Skip to content

Commit

Permalink
fix addressCodec nil error
Browse files Browse the repository at this point in the history
  • Loading branch information
slandymani committed Aug 6, 2024
1 parent 0e969f0 commit b5eb155
Show file tree
Hide file tree
Showing 5 changed files with 47 additions and 33 deletions.
16 changes: 8 additions & 8 deletions x/oracle/handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,28 +18,28 @@ func NewHandler(k keeper.Keeper) Handler {
ctx = ctx.WithEventManager(sdk.NewEventManager())
switch msg := msg.(type) {
case *types.MsgRequestData:
res, err := msgServer.RequestData(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.RequestData(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgReportData:
res, err := msgServer.ReportData(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.ReportData(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgCreateDataSource:
res, err := msgServer.CreateDataSource(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.CreateDataSource(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgEditDataSource:
res, err := msgServer.EditDataSource(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.EditDataSource(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgCreateOracleScript:
res, err := msgServer.CreateOracleScript(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.CreateOracleScript(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgEditOracleScript:
res, err := msgServer.EditOracleScript(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.EditOracleScript(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgActivate:
res, err := msgServer.Activate(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.Activate(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
case *types.MsgUpdateParams:
res, err := msgServer.UpdateParams(sdk.WrapSDKContext(ctx), msg)
res, err := msgServer.UpdateParams(ctx, msg)
return sdk.WrapServiceResult(ctx, res, err)
default:
return nil, errors.Wrapf(sdkerrors.ErrUnknownRequest, "unrecognized %s message type: %T", types.ModuleName, msg)
Expand Down
2 changes: 1 addition & 1 deletion x/oracle/keeper/grpc_query.go
Original file line number Diff line number Diff line change
Expand Up @@ -312,7 +312,7 @@ func (k Querier) IsReporter(
if err != nil {
return nil, err
}
rep, err := k.validatorAddressCodec.StringToBytes(req.ReporterAddress)
rep, err := k.addressCodec.StringToBytes(req.ReporterAddress)
if err != nil {
return nil, err
}
Expand Down
55 changes: 34 additions & 21 deletions x/oracle/keeper/grpc_query_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ func (suite *RequestVerificationTestSuite) TestSuccess() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

expectedResult := &types.QueryRequestVerificationResponse{
ChainId: suite.ctx.ChainID(),
Expand Down Expand Up @@ -128,8 +128,9 @@ func (suite *RequestVerificationTestSuite) TestFailedRequestIDNotExist() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "unable to get request from chain", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -156,7 +157,7 @@ func (suite *RequestVerificationTestSuite) TestRequestInDelayRange() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

expectedResult := &types.QueryRequestVerificationResponse{
ChainId: suite.ctx.ChainID(),
Expand Down Expand Up @@ -192,8 +193,9 @@ func (suite *RequestVerificationTestSuite) TestFailedExceedDelayRange() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "unable to get request from chain", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -219,8 +221,9 @@ func (suite *RequestVerificationTestSuite) TestFailedDataSourceIDNotMatch() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(
err.Error(),
"is not match with data source id provided in request",
Expand All @@ -230,8 +233,9 @@ func (suite *RequestVerificationTestSuite) TestFailedDataSourceIDNotMatch() {
}

func (suite *RequestVerificationTestSuite) TestFailedEmptyRequest() {
res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), nil)
res, err := suite.querier.RequestVerification(suite.ctx, nil)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "empty request", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -257,8 +261,9 @@ func (suite *RequestVerificationTestSuite) TestFailedChainIDNotMatch() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(
err.Error(),
"provided chain ID does not match the validator's chain ID",
Expand Down Expand Up @@ -288,8 +293,9 @@ func (suite *RequestVerificationTestSuite) TestFailedInvalidValidatorAddr() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "unable to parse validator address", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -315,8 +321,9 @@ func (suite *RequestVerificationTestSuite) TestFailedInvalidReporterPubKey() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "unable to get reporter's public key", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -330,8 +337,9 @@ func (suite *RequestVerificationTestSuite) TestFailedEmptySignature() {
Reporter: hex.EncodeToString(suite.reporterPrivKey.PubKey().Bytes()),
}

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "invalid reporter's signature", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand Down Expand Up @@ -360,8 +368,9 @@ func (suite *RequestVerificationTestSuite) TestFailedReporterUnauthorized() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "is not an authorized reporter of", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand Down Expand Up @@ -391,8 +400,9 @@ func (suite *RequestVerificationTestSuite) TestFailedUnselectedValidator() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "is not assigned for request ID", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand Down Expand Up @@ -422,8 +432,9 @@ func (suite *RequestVerificationTestSuite) TestFailedNoDataSourceFound() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "no data source required by the request", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand Down Expand Up @@ -460,8 +471,9 @@ func (suite *RequestVerificationTestSuite) TestFailedValidatorAlreadyReported()
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "already submitted data report", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand Down Expand Up @@ -489,8 +501,9 @@ func (suite *RequestVerificationTestSuite) TestFailedRequestAlreadyExpired() {
suite.assert.NoError(err)
req.Signature = signature

res, err := suite.querier.RequestVerification(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.RequestVerification(suite.ctx, req)

suite.assert.Error(err)
suite.assert.Contains(err.Error(), "Request with ID 1 is already expired", "RequestVerification should failed")
suite.assert.Nil(res, "response should be nil")
}
Expand All @@ -499,7 +512,7 @@ func (suite *RequestVerificationTestSuite) TestGetReporters() {
req := &types.QueryReportersRequest{
ValidatorAddress: testapp.Validators[0].ValAddress.String(),
}
res, err := suite.querier.Reporters(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.Reporters(suite.ctx, req)

expectedResult := &types.QueryReportersResponse{
Reporter: []string{suite.reporterAddr.String()},
Expand All @@ -513,7 +526,7 @@ func (suite *RequestVerificationTestSuite) TestGetExpiredReporters() {
req := &types.QueryReportersRequest{
ValidatorAddress: testapp.Validators[0].ValAddress.String(),
}
res, err := suite.querier.Reporters(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.Reporters(suite.ctx, req)

expectedResult := &types.QueryReportersResponse{
Reporter: []string{},
Expand All @@ -527,7 +540,7 @@ func (suite *RequestVerificationTestSuite) TestIsReporter() {
ValidatorAddress: testapp.Validators[0].ValAddress.String(),
ReporterAddress: suite.reporterAddr.String(),
}
res, err := suite.querier.IsReporter(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.IsReporter(suite.ctx, req)

expectedResult := &types.QueryIsReporterResponse{
IsReporter: true,
Expand All @@ -541,7 +554,7 @@ func (suite *RequestVerificationTestSuite) TestIsNotReporter() {
ValidatorAddress: testapp.Validators[0].ValAddress.String(),
ReporterAddress: suite.granteeAddr.String(),
}
res, err := suite.querier.IsReporter(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.IsReporter(suite.ctx, req)

expectedResult := &types.QueryIsReporterResponse{
IsReporter: false,
Expand All @@ -556,7 +569,7 @@ func (suite *RequestVerificationTestSuite) TestRevokeReporters() {
req := &types.QueryReportersRequest{
ValidatorAddress: testapp.Validators[0].ValAddress.String(),
}
res, err := suite.querier.Reporters(sdk.WrapSDKContext(suite.ctx), req)
res, err := suite.querier.Reporters(suite.ctx, req)

expectedResult := &types.QueryReportersResponse{
Reporter: []string{},
Expand Down Expand Up @@ -701,7 +714,7 @@ func (suite *PendingRequestsTestSuite) TestSuccess() {
)
require.NoError(suite.T(), err)

r, err := suite.querier.PendingRequests(sdk.WrapSDKContext(suite.ctx), &types.QueryPendingRequestsRequest{
r, err := suite.querier.PendingRequests(suite.ctx, &types.QueryPendingRequestsRequest{
ValidatorAddress: sdk.ValAddress(testapp.Validators[0].Address).String(),
})

Expand Down
1 change: 1 addition & 0 deletions x/oracle/keeper/keeper.go
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,7 @@ func NewKeeper(
portKeeper: portKeeper,
scopedKeeper: scopeKeeper,
validatorAddressCodec: stakingKeeper.ValidatorAddressCodec(),
addressCodec: authKeeper.AddressCodec(),
authority: authority,
storeService: storeService,

Expand Down
6 changes: 3 additions & 3 deletions x/oracle/keeper/owasm_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ func TestPrepareRequestSuccessBasic(t *testing.T) {
ctx = ctx.WithGasMeter(wrappedGasMeter)

balancesRes, err := app.BankKeeper.AllBalances(
sdk.WrapSDKContext(ctx),
ctx,
authtypes.NewQueryAllBalancesRequest(testapp.FeePayer.Address, &query.PageRequest{}, false),
)
require.NoError(t, err)
Expand Down Expand Up @@ -1040,7 +1040,7 @@ func TestCollectFeeBasicSuccess(t *testing.T) {
require.NoError(t, err)

balancesRes, err := app.BankKeeper.AllBalances(
sdk.WrapSDKContext(ctx),
ctx,
authtypes.NewQueryAllBalancesRequest(testapp.FeePayer.Address, &query.PageRequest{}, false),
)
require.NoError(t, err)
Expand Down Expand Up @@ -1074,7 +1074,7 @@ func TestCollectFeeBasicSuccessWithOtherAskCount(t *testing.T) {
require.NoError(t, err)

balancesRes, err := app.BankKeeper.AllBalances(
sdk.WrapSDKContext(ctx),
ctx,
authtypes.NewQueryAllBalancesRequest(testapp.FeePayer.Address, &query.PageRequest{}, false),
)
require.NoError(t, err)
Expand Down

0 comments on commit b5eb155

Please sign in to comment.