.numberOfValidators} validators`);
|
|
159
|
+
const stakingAsset = getContract({
|
|
160
|
+
address: this.context.deployL1ContractsValues.l1ContractAddresses.stakingAssetAddress.toString(),
|
|
161
|
+
abi: TestERC20Abi,
|
|
162
|
+
client: this.context.deployL1ContractsValues.l1Client
|
|
163
|
+
});
|
|
164
|
+
const { address: multiAdderAddress } = await deployL1Contract(this.context.deployL1ContractsValues.l1Client, MultiAdderArtifact.contractAbi, MultiAdderArtifact.contractBytecode, [
|
|
165
|
+
rollup.address,
|
|
166
|
+
this.context.deployL1ContractsValues.l1Client.account.address
|
|
167
|
+
]);
|
|
168
|
+
const multiAdder = getContract({
|
|
169
|
+
address: multiAdderAddress.toString(),
|
|
170
|
+
abi: MultiAdderArtifact.contractAbi,
|
|
171
|
+
client: this.context.deployL1ContractsValues.l1Client
|
|
172
|
+
});
|
|
173
|
+
const stakeNeeded = await rollup.read.getActivationThreshold() * BigInt(this.numberOfValidators);
|
|
174
|
+
await Promise.all([
|
|
175
|
+
await stakingAsset.write.mint([
|
|
176
|
+
multiAdder.address,
|
|
177
|
+
stakeNeeded
|
|
178
|
+
], {})
|
|
179
|
+
].map((txHash)=>this.context.deployL1ContractsValues.l1Client.waitForTransactionReceipt({
|
|
180
|
+
hash: txHash
|
|
181
|
+
})));
|
|
182
|
+
const { validators } = this.getValidators();
|
|
183
|
+
this.validators = validators;
|
|
184
|
+
const gseAddress = this.context.deployL1ContractsValues.l1ContractAddresses.gseAddress;
|
|
185
|
+
if (!gseAddress) {
|
|
186
|
+
throw new Error('GSE contract not deployed');
|
|
187
|
+
}
|
|
188
|
+
const gseContract = new GSEContract(this.context.deployL1ContractsValues.l1Client, gseAddress.toString());
|
|
189
|
+
const makeValidatorTuples = async (validator)=>{
|
|
190
|
+
const registrationTuple = await gseContract.makeRegistrationTuple(validator.bn254SecretKey.getValue());
|
|
191
|
+
return {
|
|
192
|
+
attester: validator.attester.toString(),
|
|
193
|
+
withdrawer: validator.withdrawer.toString(),
|
|
194
|
+
...registrationTuple
|
|
192
195
|
};
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
await cheatCodes.rollup.advanceToEpoch(EpochNumber.fromBigInt(BigInt(await cheatCodes.rollup.getEpoch()) + await rollup.read.getLagInEpochsForValidatorSet() + 1n));
|
|
200
|
-
// Send and await a tx to make sure we mine a block for the warp to correctly progress.
|
|
201
|
-
await this._sendDummyTx(deployL1ContractsValues.l1Client);
|
|
196
|
+
};
|
|
197
|
+
const validatorTuples = await Promise.all(validators.map(makeValidatorTuples));
|
|
198
|
+
await this.context.deployL1ContractsValues.l1Client.waitForTransactionReceipt({
|
|
199
|
+
hash: await multiAdder.write.addValidators([
|
|
200
|
+
validatorTuples
|
|
201
|
+
])
|
|
202
202
|
});
|
|
203
|
+
await this.context.cheatCodes.rollup.advanceToEpoch(EpochNumber.fromBigInt(BigInt(await this.context.cheatCodes.rollup.getEpoch()) + await rollup.read.getLagInEpochsForValidatorSet() + 1n));
|
|
204
|
+
// Send and await a tx to make sure we mine a block for the warp to correctly progress.
|
|
205
|
+
await this._sendDummyTx(this.context.deployL1ContractsValues.l1Client);
|
|
203
206
|
}
|
|
204
207
|
async setupAccount() {
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
this.
|
|
209
|
-
return Promise.resolve();
|
|
208
|
+
this.logger.info('Setting up account');
|
|
209
|
+
const { deployedAccounts } = await deployAccounts(1, this.logger)({
|
|
210
|
+
wallet: this.context.wallet,
|
|
211
|
+
initialFundedAccounts: this.context.initialFundedAccounts
|
|
210
212
|
});
|
|
213
|
+
this.deployedAccounts = deployedAccounts;
|
|
214
|
+
[{ address: this.defaultAccountAddress }] = deployedAccounts;
|
|
215
|
+
this.wallet = this.context.wallet;
|
|
211
216
|
}
|
|
212
217
|
async deploySpamContract() {
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
contractAddress: spamContract.address
|
|
222
|
-
};
|
|
223
|
-
}, ({ contractAddress })=>{
|
|
224
|
-
if (!this.wallet) {
|
|
225
|
-
throw new Error('Call snapshot t.setupAccount before deploying account contract');
|
|
226
|
-
}
|
|
227
|
-
this.spamContract = SpamContract.at(contractAddress, this.wallet);
|
|
228
|
-
return Promise.resolve();
|
|
229
|
-
});
|
|
218
|
+
this.logger.info('Deploying spam contract');
|
|
219
|
+
if (!this.wallet) {
|
|
220
|
+
throw new Error('Call setupAccount before deploying spam contract');
|
|
221
|
+
}
|
|
222
|
+
const spamContract = await SpamContract.deploy(this.wallet).send({
|
|
223
|
+
from: this.defaultAccountAddress
|
|
224
|
+
}).deployed();
|
|
225
|
+
this.spamContract = spamContract;
|
|
230
226
|
}
|
|
231
227
|
async removeInitialNode() {
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
});
|
|
238
|
-
dateProvider.setTime(Number(block.timestamp) * 1000);
|
|
239
|
-
await aztecNode.stop();
|
|
228
|
+
this.logger.info('Removing initial node');
|
|
229
|
+
// Send and await a tx to make sure we mine a block for the warp to correctly progress.
|
|
230
|
+
const { receipt } = await this._sendDummyTx(this.context.deployL1ContractsValues.l1Client);
|
|
231
|
+
const block = await this.context.deployL1ContractsValues.l1Client.getBlock({
|
|
232
|
+
blockNumber: receipt.blockNumber
|
|
240
233
|
});
|
|
234
|
+
this.context.dateProvider.setTime(Number(block.timestamp) * 1000);
|
|
235
|
+
await this.context.aztecNode.stop();
|
|
241
236
|
}
|
|
242
237
|
async sendDummyTx() {
|
|
243
238
|
return await this._sendDummyTx(this.ctx.deployL1ContractsValues.l1Client);
|
|
@@ -250,17 +245,19 @@ export class P2PNetworkTest {
|
|
|
250
245
|
});
|
|
251
246
|
}
|
|
252
247
|
async setup() {
|
|
253
|
-
this.
|
|
248
|
+
this.logger.info('Setting up subsystems from fresh');
|
|
249
|
+
this.context = await setupFromFresh(this.logger, this.setupOptions, this.deployL1ContractsArgs);
|
|
250
|
+
this.ctx = this.context;
|
|
254
251
|
const sponsoredFPCAddress = await getSponsoredFPCAddress();
|
|
255
252
|
const initialFundedAccounts = [
|
|
256
|
-
...this.
|
|
253
|
+
...this.context.initialFundedAccounts.map((a)=>a.address),
|
|
257
254
|
sponsoredFPCAddress
|
|
258
255
|
];
|
|
259
256
|
const { prefilledPublicData } = await getGenesisValues(initialFundedAccounts);
|
|
260
257
|
this.prefilledPublicData = prefilledPublicData;
|
|
261
|
-
const rollupContract = RollupContract.getFromL1ContractsValues(this.
|
|
262
|
-
this.monitor = new ChainMonitor(rollupContract, this.
|
|
263
|
-
this.monitor.on('l1-block', ({ timestamp })=>this.
|
|
258
|
+
const rollupContract = RollupContract.getFromL1ContractsValues(this.context.deployL1ContractsValues);
|
|
259
|
+
this.monitor = new ChainMonitor(rollupContract, this.context.dateProvider).start();
|
|
260
|
+
this.monitor.on('l1-block', ({ timestamp })=>this.context.dateProvider.setTime(Number(timestamp) * 1000));
|
|
264
261
|
}
|
|
265
262
|
async stopNodes(nodes) {
|
|
266
263
|
this.logger.info('Stopping nodes');
|
|
@@ -297,7 +294,7 @@ export class P2PNetworkTest {
|
|
|
297
294
|
async teardown() {
|
|
298
295
|
await this.monitor.stop();
|
|
299
296
|
await tryStop(this.bootstrapNode, this.logger);
|
|
300
|
-
await this.
|
|
297
|
+
await teardown(this.context);
|
|
301
298
|
}
|
|
302
299
|
async getContracts() {
|
|
303
300
|
if (!this.ctx.deployL1ContractsValues) {
|
|
@@ -10,8 +10,9 @@ export declare class TokenContractTest {
|
|
|
10
10
|
static TOKEN_NAME: string;
|
|
11
11
|
static TOKEN_SYMBOL: string;
|
|
12
12
|
static TOKEN_DECIMALS: bigint;
|
|
13
|
-
|
|
13
|
+
context: SubsystemsContext;
|
|
14
14
|
logger: Logger;
|
|
15
|
+
metricsPort?: number;
|
|
15
16
|
asset: TokenContract;
|
|
16
17
|
tokenSim: TokenSimulator;
|
|
17
18
|
node: AztecNode;
|
|
@@ -20,16 +21,22 @@ export declare class TokenContractTest {
|
|
|
20
21
|
adminAddress: AztecAddress;
|
|
21
22
|
account1Address: AztecAddress;
|
|
22
23
|
account2Address: AztecAddress;
|
|
24
|
+
private shouldApplyBaseSetup;
|
|
25
|
+
private shouldApplyMint;
|
|
23
26
|
constructor(testName: string);
|
|
24
27
|
/**
|
|
25
|
-
*
|
|
26
|
-
*
|
|
27
|
-
* 2. Publicly deploy accounts, deploy token contract and a "bad account".
|
|
28
|
+
* Registers that base setup should be applied during setup().
|
|
29
|
+
* Call this before setup() to deploy 3 accounts, publicly deploy accounts, token contract and a "bad account".
|
|
28
30
|
*/
|
|
29
|
-
applyBaseSnapshots():
|
|
31
|
+
applyBaseSnapshots(): void;
|
|
32
|
+
/**
|
|
33
|
+
* Registers that mint should be applied during setup().
|
|
34
|
+
* Call this before setup() to mint tokens to the admin account.
|
|
35
|
+
*/
|
|
36
|
+
applyMintSnapshot(): void;
|
|
37
|
+
private applyBaseSetup;
|
|
30
38
|
setup(): Promise<void>;
|
|
31
|
-
snapshot: <T>(name: string, apply: (context: SubsystemsContext) => Promise<T>, restore?: (snapshotData: T, context: SubsystemsContext) => Promise<void>) => Promise<void>;
|
|
32
39
|
teardown(): Promise<void>;
|
|
33
|
-
|
|
40
|
+
private applyMint;
|
|
34
41
|
}
|
|
35
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
42
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token_contract_test.d.ts","sourceRoot":"","sources":["../../src/e2e_token_contract/token_contract_test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,sBAAsB,EAAE,MAAM,8CAA8C,CAAC;AACtF,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAI5D,OAAO,
|
|
1
|
+
{"version":3,"file":"token_contract_test.d.ts","sourceRoot":"","sources":["../../src/e2e_token_contract/token_contract_test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,sBAAsB,EAAE,MAAM,8CAA8C,CAAC;AACtF,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAI5D,OAAO,EACL,KAAK,iBAAiB,EAKvB,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,cAAc,EAAE,MAAM,kCAAkC,CAAC;AAIlE,qBAAa,iBAAiB;IAC5B,MAAM,CAAC,UAAU,SAAU;IAC3B,MAAM,CAAC,YAAY,SAAS;IAC5B,MAAM,CAAC,cAAc,SAAO;IAC5B,OAAO,EAAG,iBAAiB,CAAC;IAC5B,MAAM,EAAE,MAAM,CAAC;IACf,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,KAAK,EAAG,aAAa,CAAC;IACtB,QAAQ,EAAG,cAAc,CAAC;IAC1B,IAAI,EAAG,SAAS,CAAC;IAEjB,UAAU,EAAG,sBAAsB,CAAC;IACpC,MAAM,EAAG,UAAU,CAAC;IACpB,YAAY,EAAG,YAAY,CAAC;IAC5B,eAAe,EAAG,YAAY,CAAC;IAC/B,eAAe,EAAG,YAAY,CAAC;IAE/B,OAAO,CAAC,oBAAoB,CAAS;IACrC,OAAO,CAAC,eAAe,CAAS;IAEhC,YAAY,QAAQ,EAAE,MAAM,EAG3B;IAED;;;OAGG;IACH,kBAAkB,SAEjB;IAED;;;OAGG;IACH,iBAAiB,SAEhB;YAKa,cAAc;IA+CtB,KAAK,kBAYV;IAEK,QAAQ,kBAEb;YAEa,SAAS;CA2BxB"}
|
|
@@ -2,16 +2,17 @@ import { createLogger } from '@aztec/aztec.js/log';
|
|
|
2
2
|
import { TokenContract } from '@aztec/noir-contracts.js/Token';
|
|
3
3
|
import { InvalidAccountContract } from '@aztec/noir-test-contracts.js/InvalidAccount';
|
|
4
4
|
import { jest } from '@jest/globals';
|
|
5
|
-
import {
|
|
5
|
+
import { deployAccounts, publicDeployAccounts, setupFromFresh, teardown } from '../fixtures/snapshot_manager.js';
|
|
6
6
|
import { mintTokensToPrivate } from '../fixtures/token_utils.js';
|
|
7
7
|
import { TokenSimulator } from '../simulators/token_simulator.js';
|
|
8
|
-
const {
|
|
8
|
+
const { METRICS_PORT: metricsPort } = process.env;
|
|
9
9
|
export class TokenContractTest {
|
|
10
10
|
static TOKEN_NAME = 'USDC';
|
|
11
11
|
static TOKEN_SYMBOL = 'USD';
|
|
12
12
|
static TOKEN_DECIMALS = 18n;
|
|
13
|
-
|
|
13
|
+
context;
|
|
14
14
|
logger;
|
|
15
|
+
metricsPort;
|
|
15
16
|
asset;
|
|
16
17
|
tokenSim;
|
|
17
18
|
node;
|
|
@@ -20,107 +21,102 @@ export class TokenContractTest {
|
|
|
20
21
|
adminAddress;
|
|
21
22
|
account1Address;
|
|
22
23
|
account2Address;
|
|
24
|
+
shouldApplyBaseSetup = false;
|
|
25
|
+
shouldApplyMint = false;
|
|
23
26
|
constructor(testName){
|
|
24
27
|
this.logger = createLogger(`e2e:e2e_token_contract:${testName}`);
|
|
25
|
-
this.
|
|
26
|
-
|
|
27
|
-
|
|
28
|
+
this.metricsPort = metricsPort ? parseInt(metricsPort) : undefined;
|
|
29
|
+
}
|
|
30
|
+
/**
|
|
31
|
+
* Registers that base setup should be applied during setup().
|
|
32
|
+
* Call this before setup() to deploy 3 accounts, publicly deploy accounts, token contract and a "bad account".
|
|
33
|
+
*/ applyBaseSnapshots() {
|
|
34
|
+
this.shouldApplyBaseSetup = true;
|
|
35
|
+
}
|
|
36
|
+
/**
|
|
37
|
+
* Registers that mint should be applied during setup().
|
|
38
|
+
* Call this before setup() to mint tokens to the admin account.
|
|
39
|
+
*/ applyMintSnapshot() {
|
|
40
|
+
this.shouldApplyMint = true;
|
|
28
41
|
}
|
|
29
42
|
/**
|
|
30
|
-
*
|
|
31
|
-
|
|
32
|
-
* 2. Publicly deploy accounts, deploy token contract and a "bad account".
|
|
33
|
-
*/ async applyBaseSnapshots() {
|
|
43
|
+
* Applies base setup: deploys 3 accounts, publicly deploys accounts, token contract and a "bad account".
|
|
44
|
+
*/ async applyBaseSetup() {
|
|
34
45
|
// Adding a timeout of 2 minutes in here such that it is propagated to the underlying tests
|
|
35
46
|
jest.setTimeout(120_000);
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
this.wallet
|
|
39
|
-
|
|
40
|
-
return Promise.resolve();
|
|
47
|
+
this.logger.info('Applying base setup - deploying 3 accounts');
|
|
48
|
+
const { deployedAccounts } = await deployAccounts(3, this.logger)({
|
|
49
|
+
wallet: this.context.wallet,
|
|
50
|
+
initialFundedAccounts: this.context.initialFundedAccounts
|
|
41
51
|
});
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
this.tokenSim = new TokenSimulator(this.asset, this.wallet, this.adminAddress, this.logger, [
|
|
69
|
-
this.adminAddress,
|
|
70
|
-
this.account1Address
|
|
71
|
-
]);
|
|
72
|
-
this.badAccount = InvalidAccountContract.at(badAccountAddress, this.wallet);
|
|
73
|
-
this.logger.verbose(`Bad account address: ${this.badAccount.address}`);
|
|
74
|
-
expect(await this.asset.methods.get_admin().simulate({
|
|
75
|
-
from: this.adminAddress
|
|
76
|
-
})).toBe(this.adminAddress.toBigInt());
|
|
77
|
-
});
|
|
78
|
-
// TokenContract.artifact.functions.forEach(fn => {
|
|
79
|
-
// const sig = decodeFunctionSignature(fn.name, fn.parameters);
|
|
80
|
-
// logger.verbose(`Function ${sig} and the selector: ${FunctionSelector.fromNameAndParameters(fn.name, fn.parameters)}`);
|
|
81
|
-
// });
|
|
52
|
+
this.node = this.context.aztecNode;
|
|
53
|
+
this.wallet = this.context.wallet;
|
|
54
|
+
[this.adminAddress, this.account1Address, this.account2Address] = deployedAccounts.map((acc)=>acc.address);
|
|
55
|
+
this.logger.info('Applying base setup - deploying token contract');
|
|
56
|
+
this.logger.verbose(`Public deploy accounts...`);
|
|
57
|
+
await publicDeployAccounts(this.wallet, [
|
|
58
|
+
this.adminAddress,
|
|
59
|
+
this.account1Address
|
|
60
|
+
]);
|
|
61
|
+
this.logger.verbose(`Deploying TokenContract...`);
|
|
62
|
+
this.asset = await TokenContract.deploy(this.wallet, this.adminAddress, TokenContractTest.TOKEN_NAME, TokenContractTest.TOKEN_SYMBOL, TokenContractTest.TOKEN_DECIMALS).send({
|
|
63
|
+
from: this.adminAddress
|
|
64
|
+
}).deployed();
|
|
65
|
+
this.logger.verbose(`Token deployed to ${this.asset.address}`);
|
|
66
|
+
this.logger.verbose(`Deploying bad account...`);
|
|
67
|
+
this.badAccount = await InvalidAccountContract.deploy(this.wallet).send({
|
|
68
|
+
from: this.adminAddress
|
|
69
|
+
}).deployed();
|
|
70
|
+
this.logger.verbose(`Deployed to ${this.badAccount.address}.`);
|
|
71
|
+
this.tokenSim = new TokenSimulator(this.asset, this.wallet, this.adminAddress, this.logger, [
|
|
72
|
+
this.adminAddress,
|
|
73
|
+
this.account1Address
|
|
74
|
+
]);
|
|
75
|
+
expect(await this.asset.methods.get_admin().simulate({
|
|
76
|
+
from: this.adminAddress
|
|
77
|
+
})).toBe(this.adminAddress.toBigInt());
|
|
82
78
|
}
|
|
83
79
|
async setup() {
|
|
84
|
-
await this.
|
|
80
|
+
this.context = await setupFromFresh(this.logger, {
|
|
81
|
+
metricsPort: this.metricsPort
|
|
82
|
+
});
|
|
83
|
+
if (this.shouldApplyBaseSetup) {
|
|
84
|
+
await this.applyBaseSetup();
|
|
85
|
+
}
|
|
86
|
+
if (this.shouldApplyMint) {
|
|
87
|
+
await this.applyMint();
|
|
88
|
+
}
|
|
85
89
|
}
|
|
86
|
-
snapshot = (name, apply, restore = ()=>Promise.resolve())=>this.snapshotManager.snapshot(name, apply, restore);
|
|
87
90
|
async teardown() {
|
|
88
|
-
await this.
|
|
91
|
+
await teardown(this.context);
|
|
89
92
|
}
|
|
90
|
-
async
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
from: adminAddress
|
|
115
|
-
});
|
|
116
|
-
this.logger.verbose(`Private balance of wallet 0: ${privateBalance}`);
|
|
117
|
-
expect(privateBalance).toEqual(tokenSim.balanceOfPrivate(adminAddress));
|
|
118
|
-
const totalSupply = await asset.methods.total_supply().simulate({
|
|
119
|
-
from: adminAddress
|
|
120
|
-
});
|
|
121
|
-
this.logger.verbose(`Total supply: ${totalSupply}`);
|
|
122
|
-
expect(totalSupply).toEqual(tokenSim.totalSupply);
|
|
123
|
-
return Promise.resolve();
|
|
93
|
+
async applyMint() {
|
|
94
|
+
this.logger.info('Applying mint setup');
|
|
95
|
+
const { asset, adminAddress, tokenSim } = this;
|
|
96
|
+
const amount = 10000n;
|
|
97
|
+
this.logger.verbose(`Minting ${amount} publicly...`);
|
|
98
|
+
await asset.methods.mint_to_public(adminAddress, amount).send({
|
|
99
|
+
from: adminAddress
|
|
100
|
+
}).wait();
|
|
101
|
+
tokenSim.mintPublic(adminAddress, amount);
|
|
102
|
+
const publicBalance = await asset.methods.balance_of_public(adminAddress).simulate({
|
|
103
|
+
from: adminAddress
|
|
104
|
+
});
|
|
105
|
+
this.logger.verbose(`Public balance of wallet 0: ${publicBalance}`);
|
|
106
|
+
expect(publicBalance).toEqual(this.tokenSim.balanceOfPublic(adminAddress));
|
|
107
|
+
this.logger.verbose(`Minting ${amount} privately...`);
|
|
108
|
+
await mintTokensToPrivate(asset, adminAddress, adminAddress, amount);
|
|
109
|
+
tokenSim.mintPrivate(adminAddress, amount);
|
|
110
|
+
const privateBalance = await asset.methods.balance_of_private(adminAddress).simulate({
|
|
111
|
+
from: adminAddress
|
|
112
|
+
});
|
|
113
|
+
this.logger.verbose(`Private balance of wallet 0: ${privateBalance}`);
|
|
114
|
+
expect(privateBalance).toEqual(tokenSim.balanceOfPrivate(adminAddress));
|
|
115
|
+
const totalSupply = await asset.methods.total_supply().simulate({
|
|
116
|
+
from: adminAddress
|
|
124
117
|
});
|
|
118
|
+
this.logger.verbose(`Total supply: ${totalSupply}`);
|
|
119
|
+
expect(totalSupply).toEqual(tokenSim.totalSupply);
|
|
120
|
+
this.logger.verbose(`Minting complete.`);
|
|
125
121
|
}
|
|
126
122
|
}
|
|
@@ -18,12 +18,9 @@ import { type SubsystemsContext } from './snapshot_manager.js';
|
|
|
18
18
|
* We then prove and verify transactions created via this full prover PXE.
|
|
19
19
|
*/
|
|
20
20
|
export declare class FullProverTest {
|
|
21
|
-
private minNumberOfTxsPerBlock;
|
|
22
|
-
private realProofs;
|
|
23
21
|
static TOKEN_NAME: string;
|
|
24
22
|
static TOKEN_SYMBOL: string;
|
|
25
23
|
static TOKEN_DECIMALS: bigint;
|
|
26
|
-
private snapshotManager;
|
|
27
24
|
logger: Logger;
|
|
28
25
|
wallet: TestWallet;
|
|
29
26
|
provenWallet: TestWallet;
|
|
@@ -40,22 +37,19 @@ export declare class FullProverTest {
|
|
|
40
37
|
private acvmConfigCleanup?;
|
|
41
38
|
circuitProofVerifier?: ClientProtocolCircuitVerifier;
|
|
42
39
|
provenAsset: TokenContract;
|
|
43
|
-
|
|
40
|
+
context: SubsystemsContext;
|
|
44
41
|
private proverNode;
|
|
45
42
|
private simulatedProverNode;
|
|
46
43
|
l1Contracts: DeployAztecL1ContractsReturnType;
|
|
47
44
|
proverAddress: EthAddress;
|
|
45
|
+
private minNumberOfTxsPerBlock;
|
|
46
|
+
private coinbase;
|
|
47
|
+
private realProofs;
|
|
48
48
|
constructor(testName: string, minNumberOfTxsPerBlock: number, coinbase: EthAddress, realProofs?: boolean);
|
|
49
|
-
|
|
50
|
-
* Adds two state shifts to snapshot manager.
|
|
51
|
-
* 1. Add 2 accounts.
|
|
52
|
-
* 2. Publicly deploy accounts, deploy token contract
|
|
53
|
-
*/
|
|
54
|
-
applyBaseSnapshots(): Promise<void>;
|
|
49
|
+
private applyBaseSetup;
|
|
55
50
|
setup(): Promise<this>;
|
|
56
51
|
private mintFeeJuice;
|
|
57
|
-
snapshot: <T>(name: string, apply: (context: SubsystemsContext) => Promise<T>, restore?: (snapshotData: T, context: SubsystemsContext) => Promise<void>) => Promise<void>;
|
|
58
52
|
teardown(): Promise<void>;
|
|
59
|
-
|
|
53
|
+
private applyMint;
|
|
60
54
|
}
|
|
61
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
55
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"e2e_prover_test.d.ts","sourceRoot":"","sources":["../../src/fixtures/e2e_prover_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAElE,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACrE,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAEL,KAAK,6BAA6B,EAGnC,MAAM,kBAAkB,CAAC;AAG1B,OAAO,KAAK,EAAE,gCAAgC,EAAE,MAAM,2CAA2C,CAAC;AAIlG,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAE/D,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,wBAAwB,CAAC;AAC1E,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAMvD,OAAO,EAAE,cAAc,EAAE,MAAM,kCAAkC,CAAC;AAGlE,OAAO,
|
|
1
|
+
{"version":3,"file":"e2e_prover_test.d.ts","sourceRoot":"","sources":["../../src/fixtures/e2e_prover_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAElE,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACrE,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAEL,KAAK,6BAA6B,EAGnC,MAAM,kBAAkB,CAAC;AAG1B,OAAO,KAAK,EAAE,gCAAgC,EAAE,MAAM,2CAA2C,CAAC;AAIlG,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAE/D,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,wBAAwB,CAAC;AAC1E,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAMvD,OAAO,EAAE,cAAc,EAAE,MAAM,kCAAkC,CAAC;AAGlE,OAAO,EACL,KAAK,iBAAiB,EAKvB,MAAM,uBAAuB,CAAC;AAQ/B;;;;;GAKG;AAEH,qBAAa,cAAc;IACzB,MAAM,CAAC,UAAU,SAAU;IAC3B,MAAM,CAAC,YAAY,SAAS;IAC5B,MAAM,CAAC,cAAc,SAAO;IAC5B,MAAM,EAAE,MAAM,CAAC;IACf,MAAM,EAAG,UAAU,CAAC;IACpB,YAAY,EAAG,UAAU,CAAC;IAC1B,QAAQ,EAAE,YAAY,EAAE,CAAM;IAC9B,gBAAgB,EAAG,kBAAkB,EAAE,CAAC;IACxC,eAAe,EAAG,aAAa,CAAC;IAChC,uBAAuB,EAAG,2BAA2B,CAAC;IACtD,QAAQ,EAAG,cAAc,CAAC;IAC1B,SAAS,EAAG,SAAS,CAAC;IACtB,cAAc,EAAG,cAAc,CAAC;IAChC,UAAU,EAAG,UAAU,CAAC;IACxB,OAAO,CAAC,gBAAgB,CAAqB;IAC7C,OAAO,CAAC,eAAe,CAAC,CAAsB;IAC9C,OAAO,CAAC,iBAAiB,CAAC,CAAsB;IAChD,oBAAoB,CAAC,EAAE,6BAA6B,CAAC;IACrD,WAAW,EAAG,aAAa,CAAC;IAC5B,OAAO,EAAG,iBAAiB,CAAC;IAC5B,OAAO,CAAC,UAAU,CAAc;IAChC,OAAO,CAAC,mBAAmB,CAAc;IAClC,WAAW,EAAG,gCAAgC,CAAC;IAC/C,aAAa,EAAG,UAAU,CAAC;IAClC,OAAO,CAAC,sBAAsB,CAAS;IACvC,OAAO,CAAC,QAAQ,CAAa;IAC7B,OAAO,CAAC,UAAU,CAAU;IAE5B,YAAY,QAAQ,EAAE,MAAM,EAAE,sBAAsB,EAAE,MAAM,EAAE,QAAQ,EAAE,UAAU,EAAE,UAAU,UAAO,EAKpG;YAKa,cAAc;IAuCtB,KAAK,kBA8IV;YAEa,YAAY;IASpB,QAAQ,kBAcb;YAEa,SAAS;CAqCxB"}
|