Skip to content

feat: add warning into lz contracts readme (#1216) #2296

feat: add warning into lz contracts readme (#1216)

feat: add warning into lz contracts readme (#1216) #2296

GitHub Actions / Unit Tests results succeeded Jan 29, 2025 in 0s

All 33 tests pass, 5 skipped in 57s

38 tests   - 18   33 ✅  - 21   57s ⏱️ - 5m 30s
13 suites + 4    5 💤 + 3 
 1 files   ± 0    0 ❌ ± 0 

Results for commit 26d2a9a. ± Comparison against earlier commit c871341.

Annotations

Check notice on line 0 in .github

See this annotation in the file changed.

@github-actions github-actions / Unit Tests results

5 skipped tests found

There are 5 skipped tests, see "Raw output" for the full list of skipped tests.
Raw output
Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias
should be able to call isAssociated() to the token from an EOA when associated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when associated
should be able to call isAssociated() to the token from an EOA when dissociated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when dissociated
should be able to call isAssociated() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA
should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender ‑ @IHRC-906 Facade @CryptoAllowance  Test Suite should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender

Check notice on line 0 in .github

See this annotation in the file changed.

@github-actions github-actions / Unit Tests results

38 tests found

There are 38 tests, see "Raw output" for the full list of tests.
Raw output
Should FAIL to verify message signature and return FALSE using isAuthorized for unauthorized key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should FAIL to verify message signature and return FALSE using isAuthorized for unauthorized key
Should NOT allow a spender to spend hbar on behalf of owner without an allowance grant ‑ @HAS IHRC-906 Test Suite Should NOT allow a spender to spend hbar on behalf of owner without an allowance grant
Should NOT allow an approval on behalf of hbar owner WITHOUT its signature ‑ @HAS IHRC-906 Test Suite Should NOT allow an approval on behalf of hbar owner WITHOUT its signature
Should allow a crypto owner contract account to grant an allowance to a spender contract account to transfer allowance to a receiver on behalf of owner contract account ‑ @HAS IHRC-906 Test Suite Should allow a crypto owner contract account to grant an allowance to a spender contract account to transfer allowance to a receiver on behalf of owner contract account
Should allow an approval on behalf of hbar owner WITH its signature ‑ @HAS IHRC-906 Test Suite Should allow an approval on behalf of hbar owner WITH its signature
Should allow owner to grant an allowance to spender using IHRC906AccountFacade and spender to transfer allowance to receiver on behalf of owner ‑ @HAS IHRC-906 Test Suite Should allow owner to grant an allowance to spender using IHRC906AccountFacade and spender to transfer allowance to receiver on behalf of owner
Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias
Should execute getEvmAddressAliasPublic with NOT long zero address and get INVALID_ACOUNT_ID ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic with NOT long zero address and get INVALID_ACOUNT_ID
Should execute getEvmAddressAliasPublic with not long zero address and get INVALID_ACOUNT_ID ‑ @HAS IHRC-632 Test Suite getHederaAccountNumAlias Should execute getEvmAddressAliasPublic with not long zero address and get INVALID_ACOUNT_ID
Should execute getHederaAccountNumAlias and get the corressponded accountNumAlias ‑ @HAS IHRC-632 Test Suite getHederaAccountNumAlias Should execute getHederaAccountNumAlias and get the corressponded accountNumAlias
Should execute hbarAllowancePublic and return an event with the allowance information ‑ @HAS IHRC-906 Test Suite Should execute hbarAllowancePublic and return an event with the allowance information
Should execute hbarApprovePublic and return success response code ‑ @HAS IHRC-906 Test Suite Should execute hbarApprovePublic and return success response code
Should execute isValidAliasPublic with EVM address alias param and return TRUE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with EVM address alias param and return TRUE
Should execute isValidAliasPublic with Hedera Account Num Alias param and return TRUE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with Hedera Account Num Alias param and return TRUE
Should execute isValidAliasPublic with a non existed account param and return FALSE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with a non existed account param and return FALSE
Should verify message signature and return FALSE using isAuthorizedRawPublic for ECDSA account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return FALSE using isAuthorizedRawPublic for ECDSA account
Should verify message signature and return FALSE using isAuthorizedRawPublic for ED25519 account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return FALSE using isAuthorizedRawPublic for ED25519 account
Should verify message signature and return TRUE using isAuthorized for ECDSA key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for ECDSA key
Should verify message signature and return TRUE using isAuthorized for ED25519 key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for ED25519 key
Should verify message signature and return TRUE using isAuthorized for threshold key includes multiple ED25519 and ECDSA keys ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for threshold key includes multiple ED25519 and ECDSA keys
Should verify message signature and return TRUE using isAuthorizedRawPublic for ECDSA account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return TRUE using isAuthorizedRawPublic for ECDSA account
Should verify message signature and return TRUE using isAuthorizedRawPublic for ED25519 account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return TRUE using isAuthorizedRawPublic for ED25519 account
should be able to associate() to the token from a contract ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to associate() to the token from a contract
should be able to associate() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to associate() to the token from an EOA
should be able to call isAssociated() after token association ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated() after token association
should be able to call isAssociated() after token dissociation ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated() after token dissociation
should be able to call isAssociated() to the token from an EOA when associated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when associated
should be able to call isAssociated() to the token from an EOA when dissociated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when dissociated
should be able to call isAssociated() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA
should be able to call isAssociated() ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated()
should be able to dissociate() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to dissociate() to the token from an EOA
should be able to disssociate() to the token from a contract ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to disssociate() to the token from a contract
should be able to execute associate() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute associate() via redirectForToken
should be able to execute dissociate() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute dissociate() via redirectForToken
should be able to execute isAssociated() after association via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute isAssociated() after association via redirectForToken
should be able to execute isAssociated() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute isAssociated() via redirectForToken
should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender ‑ @IHRC-906 Facade @CryptoAllowance  Test Suite should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender
should execute hbarApprove() by an EOA to grant an hbar allowance to another EOA ‑ @IHRC-906 Facade @CryptoAllowance  Test Suite should execute hbarApprove() by an EOA to grant an hbar allowance to another EOA