Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(feetiers): Reject malformed address in query #2653

Merged
merged 4 commits into from
Dec 13, 2024

Conversation

teddyding
Copy link
Contributor

@teddyding teddyding commented Dec 12, 2024

Changelist

https://dydx-team.slack.com/archives/C03FVKBHD5H/p1732319479334399

Test Plan

Unit test

Author/Reviewer Checklist

  • If this PR has changes that result in a different app state given the same prior state and transaction list, manually add the state-breaking label.
  • If the PR has breaking postgres changes to the indexer add the indexer-postgres-breaking label.
  • If this PR isn't state-breaking but has changes that modify behavior in PrepareProposal or ProcessProposal, manually add the label proposal-breaking.
  • If this PR is one of many that implement a specific feature, manually label them all feature:[feature-name].
  • If you wish to for mergify-bot to automatically create a PR to backport your change to a release branch, manually add the label backport/[branch-name].
  • Manually add any of the following labels: refactor, chore, bug.

Summary by CodeRabbit

  • New Features

    • Enhanced user address validation in the fee tier request process.
  • Bug Fixes

    • Improved error handling for invalid user addresses.
  • Tests

    • Updated test cases to include validation for valid and malformed user addresses.

@teddyding teddyding marked this pull request as ready for review December 12, 2024 21:11
@teddyding teddyding requested a review from a team as a code owner December 12, 2024 21:11
Copy link
Contributor

coderabbitai bot commented Dec 12, 2024

Walkthrough

The changes in this pull request enhance the UserFeeTier method in the Keeper struct by introducing an additional validation step for the user address, ensuring it is a valid Bech32 address. If the address is invalid, the method returns an error with the status code InvalidArgument. Corresponding updates were made to the test cases in grpc_query_test.go, including a new test for handling malformed addresses.

Changes

File Change Summary
protocol/x/feetiers/keeper/grpc_query.go Added import for sdk, updated UserFeeTier method to include Bech32 address validation.
protocol/x/feetiers/keeper/grpc_query_test.go Modified TestUserFeeTier to use a valid Bech32 address and added a test case for malformed addresses.
protocol/x/feetiers/client/cli/query_test.go Updated TestQueryUserFeeTier to use a valid Bech32 address instead of a placeholder name.

Possibly related PRs

Suggested reviewers

  • shrenujb

Poem

In the land of code where rabbits play,
A new check for addresses brightens the day.
With Bech32 in hand, we hop with glee,
Validating users, as happy as can be!
Errors now caught, no more to stray,
In our code garden, we’ll frolic and sway! 🐇✨


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between b0be3ad and 91d04b6.

📒 Files selected for processing (1)
  • protocol/x/feetiers/client/cli/query_test.go (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • protocol/x/feetiers/client/cli/query_test.go

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR. (Experiment)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

User: "alice",
},
res: nil,
err: status.Error(codes.InvalidArgument, "user address is valid bech32 address"),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't the error message be saying the address is invalid?

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Outside diff range and nitpick comments (1)
protocol/x/feetiers/keeper/grpc_query_test.go (1)

61-61: Consider using test constants for the Bech32 address

The hardcoded Bech32 address might be environment-specific. Consider moving it to a test constants file or using a helper function to generate valid test addresses.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 196dc84 and ad4c75f.

📒 Files selected for processing (2)
  • protocol/x/feetiers/keeper/grpc_query.go (2 hunks)
  • protocol/x/feetiers/keeper/grpc_query_test.go (2 hunks)
🔇 Additional comments (1)
protocol/x/feetiers/keeper/grpc_query.go (1)

6-7: LGTM: Required import for Bech32 address validation

The addition of the cosmos-sdk types package is necessary for implementing the address validation feature.

Comment on lines 47 to 50

if _, err := sdk.AccAddressFromBech32(req.User); err != nil {
return nil, status.Error(codes.InvalidArgument, "user address is valid bech32 address")
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Fix grammatical error in error message

The error message has incorrect grammar which could confuse users.

Apply this fix:

-		return nil, status.Error(codes.InvalidArgument, "user address is valid bech32 address")
+		return nil, status.Error(codes.InvalidArgument, "user address is not a valid bech32 address")
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
if _, err := sdk.AccAddressFromBech32(req.User); err != nil {
return nil, status.Error(codes.InvalidArgument, "user address is valid bech32 address")
}
if _, err := sdk.AccAddressFromBech32(req.User); err != nil {
return nil, status.Error(codes.InvalidArgument, "user address is not a valid bech32 address")
}

Comment on lines 81 to 87
"Malformed address": {
req: &types.QueryUserFeeTierRequest{
User: "alice",
},
res: nil,
err: status.Error(codes.InvalidArgument, "user address is valid bech32 address"),
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Update error message to match implementation fix

Once the error message is fixed in the implementation, update this test case to match the new message.

Apply this fix after updating the implementation:

-			err: status.Error(codes.InvalidArgument, "user address is valid bech32 address"),
+			err: status.Error(codes.InvalidArgument, "user address is not a valid bech32 address"),
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
"Malformed address": {
req: &types.QueryUserFeeTierRequest{
User: "alice",
},
res: nil,
err: status.Error(codes.InvalidArgument, "user address is valid bech32 address"),
},
"Malformed address": {
req: &types.QueryUserFeeTierRequest{
User: "alice",
},
res: nil,
err: status.Error(codes.InvalidArgument, "user address is not a valid bech32 address"),
},

Copy link
Contributor

mergify bot commented Dec 12, 2024

backport release/protcool/v8.x

❌ No backport have been created

  • Backport to branch release/protcool/v8.x failed

GitHub error: Branch not found

@teddyding
Copy link
Contributor Author

@Mergifyio backport release/protocol/v8.x

Copy link
Contributor

mergify bot commented Dec 12, 2024

backport release/protocol/v8.x

✅ Backports have been created

@teddyding
Copy link
Contributor Author

@Mergifyio backport release/protocol/v7.x

Copy link
Contributor

mergify bot commented Dec 12, 2024

backport release/protocol/v7.x

✅ Backports have been created

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (1)
protocol/x/feetiers/client/cli/query_test.go (1)

Line range hint 59-64: Enhance test coverage for the address validation feature.

While the test verifies that the command executes successfully with a valid Bech32 address, it could be improved in several ways:

  1. Add assertions to verify the response content matches expected values
  2. Add negative test cases for malformed addresses to ensure proper error handling

Consider adding the following test cases:

 func TestQueryUserFeeTier(t *testing.T) {
 	net, ctx := setupNetwork(t)
+
+	tests := []struct {
+		name          string
+		address       string
+		expectedError string
+	}{
+		{
+			name:    "valid bech32 address",
+			address: "dydx199tqg4wdlnu4qjlxchpd7seg454937hjrknju4",
+		},
+		{
+			name:          "malformed address",
+			address:       "invalid-address",
+			expectedError: "invalid address",
+		},
+		{
+			name:          "empty address",
+			address:       "",
+			expectedError: "invalid address",
+		},
+	}
+
+	for _, tc := range tests {
+		t.Run(tc.name, func(t *testing.T) {
+			out, err := clitestutil.ExecTestCLICmd(ctx, cli.CmdQueryUserFeeTier(), []string{tc.address})
+			if tc.expectedError != "" {
+				require.Error(t, err)
+				require.Contains(t, err.Error(), tc.expectedError)
+				return
+			}
+			require.NoError(t, err)
+			var resp types.QueryUserFeeTierResponse
+			require.NoError(t, net.Config.Codec.UnmarshalJSON(out.Bytes(), &resp))
+			// TODO: Add assertions for expected response values
+		})
+	}
-
-	out, err := clitestutil.ExecTestCLICmd(ctx, cli.CmdQueryUserFeeTier(), []string{"dydx199tqg4wdlnu4qjlxchpd7seg454937hjrknju4"})
-
-	require.NoError(t, err)
-	var resp types.QueryUserFeeTierResponse
-	require.NoError(t, net.Config.Codec.UnmarshalJSON(out.Bytes(), &resp))
 }
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between c358d5a and b0be3ad.

📒 Files selected for processing (1)
  • protocol/x/feetiers/client/cli/query_test.go (1 hunks)

@teddyding teddyding merged commit d8a1d79 into main Dec 13, 2024
21 checks passed
@teddyding teddyding deleted the td/malformed-user-fee-tier-query branch December 13, 2024 01:33
mergify bot pushed a commit that referenced this pull request Dec 13, 2024
mergify bot pushed a commit that referenced this pull request Dec 13, 2024
teddyding added a commit that referenced this pull request Dec 13, 2024
teddyding added a commit that referenced this pull request Dec 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

Successfully merging this pull request may close these issues.

2 participants