You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
118 lines
4.6 KiB
118 lines
4.6 KiB
const { shouldFail, constants, expectEvent } = require('openzeppelin-test-helpers');
|
|
const { ZERO_ADDRESS } = constants;
|
|
|
|
function capitalize (str) {
|
|
return str.replace(/\b\w/g, l => l.toUpperCase());
|
|
}
|
|
|
|
function shouldBehaveLikePublicRole (authorized, otherAuthorized, [anyone], rolename, manager) {
|
|
rolename = capitalize(rolename);
|
|
|
|
describe('should behave like public role', function () {
|
|
beforeEach('check preconditions', async function () {
|
|
(await this.contract[`is${rolename}`](authorized)).should.equal(true);
|
|
(await this.contract[`is${rolename}`](otherAuthorized)).should.equal(true);
|
|
(await this.contract[`is${rolename}`](anyone)).should.equal(false);
|
|
});
|
|
|
|
if (manager === undefined) { // Managed roles are only assigned by the manager, and none are set at construction
|
|
it('emits events during construction', async function () {
|
|
await expectEvent.inConstruction(this.contract, `${rolename}Added`, {
|
|
account: authorized,
|
|
});
|
|
});
|
|
}
|
|
|
|
it('reverts when querying roles for the null account', async function () {
|
|
await shouldFail.reverting(this.contract[`is${rolename}`](ZERO_ADDRESS));
|
|
});
|
|
|
|
describe('access control', function () {
|
|
context('from authorized account', function () {
|
|
const from = authorized;
|
|
|
|
it('allows access', async function () {
|
|
await this.contract[`only${rolename}Mock`]({ from });
|
|
});
|
|
});
|
|
|
|
context('from unauthorized account', function () {
|
|
const from = anyone;
|
|
|
|
it('reverts', async function () {
|
|
await shouldFail.reverting(this.contract[`only${rolename}Mock`]({ from }));
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('add', function () {
|
|
const from = manager === undefined ? authorized : manager;
|
|
|
|
context(`from ${manager ? 'the manager' : 'a role-haver'} account`, function () {
|
|
it('adds role to a new account', async function () {
|
|
await this.contract[`add${rolename}`](anyone, { from });
|
|
(await this.contract[`is${rolename}`](anyone)).should.equal(true);
|
|
});
|
|
|
|
it(`emits a ${rolename}Added event`, async function () {
|
|
const { logs } = await this.contract[`add${rolename}`](anyone, { from });
|
|
expectEvent.inLogs(logs, `${rolename}Added`, { account: anyone });
|
|
});
|
|
|
|
it('reverts when adding role to an already assigned account', async function () {
|
|
await shouldFail.reverting(this.contract[`add${rolename}`](authorized, { from }));
|
|
});
|
|
|
|
it('reverts when adding role to the null account', async function () {
|
|
await shouldFail.reverting(this.contract[`add${rolename}`](ZERO_ADDRESS, { from }));
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('remove', function () {
|
|
// Non-managed roles have no restrictions on the mocked '_remove' function (exposed via 'remove').
|
|
const from = manager || anyone;
|
|
|
|
context(`from ${manager ? 'the manager' : 'any'} account`, function () {
|
|
it('removes role from an already assigned account', async function () {
|
|
await this.contract[`remove${rolename}`](authorized, { from });
|
|
(await this.contract[`is${rolename}`](authorized)).should.equal(false);
|
|
(await this.contract[`is${rolename}`](otherAuthorized)).should.equal(true);
|
|
});
|
|
|
|
it(`emits a ${rolename}Removed event`, async function () {
|
|
const { logs } = await this.contract[`remove${rolename}`](authorized, { from });
|
|
expectEvent.inLogs(logs, `${rolename}Removed`, { account: authorized });
|
|
});
|
|
|
|
it('reverts when removing from an unassigned account', async function () {
|
|
await shouldFail.reverting(this.contract[`remove${rolename}`](anyone), { from });
|
|
});
|
|
|
|
it('reverts when removing role from the null account', async function () {
|
|
await shouldFail.reverting(this.contract[`remove${rolename}`](ZERO_ADDRESS), { from });
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('renouncing roles', function () {
|
|
it('renounces an assigned role', async function () {
|
|
await this.contract[`renounce${rolename}`]({ from: authorized });
|
|
(await this.contract[`is${rolename}`](authorized)).should.equal(false);
|
|
});
|
|
|
|
it(`emits a ${rolename}Removed event`, async function () {
|
|
const { logs } = await this.contract[`renounce${rolename}`]({ from: authorized });
|
|
expectEvent.inLogs(logs, `${rolename}Removed`, { account: authorized });
|
|
});
|
|
|
|
it('reverts when renouncing unassigned role', async function () {
|
|
await shouldFail.reverting(this.contract[`renounce${rolename}`]({ from: anyone }));
|
|
});
|
|
});
|
|
});
|
|
}
|
|
|
|
module.exports = {
|
|
shouldBehaveLikePublicRole,
|
|
};
|
|
|