@aztec/end-to-end 4.0.0-nightly.20260113 → 4.0.0-nightly.20260115
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bench/client_flows/client_flows_benchmark.d.ts +12 -13
- package/dest/bench/client_flows/client_flows_benchmark.d.ts.map +1 -1
- package/dest/bench/client_flows/client_flows_benchmark.js +104 -134
- package/dest/bench/utils.d.ts +1 -1
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.d.ts +6 -7
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.d.ts.map +1 -1
- package/dest/e2e_blacklist_token_contract/blacklist_token_contract_test.js +98 -113
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.d.ts +6 -7
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.d.ts.map +1 -1
- package/dest/e2e_cross_chain_messaging/cross_chain_messaging_test.js +65 -62
- package/dest/e2e_deploy_contract/deploy_test.d.ts +4 -3
- package/dest/e2e_deploy_contract/deploy_test.d.ts.map +1 -1
- package/dest/e2e_deploy_contract/deploy_test.js +18 -13
- package/dest/e2e_epochs/epochs_test.js +1 -1
- package/dest/e2e_fees/bridging_race.notest.js +2 -4
- package/dest/e2e_fees/fees_test.d.ts +13 -13
- package/dest/e2e_fees/fees_test.d.ts.map +1 -1
- package/dest/e2e_fees/fees_test.js +122 -140
- package/dest/e2e_l1_publisher/write_json.d.ts +1 -1
- package/dest/e2e_l1_publisher/write_json.d.ts.map +1 -1
- package/dest/e2e_l1_publisher/write_json.js +1 -0
- package/dest/e2e_nested_contract/nested_contract_test.d.ts +6 -9
- package/dest/e2e_nested_contract/nested_contract_test.d.ts.map +1 -1
- package/dest/e2e_nested_contract/nested_contract_test.js +32 -40
- package/dest/e2e_p2p/inactivity_slash_test.d.ts +3 -3
- package/dest/e2e_p2p/inactivity_slash_test.d.ts.map +1 -1
- package/dest/e2e_p2p/inactivity_slash_test.js +3 -3
- package/dest/e2e_p2p/p2p_network.d.ts +7 -6
- package/dest/e2e_p2p/p2p_network.d.ts.map +1 -1
- package/dest/e2e_p2p/p2p_network.js +106 -103
- package/dest/e2e_token_contract/token_contract_test.d.ts +16 -9
- package/dest/e2e_token_contract/token_contract_test.d.ts.map +1 -1
- package/dest/e2e_token_contract/token_contract_test.js +90 -92
- package/dest/fixtures/e2e_prover_test.d.ts +8 -14
- package/dest/fixtures/e2e_prover_test.d.ts.map +1 -1
- package/dest/fixtures/e2e_prover_test.js +82 -93
- package/dest/fixtures/setup.d.ts +216 -0
- package/dest/fixtures/setup.d.ts.map +1 -0
- package/dest/fixtures/setup.js +683 -0
- package/dest/fixtures/utils.d.ts +5 -191
- package/dest/fixtures/utils.d.ts.map +1 -1
- package/dest/fixtures/utils.js +4 -615
- package/dest/quality_of_service/prometheus_client.d.ts +38 -0
- package/dest/quality_of_service/prometheus_client.d.ts.map +1 -0
- package/dest/quality_of_service/prometheus_client.js +67 -0
- package/dest/shared/cross_chain_test_harness.d.ts +12 -1
- package/dest/shared/cross_chain_test_harness.d.ts.map +1 -1
- package/dest/shared/gas_portal_test_harness.d.ts +11 -1
- package/dest/shared/gas_portal_test_harness.d.ts.map +1 -1
- package/dest/simulators/lending_simulator.d.ts +5 -1
- package/dest/simulators/lending_simulator.d.ts.map +1 -1
- package/dest/spartan/tx_metrics.d.ts +4 -1
- package/dest/spartan/tx_metrics.d.ts.map +1 -1
- package/dest/spartan/tx_metrics.js +21 -1
- package/dest/spartan/utils.d.ts +5 -1
- package/dest/spartan/utils.d.ts.map +1 -1
- package/dest/spartan/utils.js +25 -8
- package/package.json +39 -39
- package/src/bench/client_flows/client_flows_benchmark.ts +142 -195
- package/src/e2e_blacklist_token_contract/blacklist_token_contract_test.ts +107 -142
- package/src/e2e_cross_chain_messaging/cross_chain_messaging_test.ts +99 -106
- package/src/e2e_deploy_contract/deploy_test.ts +21 -14
- package/src/e2e_epochs/epochs_test.ts +1 -1
- package/src/e2e_fees/bridging_race.notest.ts +2 -5
- package/src/e2e_fees/fees_test.ts +171 -213
- package/src/e2e_l1_publisher/write_json.ts +1 -0
- package/src/e2e_nested_contract/nested_contract_test.ts +35 -56
- package/src/e2e_p2p/inactivity_slash_test.ts +5 -5
- package/src/e2e_p2p/p2p_network.ts +165 -167
- package/src/e2e_token_contract/token_contract_test.ts +105 -118
- package/src/fixtures/e2e_prover_test.ts +107 -136
- package/src/fixtures/setup.ts +1009 -0
- package/src/fixtures/utils.ts +27 -901
- package/src/quality_of_service/prometheus_client.ts +113 -0
- package/src/spartan/tx_metrics.ts +21 -1
- package/src/spartan/utils.ts +26 -8
- package/dest/fixtures/snapshot_manager.d.ts +0 -93
- package/dest/fixtures/snapshot_manager.d.ts.map +0 -1
- package/dest/fixtures/snapshot_manager.js +0 -488
- package/src/fixtures/snapshot_manager.ts +0 -646
|
@@ -4,9 +4,8 @@ import { createLogger } from '@aztec/aztec.js/log';
|
|
|
4
4
|
import { TokenBlacklistContract } from '@aztec/noir-contracts.js/TokenBlacklist';
|
|
5
5
|
import { InvalidAccountContract } from '@aztec/noir-test-contracts.js/InvalidAccount';
|
|
6
6
|
import { jest } from '@jest/globals';
|
|
7
|
-
import {
|
|
7
|
+
import { deployAccounts, publicDeployAccounts, setup, teardown } from '../fixtures/setup.js';
|
|
8
8
|
import { TokenSimulator } from '../simulators/token_simulator.js';
|
|
9
|
-
const { E2E_DATA_PATH: dataPath } = process.env;
|
|
10
9
|
export class Role {
|
|
11
10
|
isAdmin = false;
|
|
12
11
|
isMinter = false;
|
|
@@ -36,7 +35,7 @@ export class Role {
|
|
|
36
35
|
export class BlacklistTokenContractTest {
|
|
37
36
|
// This value MUST match the same value that we have in the contract
|
|
38
37
|
static CHANGE_ROLES_DELAY = 86400;
|
|
39
|
-
|
|
38
|
+
context;
|
|
40
39
|
logger;
|
|
41
40
|
wallet;
|
|
42
41
|
asset;
|
|
@@ -50,136 +49,122 @@ export class BlacklistTokenContractTest {
|
|
|
50
49
|
blacklistedAddress;
|
|
51
50
|
constructor(testName){
|
|
52
51
|
this.logger = createLogger(`e2e:e2e_blacklist_token_contract:${testName}`);
|
|
53
|
-
this.snapshotManager = createSnapshotManager(`e2e_blacklist_token_contract/${testName}`, dataPath);
|
|
54
52
|
}
|
|
55
53
|
async crossTimestampOfChange() {
|
|
56
54
|
await this.cheatCodes.warpL2TimeAtLeastBy(this.sequencer, this.aztecNode, BlacklistTokenContractTest.CHANGE_ROLES_DELAY);
|
|
57
55
|
}
|
|
58
56
|
/**
|
|
59
|
-
*
|
|
57
|
+
* Applies base setup:
|
|
60
58
|
* 1. Add 3 accounts.
|
|
61
59
|
* 2. Publicly deploy accounts, deploy token contract and a "bad account".
|
|
62
|
-
*/ async
|
|
60
|
+
*/ async applyBaseSetup() {
|
|
63
61
|
// Adding a timeout of 2 minutes in here such that it is propagated to the underlying tests
|
|
64
62
|
jest.setTimeout(120_000);
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
this.
|
|
68
|
-
this.
|
|
69
|
-
this.wallet = wallet;
|
|
70
|
-
this.adminAddress = deployedAccounts[0].address;
|
|
71
|
-
this.otherAddress = deployedAccounts[1].address;
|
|
72
|
-
this.blacklistedAddress = deployedAccounts[2].address;
|
|
73
|
-
return Promise.resolve();
|
|
74
|
-
});
|
|
75
|
-
await this.snapshotManager.snapshot('e2e_blacklist_token_contract', async ()=>{
|
|
76
|
-
// Create the token contract state.
|
|
77
|
-
// Move this account thing to addAccounts above?
|
|
78
|
-
this.logger.verbose(`Public deploy accounts...`);
|
|
79
|
-
await publicDeployAccounts(this.wallet, [
|
|
80
|
-
this.adminAddress,
|
|
81
|
-
this.otherAddress,
|
|
82
|
-
this.blacklistedAddress
|
|
83
|
-
]);
|
|
84
|
-
this.logger.verbose(`Deploying TokenContract...`);
|
|
85
|
-
this.asset = await TokenBlacklistContract.deploy(this.wallet, this.adminAddress).send({
|
|
86
|
-
from: this.adminAddress
|
|
87
|
-
}).deployed();
|
|
88
|
-
this.logger.verbose(`Token deployed to ${this.asset.address}`);
|
|
89
|
-
this.logger.verbose(`Deploying bad account...`);
|
|
90
|
-
this.badAccount = await InvalidAccountContract.deploy(this.wallet).send({
|
|
91
|
-
from: this.adminAddress
|
|
92
|
-
}).deployed();
|
|
93
|
-
this.logger.verbose(`Deployed to ${this.badAccount.address}.`);
|
|
94
|
-
await this.crossTimestampOfChange();
|
|
95
|
-
return {
|
|
96
|
-
tokenContractAddress: this.asset.address,
|
|
97
|
-
badAccountAddress: this.badAccount.address
|
|
98
|
-
};
|
|
99
|
-
}, async ({ tokenContractAddress, badAccountAddress })=>{
|
|
100
|
-
// Restore the token contract state.
|
|
101
|
-
this.asset = TokenBlacklistContract.at(tokenContractAddress, this.wallet);
|
|
102
|
-
this.logger.verbose(`Token contract address: ${this.asset.address}`);
|
|
103
|
-
this.tokenSim = new TokenSimulator(this.asset, this.wallet, this.adminAddress, this.logger, [
|
|
104
|
-
this.adminAddress,
|
|
105
|
-
this.otherAddress,
|
|
106
|
-
this.blacklistedAddress
|
|
107
|
-
]);
|
|
108
|
-
this.badAccount = InvalidAccountContract.at(badAccountAddress, this.wallet);
|
|
109
|
-
this.logger.verbose(`Bad account address: ${this.badAccount.address}`);
|
|
110
|
-
expect(await this.asset.methods.get_roles(this.adminAddress).simulate({
|
|
111
|
-
from: this.adminAddress
|
|
112
|
-
})).toEqual(new Role().withAdmin().toNoirStruct());
|
|
63
|
+
this.logger.info('Deploying 3 accounts');
|
|
64
|
+
const { deployedAccounts } = await deployAccounts(3, this.logger)({
|
|
65
|
+
wallet: this.context.wallet,
|
|
66
|
+
initialFundedAccounts: this.context.initialFundedAccounts
|
|
113
67
|
});
|
|
68
|
+
this.cheatCodes = this.context.cheatCodes;
|
|
69
|
+
this.aztecNode = this.context.aztecNodeService;
|
|
70
|
+
this.sequencer = this.context.sequencer;
|
|
71
|
+
this.wallet = this.context.wallet;
|
|
72
|
+
this.adminAddress = deployedAccounts[0].address;
|
|
73
|
+
this.otherAddress = deployedAccounts[1].address;
|
|
74
|
+
this.blacklistedAddress = deployedAccounts[2].address;
|
|
75
|
+
this.logger.info('Setting up blacklist token contract');
|
|
76
|
+
// Create the token contract state.
|
|
77
|
+
this.logger.verbose(`Public deploy accounts...`);
|
|
78
|
+
await publicDeployAccounts(this.wallet, [
|
|
79
|
+
this.adminAddress,
|
|
80
|
+
this.otherAddress,
|
|
81
|
+
this.blacklistedAddress
|
|
82
|
+
]);
|
|
83
|
+
this.logger.verbose(`Deploying TokenContract...`);
|
|
84
|
+
this.asset = await TokenBlacklistContract.deploy(this.wallet, this.adminAddress).send({
|
|
85
|
+
from: this.adminAddress
|
|
86
|
+
}).deployed();
|
|
87
|
+
this.logger.verbose(`Token deployed to ${this.asset.address}`);
|
|
88
|
+
this.logger.verbose(`Deploying bad account...`);
|
|
89
|
+
this.badAccount = await InvalidAccountContract.deploy(this.wallet).send({
|
|
90
|
+
from: this.adminAddress
|
|
91
|
+
}).deployed();
|
|
92
|
+
this.logger.verbose(`Deployed to ${this.badAccount.address}.`);
|
|
93
|
+
await this.crossTimestampOfChange();
|
|
94
|
+
this.tokenSim = new TokenSimulator(this.asset, this.wallet, this.adminAddress, this.logger, [
|
|
95
|
+
this.adminAddress,
|
|
96
|
+
this.otherAddress,
|
|
97
|
+
this.blacklistedAddress
|
|
98
|
+
]);
|
|
99
|
+
expect(await this.asset.methods.get_roles(this.adminAddress).simulate({
|
|
100
|
+
from: this.adminAddress
|
|
101
|
+
})).toEqual(new Role().withAdmin().toNoirStruct());
|
|
114
102
|
}
|
|
115
103
|
async setup() {
|
|
116
|
-
|
|
104
|
+
this.logger.info('Setting up fresh context');
|
|
105
|
+
this.context = await setup(0, {
|
|
106
|
+
fundSponsoredFPC: true,
|
|
107
|
+
skipAccountDeployment: true
|
|
108
|
+
});
|
|
109
|
+
await this.applyBaseSetup();
|
|
117
110
|
}
|
|
118
|
-
snapshot = (name, apply, restore = ()=>Promise.resolve())=>this.snapshotManager.snapshot(name, apply, restore);
|
|
119
111
|
async teardown() {
|
|
120
|
-
await this.
|
|
112
|
+
await teardown(this.context);
|
|
121
113
|
}
|
|
122
114
|
async addPendingShieldNoteToPXE(contract, recipient, amount, secretHash, txHash) {
|
|
123
115
|
const txEffects = await this.aztecNode.getTxEffect(txHash);
|
|
124
|
-
await contract.methods.
|
|
116
|
+
await contract.methods.process_transparent_note(contract.address, amount, secretHash, txHash.hash, txEffects.data.noteHashes, txEffects.data.nullifiers[0], recipient).simulate({
|
|
125
117
|
from: recipient
|
|
126
118
|
});
|
|
127
119
|
}
|
|
128
|
-
async
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
}
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
});
|
|
175
|
-
this.logger.verbose(`Private balance of wallet 0: ${privateBalance}`);
|
|
176
|
-
expect(privateBalance).toEqual(tokenSim.balanceOfPrivate(this.adminAddress));
|
|
177
|
-
const totalSupply = await asset.methods.total_supply().simulate({
|
|
178
|
-
from: this.adminAddress
|
|
179
|
-
});
|
|
180
|
-
this.logger.verbose(`Total supply: ${totalSupply}`);
|
|
181
|
-
expect(totalSupply).toEqual(tokenSim.totalSupply);
|
|
182
|
-
return Promise.resolve();
|
|
120
|
+
async applyMint() {
|
|
121
|
+
this.logger.info('Applying mint setup');
|
|
122
|
+
const { asset, tokenSim } = this;
|
|
123
|
+
const amount = 10000n;
|
|
124
|
+
const adminMinterRole = new Role().withAdmin().withMinter();
|
|
125
|
+
await this.asset.methods.update_roles(this.adminAddress, adminMinterRole.toNoirStruct()).send({
|
|
126
|
+
from: this.adminAddress
|
|
127
|
+
}).wait();
|
|
128
|
+
const blacklistRole = new Role().withBlacklisted();
|
|
129
|
+
await this.asset.methods.update_roles(this.blacklistedAddress, blacklistRole.toNoirStruct()).send({
|
|
130
|
+
from: this.adminAddress
|
|
131
|
+
}).wait();
|
|
132
|
+
await this.crossTimestampOfChange();
|
|
133
|
+
expect(await this.asset.methods.get_roles(this.adminAddress).simulate({
|
|
134
|
+
from: this.adminAddress
|
|
135
|
+
})).toEqual(adminMinterRole.toNoirStruct());
|
|
136
|
+
this.logger.verbose(`Minting ${amount} publicly...`);
|
|
137
|
+
await asset.methods.mint_public(this.adminAddress, amount).send({
|
|
138
|
+
from: this.adminAddress
|
|
139
|
+
}).wait();
|
|
140
|
+
this.logger.verbose(`Minting ${amount} privately...`);
|
|
141
|
+
const secret = Fr.random();
|
|
142
|
+
const secretHash = await computeSecretHash(secret);
|
|
143
|
+
const receipt = await asset.methods.mint_private(amount, secretHash).send({
|
|
144
|
+
from: this.adminAddress
|
|
145
|
+
}).wait();
|
|
146
|
+
await this.addPendingShieldNoteToPXE(asset, this.adminAddress, amount, secretHash, receipt.txHash);
|
|
147
|
+
const txClaim = asset.methods.redeem_shield(this.adminAddress, amount, secret).send({
|
|
148
|
+
from: this.adminAddress
|
|
149
|
+
});
|
|
150
|
+
await txClaim.wait();
|
|
151
|
+
this.logger.verbose(`Minting complete.`);
|
|
152
|
+
tokenSim.mintPublic(this.adminAddress, amount);
|
|
153
|
+
const publicBalance = await asset.methods.balance_of_public(this.adminAddress).simulate({
|
|
154
|
+
from: this.adminAddress
|
|
155
|
+
});
|
|
156
|
+
this.logger.verbose(`Public balance of wallet 0: ${publicBalance}`);
|
|
157
|
+
expect(publicBalance).toEqual(this.tokenSim.balanceOfPublic(this.adminAddress));
|
|
158
|
+
tokenSim.mintPrivate(this.adminAddress, amount);
|
|
159
|
+
const privateBalance = await asset.methods.balance_of_private(this.adminAddress).simulate({
|
|
160
|
+
from: this.adminAddress
|
|
161
|
+
});
|
|
162
|
+
this.logger.verbose(`Private balance of wallet 0: ${privateBalance}`);
|
|
163
|
+
expect(privateBalance).toEqual(tokenSim.balanceOfPrivate(this.adminAddress));
|
|
164
|
+
const totalSupply = await asset.methods.total_supply().simulate({
|
|
165
|
+
from: this.adminAddress
|
|
183
166
|
});
|
|
167
|
+
this.logger.verbose(`Total supply: ${totalSupply}`);
|
|
168
|
+
expect(totalSupply).toEqual(tokenSim.totalSupply);
|
|
184
169
|
}
|
|
185
170
|
}
|
|
@@ -12,17 +12,17 @@ import { TokenContract } from '@aztec/noir-contracts.js/Token';
|
|
|
12
12
|
import { TokenBridgeContract } from '@aztec/noir-contracts.js/TokenBridge';
|
|
13
13
|
import type { AztecNodeAdmin } from '@aztec/stdlib/interfaces/client';
|
|
14
14
|
import type { TestWallet } from '@aztec/test-wallet/server';
|
|
15
|
-
import { type
|
|
16
|
-
import type { SetupOptions } from '../fixtures/utils.js';
|
|
15
|
+
import { type EndToEndContext, type SetupOptions } from '../fixtures/setup.js';
|
|
17
16
|
import { CrossChainTestHarness } from '../shared/cross_chain_test_harness.js';
|
|
18
17
|
export declare class CrossChainMessagingTest {
|
|
19
|
-
private snapshotManager;
|
|
20
18
|
private requireEpochProven;
|
|
19
|
+
private setupOptions;
|
|
20
|
+
private deployL1ContractsArgs;
|
|
21
21
|
logger: Logger;
|
|
22
|
+
context: EndToEndContext;
|
|
22
23
|
aztecNode: AztecNode;
|
|
23
24
|
aztecNodeConfig: AztecNodeConfig;
|
|
24
25
|
aztecNodeAdmin: AztecNodeAdmin;
|
|
25
|
-
ctx: SubsystemsContext;
|
|
26
26
|
l1Client: ExtendedViemWalletClient | undefined;
|
|
27
27
|
wallet: TestWallet;
|
|
28
28
|
ownerAddress: AztecAddress;
|
|
@@ -41,8 +41,7 @@ export declare class CrossChainMessagingTest {
|
|
|
41
41
|
setup(): Promise<void>;
|
|
42
42
|
advanceToEpochProven(l2TxReceipt: TxReceipt): Promise<EpochNumber>;
|
|
43
43
|
catchUpProvenChain(): Promise<void>;
|
|
44
|
-
snapshot: <T>(name: string, apply: (context: SubsystemsContext) => Promise<T>, restore?: (snapshotData: T, context: SubsystemsContext) => Promise<void>) => Promise<void>;
|
|
45
44
|
teardown(): Promise<void>;
|
|
46
|
-
|
|
45
|
+
applyBaseSetup(): Promise<void>;
|
|
47
46
|
}
|
|
48
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
47
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cross_chain_messaging_test.d.ts","sourceRoot":"","sources":["../../src/e2e_cross_chain_messaging/cross_chain_messaging_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACzD,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAErE,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAElD,OAAO,EAAE,aAAa,EAAE,cAAc,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC1F,OAAO,KAAK,EACV,0BAA0B,EAC1B,gCAAgC,EACjC,MAAM,2CAA2C,CAAC;AAEnD,OAAO,KAAK,EAAE,wBAAwB,EAAE,MAAM,uBAAuB,CAAC;AACtE,OAAO,EAAoB,WAAW,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,mBAAmB,EAAE,MAAM,sCAAsC,CAAC;AAC3E,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAG5D,OAAO,
|
|
1
|
+
{"version":3,"file":"cross_chain_messaging_test.d.ts","sourceRoot":"","sources":["../../src/e2e_cross_chain_messaging/cross_chain_messaging_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACzD,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAErE,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAElD,OAAO,EAAE,aAAa,EAAE,cAAc,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC1F,OAAO,KAAK,EACV,0BAA0B,EAC1B,gCAAgC,EACjC,MAAM,2CAA2C,CAAC;AAEnD,OAAO,KAAK,EAAE,wBAAwB,EAAE,MAAM,uBAAuB,CAAC;AACtE,OAAO,EAAoB,WAAW,EAAE,MAAM,iCAAiC,CAAC;AAGhF,OAAO,EAAE,aAAa,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,mBAAmB,EAAE,MAAM,sCAAsC,CAAC;AAC3E,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAG5D,OAAO,EACL,KAAK,eAAe,EACpB,KAAK,YAAY,EAKlB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,qBAAqB,EAAE,MAAM,uCAAuC,CAAC;AAE9E,qBAAa,uBAAuB;IAClC,OAAO,CAAC,kBAAkB,CAAU;IACpC,OAAO,CAAC,YAAY,CAAe;IACnC,OAAO,CAAC,qBAAqB,CAAsC;IACnE,MAAM,EAAE,MAAM,CAAC;IACf,OAAO,EAAG,eAAe,CAAC;IAC1B,SAAS,EAAG,SAAS,CAAC;IACtB,eAAe,EAAG,eAAe,CAAC;IAClC,cAAc,EAAG,cAAc,CAAC;IAEhC,QAAQ,EAAG,wBAAwB,GAAG,SAAS,CAAC;IAEhD,MAAM,EAAG,UAAU,CAAC;IACpB,YAAY,EAAG,YAAY,CAAC;IAC5B,YAAY,EAAG,YAAY,CAAC;IAC5B,YAAY,EAAG,YAAY,CAAC;IAC5B,qBAAqB,EAAG,qBAAqB,CAAC;IAC9C,UAAU,EAAG,UAAU,CAAC;IACxB,OAAO,EAAG,aAAa,CAAC;IACxB,QAAQ,EAAG,mBAAmB,CAAC;IAE/B,MAAM,EAAG,cAAc,CAAC;IACxB,KAAK,EAAG,aAAa,CAAC;IACtB,MAAM,EAAG,cAAc,CAAC;IACxB,UAAU,EAAG,UAAU,CAAC;IAExB,uBAAuB,EAAG,gCAAgC,CAAC;IAE3D,YACE,QAAQ,EAAE,MAAM,EAChB,IAAI,GAAE,YAAiB,EACvB,qBAAqB,GAAE,OAAO,CAAC,0BAA0B,CAAM,EAShE;IAEK,KAAK,kBASV;IAEK,oBAAoB,CAAC,WAAW,EAAE,SAAS,GAAG,OAAO,CAAC,WAAW,CAAC,CAUvE;IAEK,kBAAkB,kBAKvB;IAEK,QAAQ,kBAEb;IAEK,cAAc,kBAkFnB;CACF"}
|
|
@@ -10,17 +10,17 @@ import { TestERC20Abi, TestERC20Bytecode } from '@aztec/l1-artifacts';
|
|
|
10
10
|
import { TokenContract } from '@aztec/noir-contracts.js/Token';
|
|
11
11
|
import { TokenBridgeContract } from '@aztec/noir-contracts.js/TokenBridge';
|
|
12
12
|
import { MNEMONIC } from '../fixtures/fixtures.js';
|
|
13
|
-
import {
|
|
13
|
+
import { deployAccounts, publicDeployAccounts, setup, teardown } from '../fixtures/setup.js';
|
|
14
14
|
import { CrossChainTestHarness } from '../shared/cross_chain_test_harness.js';
|
|
15
|
-
const { E2E_DATA_PATH: dataPath } = process.env;
|
|
16
15
|
export class CrossChainMessagingTest {
|
|
17
|
-
snapshotManager;
|
|
18
16
|
requireEpochProven;
|
|
17
|
+
setupOptions;
|
|
18
|
+
deployL1ContractsArgs;
|
|
19
19
|
logger;
|
|
20
|
+
context;
|
|
20
21
|
aztecNode;
|
|
21
22
|
aztecNodeConfig;
|
|
22
23
|
aztecNodeAdmin;
|
|
23
|
-
ctx;
|
|
24
24
|
l1Client;
|
|
25
25
|
wallet;
|
|
26
26
|
ownerAddress;
|
|
@@ -37,24 +37,22 @@ export class CrossChainMessagingTest {
|
|
|
37
37
|
deployL1ContractsValues;
|
|
38
38
|
constructor(testName, opts = {}, deployL1ContractsArgs = {}){
|
|
39
39
|
this.logger = createLogger(`e2e:e2e_cross_chain_messaging:${testName}`);
|
|
40
|
-
this.
|
|
40
|
+
this.setupOptions = opts;
|
|
41
|
+
this.deployL1ContractsArgs = {
|
|
41
42
|
initialValidators: [],
|
|
42
43
|
...deployL1ContractsArgs
|
|
43
|
-
}
|
|
44
|
+
};
|
|
44
45
|
this.requireEpochProven = opts.startProverNode ?? false;
|
|
45
46
|
}
|
|
46
47
|
async setup() {
|
|
47
|
-
this.
|
|
48
|
-
this.
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
// Turn off the watcher to prevent it from keep marking blocks as proven.
|
|
56
|
-
this.ctx.watcher.setIsMarkingAsProven(false);
|
|
57
|
-
}
|
|
48
|
+
this.logger.info('Setting up cross chain messaging test');
|
|
49
|
+
this.context = await setup(0, {
|
|
50
|
+
...this.setupOptions,
|
|
51
|
+
fundSponsoredFPC: true,
|
|
52
|
+
skipAccountDeployment: true,
|
|
53
|
+
l1ContractsArgs: this.deployL1ContractsArgs
|
|
54
|
+
});
|
|
55
|
+
await this.applyBaseSetup();
|
|
58
56
|
}
|
|
59
57
|
async advanceToEpochProven(l2TxReceipt) {
|
|
60
58
|
const epoch = await this.rollup.getEpochNumberForCheckpoint(CheckpointNumber.fromBlockNumber(l2TxReceipt.blockNumber));
|
|
@@ -73,53 +71,58 @@ export class CrossChainMessagingTest {
|
|
|
73
71
|
await sleep(1000);
|
|
74
72
|
}
|
|
75
73
|
}
|
|
76
|
-
snapshot = (name, apply, restore = ()=>Promise.resolve())=>this.snapshotManager.snapshot(name, apply, restore);
|
|
77
74
|
async teardown() {
|
|
78
|
-
await this.
|
|
75
|
+
await teardown(this.context);
|
|
79
76
|
}
|
|
80
|
-
async
|
|
81
|
-
//
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
this.user2Address
|
|
98
|
-
]);
|
|
99
|
-
this.l1Client = createExtendedL1Client(this.aztecNodeConfig.l1RpcUrls, MNEMONIC);
|
|
100
|
-
const underlyingERC20Address = await deployL1Contract(this.l1Client, TestERC20Abi, TestERC20Bytecode, [
|
|
101
|
-
'Underlying',
|
|
102
|
-
'UND',
|
|
103
|
-
this.l1Client.account.address
|
|
104
|
-
]).then(({ address })=>address);
|
|
105
|
-
this.logger.verbose(`Setting up cross chain harness...`);
|
|
106
|
-
this.crossChainTestHarness = await CrossChainTestHarness.new(this.aztecNode, this.l1Client, this.wallet, this.ownerAddress, this.logger, underlyingERC20Address);
|
|
107
|
-
this.logger.verbose(`L2 token deployed to: ${this.crossChainTestHarness.l2Token.address}`);
|
|
108
|
-
return this.crossChainTestHarness.toCrossChainContext();
|
|
109
|
-
}, (crossChainContext)=>{
|
|
110
|
-
this.l2Token = TokenContract.at(crossChainContext.l2Token, this.wallet);
|
|
111
|
-
this.l2Bridge = TokenBridgeContract.at(crossChainContext.l2Bridge, this.wallet);
|
|
112
|
-
// There is an issue with the reviver so we are getting strings sometimes. Working around it here.
|
|
113
|
-
this.ethAccount = EthAddress.fromString(crossChainContext.ethAccount.toString());
|
|
114
|
-
const tokenPortalAddress = EthAddress.fromString(crossChainContext.tokenPortal.toString());
|
|
115
|
-
const l1Client = createExtendedL1Client(this.aztecNodeConfig.l1RpcUrls, MNEMONIC);
|
|
116
|
-
this.l1Client = l1Client;
|
|
117
|
-
const l1Contracts = this.aztecNodeConfig.l1Contracts;
|
|
118
|
-
this.rollup = new RollupContract(l1Client, l1Contracts.rollupAddress.toString());
|
|
119
|
-
this.inbox = new InboxContract(l1Client, l1Contracts.inboxAddress.toString());
|
|
120
|
-
this.outbox = new OutboxContract(l1Client, l1Contracts.outboxAddress.toString());
|
|
121
|
-
this.crossChainTestHarness = new CrossChainTestHarness(this.aztecNode, this.logger, this.l2Token, this.l2Bridge, this.ethAccount, tokenPortalAddress, crossChainContext.underlying, l1Client, this.aztecNodeConfig.l1Contracts, this.wallet, this.ownerAddress);
|
|
122
|
-
return Promise.resolve();
|
|
77
|
+
async applyBaseSetup() {
|
|
78
|
+
// Set up base context fields
|
|
79
|
+
this.aztecNode = this.context.aztecNodeService;
|
|
80
|
+
this.wallet = this.context.wallet;
|
|
81
|
+
this.aztecNodeConfig = this.context.config;
|
|
82
|
+
this.cheatCodes = this.context.cheatCodes;
|
|
83
|
+
this.deployL1ContractsValues = this.context.deployL1ContractsValues;
|
|
84
|
+
this.aztecNodeAdmin = this.context.aztecNodeService;
|
|
85
|
+
if (this.requireEpochProven) {
|
|
86
|
+
// Turn off the watcher to prevent it from keep marking blocks as proven.
|
|
87
|
+
this.context.watcher.setIsMarkingAsProven(false);
|
|
88
|
+
}
|
|
89
|
+
// Deploy 3 accounts
|
|
90
|
+
this.logger.info('Applying 3_accounts setup');
|
|
91
|
+
const { deployedAccounts } = await deployAccounts(3, this.logger)({
|
|
92
|
+
wallet: this.context.wallet,
|
|
93
|
+
initialFundedAccounts: this.context.initialFundedAccounts
|
|
123
94
|
});
|
|
95
|
+
[this.ownerAddress, this.user1Address, this.user2Address] = deployedAccounts.map((a)=>a.address);
|
|
96
|
+
// Set up cross chain messaging
|
|
97
|
+
this.logger.info('Applying e2e_cross_chain_messaging setup');
|
|
98
|
+
// Create the token contract state.
|
|
99
|
+
this.logger.verbose(`Public deploy accounts...`);
|
|
100
|
+
await publicDeployAccounts(this.wallet, [
|
|
101
|
+
this.ownerAddress,
|
|
102
|
+
this.user1Address,
|
|
103
|
+
this.user2Address
|
|
104
|
+
]);
|
|
105
|
+
this.l1Client = createExtendedL1Client(this.aztecNodeConfig.l1RpcUrls, MNEMONIC);
|
|
106
|
+
const underlyingERC20Address = await deployL1Contract(this.l1Client, TestERC20Abi, TestERC20Bytecode, [
|
|
107
|
+
'Underlying',
|
|
108
|
+
'UND',
|
|
109
|
+
this.l1Client.account.address
|
|
110
|
+
]).then(({ address })=>address);
|
|
111
|
+
this.logger.verbose(`Setting up cross chain harness...`);
|
|
112
|
+
this.crossChainTestHarness = await CrossChainTestHarness.new(this.aztecNode, this.l1Client, this.wallet, this.ownerAddress, this.logger, underlyingERC20Address);
|
|
113
|
+
this.logger.verbose(`L2 token deployed to: ${this.crossChainTestHarness.l2Token.address}`);
|
|
114
|
+
const crossChainContext = this.crossChainTestHarness.toCrossChainContext();
|
|
115
|
+
this.l2Token = TokenContract.at(crossChainContext.l2Token, this.wallet);
|
|
116
|
+
this.l2Bridge = TokenBridgeContract.at(crossChainContext.l2Bridge, this.wallet);
|
|
117
|
+
// There is an issue with the reviver so we are getting strings sometimes. Working around it here.
|
|
118
|
+
this.ethAccount = EthAddress.fromString(crossChainContext.ethAccount.toString());
|
|
119
|
+
const tokenPortalAddress = EthAddress.fromString(crossChainContext.tokenPortal.toString());
|
|
120
|
+
const l1Client = createExtendedL1Client(this.aztecNodeConfig.l1RpcUrls, MNEMONIC);
|
|
121
|
+
this.l1Client = l1Client;
|
|
122
|
+
const l1Contracts = this.aztecNodeConfig.l1Contracts;
|
|
123
|
+
this.rollup = new RollupContract(l1Client, l1Contracts.rollupAddress.toString());
|
|
124
|
+
this.inbox = new InboxContract(l1Client, l1Contracts.inboxAddress.toString());
|
|
125
|
+
this.outbox = new OutboxContract(l1Client, l1Contracts.outboxAddress.toString());
|
|
126
|
+
this.crossChainTestHarness = new CrossChainTestHarness(this.aztecNode, this.logger, this.l2Token, this.l2Bridge, this.ethAccount, tokenPortalAddress, crossChainContext.underlying, l1Client, this.aztecNodeConfig.l1Contracts, this.wallet, this.ownerAddress);
|
|
124
127
|
}
|
|
125
128
|
}
|
|
@@ -9,8 +9,9 @@ import type { Wallet } from '@aztec/aztec.js/wallet';
|
|
|
9
9
|
import type { StatefulTestContract } from '@aztec/noir-test-contracts.js/StatefulTest';
|
|
10
10
|
import type { AztecNodeAdmin } from '@aztec/stdlib/interfaces/client';
|
|
11
11
|
import type { TestWallet } from '@aztec/test-wallet/server';
|
|
12
|
+
import { type EndToEndContext } from '../fixtures/setup.js';
|
|
12
13
|
export declare class DeployTest {
|
|
13
|
-
|
|
14
|
+
context: EndToEndContext;
|
|
14
15
|
logger: Logger;
|
|
15
16
|
wallet: TestWallet;
|
|
16
17
|
defaultAccountAddress: AztecAddress;
|
|
@@ -19,7 +20,7 @@ export declare class DeployTest {
|
|
|
19
20
|
constructor(testName: string);
|
|
20
21
|
setup(): Promise<this>;
|
|
21
22
|
teardown(): Promise<void>;
|
|
22
|
-
private
|
|
23
|
+
private applyInitialAccount;
|
|
23
24
|
registerContract<T extends ContractBase>(wallet: Wallet, contractArtifact: ContractArtifactClass<T>, opts?: {
|
|
24
25
|
salt?: Fr;
|
|
25
26
|
publicKeys?: PublicKeys;
|
|
@@ -33,4 +34,4 @@ export type ContractArtifactClass<T extends ContractBase> = {
|
|
|
33
34
|
at(address: AztecAddress, wallet: Wallet): T;
|
|
34
35
|
artifact: ContractArtifact;
|
|
35
36
|
};
|
|
36
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
37
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"deploy_test.d.ts","sourceRoot":"","sources":["../../src/e2e_deploy_contract/deploy_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAC5D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AAC9D,OAAO,EAAE,KAAK,YAAY,EAA8C,MAAM,2BAA2B,CAAC;AAC1G,OAAO,EAAE,EAAE,EAAE,MAAM,wBAAwB,CAAC;AAC5C,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,4CAA4C,CAAC;AACvF,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;
|
|
1
|
+
{"version":3,"file":"deploy_test.d.ts","sourceRoot":"","sources":["../../src/e2e_deploy_contract/deploy_test.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAC5D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AAC9D,OAAO,EAAE,KAAK,YAAY,EAA8C,MAAM,2BAA2B,CAAC;AAC1G,OAAO,EAAE,EAAE,EAAE,MAAM,wBAAwB,CAAC;AAC5C,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,qBAAqB,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,4CAA4C,CAAC;AACvF,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAC;AACtE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAE5D,OAAO,EAAE,KAAK,eAAe,EAAmC,MAAM,sBAAsB,CAAC;AAE7F,qBAAa,UAAU;IACd,OAAO,EAAG,eAAe,CAAC;IAC1B,MAAM,EAAE,MAAM,CAAC;IACf,MAAM,EAAG,UAAU,CAAC;IACpB,qBAAqB,EAAG,YAAY,CAAC;IACrC,SAAS,EAAG,SAAS,CAAC;IACtB,cAAc,EAAG,cAAc,CAAC;IAEvC,YAAY,QAAQ,EAAE,MAAM,EAE3B;IAEK,KAAK,kBAWV;IAEK,QAAQ,kBAEb;YAEa,mBAAmB;IAY3B,gBAAgB,CAAC,CAAC,SAAS,YAAY,EAC3C,MAAM,EAAE,MAAM,EACd,gBAAgB,EAAE,qBAAqB,CAAC,CAAC,CAAC,EAC1C,IAAI,GAAE;QACJ,IAAI,CAAC,EAAE,EAAE,CAAC;QACV,UAAU,CAAC,EAAE,UAAU,CAAC;QACxB,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC;QACjB,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,YAAY,CAAC;KACpB,GACL,OAAO,CAAC,CAAC,CAAC,CAWZ;CACF;AAED,MAAM,MAAM,wBAAwB,GAAG,UAAU,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC;AAElG,MAAM,MAAM,qBAAqB,CAAC,CAAC,SAAS,YAAY,IAAI;IAC1D,EAAE,CAAC,OAAO,EAAE,YAAY,EAAE,MAAM,EAAE,MAAM,GAAG,CAAC,CAAC;IAC7C,QAAQ,EAAE,gBAAgB,CAAC;CAC5B,CAAC"}
|
|
@@ -1,10 +1,9 @@
|
|
|
1
1
|
import { getContractInstanceFromInstantiationParams } from '@aztec/aztec.js/contracts';
|
|
2
2
|
import { Fr } from '@aztec/aztec.js/fields';
|
|
3
3
|
import { createLogger } from '@aztec/aztec.js/log';
|
|
4
|
-
import {
|
|
5
|
-
const { E2E_DATA_PATH: dataPath } = process.env;
|
|
4
|
+
import { deployAccounts, setup, teardown } from '../fixtures/setup.js';
|
|
6
5
|
export class DeployTest {
|
|
7
|
-
|
|
6
|
+
context;
|
|
8
7
|
logger;
|
|
9
8
|
wallet;
|
|
10
9
|
defaultAccountAddress;
|
|
@@ -12,23 +11,29 @@ export class DeployTest {
|
|
|
12
11
|
aztecNodeAdmin;
|
|
13
12
|
constructor(testName){
|
|
14
13
|
this.logger = createLogger(`e2e:e2e_deploy_contract:${testName}`);
|
|
15
|
-
this.snapshotManager = createSnapshotManager(`e2e_deploy_contract/${testName}`, dataPath);
|
|
16
14
|
}
|
|
17
15
|
async setup() {
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
16
|
+
this.logger.info('Setting up test environment');
|
|
17
|
+
this.context = await setup(0, {
|
|
18
|
+
fundSponsoredFPC: true,
|
|
19
|
+
skipAccountDeployment: true
|
|
20
|
+
});
|
|
21
|
+
this.aztecNode = this.context.aztecNodeService;
|
|
22
|
+
this.wallet = this.context.wallet;
|
|
23
|
+
this.aztecNodeAdmin = this.context.aztecNodeService;
|
|
24
|
+
await this.applyInitialAccount();
|
|
22
25
|
return this;
|
|
23
26
|
}
|
|
24
27
|
async teardown() {
|
|
25
|
-
await this.
|
|
28
|
+
await teardown(this.context);
|
|
26
29
|
}
|
|
27
|
-
async
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
30
|
+
async applyInitialAccount() {
|
|
31
|
+
this.logger.info('Applying initial account setup');
|
|
32
|
+
const { deployedAccounts } = await deployAccounts(1, this.logger)({
|
|
33
|
+
wallet: this.context.wallet,
|
|
34
|
+
initialFundedAccounts: this.context.initialFundedAccounts
|
|
31
35
|
});
|
|
36
|
+
this.defaultAccountAddress = deployedAccounts[0].address;
|
|
32
37
|
}
|
|
33
38
|
async registerContract(wallet, contractArtifact, opts = {}) {
|
|
34
39
|
const { salt, publicKeys, initArgs, constructorName, deployer } = opts;
|
|
@@ -147,7 +147,7 @@ export const DEFAULT_L1_BLOCK_TIME = process.env.CI ? 12 : 8;
|
|
|
147
147
|
proverId: EthAddress.fromNumber(parseInt(suffix, 10)),
|
|
148
148
|
dontStart: opts.dontStart,
|
|
149
149
|
...opts
|
|
150
|
-
}, this.context.aztecNode,
|
|
150
|
+
}, this.context.aztecNode, this.context.prefilledPublicData ?? [], {
|
|
151
151
|
dateProvider: this.context.dateProvider
|
|
152
152
|
}));
|
|
153
153
|
this.proverNodes.push(proverNode);
|
|
@@ -16,10 +16,8 @@ describe('e2e_fees bridging_race', ()=>{
|
|
|
16
16
|
minTxsPerBlock: 0
|
|
17
17
|
});
|
|
18
18
|
beforeAll(async ()=>{
|
|
19
|
-
await t.
|
|
20
|
-
|
|
21
|
-
await t.applySetupFeeJuiceSnapshot();
|
|
22
|
-
({ wallet, logger } = await t.setup());
|
|
19
|
+
await t.setup();
|
|
20
|
+
({ wallet, logger } = t);
|
|
23
21
|
});
|
|
24
22
|
afterAll(async ()=>{
|
|
25
23
|
await t.teardown();
|