Conversation
...lus/parachains/integration-tests/emulated/tests/people/people-rococo/src/tests/governance.rs
Outdated
Show resolved
Hide resolved
In Westend, `type UsernameAuthorityOrigin = EnsureRoot<Self::AccountId>;`, so `add_username_authority/remove_username_authority` should fail with regular signed and general admin origins.
acatangiu
left a comment
There was a problem hiding this comment.
New tests look good, fyi need fixing issues after merging master (adapt for XCMv5) to get CI green.
3308e96 to
12d8979
Compare
|
@acatangiu thank you for the the feedback. Before I put this in the merge queue, there's something I would like to understand. At present,
so an incorrect origin check can consist of just checking a
The wrong origin tests that I added are:
For Rococo:
For Westend:
Why is this the case? Before these tests, I would have hypothesized that when submitting an extrinsic with an insufficient origin, the mode of failure was to be the same, regardless of extrinsic, network, or origin. |
|
I only read diagonally, but first thing you should check is rococo/westend configs. Usually when they are different from prod networks they are simply outdated. EitherOfDiverse<
Looks right to me, check git blame for the Westend and rococo configs and you can figure out if they are different intentionally (some new feature added not yet reached prod networks), or if they are simply outdated. Also, Rococo is deprecated/retired. It’s not deployed anywhere anymore. We still keep the code around for bridge emulated tests and zombienet tests, but everything else is deprecated. Aka, no need to add new governance tests on Rococo. |
|
Thank you for the reply! Even before writing my previous comment, I had checked configs; you're correct that Kusama/Polkadot configs became different from Westend/Rococo. My wall of text obscured the core of my question:
The origins being defined differently between networks is relevant - but a separate issue. |
can you provide more details? how do they fail differently? what are the tracing logs saying? I am guessing there are different validation functions (per origin type) that are failing, but we'd need to follow the code to figure out exactly - either way, I don't think this is a problem |
|
@acatangiu Thanks for the feedback. This PR fulfills its purpose and the underlying reason for the behavior I described is not problematic, just curious IMO; as you said:
This can be looked into in a separate issue/PR. I'll merge this (with another approval). |
# Description Made as a follow-up of polkadot-fellows/runtimes#499 ## Integration N/A ## Review Notes N/A --------- Co-authored-by: Dónal Murray <donal.murray@parity.io>
# Description Made as a follow-up of polkadot-fellows/runtimes#499 ## Integration N/A ## Review Notes N/A --------- Co-authored-by: Dónal Murray <donal.murray@parity.io>
Description
Made as a follow-up of polkadot-fellows/runtimes#499
Integration
N/A
Review Notes
N/A