Skip to content

Commit da485d4

Browse files
committed
Upgrade crust and GolangCI v2 support
1 parent 5229bda commit da485d4

File tree

7 files changed

+20
-20
lines changed

7 files changed

+20
-20
lines changed

integration-tests/contract/sending_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2942,7 +2942,7 @@ func TestFeeCalculations_MultipleAssetsAndPartialClaim(t *testing.T) {
29422942
for _, asset := range assets {
29432943
if asset.registeredToken.CoreumDenom == fee.Denom {
29442944
found = true
2945-
assert.EqualValues(t, fee.Amount.String(), asset.bridgingFee.Quo(sdkmath.NewInt(int64(len(relayers)))).String())
2945+
assert.Equal(t, fee.Amount.String(), asset.bridgingFee.Quo(sdkmath.NewInt(int64(len(relayers)))).String())
29462946
break
29472947
}
29482948
}
@@ -2972,7 +2972,7 @@ func TestFeeCalculations_MultipleAssetsAndPartialClaim(t *testing.T) {
29722972
remainderFees := initialFees.Sub(oneThirdOfFees...)
29732973
fees, err := contractClient.GetFeesCollected(ctx, relayer.CoreumAddress)
29742974
require.NoError(t, err)
2975-
require.EqualValues(t, remainderFees.String(), fees.String())
2975+
require.Equal(t, remainderFees.String(), fees.String())
29762976

29772977
// claim remainder of fees
29782978
_, err = contractClient.ClaimRelayerFees(ctx, relayer.CoreumAddress, remainderFees)
@@ -3399,7 +3399,7 @@ func claimFeesAndMakeAssertions(
33993399
require.NoError(t, err)
34003400
balanceChange := relayerBalanceAfterClaim.Balance.
34013401
Sub(*relayerBalanceBeforeClaim.Balance)
3402-
require.EqualValues(t, expectedFeeAmount.String(), balanceChange.Amount.String())
3402+
require.Equal(t, expectedFeeAmount.String(), balanceChange.Amount.String())
34033403

34043404
// assert fees are now collected
34053405
fees, err = contractClient.GetFeesCollected(ctx, relayer.CoreumAddress)
@@ -3408,7 +3408,7 @@ func claimFeesAndMakeAssertions(
34083408
require.Empty(t, fees, 0)
34093409
} else {
34103410
expectedRemainder := remainderAmount.QuoRaw(int64(len(relayers)))
3411-
require.EqualValues(t, fees[0].Amount.String(), expectedRemainder.String())
3411+
require.Equal(t, fees[0].Amount.String(), expectedRemainder.String())
34123412
}
34133413
}
34143414
}

integration-tests/contract/token_registry_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -851,7 +851,7 @@ func TestEnableAndDisableXRPLOriginatedToken(t *testing.T) {
851851
pendingRefunds, err := contractClient.GetPendingRefunds(ctx, coreumRecipient)
852852
require.NoError(t, err)
853853
require.Len(t, pendingRefunds, 1)
854-
require.EqualValues(t, pendingRefunds[0].Coin.String(), coinToSendBack.String())
854+
require.Equal(t, pendingRefunds[0].Coin.String(), coinToSendBack.String())
855855
_, err = contractClient.ClaimRefund(ctx, coreumRecipient, pendingRefunds[0].ID)
856856
require.NoError(t, err)
857857

@@ -1075,7 +1075,7 @@ func TestEnableAndDisableCoreumOriginatedToken(t *testing.T) {
10751075
pendingRefunds, err := contractClient.GetPendingRefunds(ctx, coreumSenderAddress)
10761076
require.NoError(t, err)
10771077
require.Len(t, pendingRefunds, 1)
1078-
require.EqualValues(t, pendingRefunds[0].Coin.String(), coinToSendFromCoreumToXRPL.String())
1078+
require.Equal(t, pendingRefunds[0].Coin.String(), coinToSendFromCoreumToXRPL.String())
10791079
_, err = contractClient.ClaimRefund(ctx, coreumSenderAddress, pendingRefunds[0].ID)
10801080
require.NoError(t, err)
10811081

integration-tests/init.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ func init() {
6161
if err != nil {
6262
panic(errors.Wrapf(err, "failed to init coreum chain"))
6363
}
64-
coreumChain.Chain.ClientContext = coreumChain.Chain.ClientContext.WithCodec(coreumChain.Chain.EncodingConfig.Codec)
64+
coreumChain.ClientContext = coreumChain.ClientContext.WithCodec(coreumChain.EncodingConfig.Codec)
6565
chains.Coreum = coreumChain
6666

6767
xrplChain, err := NewXRPLChain(xrplCfg, chains.Log)

integration-tests/processes/sending_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ func TestSendXRPLOriginatedTokensFromXRPLToCoreumAndBack(t *testing.T) {
145145
require.NoError(t, err)
146146
require.Len(t, fees, 1)
147147
expectedFees := bridgingFee.MulRaw(5).QuoRaw(int64(envCfg.RelayersCount))
148-
require.EqualValues(t, expectedFees.String(), fees.AmountOf(registeredXRPLToken.CoreumDenom).String())
148+
require.Equal(t, expectedFees.String(), fees.AmountOf(registeredXRPLToken.CoreumDenom).String())
149149
}
150150
}
151151

integration-tests/processes/tickets_allocation_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ func TestTicketsReAllocationByTheXRPLTokenRegistration(t *testing.T) {
227227
require.NoError(t, err)
228228
require.Len(t, availableTicketsAfterReallocation, int(envCfg.UsedTicketSequenceThreshold))
229229
// check that tickets are used
230-
require.NotEqualValues(t, initialAvailableTickets, availableTicketsAfterReallocation)
230+
require.NotEqual(t, initialAvailableTickets, availableTicketsAfterReallocation)
231231

232232
// use re-allocated tickets
233233
for range numberOfXRPLTokensToRegister {
@@ -245,8 +245,8 @@ func TestTicketsReAllocationByTheXRPLTokenRegistration(t *testing.T) {
245245
runnerEnv.AwaitNoPendingOperations(ctx, t)
246246
availableTicketsAfterSecondReallocation, err := runnerEnv.ContractClient.GetAvailableTickets(ctx)
247247
require.NoError(t, err)
248-
require.NotEqualValues(t, initialAvailableTickets, availableTicketsAfterSecondReallocation)
249-
require.NotEqualValues(t, availableTicketsAfterReallocation, availableTicketsAfterSecondReallocation)
248+
require.NotEqual(t, initialAvailableTickets, availableTicketsAfterSecondReallocation)
249+
require.NotEqual(t, availableTicketsAfterReallocation, availableTicketsAfterSecondReallocation)
250250
}
251251

252252
func TestSendXRPLOriginatedTokenFromXRPLToCoreumWithTicketsReallocation(t *testing.T) {

integration-tests/stress/env_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ func NewEnv(t *testing.T, cfg EnvConfig) *Env {
7878
)
7979

8080
// import contract owner mnemonic
81-
contractOwner := chains.Coreum.ChainContext.ImportMnemonic(bridgeCfg.OwnerMnemonic)
81+
contractOwner := chains.Coreum.ImportMnemonic(bridgeCfg.OwnerMnemonic)
8282

8383
return &Env{
8484
Cfg: cfg,

integration-tests/xrpl/rpc_test.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ func TestCreateAndUseTicketForPaymentAndTicketsCreation(t *testing.T) {
250250
}
251251
chains.XRPL.AutoFillTx(ctx, t, &createTicketsTx, senderAcc)
252252
// reset sequence and add ticket
253-
createTicketsTx.TxBase.Sequence = 0
253+
createTicketsTx.Sequence = 0
254254
createTicketsTx.TicketSequence = createdTickets[0].TicketSequence
255255
require.NoError(t, chains.XRPL.SignAndSubmitTx(ctx, t, &createTicketsTx, senderAcc))
256256

@@ -272,7 +272,7 @@ func TestCreateAndUseTicketForPaymentAndTicketsCreation(t *testing.T) {
272272
}
273273
chains.XRPL.AutoFillTx(ctx, t, &xrpPaymentTx, senderAcc)
274274
// reset sequence and add ticket
275-
xrpPaymentTx.TxBase.Sequence = 0
275+
xrpPaymentTx.Sequence = 0
276276
xrpPaymentTx.TicketSequence = createdTickets[0].TicketSequence
277277

278278
t.Logf("Recipient account balance before: %s", chains.XRPL.GetAccountBalances(ctx, t, recipientAcc))
@@ -300,7 +300,7 @@ func TestCreateAndUseTicketForPaymentAndTicketsCreation(t *testing.T) {
300300
}
301301
chains.XRPL.AutoFillTx(ctx, t, &fooPaymentTx, senderAcc)
302302
// reset sequence and add ticket
303-
fooPaymentTx.TxBase.Sequence = 0
303+
fooPaymentTx.Sequence = 0
304304
fooPaymentTx.TicketSequence = ticketForFailingTx
305305
// there is no trust set so the tx should fail and use the ticket
306306
require.ErrorContains(
@@ -319,7 +319,7 @@ func TestCreateAndUseTicketForPaymentAndTicketsCreation(t *testing.T) {
319319
}
320320
chains.XRPL.AutoFillTx(ctx, t, &xrpPaymentTx, senderAcc)
321321
// reset sequence and add ticket
322-
xrpPaymentTx.TxBase.Sequence = 0
322+
xrpPaymentTx.Sequence = 0
323323
xrpPaymentTx.TicketSequence = ticketForFailingTx
324324
// the ticket is used in prev failed transaction so can't be used here
325325
require.ErrorContains(t, chains.XRPL.SignAndSubmitTx(ctx, t, &fooPaymentTx, senderAcc), "Ticket is not in ledger")
@@ -1031,7 +1031,7 @@ func TestXRPLClawback(t *testing.T) {
10311031
require.NoError(t, chains.XRPL.AutoFillSignAndSubmitTx(ctx, t, &clawbackTx, issuerClawbackAcc))
10321032
balancesAfter = chains.XRPL.GetAccountBalances(ctx, t, recipientAcc)
10331033
t.Logf("Recipient account balances after: %s", balancesAfter)
1034-
require.True(t, balancesAfter[currencyIssuerClawbackKey].Value.IsZero())
1034+
require.True(t, balancesAfter[currencyIssuerClawbackKey].IsZero())
10351035

10361036
// try to do the clawback after the issuance
10371037
fooNoClawbackCurrencyTrustSetTx := rippledata.TrustSet{
@@ -1116,7 +1116,7 @@ func buildXrpPaymentTxForMultiSigning(
11161116
}
11171117
xrplChain.AutoFillTx(ctx, t, &tx, from)
11181118
// important for the multi-signing
1119-
tx.TxBase.SigningPubKey = &rippledata.PublicKey{}
1119+
tx.SigningPubKey = &rippledata.PublicKey{}
11201120

11211121
return tx
11221122
}
@@ -1148,7 +1148,7 @@ func buildCreateTicketsTxForMultiSigning(
11481148
tx.TicketSequence = ticketSeq
11491149
}
11501150
// important for the multi-signing
1151-
tx.TxBase.SigningPubKey = &rippledata.PublicKey{}
1151+
tx.SigningPubKey = &rippledata.PublicKey{}
11521152

11531153
return tx
11541154
}
@@ -1179,7 +1179,7 @@ func buildUpdateSignerListSetTxForMultiSigning(
11791179
}
11801180
xrplChain.AutoFillTx(ctx, t, &tx, from)
11811181
// important for the multi-signing
1182-
tx.TxBase.SigningPubKey = &rippledata.PublicKey{}
1182+
tx.SigningPubKey = &rippledata.PublicKey{}
11831183

11841184
if ticketSeq != nil {
11851185
tx.Sequence = 0

0 commit comments

Comments
 (0)