165 lines
5.7 KiB
JavaScript
165 lines
5.7 KiB
JavaScript
const namehash = require('eth-ens-namehash').hash;
|
|
|
|
// eslint-disable-next-line no-undef
|
|
const Proposal = artifacts.require("Proposal.sol");
|
|
const { Contributor, getContributorContract } = require("../../contributor/artifacts");
|
|
const { Contribution, getContributionContract } = require("../../contribution/artifacts");
|
|
|
|
// eslint-disable-next-line no-undef
|
|
const getContract = name => artifacts.require(name);
|
|
// eslint-disable-next-line no-unused-vars
|
|
const { assertRevert } = require('@aragon/test-helpers/assertThrow');
|
|
|
|
const ZERO_ADDR = '0x0000000000000000000000000000000000000000';
|
|
|
|
contract('Proposal app', (accounts) => {
|
|
let kernelBase, aclBase, daoFactory, dao, r, acl, proposal, contribution, contributor;
|
|
|
|
const root = accounts[0];
|
|
|
|
// eslint-disable-next-line no-undef
|
|
before(async () => {
|
|
kernelBase = await getContract('Kernel').new(true); // petrify immediately
|
|
aclBase = await getContract('ACL').new();
|
|
daoFactory = await getContract('DAOFactory').new(kernelBase.address, aclBase.address, ZERO_ADDR);
|
|
r = await daoFactory.newDAO(root);
|
|
dao = getContract('Kernel').at(r.logs.filter(l => l.event == 'DeployDAO')[0].args.dao);
|
|
acl = getContract('ACL').at(await dao.acl());
|
|
|
|
//create dao mamnager permission for coin owner
|
|
await acl.createPermission(
|
|
root,
|
|
dao.address,
|
|
await dao.APP_MANAGER_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
|
|
//apps id
|
|
let appsId = [];
|
|
appsId[0] = namehash("kredits-contribution");
|
|
appsId[1] = namehash("kredits-contributor");
|
|
appsId[2] = namehash("kredits-proposal");
|
|
appsId[3] = namehash("kredits-token");
|
|
|
|
|
|
//get new app instance from DAO
|
|
let receipt = await dao.newAppInstance(
|
|
appsId[2],
|
|
(await Proposal.new()).address,
|
|
0x0,
|
|
false,
|
|
{ from: root }
|
|
);
|
|
proposal = Proposal.at(
|
|
receipt.logs.filter(l => l.event == 'NewAppProxy')[0].args.proxy
|
|
);
|
|
|
|
receipt = await dao.newAppInstance(
|
|
appsId[1],
|
|
(await getContributorContract('Contributor').new()).address,
|
|
0x0,
|
|
false,
|
|
{ from: root }
|
|
);
|
|
contributor = Contributor.at(
|
|
receipt.logs.filter(l => l.event == 'NewAppProxy')[0].args.proxy
|
|
);
|
|
|
|
receipt = await dao.newAppInstance(
|
|
appsId[0],
|
|
(await getContributionContract('Contribution').new()).address,
|
|
0x0,
|
|
false,
|
|
{ from: root }
|
|
);
|
|
contribution = Contribution.at(
|
|
receipt.logs.filter(l => l.event == 'NewAppProxy')[0].args.proxy
|
|
);
|
|
|
|
//init app
|
|
await proposal.initialize(appsId);
|
|
|
|
await acl.createPermission(
|
|
root,
|
|
proposal.address,
|
|
await proposal.ADD_PROPOSAL_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
|
|
await acl.createPermission(
|
|
root,
|
|
proposal.address,
|
|
await proposal.VOTE_PROPOSAL_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
|
|
//init contribution (app)
|
|
await contribution.initialize(appsId);
|
|
|
|
await acl.createPermission(
|
|
root,
|
|
contribution.address,
|
|
await contribution.ADD_CONTRIBUTION_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
|
|
await acl.createPermission(
|
|
root,
|
|
contribution.address,
|
|
await contribution.VETO_CONTRIBUTION_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
|
|
//acl.grantPermission(proposal, contribution, await contribution.ADD_CONTRIBUTION_ROLE(), {from: root});
|
|
|
|
//init contributor app
|
|
await contributor.initialize(appsId);
|
|
|
|
await acl.createPermission(
|
|
root,
|
|
contributor.address,
|
|
await contributor.MANAGE_CONTRIBUTORS_ROLE(),
|
|
root,
|
|
{ from: root }
|
|
);
|
|
});
|
|
|
|
describe("Owner default permissions", async () => {
|
|
it('check owner can add proposal', async () => {
|
|
let addProposalPermission = await acl.hasPermission(root, proposal.address, await proposal.ADD_PROPOSAL_ROLE());
|
|
// eslint-disable-next-line no-undef
|
|
assert.equal(addProposalPermission, true);
|
|
});
|
|
|
|
it('check owner can veto contribution', async () => {
|
|
let vetoProposalPermission = await acl.hasPermission(root, proposal.address, await proposal.VOTE_PROPOSAL_ROLE());
|
|
// eslint-disable-next-line no-undef
|
|
assert.equal(vetoProposalPermission, true);
|
|
});
|
|
|
|
it('check owner can add contribution', async () => {
|
|
let addContributionPermission = await acl.hasPermission(root, contribution.address, await contribution.ADD_CONTRIBUTION_ROLE());
|
|
// eslint-disable-next-line no-undef
|
|
assert.equal(addContributionPermission, true);
|
|
});
|
|
|
|
it('check owner can veto contribution', async () => {
|
|
let vetoContributionPermission = await acl.hasPermission(root, contribution.address, await contribution.VETO_CONTRIBUTION_ROLE());
|
|
// eslint-disable-next-line no-undef
|
|
assert.equal(vetoContributionPermission, true);
|
|
});
|
|
|
|
it('check owner can manage contributors', async () => {
|
|
let manageContributorsPermission = await acl.hasPermission(root, contributor.address, await contribution.MANAGE_CONTRIBUTORS_ROLE());
|
|
// eslint-disable-next-line no-undef
|
|
assert.equal(manageContributorsPermission, true);
|
|
});
|
|
});
|
|
|
|
});
|