feat: add warning into lz contracts readme (#1216) #2296
GitHub Actions / Unit Tests results
succeeded
Jan 29, 2025 in 0s
All 33 tests pass, 5 skipped in 57s
Annotations
Check notice on line 0 in .github
github-actions / Unit Tests results
5 skipped tests found
There are 5 skipped tests, see "Raw output" for the full list of skipped tests.
Raw output
Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias
should be able to call isAssociated() to the token from an EOA when associated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when associated
should be able to call isAssociated() to the token from an EOA when dissociated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when dissociated
should be able to call isAssociated() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA
should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender ‑ @IHRC-906 Facade @CryptoAllowance Test Suite should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender
Check notice on line 0 in .github
github-actions / Unit Tests results
38 tests found
There are 38 tests, see "Raw output" for the full list of tests.
Raw output
Should FAIL to verify message signature and return FALSE using isAuthorized for unauthorized key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should FAIL to verify message signature and return FALSE using isAuthorized for unauthorized key
Should NOT allow a spender to spend hbar on behalf of owner without an allowance grant ‑ @HAS IHRC-906 Test Suite Should NOT allow a spender to spend hbar on behalf of owner without an allowance grant
Should NOT allow an approval on behalf of hbar owner WITHOUT its signature ‑ @HAS IHRC-906 Test Suite Should NOT allow an approval on behalf of hbar owner WITHOUT its signature
Should allow a crypto owner contract account to grant an allowance to a spender contract account to transfer allowance to a receiver on behalf of owner contract account ‑ @HAS IHRC-906 Test Suite Should allow a crypto owner contract account to grant an allowance to a spender contract account to transfer allowance to a receiver on behalf of owner contract account
Should allow an approval on behalf of hbar owner WITH its signature ‑ @HAS IHRC-906 Test Suite Should allow an approval on behalf of hbar owner WITH its signature
Should allow owner to grant an allowance to spender using IHRC906AccountFacade and spender to transfer allowance to receiver on behalf of owner ‑ @HAS IHRC-906 Test Suite Should allow owner to grant an allowance to spender using IHRC906AccountFacade and spender to transfer allowance to receiver on behalf of owner
Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic and get the corressponded evmAddressAlias
Should execute getEvmAddressAliasPublic with NOT long zero address and get INVALID_ACOUNT_ID ‑ @HAS IHRC-632 Test Suite getEvmAddressAlias Should execute getEvmAddressAliasPublic with NOT long zero address and get INVALID_ACOUNT_ID
Should execute getEvmAddressAliasPublic with not long zero address and get INVALID_ACOUNT_ID ‑ @HAS IHRC-632 Test Suite getHederaAccountNumAlias Should execute getEvmAddressAliasPublic with not long zero address and get INVALID_ACOUNT_ID
Should execute getHederaAccountNumAlias and get the corressponded accountNumAlias ‑ @HAS IHRC-632 Test Suite getHederaAccountNumAlias Should execute getHederaAccountNumAlias and get the corressponded accountNumAlias
Should execute hbarAllowancePublic and return an event with the allowance information ‑ @HAS IHRC-906 Test Suite Should execute hbarAllowancePublic and return an event with the allowance information
Should execute hbarApprovePublic and return success response code ‑ @HAS IHRC-906 Test Suite Should execute hbarApprovePublic and return success response code
Should execute isValidAliasPublic with EVM address alias param and return TRUE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with EVM address alias param and return TRUE
Should execute isValidAliasPublic with Hedera Account Num Alias param and return TRUE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with Hedera Account Num Alias param and return TRUE
Should execute isValidAliasPublic with a non existed account param and return FALSE ‑ @HAS IHRC-632 Test Suite isValidAlias Should execute isValidAliasPublic with a non existed account param and return FALSE
Should verify message signature and return FALSE using isAuthorizedRawPublic for ECDSA account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return FALSE using isAuthorizedRawPublic for ECDSA account
Should verify message signature and return FALSE using isAuthorizedRawPublic for ED25519 account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return FALSE using isAuthorizedRawPublic for ED25519 account
Should verify message signature and return TRUE using isAuthorized for ECDSA key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for ECDSA key
Should verify message signature and return TRUE using isAuthorized for ED25519 key ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for ED25519 key
Should verify message signature and return TRUE using isAuthorized for threshold key includes multiple ED25519 and ECDSA keys ‑ @HAS IHRC-632 Test Suite IsAuthorized Should verify message signature and return TRUE using isAuthorized for threshold key includes multiple ED25519 and ECDSA keys
Should verify message signature and return TRUE using isAuthorizedRawPublic for ECDSA account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return TRUE using isAuthorizedRawPublic for ECDSA account
Should verify message signature and return TRUE using isAuthorizedRawPublic for ED25519 account ‑ @HAS IHRC-632 Test Suite IsAuthorizedRaw Should verify message signature and return TRUE using isAuthorizedRawPublic for ED25519 account
should be able to associate() to the token from a contract ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to associate() to the token from a contract
should be able to associate() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to associate() to the token from an EOA
should be able to call isAssociated() after token association ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated() after token association
should be able to call isAssociated() after token dissociation ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated() after token dissociation
should be able to call isAssociated() to the token from an EOA when associated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when associated
should be able to call isAssociated() to the token from an EOA when dissociated ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA when dissociated
should be able to call isAssociated() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to call isAssociated() to the token from an EOA
should be able to call isAssociated() ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to call isAssociated()
should be able to dissociate() to the token from an EOA ‑ @HRC-719 Test Suite HRC719 Token should be able to dissociate() to the token from an EOA
should be able to disssociate() to the token from a contract ‑ @HRC-719 Test Suite HRC719 wrapper contract should be able to disssociate() to the token from a contract
should be able to execute associate() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute associate() via redirectForToken
should be able to execute dissociate() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute dissociate() via redirectForToken
should be able to execute isAssociated() after association via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute isAssociated() after association via redirectForToken
should be able to execute isAssociated() via redirectForToken ‑ @HRC-719 Test Suite redirectoForToken should be able to execute isAssociated() via redirectForToken
should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender ‑ @IHRC-906 Facade @CryptoAllowance Test Suite should execute hbarAllowance() by an EOA to retrieve allowance granted to a spender
should execute hbarApprove() by an EOA to grant an hbar allowance to another EOA ‑ @IHRC-906 Facade @CryptoAllowance Test Suite should execute hbarApprove() by an EOA to grant an hbar allowance to another EOA
Loading