tempo.ts 0.5.1 → 0.5.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/viem/Actions/policy.d.ts +9 -1
- package/dist/viem/Actions/policy.d.ts.map +1 -1
- package/dist/viem/Actions/policy.js.map +1 -1
- package/dist/viem/Chain.d.ts.map +1 -1
- package/dist/viem/Chain.js +8 -2
- package/dist/viem/Chain.js.map +1 -1
- package/dist/viem/Transaction.js +4 -1
- package/dist/viem/Transaction.js.map +1 -1
- package/dist/viem/Transport.d.ts +8 -0
- package/dist/viem/Transport.d.ts.map +1 -1
- package/dist/viem/Transport.js +87 -1
- package/dist/viem/Transport.js.map +1 -1
- package/dist/wagmi/Actions/faucet.d.ts +31 -0
- package/dist/wagmi/Actions/faucet.d.ts.map +1 -1
- package/dist/wagmi/Actions/faucet.js +31 -0
- package/dist/wagmi/Actions/faucet.js.map +1 -1
- package/dist/wagmi/Actions/index.d.ts +1 -0
- package/dist/wagmi/Actions/index.d.ts.map +1 -1
- package/dist/wagmi/Actions/index.js +1 -0
- package/dist/wagmi/Actions/index.js.map +1 -1
- package/dist/wagmi/Actions/policy.d.ts +481 -0
- package/dist/wagmi/Actions/policy.d.ts.map +1 -0
- package/dist/wagmi/Actions/policy.js +530 -0
- package/dist/wagmi/Actions/policy.js.map +1 -0
- package/dist/wagmi/Connector.d.ts +1 -1
- package/dist/wagmi/Connector.d.ts.map +1 -1
- package/dist/wagmi/Connector.js +3 -85
- package/dist/wagmi/Connector.js.map +1 -1
- package/dist/wagmi/Hooks/faucet.d.ts +33 -1
- package/dist/wagmi/Hooks/faucet.d.ts.map +1 -1
- package/dist/wagmi/Hooks/faucet.js +37 -1
- package/dist/wagmi/Hooks/faucet.js.map +1 -1
- package/dist/wagmi/Hooks/index.d.ts +1 -0
- package/dist/wagmi/Hooks/index.d.ts.map +1 -1
- package/dist/wagmi/Hooks/index.js +1 -0
- package/dist/wagmi/Hooks/index.js.map +1 -1
- package/dist/wagmi/Hooks/policy.d.ts +424 -0
- package/dist/wagmi/Hooks/policy.d.ts.map +1 -0
- package/dist/wagmi/Hooks/policy.js +510 -0
- package/dist/wagmi/Hooks/policy.js.map +1 -0
- package/package.json +2 -2
- package/src/viem/Actions/policy.ts +25 -0
- package/src/viem/Chain.ts +9 -2
- package/src/viem/Transaction.ts +9 -4
- package/src/viem/Transport.ts +107 -1
- package/src/viem/e2e.test.ts +33 -24
- package/src/wagmi/Actions/faucet.ts +43 -0
- package/src/wagmi/Actions/index.ts +1 -0
- package/src/wagmi/Actions/policy.test.ts +461 -0
- package/src/wagmi/Actions/policy.ts +819 -0
- package/src/wagmi/Connector.ts +4 -112
- package/src/wagmi/Hooks/faucet.ts +69 -1
- package/src/wagmi/Hooks/index.ts +1 -0
- package/src/wagmi/Hooks/policy.test.ts +665 -0
- package/src/wagmi/Hooks/policy.ts +875 -0
|
@@ -0,0 +1,461 @@
|
|
|
1
|
+
import { connect } from '@wagmi/core'
|
|
2
|
+
import { describe, expect, test } from 'vitest'
|
|
3
|
+
import { accounts } from '../../../test/viem/config.js'
|
|
4
|
+
import { config, queryClient } from '../../../test/wagmi/config.js'
|
|
5
|
+
import * as policy from './policy.js'
|
|
6
|
+
|
|
7
|
+
const account = accounts[0]
|
|
8
|
+
const account2 = accounts[1]
|
|
9
|
+
|
|
10
|
+
describe('create', () => {
|
|
11
|
+
test('default', async () => {
|
|
12
|
+
await connect(config, {
|
|
13
|
+
connector: config.connectors[0]!,
|
|
14
|
+
})
|
|
15
|
+
|
|
16
|
+
const result = await policy.createSync(config, {
|
|
17
|
+
type: 'whitelist',
|
|
18
|
+
})
|
|
19
|
+
|
|
20
|
+
expect(result.receipt).toBeDefined()
|
|
21
|
+
expect(result.policyId).toBeDefined()
|
|
22
|
+
expect(result.policyType).toBe(0)
|
|
23
|
+
expect(result.updater).toBe(account.address)
|
|
24
|
+
|
|
25
|
+
// verify policy was created
|
|
26
|
+
const data = await policy.getData(config, {
|
|
27
|
+
policyId: result.policyId,
|
|
28
|
+
})
|
|
29
|
+
expect(data.admin).toBe(account.address)
|
|
30
|
+
expect(data.type).toBe('whitelist')
|
|
31
|
+
})
|
|
32
|
+
|
|
33
|
+
test('behavior: blacklist', async () => {
|
|
34
|
+
await connect(config, {
|
|
35
|
+
connector: config.connectors[0]!,
|
|
36
|
+
})
|
|
37
|
+
|
|
38
|
+
const result = await policy.createSync(config, {
|
|
39
|
+
type: 'blacklist',
|
|
40
|
+
})
|
|
41
|
+
|
|
42
|
+
expect(result.receipt).toBeDefined()
|
|
43
|
+
expect(result.policyId).toBeDefined()
|
|
44
|
+
expect(result.policyType).toBe(1)
|
|
45
|
+
expect(result.updater).toBe(account.address)
|
|
46
|
+
|
|
47
|
+
// verify policy was created
|
|
48
|
+
const data = await policy.getData(config, {
|
|
49
|
+
policyId: result.policyId,
|
|
50
|
+
})
|
|
51
|
+
expect(data.admin).toBe(account.address)
|
|
52
|
+
expect(data.type).toBe('blacklist')
|
|
53
|
+
})
|
|
54
|
+
})
|
|
55
|
+
|
|
56
|
+
describe('setAdmin', () => {
|
|
57
|
+
test('default', async () => {
|
|
58
|
+
await connect(config, {
|
|
59
|
+
connector: config.connectors[0]!,
|
|
60
|
+
})
|
|
61
|
+
|
|
62
|
+
// create policy
|
|
63
|
+
const { policyId } = await policy.createSync(config, {
|
|
64
|
+
type: 'whitelist',
|
|
65
|
+
})
|
|
66
|
+
|
|
67
|
+
// set new admin
|
|
68
|
+
const { receipt: setAdminReceipt, ...setAdminResult } =
|
|
69
|
+
await policy.setAdminSync(config, {
|
|
70
|
+
policyId,
|
|
71
|
+
admin: account2.address,
|
|
72
|
+
})
|
|
73
|
+
expect(setAdminReceipt).toBeDefined()
|
|
74
|
+
expect(setAdminResult.policyId).toBe(policyId)
|
|
75
|
+
expect(setAdminResult.admin).toBe(account2.address)
|
|
76
|
+
expect(setAdminResult.updater).toBe(account.address)
|
|
77
|
+
|
|
78
|
+
{
|
|
79
|
+
// verify new admin
|
|
80
|
+
const data = await policy.getData(config, {
|
|
81
|
+
policyId,
|
|
82
|
+
})
|
|
83
|
+
expect(data.admin).toBe(account2.address)
|
|
84
|
+
}
|
|
85
|
+
})
|
|
86
|
+
})
|
|
87
|
+
|
|
88
|
+
describe('modifyWhitelist', () => {
|
|
89
|
+
test('default', async () => {
|
|
90
|
+
await connect(config, {
|
|
91
|
+
connector: config.connectors[0]!,
|
|
92
|
+
})
|
|
93
|
+
|
|
94
|
+
// create whitelist policy
|
|
95
|
+
const { policyId } = await policy.createSync(config, {
|
|
96
|
+
type: 'whitelist',
|
|
97
|
+
})
|
|
98
|
+
|
|
99
|
+
// verify account2 is not authorized
|
|
100
|
+
{
|
|
101
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
102
|
+
policyId,
|
|
103
|
+
user: account2.address,
|
|
104
|
+
})
|
|
105
|
+
expect(isAuthorized).toBe(false)
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
// add account2 to whitelist
|
|
109
|
+
const addResult = await policy.modifyWhitelistSync(config, {
|
|
110
|
+
policyId,
|
|
111
|
+
address: account2.address,
|
|
112
|
+
allowed: true,
|
|
113
|
+
})
|
|
114
|
+
|
|
115
|
+
expect(addResult.receipt).toBeDefined()
|
|
116
|
+
expect(addResult.policyId).toBe(policyId)
|
|
117
|
+
expect(addResult.account).toBe(account2.address)
|
|
118
|
+
expect(addResult.allowed).toBe(true)
|
|
119
|
+
expect(addResult.updater).toBe(account.address)
|
|
120
|
+
|
|
121
|
+
// verify account2 is authorized
|
|
122
|
+
{
|
|
123
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
124
|
+
policyId,
|
|
125
|
+
user: account2.address,
|
|
126
|
+
})
|
|
127
|
+
expect(isAuthorized).toBe(true)
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
// remove account2 from whitelist
|
|
131
|
+
const removeResult = await policy.modifyWhitelistSync(config, {
|
|
132
|
+
policyId,
|
|
133
|
+
address: account2.address,
|
|
134
|
+
allowed: false,
|
|
135
|
+
})
|
|
136
|
+
|
|
137
|
+
expect(removeResult.receipt).toBeDefined()
|
|
138
|
+
expect(removeResult.policyId).toBe(policyId)
|
|
139
|
+
expect(removeResult.account).toBe(account2.address)
|
|
140
|
+
expect(removeResult.allowed).toBe(false)
|
|
141
|
+
expect(removeResult.updater).toBe(account.address)
|
|
142
|
+
|
|
143
|
+
// verify account2 is no longer authorized
|
|
144
|
+
{
|
|
145
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
146
|
+
policyId,
|
|
147
|
+
user: account2.address,
|
|
148
|
+
})
|
|
149
|
+
expect(isAuthorized).toBe(false)
|
|
150
|
+
}
|
|
151
|
+
})
|
|
152
|
+
})
|
|
153
|
+
|
|
154
|
+
describe('modifyBlacklist', () => {
|
|
155
|
+
test('default', async () => {
|
|
156
|
+
await connect(config, {
|
|
157
|
+
connector: config.connectors[0]!,
|
|
158
|
+
})
|
|
159
|
+
|
|
160
|
+
// create blacklist policy
|
|
161
|
+
const { policyId } = await policy.createSync(config, {
|
|
162
|
+
type: 'blacklist',
|
|
163
|
+
})
|
|
164
|
+
|
|
165
|
+
// verify account2 is authorized (not blacklisted)
|
|
166
|
+
{
|
|
167
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
168
|
+
policyId,
|
|
169
|
+
user: account2.address,
|
|
170
|
+
})
|
|
171
|
+
expect(isAuthorized).toBe(true)
|
|
172
|
+
}
|
|
173
|
+
|
|
174
|
+
// add account2 to blacklist
|
|
175
|
+
const addResult = await policy.modifyBlacklistSync(config, {
|
|
176
|
+
policyId,
|
|
177
|
+
address: account2.address,
|
|
178
|
+
restricted: true,
|
|
179
|
+
})
|
|
180
|
+
|
|
181
|
+
expect(addResult.receipt).toBeDefined()
|
|
182
|
+
expect(addResult.policyId).toBe(policyId)
|
|
183
|
+
expect(addResult.account).toBe(account2.address)
|
|
184
|
+
expect(addResult.restricted).toBe(true)
|
|
185
|
+
expect(addResult.updater).toBe(account.address)
|
|
186
|
+
|
|
187
|
+
// verify account2 is not authorized (blacklisted)
|
|
188
|
+
{
|
|
189
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
190
|
+
policyId,
|
|
191
|
+
user: account2.address,
|
|
192
|
+
})
|
|
193
|
+
expect(isAuthorized).toBe(false)
|
|
194
|
+
}
|
|
195
|
+
|
|
196
|
+
// remove account2 from blacklist
|
|
197
|
+
const removeResult = await policy.modifyBlacklistSync(config, {
|
|
198
|
+
policyId,
|
|
199
|
+
address: account2.address,
|
|
200
|
+
restricted: false,
|
|
201
|
+
})
|
|
202
|
+
|
|
203
|
+
expect(removeResult.receipt).toBeDefined()
|
|
204
|
+
expect(removeResult.policyId).toBe(policyId)
|
|
205
|
+
expect(removeResult.account).toBe(account2.address)
|
|
206
|
+
expect(removeResult.restricted).toBe(false)
|
|
207
|
+
expect(removeResult.updater).toBe(account.address)
|
|
208
|
+
|
|
209
|
+
// verify account2 is authorized again
|
|
210
|
+
{
|
|
211
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
212
|
+
policyId,
|
|
213
|
+
user: account2.address,
|
|
214
|
+
})
|
|
215
|
+
expect(isAuthorized).toBe(true)
|
|
216
|
+
}
|
|
217
|
+
})
|
|
218
|
+
})
|
|
219
|
+
|
|
220
|
+
describe('getData', () => {
|
|
221
|
+
test('default', async () => {
|
|
222
|
+
await connect(config, {
|
|
223
|
+
connector: config.connectors[0]!,
|
|
224
|
+
})
|
|
225
|
+
|
|
226
|
+
// create policy
|
|
227
|
+
const { policyId } = await policy.createSync(config, {
|
|
228
|
+
type: 'whitelist',
|
|
229
|
+
})
|
|
230
|
+
|
|
231
|
+
{
|
|
232
|
+
// get policy data
|
|
233
|
+
const data = await policy.getData(config, {
|
|
234
|
+
policyId,
|
|
235
|
+
})
|
|
236
|
+
expect(data.admin).toBe(account.address)
|
|
237
|
+
expect(data.type).toBe('whitelist')
|
|
238
|
+
}
|
|
239
|
+
})
|
|
240
|
+
|
|
241
|
+
test('behavior: blacklist', async () => {
|
|
242
|
+
await connect(config, {
|
|
243
|
+
connector: config.connectors[0]!,
|
|
244
|
+
})
|
|
245
|
+
|
|
246
|
+
// create blacklist policy
|
|
247
|
+
const { policyId } = await policy.createSync(config, {
|
|
248
|
+
type: 'blacklist',
|
|
249
|
+
})
|
|
250
|
+
|
|
251
|
+
{
|
|
252
|
+
// get policy data
|
|
253
|
+
const data = await policy.getData(config, {
|
|
254
|
+
policyId,
|
|
255
|
+
})
|
|
256
|
+
expect(data.admin).toBe(account.address)
|
|
257
|
+
expect(data.type).toBe('blacklist')
|
|
258
|
+
}
|
|
259
|
+
})
|
|
260
|
+
|
|
261
|
+
describe('queryOptions', () => {
|
|
262
|
+
test('default', async () => {
|
|
263
|
+
await connect(config, {
|
|
264
|
+
connector: config.connectors[0]!,
|
|
265
|
+
})
|
|
266
|
+
|
|
267
|
+
// create policy
|
|
268
|
+
const { policyId } = await policy.createSync(config, {
|
|
269
|
+
type: 'whitelist',
|
|
270
|
+
})
|
|
271
|
+
|
|
272
|
+
const options = policy.getData.queryOptions(config, {
|
|
273
|
+
policyId,
|
|
274
|
+
})
|
|
275
|
+
const data = await queryClient.fetchQuery(options)
|
|
276
|
+
|
|
277
|
+
expect(data.admin).toBe(account.address)
|
|
278
|
+
expect(data.type).toBe('whitelist')
|
|
279
|
+
})
|
|
280
|
+
})
|
|
281
|
+
})
|
|
282
|
+
|
|
283
|
+
describe('isAuthorized', () => {
|
|
284
|
+
test('special policy: always-reject (policyId 0)', async () => {
|
|
285
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
286
|
+
policyId: 0n,
|
|
287
|
+
user: account.address,
|
|
288
|
+
})
|
|
289
|
+
expect(isAuthorized).toBe(false)
|
|
290
|
+
})
|
|
291
|
+
|
|
292
|
+
test('special policy: always-allow (policyId 1)', async () => {
|
|
293
|
+
const isAuthorized = await policy.isAuthorized(config, {
|
|
294
|
+
policyId: 1n,
|
|
295
|
+
user: account.address,
|
|
296
|
+
})
|
|
297
|
+
expect(isAuthorized).toBe(true)
|
|
298
|
+
})
|
|
299
|
+
|
|
300
|
+
describe('queryOptions', () => {
|
|
301
|
+
test('default', async () => {
|
|
302
|
+
const options = policy.isAuthorized.queryOptions(config, {
|
|
303
|
+
policyId: 1n,
|
|
304
|
+
user: account.address,
|
|
305
|
+
})
|
|
306
|
+
const isAuthorized = await queryClient.fetchQuery(options)
|
|
307
|
+
|
|
308
|
+
expect(isAuthorized).toBe(true)
|
|
309
|
+
})
|
|
310
|
+
})
|
|
311
|
+
})
|
|
312
|
+
|
|
313
|
+
describe('watchCreate', () => {
|
|
314
|
+
test('default', async () => {
|
|
315
|
+
await connect(config, {
|
|
316
|
+
connector: config.connectors[0]!,
|
|
317
|
+
})
|
|
318
|
+
|
|
319
|
+
const events: any[] = []
|
|
320
|
+
const unwatch = policy.watchCreate(config, {
|
|
321
|
+
onPolicyCreated: (args, log) => {
|
|
322
|
+
events.push({ args, log })
|
|
323
|
+
},
|
|
324
|
+
})
|
|
325
|
+
|
|
326
|
+
// create policy
|
|
327
|
+
await policy.createSync(config, {
|
|
328
|
+
type: 'whitelist',
|
|
329
|
+
})
|
|
330
|
+
|
|
331
|
+
await new Promise((resolve) => setTimeout(resolve, 500))
|
|
332
|
+
unwatch()
|
|
333
|
+
|
|
334
|
+
expect(events.length).toBe(1)
|
|
335
|
+
expect(events[0].args.policyId).toBeDefined()
|
|
336
|
+
expect(events[0].args.updater).toBe(account.address)
|
|
337
|
+
expect(events[0].args.type).toBe('whitelist')
|
|
338
|
+
})
|
|
339
|
+
})
|
|
340
|
+
|
|
341
|
+
describe('watchAdminUpdated', () => {
|
|
342
|
+
test('default', async () => {
|
|
343
|
+
await connect(config, {
|
|
344
|
+
connector: config.connectors[0]!,
|
|
345
|
+
})
|
|
346
|
+
|
|
347
|
+
// create policy
|
|
348
|
+
const { policyId } = await policy.createSync(config, {
|
|
349
|
+
type: 'whitelist',
|
|
350
|
+
})
|
|
351
|
+
|
|
352
|
+
const events: any[] = []
|
|
353
|
+
const unwatch = policy.watchAdminUpdated(config, {
|
|
354
|
+
onAdminUpdated: (args, log) => {
|
|
355
|
+
events.push({ args, log })
|
|
356
|
+
},
|
|
357
|
+
})
|
|
358
|
+
|
|
359
|
+
// set new admin
|
|
360
|
+
await policy.setAdminSync(config, {
|
|
361
|
+
policyId,
|
|
362
|
+
admin: account2.address,
|
|
363
|
+
})
|
|
364
|
+
|
|
365
|
+
await new Promise((resolve) => setTimeout(resolve, 500))
|
|
366
|
+
unwatch()
|
|
367
|
+
|
|
368
|
+
expect(events.length).toBe(1)
|
|
369
|
+
expect(events[0].args.policyId).toBe(policyId)
|
|
370
|
+
expect(events[0].args.updater).toBe(account.address)
|
|
371
|
+
expect(events[0].args.admin).toBe(account2.address)
|
|
372
|
+
})
|
|
373
|
+
})
|
|
374
|
+
|
|
375
|
+
describe('watchWhitelistUpdated', () => {
|
|
376
|
+
test('default', async () => {
|
|
377
|
+
await connect(config, {
|
|
378
|
+
connector: config.connectors[0]!,
|
|
379
|
+
})
|
|
380
|
+
|
|
381
|
+
// create whitelist policy
|
|
382
|
+
const { policyId } = await policy.createSync(config, {
|
|
383
|
+
type: 'whitelist',
|
|
384
|
+
})
|
|
385
|
+
|
|
386
|
+
const events: any[] = []
|
|
387
|
+
const unwatch = policy.watchWhitelistUpdated(config, {
|
|
388
|
+
onWhitelistUpdated: (args, log) => {
|
|
389
|
+
events.push({ args, log })
|
|
390
|
+
},
|
|
391
|
+
})
|
|
392
|
+
|
|
393
|
+
// add address to whitelist
|
|
394
|
+
await policy.modifyWhitelistSync(config, {
|
|
395
|
+
policyId,
|
|
396
|
+
address: account2.address,
|
|
397
|
+
allowed: true,
|
|
398
|
+
})
|
|
399
|
+
|
|
400
|
+
// remove address from whitelist
|
|
401
|
+
await policy.modifyWhitelistSync(config, {
|
|
402
|
+
policyId,
|
|
403
|
+
address: account2.address,
|
|
404
|
+
allowed: false,
|
|
405
|
+
})
|
|
406
|
+
|
|
407
|
+
await new Promise((resolve) => setTimeout(resolve, 500))
|
|
408
|
+
unwatch()
|
|
409
|
+
|
|
410
|
+
expect(events.length).toBe(2)
|
|
411
|
+
expect(events[0].args.policyId).toBe(policyId)
|
|
412
|
+
expect(events[0].args.updater).toBe(account.address)
|
|
413
|
+
expect(events[0].args.account).toBe(account2.address)
|
|
414
|
+
expect(events[0].args.allowed).toBe(true)
|
|
415
|
+
expect(events[1].args.allowed).toBe(false)
|
|
416
|
+
})
|
|
417
|
+
})
|
|
418
|
+
|
|
419
|
+
describe('watchBlacklistUpdated', () => {
|
|
420
|
+
test('default', async () => {
|
|
421
|
+
await connect(config, {
|
|
422
|
+
connector: config.connectors[0]!,
|
|
423
|
+
})
|
|
424
|
+
|
|
425
|
+
// create blacklist policy
|
|
426
|
+
const { policyId } = await policy.createSync(config, {
|
|
427
|
+
type: 'blacklist',
|
|
428
|
+
})
|
|
429
|
+
|
|
430
|
+
const events: any[] = []
|
|
431
|
+
const unwatch = policy.watchBlacklistUpdated(config, {
|
|
432
|
+
onBlacklistUpdated: (args, log) => {
|
|
433
|
+
events.push({ args, log })
|
|
434
|
+
},
|
|
435
|
+
})
|
|
436
|
+
|
|
437
|
+
// add address to blacklist
|
|
438
|
+
await policy.modifyBlacklistSync(config, {
|
|
439
|
+
policyId,
|
|
440
|
+
address: account2.address,
|
|
441
|
+
restricted: true,
|
|
442
|
+
})
|
|
443
|
+
|
|
444
|
+
// remove address from blacklist
|
|
445
|
+
await policy.modifyBlacklistSync(config, {
|
|
446
|
+
policyId,
|
|
447
|
+
address: account2.address,
|
|
448
|
+
restricted: false,
|
|
449
|
+
})
|
|
450
|
+
|
|
451
|
+
await new Promise((resolve) => setTimeout(resolve, 500))
|
|
452
|
+
unwatch()
|
|
453
|
+
|
|
454
|
+
expect(events.length).toBe(2)
|
|
455
|
+
expect(events[0].args.policyId).toBe(policyId)
|
|
456
|
+
expect(events[0].args.updater).toBe(account.address)
|
|
457
|
+
expect(events[0].args.account).toBe(account2.address)
|
|
458
|
+
expect(events[0].args.restricted).toBe(true)
|
|
459
|
+
expect(events[1].args.restricted).toBe(false)
|
|
460
|
+
})
|
|
461
|
+
})
|