@@ -72,7 +72,7 @@ contract PionexContractTest is StrategySharedSetup {
72
72
dai, // userToken
73
73
usdt, // pionexToken
74
74
100 * 1e18 , // userTokenAmount
75
- 90 * 1e6 , // pionexTokenAmount
75
+ 90 * 1e6 , // minPionexTokenAmount
76
76
user, // user
77
77
address (0 ), // pionex
78
78
uint256 (1001 ), // salt
@@ -85,7 +85,7 @@ contract PionexContractTest is StrategySharedSetup {
85
85
pionex,
86
86
receiver,
87
87
DEFAULT_ORDER.userTokenAmount,
88
- DEFAULT_ORDER.pionexTokenAmount ,
88
+ DEFAULT_ORDER.minPionexTokenAmount ,
89
89
uint256 (1002 ),
90
90
DEADLINE
91
91
);
@@ -652,21 +652,21 @@ contract PionexContractTest is StrategySharedSetup {
652
652
address (DEFAULT_ORDER.userToken),
653
653
address (DEFAULT_ORDER.pionexToken),
654
654
DEFAULT_ORDER.userTokenAmount,
655
- DEFAULT_ORDER.pionexTokenAmount ,
656
- 0 , // remainingAmount should be zero after order fully filled
657
- DEFAULT_ORDER.pionexTokenAmount .mul (10 ).div (100 ), // tokenlonFee = 10% pionexTokenAmount
658
- DEFAULT_ORDER.pionexTokenAmount .mul (3 ).div (100 ) // pionexStrategyFee = 0.5% + 2.5% = 3% pionexTokenAmount
655
+ DEFAULT_ORDER.minPionexTokenAmount ,
656
+ 0 , // remainingUserTokenAmount should be zero after order fully filled
657
+ DEFAULT_ORDER.minPionexTokenAmount .mul (10 ).div (100 ), // tokenlonFee = 10% pionexTokenAmount
658
+ DEFAULT_ORDER.minPionexTokenAmount .mul (3 ).div (100 ) // pionexStrategyFee = 0.5% + 2.5% = 3% pionexTokenAmount
659
659
)
660
660
);
661
661
vm.prank (pionex, pionex); // Only EOA
662
662
userProxy.toLimitOrder (payload);
663
663
664
- pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.pionexTokenAmount .mul (97 ).div (100 ))); // 3% fee for Pionex is deducted from pionexTokenAmount directly
664
+ pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.minPionexTokenAmount .mul (97 ).div (100 ))); // 3% fee for Pionex is deducted from pionexTokenAmount directly
665
665
receiverMakerAsset.assertChange (int256 (DEFAULT_ORDER.userTokenAmount));
666
- userTakerAsset.assertChange (int256 (DEFAULT_ORDER.pionexTokenAmount .mul (87 ).div (100 ))); // 10% fee for Tokenlon and 3% fee for Pionex
666
+ userTakerAsset.assertChange (int256 (DEFAULT_ORDER.minPionexTokenAmount .mul (87 ).div (100 ))); // 10% fee for Tokenlon and 3% fee for Pionex
667
667
userMakerAsset.assertChange (- int256 (DEFAULT_ORDER.userTokenAmount));
668
668
fcMakerAsset.assertChange (0 );
669
- fcTakerAsset.assertChange (int256 (DEFAULT_ORDER.pionexTokenAmount .mul (10 ).div (100 )));
669
+ fcTakerAsset.assertChange (int256 (DEFAULT_ORDER.minPionexTokenAmount .mul (10 ).div (100 )));
670
670
}
671
671
672
672
function testFullyFillByTraderWithBetterTakerMakerTokenRatio () public {
@@ -704,7 +704,7 @@ contract PionexContractTest is StrategySharedSetup {
704
704
address (DEFAULT_ORDER.pionexToken),
705
705
DEFAULT_ORDER.userTokenAmount,
706
706
fill.pionexTokenAmount,
707
- 0 , // remainingAmount should be zero after order fully filled
707
+ 0 , // remainingUserTokenAmount should be zero after order fully filled
708
708
0 ,
709
709
0
710
710
)
@@ -797,7 +797,7 @@ contract PionexContractTest is StrategySharedSetup {
797
797
PionexContractLibEIP712.Fill memory fill = DEFAULT_FILL;
798
798
// set the fill amount to 2x of order quota
799
799
fill.userTokenAmount = DEFAULT_ORDER.userTokenAmount.mul (2 );
800
- fill.pionexTokenAmount = DEFAULT_ORDER.pionexTokenAmount .mul (2 );
800
+ fill.pionexTokenAmount = DEFAULT_ORDER.minPionexTokenAmount .mul (2 );
801
801
802
802
IPionexContract.TraderParams memory traderParams = DEFAULT_TRADER_PARAMS;
803
803
traderParams.userTokenAmount = fill.userTokenAmount;
@@ -815,9 +815,9 @@ contract PionexContractTest is StrategySharedSetup {
815
815
userProxy.toLimitOrder (payload);
816
816
817
817
// Balance change should be bound by order amount (not affected by 2x fill amount)
818
- pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.pionexTokenAmount ));
818
+ pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.minPionexTokenAmount ));
819
819
receiverMakerAsset.assertChange (int256 (DEFAULT_ORDER.userTokenAmount));
820
- userTakerAsset.assertChange (int256 (DEFAULT_ORDER.pionexTokenAmount ));
820
+ userTakerAsset.assertChange (int256 (DEFAULT_ORDER.minPionexTokenAmount ));
821
821
userMakerAsset.assertChange (- int256 (DEFAULT_ORDER.userTokenAmount));
822
822
}
823
823
@@ -830,7 +830,7 @@ contract PionexContractTest is StrategySharedSetup {
830
830
PionexContractLibEIP712.Fill memory fill = DEFAULT_FILL;
831
831
// set the fill amount to 2x of order quota
832
832
fill.userTokenAmount = DEFAULT_ORDER.userTokenAmount.mul (2 );
833
- fill.pionexTokenAmount = DEFAULT_ORDER.pionexTokenAmount .mul (2 ).mul (11 ).div (10 ); // 10% more
833
+ fill.pionexTokenAmount = DEFAULT_ORDER.minPionexTokenAmount .mul (2 ).mul (11 ).div (10 ); // 10% more
834
834
835
835
IPionexContract.TraderParams memory traderParams = DEFAULT_TRADER_PARAMS;
836
836
traderParams.userTokenAmount = fill.userTokenAmount;
@@ -848,9 +848,9 @@ contract PionexContractTest is StrategySharedSetup {
848
848
userProxy.toLimitOrder (payload);
849
849
850
850
// Balance change should be bound by order amount (not affected by 2x fill amount)
851
- pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.pionexTokenAmount .mul (11 ).div (10 ))); // 10% more
851
+ pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.minPionexTokenAmount .mul (11 ).div (10 ))); // 10% more
852
852
receiverMakerAsset.assertChange (int256 (DEFAULT_ORDER.userTokenAmount));
853
- userTakerAsset.assertChange (int256 (DEFAULT_ORDER.pionexTokenAmount .mul (11 ).div (10 ))); // 10% more
853
+ userTakerAsset.assertChange (int256 (DEFAULT_ORDER.minPionexTokenAmount .mul (11 ).div (10 ))); // 10% more
854
854
userMakerAsset.assertChange (- int256 (DEFAULT_ORDER.userTokenAmount));
855
855
}
856
856
@@ -900,9 +900,9 @@ contract PionexContractTest is StrategySharedSetup {
900
900
userProxy.toLimitOrder (payload2);
901
901
902
902
// Half of the order filled after 2 txs
903
- pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.pionexTokenAmount .div (2 )));
903
+ pionexTakerAsset.assertChange (- int256 (DEFAULT_ORDER.minPionexTokenAmount .div (2 )));
904
904
receiverMakerAsset.assertChange (int256 (DEFAULT_ORDER.userTokenAmount.div (2 )));
905
- userTakerAsset.assertChange (int256 (DEFAULT_ORDER.pionexTokenAmount .div (2 )));
905
+ userTakerAsset.assertChange (int256 (DEFAULT_ORDER.minPionexTokenAmount .div (2 )));
906
906
userMakerAsset.assertChange (- int256 (DEFAULT_ORDER.userTokenAmount.div (2 )));
907
907
}
908
908
@@ -964,7 +964,7 @@ contract PionexContractTest is StrategySharedSetup {
964
964
965
965
function testCannotFillCanceledOrder () public {
966
966
PionexContractLibEIP712.Order memory zeroOrder = DEFAULT_ORDER;
967
- zeroOrder.pionexTokenAmount = 0 ;
967
+ zeroOrder.minPionexTokenAmount = 0 ;
968
968
969
969
bytes memory cancelPayload = _genCancelLimitOrderPayload (DEFAULT_ORDER, _signOrder (userPrivateKey, zeroOrder, SignatureValidator.SignatureType.EIP712));
970
970
vm.prank (pionex, pionex); // Only EOA
@@ -978,7 +978,7 @@ contract PionexContractTest is StrategySharedSetup {
978
978
979
979
function testCannotCancelIfNotMaker () public {
980
980
PionexContractLibEIP712.Order memory zeroOrder = DEFAULT_ORDER;
981
- zeroOrder.pionexTokenAmount = 0 ;
981
+ zeroOrder.minPionexTokenAmount = 0 ;
982
982
983
983
bytes memory cancelPayload = _genCancelLimitOrderPayload (
984
984
DEFAULT_ORDER,
@@ -1001,7 +1001,7 @@ contract PionexContractTest is StrategySharedSetup {
1001
1001
1002
1002
function testCannotCancelTwice () public {
1003
1003
PionexContractLibEIP712.Order memory zeroOrder = DEFAULT_ORDER;
1004
- zeroOrder.pionexTokenAmount = 0 ;
1004
+ zeroOrder.minPionexTokenAmount = 0 ;
1005
1005
1006
1006
bytes memory payload = _genCancelLimitOrderPayload (DEFAULT_ORDER, _signOrder (userPrivateKey, zeroOrder, SignatureValidator.SignatureType.EIP712));
1007
1007
vm.prank (pionex, pionex); // Only EOA
0 commit comments