mirror of
https://github.com/XRPLF/clio.git
synced 2025-11-20 11:45:53 +00:00
841 lines
33 KiB
C++
841 lines
33 KiB
C++
//------------------------------------------------------------------------------
|
|
/*
|
|
This file is part of clio: https://github.com/XRPLF/clio
|
|
Copyright (c) 2023, the clio developers.
|
|
|
|
Permission to use, copy, modify, and distribute this software for any
|
|
purpose with or without fee is hereby granted, provided that the above
|
|
copyright notice and this permission notice appear in all copies.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
//==============================================================================
|
|
|
|
#include "data/AmendmentCenter.hpp"
|
|
#include "data/Types.hpp"
|
|
#include "rpc/Errors.hpp"
|
|
#include "rpc/common/AnyHandler.hpp"
|
|
#include "rpc/common/Types.hpp"
|
|
#include "rpc/handlers/AccountInfo.hpp"
|
|
#include "util/HandlerBaseTestFixture.hpp"
|
|
#include "util/MockAmendmentCenter.hpp"
|
|
#include "util/NameGenerator.hpp"
|
|
#include "util/TestObject.hpp"
|
|
|
|
#include <boost/json/parse.hpp>
|
|
#include <boost/json/value.hpp>
|
|
#include <fmt/format.h>
|
|
#include <gmock/gmock.h>
|
|
#include <gtest/gtest.h>
|
|
#include <xrpl/basics/base_uint.h>
|
|
#include <xrpl/protocol/Indexes.h>
|
|
#include <xrpl/protocol/LedgerFormats.h>
|
|
#include <xrpl/protocol/LedgerHeader.h>
|
|
|
|
#include <cstdint>
|
|
#include <optional>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
using namespace rpc;
|
|
using namespace data;
|
|
namespace json = boost::json;
|
|
using namespace testing;
|
|
|
|
namespace {
|
|
|
|
constexpr auto kACCOUNT = "rf1BiGeXwwQoi8Z2ueFYTEXSwuJYfV2Jpn";
|
|
constexpr auto kACCOUNT1 = "rsA2LpzuawewSBQXkiju3YQTMzW13pAAdW";
|
|
constexpr auto kACCOUNT2 = "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun";
|
|
constexpr auto kLEDGER_HASH = "4BC50C9B0D8515D3EAAE1E74B29A95804346C491EE1A95BF25E4AAB854A6A652";
|
|
constexpr auto kINDEX1 = "1B8590C01B0006EDFA9ED60296DD052DC5E90F99659B25014D08E1BC983515BC";
|
|
|
|
} // namespace
|
|
|
|
struct RPCAccountInfoHandlerTest : HandlerBaseTest {
|
|
RPCAccountInfoHandlerTest()
|
|
{
|
|
backend_->setRange(10, 30);
|
|
}
|
|
|
|
protected:
|
|
StrictMockAmendmentCenterSharedPtr mockAmendmentCenterPtr_;
|
|
};
|
|
|
|
struct AccountInfoParamTestCaseBundle {
|
|
std::string testName;
|
|
std::string testJson;
|
|
std::string expectedError;
|
|
std::string expectedErrorMessage;
|
|
};
|
|
|
|
// parameterized test cases for parameters check
|
|
struct AccountInfoParameterTest : RPCAccountInfoHandlerTest, WithParamInterface<AccountInfoParamTestCaseBundle> {};
|
|
|
|
static auto
|
|
generateTestValuesForParametersTest()
|
|
{
|
|
return std::vector<AccountInfoParamTestCaseBundle>{
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "MissingAccountAndIdent",
|
|
.testJson = R"JSON({})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "Missing field 'account'."
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "AccountNotString",
|
|
.testJson = R"JSON({"account": 1})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "accountNotString"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "AccountInvalid",
|
|
.testJson = R"JSON({"account": "xxx"})JSON",
|
|
.expectedError = "actMalformed",
|
|
.expectedErrorMessage = "accountMalformed"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "IdentNotString",
|
|
.testJson = R"JSON({"ident": 1})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "identNotString"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "IdentInvalid",
|
|
.testJson = R"JSON({"ident": "xxx"})JSON",
|
|
.expectedError = "actMalformed",
|
|
.expectedErrorMessage = "identMalformed"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "SignerListsInvalid",
|
|
.testJson = R"JSON({"ident": "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun", "signer_lists": 1})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "Invalid parameters."
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "LedgerHashInvalid",
|
|
.testJson = R"JSON({"ident": "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun", "ledger_hash": "1"})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "ledger_hashMalformed"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "LedgerHashNotString",
|
|
.testJson = R"JSON({"ident": "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun", "ledger_hash": 1})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "ledger_hashNotString"
|
|
},
|
|
AccountInfoParamTestCaseBundle{
|
|
.testName = "LedgerIndexInvalid",
|
|
.testJson = R"JSON({"ident": "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun", "ledger_index": "a"})JSON",
|
|
.expectedError = "invalidParams",
|
|
.expectedErrorMessage = "ledgerIndexMalformed"
|
|
},
|
|
};
|
|
}
|
|
|
|
INSTANTIATE_TEST_CASE_P(
|
|
RPCAccountInfoGroup1,
|
|
AccountInfoParameterTest,
|
|
ValuesIn(generateTestValuesForParametersTest()),
|
|
tests::util::kNAME_GENERATOR
|
|
);
|
|
|
|
TEST_P(AccountInfoParameterTest, InvalidParams)
|
|
{
|
|
auto const testBundle = GetParam();
|
|
runSpawn([&, this](auto yield) {
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
auto const req = json::parse(testBundle.testJson);
|
|
auto const output = handler.process(req, Context{.yield = yield, .apiVersion = 2});
|
|
ASSERT_FALSE(output);
|
|
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), testBundle.expectedError);
|
|
EXPECT_EQ(err.at("error_message").as_string(), testBundle.expectedErrorMessage);
|
|
});
|
|
}
|
|
|
|
TEST_F(AccountInfoParameterTest, ApiV1SignerListIsNotBool)
|
|
{
|
|
static constexpr auto kREQ_JSON = R"JSON(
|
|
{"ident": "rLEsXccBGNR3UPuPu2hUXPjziKC3qKSBun", "signer_lists": 1}
|
|
)JSON";
|
|
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence);
|
|
|
|
runSpawn([&, this](auto yield) {
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
auto const req = json::parse(kREQ_JSON);
|
|
auto const output = handler.process(req, Context{.yield = yield, .apiVersion = 1});
|
|
ASSERT_FALSE(output);
|
|
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "lgrNotFound");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "ledgerNotFound");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, LedgerNonExistViaIntSequence)
|
|
{
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
// return empty ledgerHeader
|
|
ON_CALL(*backend_, fetchLedgerBySequence(30, _)).WillByDefault(Return(std::optional<ripple::LedgerHeader>{}));
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"ledger_index": 30
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "lgrNotFound");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "ledgerNotFound");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, LedgerNonExistViaStringSequence)
|
|
{
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
// return empty ledgerHeader
|
|
ON_CALL(*backend_, fetchLedgerBySequence(30, _)).WillByDefault(Return(std::nullopt));
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"ledger_index": "30"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "lgrNotFound");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "ledgerNotFound");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, LedgerNonExistViaHash)
|
|
{
|
|
EXPECT_CALL(*backend_, fetchLedgerByHash).Times(1);
|
|
// return empty ledgerHeader
|
|
ON_CALL(*backend_, fetchLedgerByHash(ripple::uint256{kLEDGER_HASH}, _))
|
|
.WillByDefault(Return(std::optional<ripple::LedgerHeader>{}));
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"ledger_hash": "{}"
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kLEDGER_HASH
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "lgrNotFound");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "ledgerNotFound");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, AccountNotExist)
|
|
{
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
ON_CALL(*backend_, doFetchLedgerObject).WillByDefault(Return(std::optional<Blob>{}));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject).Times(1);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "actNotFound");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "Account not found.");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, AccountInvalid)
|
|
{
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
// return a valid ledger object but not account root
|
|
ON_CALL(*backend_, doFetchLedgerObject).WillByDefault(Return(createLegacyFeeSettingBlob(1, 2, 3, 4, 0)));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject).Times(1);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "dbDeserialization");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "Database deserialization error.");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, SignerListsInvalid)
|
|
{
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(kACCOUNT, 0, 2, 200, 2, kINDEX1, 2);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
auto signersKey = ripple::keylet::signers(account).key;
|
|
ON_CALL(*backend_, doFetchLedgerObject(signersKey, 30, _))
|
|
.WillByDefault(Return(createLegacyFeeSettingBlob(1, 2, 3, 4, 0)));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject).Times(2);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"signer_lists": true
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_FALSE(output);
|
|
auto const err = rpc::makeError(output.result.error());
|
|
EXPECT_EQ(err.at("error").as_string(), "dbDeserialization");
|
|
EXPECT_EQ(err.at("error_message").as_string(), "Database deserialization error.");
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, SignerListsTrueV2)
|
|
{
|
|
auto const expectedOutput = fmt::format(
|
|
R"JSON({{
|
|
"account_data": {{
|
|
"Account": "{}",
|
|
"Balance": "200",
|
|
"Flags": 0,
|
|
"LedgerEntryType": "AccountRoot",
|
|
"OwnerCount": 2,
|
|
"PreviousTxnID": "{}",
|
|
"PreviousTxnLgrSeq": 2,
|
|
"Sequence": 2,
|
|
"TransferRate": 0,
|
|
"index": "13F1A95D7AAB7108D5CE7EEAF504B2894B8C674E6D68499076441C4837282BF8"
|
|
}},
|
|
"signer_lists": [
|
|
{{
|
|
"Flags": 0,
|
|
"LedgerEntryType": "SignerList",
|
|
"OwnerNode": "0",
|
|
"PreviousTxnID": "0000000000000000000000000000000000000000000000000000000000000000",
|
|
"PreviousTxnLgrSeq": 0,
|
|
"SignerEntries": [
|
|
{{
|
|
"SignerEntry": {{
|
|
"Account": "{}",
|
|
"SignerWeight": 1
|
|
}}
|
|
}},
|
|
{{
|
|
"SignerEntry": {{
|
|
"Account": "{}",
|
|
"SignerWeight": 1
|
|
}}
|
|
}}
|
|
],
|
|
"SignerListID": 0,
|
|
"SignerQuorum": 2,
|
|
"index": "A9C28A28B85CD533217F5C0A0C7767666B093FA58A0F2D80026FCC4CD932DDC7"
|
|
}}
|
|
],
|
|
"account_flags": {{
|
|
"defaultRipple": false,
|
|
"depositAuth": false,
|
|
"disableMasterKey": false,
|
|
"disallowIncomingXRP": false,
|
|
"globalFreeze": false,
|
|
"noFreeze": false,
|
|
"passwordSpent": false,
|
|
"requireAuthorization": false,
|
|
"requireDestinationTag": false
|
|
}},
|
|
"ledger_hash": "{}",
|
|
"ledger_index": 30,
|
|
"validated": true
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kINDEX1,
|
|
kACCOUNT1,
|
|
kACCOUNT2,
|
|
kLEDGER_HASH
|
|
);
|
|
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(kACCOUNT, 0, 2, 200, 2, kINDEX1, 2);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
auto signersKey = ripple::keylet::signers(account).key;
|
|
ON_CALL(*backend_, doFetchLedgerObject(signersKey, 30, _))
|
|
.WillByDefault(Return(createSignerLists({{kACCOUNT1, 1}, {kACCOUNT2, 1}}).getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject).Times(2);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"signer_lists": true
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{.yield = yield, .apiVersion = 2});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_EQ(*output.result, json::parse(expectedOutput));
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, SignerListsTrueV1)
|
|
{
|
|
auto const expectedOutput = fmt::format(
|
|
R"JSON({{
|
|
"account_data": {{
|
|
"Account": "{}",
|
|
"Balance": "200",
|
|
"Flags": 0,
|
|
"LedgerEntryType": "AccountRoot",
|
|
"OwnerCount": 2,
|
|
"PreviousTxnID": "{}",
|
|
"PreviousTxnLgrSeq": 2,
|
|
"Sequence": 2,
|
|
"TransferRate": 0,
|
|
"index": "13F1A95D7AAB7108D5CE7EEAF504B2894B8C674E6D68499076441C4837282BF8",
|
|
"signer_lists": [
|
|
{{
|
|
"Flags": 0,
|
|
"LedgerEntryType": "SignerList",
|
|
"OwnerNode": "0",
|
|
"PreviousTxnID": "0000000000000000000000000000000000000000000000000000000000000000",
|
|
"PreviousTxnLgrSeq": 0,
|
|
"SignerEntries": [
|
|
{{
|
|
"SignerEntry": {{
|
|
"Account": "{}",
|
|
"SignerWeight": 1
|
|
}}
|
|
}},
|
|
{{
|
|
"SignerEntry": {{
|
|
"Account": "{}",
|
|
"SignerWeight": 1
|
|
}}
|
|
}}
|
|
],
|
|
"SignerListID": 0,
|
|
"SignerQuorum": 2,
|
|
"index": "A9C28A28B85CD533217F5C0A0C7767666B093FA58A0F2D80026FCC4CD932DDC7"
|
|
}}
|
|
]
|
|
}},
|
|
"account_flags": {{
|
|
"defaultRipple": false,
|
|
"depositAuth": false,
|
|
"disableMasterKey": false,
|
|
"disallowIncomingXRP": false,
|
|
"globalFreeze": false,
|
|
"noFreeze": false,
|
|
"passwordSpent": false,
|
|
"requireAuthorization": false,
|
|
"requireDestinationTag": false
|
|
}},
|
|
"ledger_hash": "{}",
|
|
"ledger_index": 30,
|
|
"validated": true
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kINDEX1,
|
|
kACCOUNT1,
|
|
kACCOUNT2,
|
|
kLEDGER_HASH
|
|
);
|
|
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(kACCOUNT, 0, 2, 200, 2, kINDEX1, 2);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
auto signersKey = ripple::keylet::signers(account).key;
|
|
ON_CALL(*backend_, doFetchLedgerObject(signersKey, 30, _))
|
|
.WillByDefault(Return(createSignerLists({{kACCOUNT1, 1}, {kACCOUNT2, 1}}).getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject).Times(2);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}",
|
|
"signer_lists": true
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{.yield = yield, .apiVersion = 1});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_EQ(*output.result, json::parse(expectedOutput));
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, Flags)
|
|
{
|
|
auto const expectedOutput = fmt::format(
|
|
R"JSON({{
|
|
"account_data": {{
|
|
"Account": "{}",
|
|
"Balance": "200",
|
|
"Flags": 33488896,
|
|
"LedgerEntryType": "AccountRoot",
|
|
"OwnerCount": 2,
|
|
"PreviousTxnID": "{}",
|
|
"PreviousTxnLgrSeq": 2,
|
|
"Sequence": 2,
|
|
"TransferRate": 0,
|
|
"index": "13F1A95D7AAB7108D5CE7EEAF504B2894B8C674E6D68499076441C4837282BF8"
|
|
}},
|
|
"account_flags": {{
|
|
"defaultRipple": true,
|
|
"depositAuth": true,
|
|
"disableMasterKey": true,
|
|
"disallowIncomingXRP": true,
|
|
"globalFreeze": true,
|
|
"noFreeze": true,
|
|
"passwordSpent": true,
|
|
"requireAuthorization": true,
|
|
"requireDestinationTag": true
|
|
}},
|
|
"ledger_hash": "{}",
|
|
"ledger_index": 30,
|
|
"validated": true
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kINDEX1,
|
|
kLEDGER_HASH
|
|
);
|
|
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(
|
|
kACCOUNT,
|
|
ripple::lsfDefaultRipple | ripple::lsfGlobalFreeze | ripple::lsfRequireDestTag | ripple::lsfRequireAuth |
|
|
ripple::lsfDepositAuth | ripple::lsfDisableMaster | ripple::lsfDisallowXRP | ripple::lsfNoFreeze |
|
|
ripple::lsfPasswordSpent,
|
|
2,
|
|
200,
|
|
2,
|
|
kINDEX1,
|
|
2
|
|
);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_EQ(*output.result, json::parse(expectedOutput));
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, IdentAndSignerListsFalse)
|
|
{
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(kACCOUNT, 0, 2, 200, 2, kINDEX1, 2);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"ident": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_FALSE(output.result->as_object().contains("signer_lists"));
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, DisallowIncoming)
|
|
{
|
|
auto const expectedOutput = fmt::format(
|
|
R"JSON({{
|
|
"account_data": {{
|
|
"Account": "{}",
|
|
"Balance": "200",
|
|
"Flags": 1040121856,
|
|
"LedgerEntryType": "AccountRoot",
|
|
"OwnerCount": 2,
|
|
"PreviousTxnID": "{}",
|
|
"PreviousTxnLgrSeq": 2,
|
|
"Sequence": 2,
|
|
"TransferRate": 0,
|
|
"index": "13F1A95D7AAB7108D5CE7EEAF504B2894B8C674E6D68499076441C4837282BF8"
|
|
}},
|
|
"account_flags": {{
|
|
"defaultRipple": true,
|
|
"depositAuth": true,
|
|
"disableMasterKey": true,
|
|
"disallowIncomingXRP": true,
|
|
"globalFreeze": true,
|
|
"noFreeze": true,
|
|
"passwordSpent": true,
|
|
"requireAuthorization": true,
|
|
"requireDestinationTag": true,
|
|
"disallowIncomingCheck": true,
|
|
"disallowIncomingNFTokenOffer": true,
|
|
"disallowIncomingPayChan": true,
|
|
"disallowIncomingTrustline": true
|
|
}},
|
|
"ledger_hash": "{}",
|
|
"ledger_index": 30,
|
|
"validated": true
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kINDEX1,
|
|
kLEDGER_HASH
|
|
);
|
|
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(
|
|
kACCOUNT,
|
|
ripple::lsfDefaultRipple | ripple::lsfGlobalFreeze | ripple::lsfRequireDestTag | ripple::lsfRequireAuth |
|
|
ripple::lsfDepositAuth | ripple::lsfDisableMaster | ripple::lsfDisallowXRP | ripple::lsfNoFreeze |
|
|
ripple::lsfPasswordSpent | ripple::lsfDisallowIncomingNFTokenOffer | ripple::lsfDisallowIncomingCheck |
|
|
ripple::lsfDisallowIncomingPayChan | ripple::lsfDisallowIncomingTrustline,
|
|
2,
|
|
200,
|
|
2,
|
|
kINDEX1,
|
|
2
|
|
);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(true));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_EQ(*output.result, json::parse(expectedOutput));
|
|
});
|
|
}
|
|
|
|
TEST_F(RPCAccountInfoHandlerTest, AmendmentsEnabled)
|
|
{
|
|
auto const expectedOutput = fmt::format(
|
|
R"JSON({{
|
|
"account_data": {{
|
|
"Account": "{}",
|
|
"Balance": "200",
|
|
"Flags": 3254714368,
|
|
"LedgerEntryType": "AccountRoot",
|
|
"OwnerCount": 2,
|
|
"PreviousTxnID": "{}",
|
|
"PreviousTxnLgrSeq": 2,
|
|
"Sequence": 2,
|
|
"TransferRate": 0,
|
|
"index": "13F1A95D7AAB7108D5CE7EEAF504B2894B8C674E6D68499076441C4837282BF8"
|
|
}},
|
|
"account_flags": {{
|
|
"defaultRipple": true,
|
|
"depositAuth": true,
|
|
"disableMasterKey": true,
|
|
"disallowIncomingXRP": true,
|
|
"globalFreeze": true,
|
|
"noFreeze": true,
|
|
"passwordSpent": true,
|
|
"requireAuthorization": true,
|
|
"requireDestinationTag": true,
|
|
"allowTrustLineClawback": true,
|
|
"allowTrustLineLocking": true
|
|
}},
|
|
"ledger_hash": "{}",
|
|
"ledger_index": 30,
|
|
"validated": true
|
|
}})JSON",
|
|
kACCOUNT,
|
|
kINDEX1,
|
|
kLEDGER_HASH
|
|
);
|
|
|
|
auto const ledgerHeader = createLedgerHeader(kLEDGER_HASH, 30);
|
|
EXPECT_CALL(*backend_, fetchLedgerBySequence).Times(1);
|
|
ON_CALL(*backend_, fetchLedgerBySequence).WillByDefault(Return(ledgerHeader));
|
|
|
|
auto const account = getAccountIdWithString(kACCOUNT);
|
|
auto const accountKk = ripple::keylet::account(account).key;
|
|
auto const accountRoot = createAccountRootObject(
|
|
kACCOUNT,
|
|
ripple::lsfDefaultRipple | ripple::lsfGlobalFreeze | ripple::lsfRequireDestTag | ripple::lsfRequireAuth |
|
|
ripple::lsfDepositAuth | ripple::lsfDisableMaster | ripple::lsfDisallowXRP | ripple::lsfNoFreeze |
|
|
ripple::lsfPasswordSpent | ripple::lsfAllowTrustLineClawback | ripple::lsfAllowTrustLineLocking,
|
|
2,
|
|
200,
|
|
2,
|
|
kINDEX1,
|
|
2
|
|
);
|
|
ON_CALL(*backend_, doFetchLedgerObject(accountKk, 30, _))
|
|
.WillByDefault(Return(accountRoot.getSerializer().peekData()));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::DisallowIncoming, _)).WillOnce(Return(false));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::Clawback, _)).WillOnce(Return(true));
|
|
EXPECT_CALL(*mockAmendmentCenterPtr_, isEnabled(_, Amendments::TokenEscrow, _)).WillOnce(Return(true));
|
|
EXPECT_CALL(*backend_, doFetchLedgerObject);
|
|
|
|
static auto const kINPUT = json::parse(
|
|
fmt::format(
|
|
R"JSON({{
|
|
"account": "{}"
|
|
}})JSON",
|
|
kACCOUNT
|
|
)
|
|
);
|
|
auto const handler = AnyHandler{AccountInfoHandler{backend_, mockAmendmentCenterPtr_}};
|
|
runSpawn([&](auto yield) {
|
|
auto const output = handler.process(kINPUT, Context{yield});
|
|
ASSERT_TRUE(output);
|
|
EXPECT_EQ(*output.result, json::parse(expectedOutput));
|
|
});
|
|
}
|
|
|
|
TEST(RPCAccountInfoHandlerSpecTest, DeprecatedFields)
|
|
{
|
|
boost::json::value const json{
|
|
{"account", kACCOUNT},
|
|
{"ident", kACCOUNT},
|
|
{"ledger_index", 30},
|
|
{"ledger_hash", kLEDGER_HASH},
|
|
{"ledger", "some"},
|
|
{"strict", true}
|
|
};
|
|
auto const spec = AccountInfoHandler::spec(2);
|
|
auto const warnings = spec.check(json);
|
|
ASSERT_EQ(warnings.size(), 1);
|
|
auto const& warning = warnings[0];
|
|
ASSERT_TRUE(warning.is_object());
|
|
auto const obj = warning.as_object();
|
|
ASSERT_TRUE(obj.contains("id"));
|
|
ASSERT_TRUE(obj.contains("message"));
|
|
EXPECT_EQ(obj.at("id").as_int64(), static_cast<int64_t>(WarningCode::WarnRpcDeprecated));
|
|
auto const& message = obj.at("message").as_string();
|
|
for (auto const& field : {"ident", "ledger", "strict"}) {
|
|
EXPECT_NE(message.find(fmt::format("Field '{}' is deprecated", field)), std::string::npos) << message;
|
|
}
|
|
}
|