-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: transaction with CONTRACT_NEGATIVE_VALUE
breaks some routes
#3387
base: main
Are you sure you want to change the base?
feat: transaction with CONTRACT_NEGATIVE_VALUE
breaks some routes
#3387
Conversation
Signed-off-by: nikolay <[email protected]>
Test Results 21 files - 1 275 suites +4 55m 49s ⏱️ - 9m 54s For more details on these failures, see this check. Results for commit 94e77f6. ± Comparison against base commit 373f1dc. This pull request removes 3 and adds 8 tests. Note that renamed tests count towards both.
♻️ This comment has been updated with latest results. |
Signed-off-by: nikolay <[email protected]>
Signed-off-by: nikolay <[email protected]>
Signed-off-by: nikolay <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great work overall. Blocking as one warning needed to be addressed.
Also, is it feasible to add an e2e test to avoid regression?
Signed-off-by: nikolay <[email protected]>
Adding an e2e test is not a straightforward process because that kind of revert can't be reproduced with an I have no problem adding that test if you insist 🚀 🙏. |
Ah I see. Just curious how would you reproduice the problem? |
Signed-off-by: nikolay <[email protected]>
Sending a negative amount via ContractCallTransaction will be enough while it accepts int64 (not uint64). Here is the link to the doc https://docs.hedera.com/hedera/sdks-and-apis/hedera-api/readme-1-1/contractcall#contractcalltransactionbody. |
Ah I see. So if it's feasible and do not take crazy amount of time, I would encourage we have an e2e just to make sure no regression later. Thanks much Nikki! |
Signed-off-by: nikolay <[email protected]>
At the least we could mock the CN response that would cause this and have an integration test that ensures the relay responds as expected. |
Signed-off-by: nikolay <[email protected]>
Signed-off-by: nikolay <[email protected]>
Signed-off-by: nikolay <[email protected]>
Quality Gate failedFailed conditions |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #3387 +/- ##
==========================================
+ Coverage 84.18% 85.54% +1.36%
==========================================
Files 69 69
Lines 4711 4726 +15
Branches 1048 1051 +3
==========================================
+ Hits 3966 4043 +77
+ Misses 428 393 -35
+ Partials 317 290 -27
Flags with carried forward coverage won't be shown. Click here to find out more.
|
Description:
It seems like
eth_getBlockByNumber
fails because one of the transactions in the block was a CONTRACT_NEGATIVE_VALUE failure. The expectation is for the block to be successfully returned.Steps to reproduce:
eth_getBlockByNumber
on block 73298898The problematic transaction is here
Related issue(s):
Fixes #3367
Notes for reviewer:
Checklist