Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update integration tests with new consumer initiated slash behaviour #705

Merged

Conversation

MSalopek
Copy link
Contributor

@MSalopek MSalopek commented Feb 3, 2023

Description

Updates integration tests to reflect consumer initiated slashing changes.

Linked issues

Related to: #689

Type of change

If you've checked more than one of the first three boxes, consider splitting this PR into multiple PRs!

  • Feature: Changes and/or adds code behavior, irrelevant to bug fixes
  • Fix: Changes and/or adds code behavior, specifically to fix a bug
  • Refactor: Changes existing code style, naming, structure, etc.
  • Testing: Adds testing
  • Docs: Adds documentation

@sainoe sainoe merged commit be8da31 into 689-disable-slashing Feb 3, 2023
@sainoe sainoe deleted the masa/689-disable-slash-integration-test branch February 3, 2023 14:08
shaspitz added a commit that referenced this pull request Feb 6, 2023
* disable consumer initiating slashing; also jailing for double-signing on the consumers

* fix diff testing

* fix TestHandleSlashPacket

* fix relay tests

* set jailUntil again

* rm TestSlashUndelegation

* rm unused func

* change e2e test to check downtime

* comments

* split out TestRelayAndApplySlashPacket

* final fix in slashing.go

* fix TestHandleSlashPacket

* expectJailing bool

* fix throttle e2e tests

* doc diff test

* fix diff-test slashing

* upstream new traces

* update integration tests with new consumer initiated slash behaviour (#705)

* Update tests/difference/core/model/src/model.ts

* Update tests/difference/core/model/src/model.ts

* rm comment

* fix bug in diff-test model

* Fix slash acks bug (#708)

* refactor Slash processing on provider and consumer

* add unittest for slash acks correctness

* update using review comments

* fix and tests

* relay test

* smol

---------

Co-authored-by: Matija Salopek <[email protected]>
Co-authored-by: MSalopek <[email protected]>

* fix comment strings in integration tests

---------

Co-authored-by: mpoke <[email protected]>
Co-authored-by: Shawn Marshall-Spitzbart <[email protected]>
Co-authored-by: MSalopek <[email protected]>
Co-authored-by: Matija Salopek <[email protected]>
Co-authored-by: Jehan <[email protected]>
ThanhNhann pushed a commit to decentrio/interchain-security that referenced this pull request Jan 3, 2024
## Description

Wording could maybe be improved, but I think the content is good enough

closes: cosmos#705 

---

Before we can merge this PR, please make sure that all the following items have been
checked off. If any of the checklist items are not applicable, please leave them but
write a little note why.

- [ ] Targeted PR against correct branch (see [CONTRIBUTING.md](https://github.com/cosmos/ibc-go/blob/master/CONTRIBUTING.md#pr-targeting))
- [ ] Linked to Github issue with discussion and accepted design OR link to spec that describes this work.
- [ ] Code follows the [module structure standards](https://github.com/cosmos/cosmos-sdk/blob/master/docs/building-modules/structure.md).
- [ ] Wrote unit and integration [tests](https://github.com/cosmos/ibc-go/blob/master/CONTRIBUTING.md#testing)
- [ ] Updated relevant documentation (`docs/`) or specification (`x/<module>/spec/`)
- [ ] Added relevant `godoc` [comments](https://blog.golang.org/godoc-documenting-go-code).
- [ ] Added a relevant changelog entry to the `Unreleased` section in `CHANGELOG.md`
- [ ] Re-reviewed `Files changed` in the Github PR explorer
- [ ] Review `Codecov Report` in the comment section below once CI passes
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants