diff --git a/crates/blockifier/src/blockifier/stateful_validator.rs b/crates/blockifier/src/blockifier/stateful_validator.rs index 5dbba123a93..614620742e1 100644 --- a/crates/blockifier/src/blockifier/stateful_validator.rs +++ b/crates/blockifier/src/blockifier/stateful_validator.rs @@ -115,7 +115,7 @@ impl StatefulValidator { let mut execution_resources = ExecutionResources::default(); let tx_context = Arc::new(self.tx_executor.block_context.to_tx_context(tx)); - let limit_steps_by_resources = tx.create_tx_info().enforce_fee(); + let limit_steps_by_resources = tx.enforce_fee(); let validate_call_info = tx.validate_tx( self.tx_executor.block_state.as_mut().expect(BLOCK_STATE_ACCESS_ERR), &mut execution_resources, diff --git a/crates/blockifier/src/transaction/account_transactions_test.rs b/crates/blockifier/src/transaction/account_transactions_test.rs index 8548801fa8f..c306c6d4f5a 100644 --- a/crates/blockifier/src/transaction/account_transactions_test.rs +++ b/crates/blockifier/src/transaction/account_transactions_test.rs @@ -212,7 +212,7 @@ fn test_fee_enforcement( &mut NonceManager::default(), ); - let enforce_fee = deploy_account_tx.create_tx_info().enforce_fee(); + let enforce_fee = deploy_account_tx.enforce_fee(); assert_ne!(zero_bounds, enforce_fee); let result = deploy_account_tx.execute(state, &block_context, enforce_fee, true); // Execution should fail if the fee is enforced because the account doesn't have sufficient @@ -238,7 +238,7 @@ fn test_all_bounds_combinations_enforce_fee( DEFAULT_STRK_L1_DATA_GAS_PRICE.into(), ), }); - assert_eq!(account_tx.create_tx_info().enforce_fee(), expected_enforce_fee); + assert_eq!(account_tx.enforce_fee(), expected_enforce_fee); } #[rstest]