Compare commits

..

6 Commits

Author SHA1 Message Date
Bronek Kozicki
4e535f1838 Add testDeletePermissionedDomainOwner() 2025-10-14 18:12:53 +01:00
Michael Legleux
1e01cd34f7 Set version to 2.5.0 2025-06-23 10:13:01 -07:00
Alex Kremer
e2fa5c1b7c chore: Change libXRPL check conan remote to dev (#5482)
This change aligns the Conan remote used by the libXRPL Clio compatibility check workflow with the recent changes applied to Clio.
2025-06-20 17:02:16 +00:00
Ed Hennis
fc0984d286 Require a message on "Application::signalStop" (#5255)
This change adds a message parameter to Application::signalStop for extra context.
2025-06-20 16:24:34 +00:00
Valentin Balaschenko
8b3dcd41f7 refactor: Change getNodeFat Missing Node State Tree error into warning (#5455) 2025-06-20 15:44:42 +00:00
Denis Angell
8f2f5310e2 Fix: Improve error handling in Batch RPC response (#5503) 2025-06-18 17:46:45 -04:00
12 changed files with 273 additions and 44 deletions

View File

@@ -1,6 +1,6 @@
name: Check libXRPL compatibility with Clio name: Check libXRPL compatibility with Clio
env: env:
CONAN_URL: http://18.143.149.228:8081/artifactory/api/conan/conan-non-prod CONAN_URL: http://18.143.149.228:8081/artifactory/api/conan/dev
CONAN_LOGIN_USERNAME_RIPPLE: ${{ secrets.CONAN_USERNAME }} CONAN_LOGIN_USERNAME_RIPPLE: ${{ secrets.CONAN_USERNAME }}
CONAN_PASSWORD_RIPPLE: ${{ secrets.CONAN_TOKEN }} CONAN_PASSWORD_RIPPLE: ${{ secrets.CONAN_TOKEN }}
on: on:

View File

@@ -36,7 +36,7 @@ namespace BuildInfo {
// and follow the format described at http://semver.org/ // and follow the format described at http://semver.org/
//------------------------------------------------------------------------------ //------------------------------------------------------------------------------
// clang-format off // clang-format off
char const* const versionString = "2.5.0-rc2" char const* const versionString = "2.5.0"
// clang-format on // clang-format on
#if defined(DEBUG) || defined(SANITIZER) #if defined(DEBUG) || defined(SANITIZER)

View File

@@ -760,6 +760,12 @@ isRawTransactionOkay(STObject const& st, std::string& reason)
{ {
TxType const tt = TxType const tt =
safe_cast<TxType>(raw.getFieldU16(sfTransactionType)); safe_cast<TxType>(raw.getFieldU16(sfTransactionType));
if (tt == ttBATCH)
{
reason = "Raw Transactions may not contain batch transactions.";
return false;
}
raw.applyTemplate(getTxFormat(tt)->getSOTemplate()); raw.applyTemplate(getTxFormat(tt)->getSOTemplate());
} }
catch (std::exception const& e) catch (std::exception const& e)

View File

@@ -18,8 +18,10 @@
//============================================================================== //==============================================================================
#include <test/jtx.h> #include <test/jtx.h>
#include <test/jtx/permissioned_domains.h>
#include <xrpl/protocol/Feature.h> #include <xrpl/protocol/Feature.h>
#include <xrpl/protocol/TER.h>
#include <xrpl/protocol/jss.h> #include <xrpl/protocol/jss.h>
namespace ripple { namespace ripple {
@@ -1251,21 +1253,48 @@ public:
} }
} }
void
testDeletePermissionedDomainOwner()
{
using namespace jtx;
Env env{*this};
Account alice{"alice"};
Account becky{"becky"};
env.fund(XRP(1000), alice, becky);
env.close();
env(fset(becky, asfDepositAuth));
env.close();
pdomain::Credentials const credentials1{
{.issuer = alice, .credType = "foobaz"}};
env(pdomain::setTx(alice, credentials1));
// Close 256 ledgers
for (int i = 0; i < 256; ++i)
env.close();
auto const acctDelFee{drops(env.current()->fees().increment)};
env(acctdelete(alice, becky), fee(acctDelFee), ter{tecNO_PERMISSION});
env.close();
}
void void
run() override run() override
{ {
testBasics(); // testBasics();
testDirectories(); // testDirectories();
testOwnedTypes(); // testOwnedTypes();
testResurrection(); // testResurrection();
testAmendmentEnable(); // testAmendmentEnable();
testTooManyOffers(); // testTooManyOffers();
testImplicitlyCreatedTrustline(); // testImplicitlyCreatedTrustline();
testBalanceTooSmallForFee(); // testBalanceTooSmallForFee();
testWithTickets(); // testWithTickets();
testDest(); // testDest();
testDestinationDepositAuthCredentials(); // testDestinationDepositAuthCredentials();
testDeleteCredentialsOwner(); // testDeleteCredentialsOwner();
testDeletePermissionedDomainOwner();
} }
}; };

View File

@@ -24,6 +24,7 @@
#include <xrpld/app/misc/HashRouter.h> #include <xrpld/app/misc/HashRouter.h>
#include <xrpld/app/misc/Transaction.h> #include <xrpld/app/misc/Transaction.h>
#include <xrpld/app/tx/apply.h> #include <xrpld/app/tx/apply.h>
#include <xrpld/app/tx/detail/Batch.h>
#include <xrpl/protocol/Batch.h> #include <xrpl/protocol/Batch.h>
#include <xrpl/protocol/Feature.h> #include <xrpl/protocol/Feature.h>
@@ -317,7 +318,8 @@ class Batch_test : public beast::unit_test::suite
env.close(); env.close();
} }
// temINVALID: Batch: batch cannot have inner batch txn. // DEFENSIVE: temINVALID: Batch: batch cannot have inner batch txn.
// ACTUAL: telENV_RPC_FAILED: isRawTransactionOkay()
{ {
auto const seq = env.seq(alice); auto const seq = env.seq(alice);
auto const batchFee = batch::calcBatchFee(env, 0, 2); auto const batchFee = batch::calcBatchFee(env, 0, 2);
@@ -325,7 +327,7 @@ class Batch_test : public beast::unit_test::suite
batch::inner( batch::inner(
batch::outer(alice, seq, batchFee, tfAllOrNothing), seq), batch::outer(alice, seq, batchFee, tfAllOrNothing), seq),
batch::inner(pay(alice, bob, XRP(1)), seq + 2), batch::inner(pay(alice, bob, XRP(1)), seq + 2),
ter(temINVALID)); ter(telENV_RPC_FAILED));
env.close(); env.close();
} }
@@ -3953,6 +3955,176 @@ class Batch_test : public beast::unit_test::suite
} }
} }
void
testValidateRPCResponse(FeatureBitset features)
{
// Verifying that the RPC response from submit includes
// the account_sequence_available, account_sequence_next,
// open_ledger_cost and validated_ledger_index fields.
testcase("Validate RPC response");
using namespace jtx;
Env env(*this);
Account const alice("alice");
Account const bob("bob");
env.fund(XRP(10000), alice, bob);
env.close();
// tes
{
auto const baseFee = env.current()->fees().base;
auto const aliceSeq = env.seq(alice);
auto jtx = env.jt(pay(alice, bob, XRP(1)));
Serializer s;
jtx.stx->add(s);
auto const jr = env.rpc("submit", strHex(s.slice()))[jss::result];
env.close();
BEAST_EXPECT(jr.isMember(jss::account_sequence_available));
BEAST_EXPECT(
jr[jss::account_sequence_available].asUInt() == aliceSeq + 1);
BEAST_EXPECT(jr.isMember(jss::account_sequence_next));
BEAST_EXPECT(
jr[jss::account_sequence_next].asUInt() == aliceSeq + 1);
BEAST_EXPECT(jr.isMember(jss::open_ledger_cost));
BEAST_EXPECT(jr[jss::open_ledger_cost] == to_string(baseFee));
BEAST_EXPECT(jr.isMember(jss::validated_ledger_index));
}
// tec failure
{
auto const baseFee = env.current()->fees().base;
auto const aliceSeq = env.seq(alice);
env(fset(bob, asfRequireDest));
auto jtx = env.jt(pay(alice, bob, XRP(1)), seq(aliceSeq));
Serializer s;
jtx.stx->add(s);
auto const jr = env.rpc("submit", strHex(s.slice()))[jss::result];
env.close();
BEAST_EXPECT(jr.isMember(jss::account_sequence_available));
BEAST_EXPECT(
jr[jss::account_sequence_available].asUInt() == aliceSeq + 1);
BEAST_EXPECT(jr.isMember(jss::account_sequence_next));
BEAST_EXPECT(
jr[jss::account_sequence_next].asUInt() == aliceSeq + 1);
BEAST_EXPECT(jr.isMember(jss::open_ledger_cost));
BEAST_EXPECT(jr[jss::open_ledger_cost] == to_string(baseFee));
BEAST_EXPECT(jr.isMember(jss::validated_ledger_index));
}
// tem failure
{
auto const baseFee = env.current()->fees().base;
auto const aliceSeq = env.seq(alice);
auto jtx = env.jt(pay(alice, bob, XRP(1)), seq(aliceSeq + 1));
Serializer s;
jtx.stx->add(s);
auto const jr = env.rpc("submit", strHex(s.slice()))[jss::result];
env.close();
BEAST_EXPECT(jr.isMember(jss::account_sequence_available));
BEAST_EXPECT(
jr[jss::account_sequence_available].asUInt() == aliceSeq);
BEAST_EXPECT(jr.isMember(jss::account_sequence_next));
BEAST_EXPECT(jr[jss::account_sequence_next].asUInt() == aliceSeq);
BEAST_EXPECT(jr.isMember(jss::open_ledger_cost));
BEAST_EXPECT(jr[jss::open_ledger_cost] == to_string(baseFee));
BEAST_EXPECT(jr.isMember(jss::validated_ledger_index));
}
}
void
testBatchCalculateBaseFee(FeatureBitset features)
{
using namespace jtx;
Env env(*this);
Account const alice("alice");
Account const bob("bob");
Account const carol("carol");
env.fund(XRP(10000), alice, bob, carol);
env.close();
auto getBaseFee = [&](JTx const& jtx) -> XRPAmount {
Serializer s;
jtx.stx->add(s);
return Batch::calculateBaseFee(*env.current(), *jtx.stx);
};
// bad: Inner Batch transaction found
{
auto const seq = env.seq(alice);
XRPAmount const batchFee = batch::calcBatchFee(env, 0, 2);
auto jtx = env.jt(
batch::outer(alice, seq, batchFee, tfAllOrNothing),
batch::inner(
batch::outer(alice, seq, batchFee, tfAllOrNothing), seq),
batch::inner(pay(alice, bob, XRP(1)), seq + 2));
XRPAmount const txBaseFee = getBaseFee(jtx);
BEAST_EXPECT(txBaseFee == XRPAmount(INITIAL_XRP));
}
// bad: Raw Transactions array exceeds max entries.
{
auto const seq = env.seq(alice);
XRPAmount const batchFee = batch::calcBatchFee(env, 0, 2);
auto jtx = env.jt(
batch::outer(alice, seq, batchFee, tfAllOrNothing),
batch::inner(pay(alice, bob, XRP(1)), seq + 1),
batch::inner(pay(alice, bob, XRP(1)), seq + 2),
batch::inner(pay(alice, bob, XRP(1)), seq + 3),
batch::inner(pay(alice, bob, XRP(1)), seq + 4),
batch::inner(pay(alice, bob, XRP(1)), seq + 5),
batch::inner(pay(alice, bob, XRP(1)), seq + 6),
batch::inner(pay(alice, bob, XRP(1)), seq + 7),
batch::inner(pay(alice, bob, XRP(1)), seq + 8),
batch::inner(pay(alice, bob, XRP(1)), seq + 9));
XRPAmount const txBaseFee = getBaseFee(jtx);
BEAST_EXPECT(txBaseFee == XRPAmount(INITIAL_XRP));
}
// bad: Signers array exceeds max entries.
{
auto const seq = env.seq(alice);
XRPAmount const batchFee = batch::calcBatchFee(env, 0, 2);
auto jtx = env.jt(
batch::outer(alice, seq, batchFee, tfAllOrNothing),
batch::inner(pay(alice, bob, XRP(10)), seq + 1),
batch::inner(pay(alice, bob, XRP(5)), seq + 2),
batch::sig(
bob,
carol,
alice,
bob,
carol,
alice,
bob,
carol,
alice,
alice));
XRPAmount const txBaseFee = getBaseFee(jtx);
BEAST_EXPECT(txBaseFee == XRPAmount(INITIAL_XRP));
}
// good:
{
auto const seq = env.seq(alice);
XRPAmount const batchFee = batch::calcBatchFee(env, 0, 2);
auto jtx = env.jt(
batch::outer(alice, seq, batchFee, tfAllOrNothing),
batch::inner(pay(alice, bob, XRP(1)), seq + 1),
batch::inner(pay(bob, alice, XRP(2)), seq + 2));
XRPAmount const txBaseFee = getBaseFee(jtx);
BEAST_EXPECT(txBaseFee == batchFee);
}
}
void void
testWithFeats(FeatureBitset features) testWithFeats(FeatureBitset features)
{ {
@@ -3983,6 +4155,8 @@ class Batch_test : public beast::unit_test::suite
testBatchTxQueue(features); testBatchTxQueue(features);
testBatchNetworkOps(features); testBatchNetworkOps(features);
testBatchDelegate(features); testBatchDelegate(features);
testValidateRPCResponse(features);
testBatchCalculateBaseFee(features);
} }
public: public:

View File

@@ -96,7 +96,7 @@ Env::AppBundle::~AppBundle()
if (app) if (app)
{ {
app->getJobQueue().rendezvous(); app->getJobQueue().rendezvous();
app->signalStop(); app->signalStop("~AppBundle");
} }
if (thread.joinable()) if (thread.joinable())
thread.join(); thread.join();

View File

@@ -285,7 +285,7 @@ public:
config_->CONFIG_DIR), config_->CONFIG_DIR),
*this, *this,
logs_->journal("PerfLog"), logs_->journal("PerfLog"),
[this] { signalStop(); })) [this] { signalStop("PerfLog"); }))
, m_txMaster(*this) , m_txMaster(*this)
@@ -505,7 +505,7 @@ public:
void void
run() override; run() override;
void void
signalStop(std::string msg = "") override; signalStop(std::string msg) override;
bool bool
checkSigs() const override; checkSigs() const override;
void void
@@ -977,7 +977,7 @@ public:
if (!config_->standalone() && if (!config_->standalone() &&
!getRelationalDatabase().transactionDbHasSpace(*config_)) !getRelationalDatabase().transactionDbHasSpace(*config_))
{ {
signalStop(); signalStop("Out of transaction DB space");
} }
// VFALCO NOTE Does the order of calls matter? // VFALCO NOTE Does the order of calls matter?
@@ -1193,7 +1193,7 @@ ApplicationImp::setup(boost::program_options::variables_map const& cmdline)
JLOG(m_journal.info()) << "Received signal " << signum; JLOG(m_journal.info()) << "Received signal " << signum;
if (signum == SIGTERM || signum == SIGINT) if (signum == SIGTERM || signum == SIGINT)
signalStop(); signalStop("Signal: " + to_string(signum));
}); });
auto debug_log = config_->getDebugLogFile(); auto debug_log = config_->getDebugLogFile();

View File

@@ -141,7 +141,7 @@ public:
virtual void virtual void
run() = 0; run() = 0;
virtual void virtual void
signalStop(std::string msg = "") = 0; signalStop(std::string msg) = 0;
virtual bool virtual bool
checkSigs() const = 0; checkSigs() const = 0;
virtual void virtual void

View File

@@ -1701,7 +1701,7 @@ NetworkOPsImp::apply(std::unique_lock<std::mutex>& batchLock)
} }
} }
if (!isTemMalformed(e.result) && validatedLedgerIndex) if (validatedLedgerIndex)
{ {
auto [fee, accountSeq, availableSeq] = auto [fee, accountSeq, availableSeq] =
app_.getTxQ().getTxRequiredFeeAndSeq( app_.getTxQ().getTxRequiredFeeAndSeq(

View File

@@ -61,7 +61,10 @@ Batch::calculateBaseFee(ReadView const& view, STTx const& tx)
// LCOV_EXCL_START // LCOV_EXCL_START
if (baseFee > maxAmount - view.fees().base) if (baseFee > maxAmount - view.fees().base)
throw std::overflow_error("XRPAmount overflow"); {
JLOG(debugLog().error()) << "BatchTrace: Base fee overflow detected.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
XRPAmount const batchBase = view.fees().base + baseFee; XRPAmount const batchBase = view.fees().base + baseFee;
@@ -72,32 +75,36 @@ Batch::calculateBaseFee(ReadView const& view, STTx const& tx)
{ {
auto const& txns = tx.getFieldArray(sfRawTransactions); auto const& txns = tx.getFieldArray(sfRawTransactions);
XRPL_ASSERT(
txns.size() <= maxBatchTxCount,
"Raw Transactions array exceeds max entries.");
// LCOV_EXCL_START // LCOV_EXCL_START
if (txns.size() > maxBatchTxCount) if (txns.size() > maxBatchTxCount)
throw std::length_error( {
"Raw Transactions array exceeds max entries"); JLOG(debugLog().error())
<< "BatchTrace: Raw Transactions array exceeds max entries.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
for (STObject txn : txns) for (STObject txn : txns)
{ {
STTx const stx = STTx{std::move(txn)}; STTx const stx = STTx{std::move(txn)};
XRPL_ASSERT(
stx.getTxnType() != ttBATCH, "Inner Batch transaction found.");
// LCOV_EXCL_START // LCOV_EXCL_START
if (stx.getTxnType() == ttBATCH) if (stx.getTxnType() == ttBATCH)
throw std::invalid_argument("Inner Batch transaction found"); {
JLOG(debugLog().error())
<< "BatchTrace: Inner Batch transaction found.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
auto const fee = ripple::calculateBaseFee(view, stx); auto const fee = ripple::calculateBaseFee(view, stx);
// LCOV_EXCL_START // LCOV_EXCL_START
if (txnFees > maxAmount - fee) if (txnFees > maxAmount - fee)
throw std::overflow_error("XRPAmount overflow"); {
JLOG(debugLog().error())
<< "BatchTrace: XRPAmount overflow in txnFees calculation.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
txnFees += fee; txnFees += fee;
} }
@@ -108,13 +115,14 @@ Batch::calculateBaseFee(ReadView const& view, STTx const& tx)
if (tx.isFieldPresent(sfBatchSigners)) if (tx.isFieldPresent(sfBatchSigners))
{ {
auto const& signers = tx.getFieldArray(sfBatchSigners); auto const& signers = tx.getFieldArray(sfBatchSigners);
XRPL_ASSERT(
signers.size() <= maxBatchTxCount,
"Batch Signers array exceeds max entries.");
// LCOV_EXCL_START // LCOV_EXCL_START
if (signers.size() > maxBatchTxCount) if (signers.size() > maxBatchTxCount)
throw std::length_error("Batch Signers array exceeds max entries"); {
JLOG(debugLog().error())
<< "BatchTrace: Batch Signers array exceeds max entries.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
for (STObject const& signer : signers) for (STObject const& signer : signers)
@@ -128,16 +136,28 @@ Batch::calculateBaseFee(ReadView const& view, STTx const& tx)
// LCOV_EXCL_START // LCOV_EXCL_START
if (signerCount > 0 && view.fees().base > maxAmount / signerCount) if (signerCount > 0 && view.fees().base > maxAmount / signerCount)
throw std::overflow_error("XRPAmount overflow"); {
JLOG(debugLog().error())
<< "BatchTrace: XRPAmount overflow in signerCount calculation.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
XRPAmount signerFees = signerCount * view.fees().base; XRPAmount signerFees = signerCount * view.fees().base;
// LCOV_EXCL_START // LCOV_EXCL_START
if (signerFees > maxAmount - txnFees) if (signerFees > maxAmount - txnFees)
throw std::overflow_error("XRPAmount overflow"); {
JLOG(debugLog().error())
<< "BatchTrace: XRPAmount overflow in signerFees calculation.";
return XRPAmount{INITIAL_XRP};
}
if (txnFees + signerFees > maxAmount - batchBase) if (txnFees + signerFees > maxAmount - batchBase)
throw std::overflow_error("XRPAmount overflow"); {
JLOG(debugLog().error())
<< "BatchTrace: XRPAmount overflow in total fee calculation.";
return XRPAmount{INITIAL_XRP};
}
// LCOV_EXCL_STOP // LCOV_EXCL_STOP
// 10 drops per batch signature + sum of inner tx fees + batchBase // 10 drops per batch signature + sum of inner tx fees + batchBase

View File

@@ -3440,7 +3440,7 @@ PeerImp::processLedgerRequest(std::shared_ptr<protocol::TMGetLedger> const& m)
if (!m->has_ledgerhash()) if (!m->has_ledgerhash())
info += ", no hash specified"; info += ", no hash specified";
JLOG(p_journal_.error()) JLOG(p_journal_.warn())
<< "processLedgerRequest: getNodeFat with nodeId " << "processLedgerRequest: getNodeFat with nodeId "
<< *shaMapNodeId << " and ledger info type " << info << *shaMapNodeId << " and ledger info type " << info
<< " throws exception: " << e.what(); << " throws exception: " << e.what();

View File

@@ -31,7 +31,7 @@ struct JsonContext;
Json::Value Json::Value
doStop(RPC::JsonContext& context) doStop(RPC::JsonContext& context)
{ {
context.app.signalStop(); context.app.signalStop("RPC");
return RPC::makeObjectValue(systemName() + " server stopping"); return RPC::makeObjectValue(systemName() + " server stopping");
} }