rippled
Loading...
Searching...
No Matches
AmendmentBlocked_test.cpp
1#include <test/jtx.h>
2#include <test/jtx/WSClient.h>
3
4#include <xrpld/app/misc/NetworkOPs.h>
5#include <xrpld/core/ConfigSections.h>
6
7#include <xrpl/protocol/jss.h>
8
9namespace xrpl {
10
12{
13 void
15 {
16 using namespace test::jtx;
17 Env env{*this, envconfig([](std::unique_ptr<Config> cfg) {
18 cfg->loadFromString("[" SECTION_SIGNING_SUPPORT "]\ntrue");
19 return cfg;
20 })};
21 auto const gw = Account{"gateway"};
22 auto const USD = gw["USD"];
23 auto const alice = Account{"alice"};
24 auto const bob = Account{"bob"};
25 Account const ali{"ali", KeyType::secp256k1};
26 env.fund(XRP(10000), alice, bob, gw);
27 env.memoize(ali);
28 // This close() ensures that all the accounts get created and their
29 // default ripple flag gets set before the trust lines are created.
30 // Without it, the ordering manages to create alice's trust line with
31 // noRipple set on gw's end. The existing tests pass either way, but
32 // better to do it right.
33 env.close();
34 env.trust(USD(600), alice);
35 env.trust(USD(700), bob);
36 env(pay(gw, alice, USD(70)));
37 env(pay(gw, bob, USD(50)));
38 env.close();
39
40 auto wsc = test::makeWSClient(env.app().config());
41
42 auto current = env.current();
43 // ledger_accept
44 auto jr = env.rpc("ledger_accept")[jss::result];
45 BEAST_EXPECT(jr[jss::ledger_current_index] == current->seq() + 1);
46 BEAST_EXPECT(!jr.isMember(jss::warnings));
47
48 // ledger_current
49 jr = env.rpc("ledger_current")[jss::result];
50 BEAST_EXPECT(jr[jss::ledger_current_index] == current->seq() + 1);
51 BEAST_EXPECT(!jr.isMember(jss::warnings));
52
53 // owner_info
54 jr = env.rpc("owner_info", alice.human())[jss::result];
55 BEAST_EXPECT(jr.isMember(jss::accepted) && jr.isMember(jss::current));
56 BEAST_EXPECT(!jr.isMember(jss::warnings));
57
58 // path_find
59 Json::Value pf_req;
60 pf_req[jss::subcommand] = "create";
61 pf_req[jss::source_account] = alice.human();
62 pf_req[jss::destination_account] = bob.human();
63 pf_req[jss::destination_amount] = bob["USD"](20).value().getJson(JsonOptions::none);
64 jr = wsc->invoke("path_find", pf_req)[jss::result];
65 BEAST_EXPECT(
66 jr.isMember(jss::alternatives) && jr[jss::alternatives].isArray() && jr[jss::alternatives].size() == 1);
67 BEAST_EXPECT(!jr.isMember(jss::warnings));
68
69 // submit
70 auto jt = env.jt(noop(alice));
71 Serializer s;
72 jt.stx->add(s);
73 jr = env.rpc("submit", strHex(s.slice()))[jss::result];
74 BEAST_EXPECT(jr.isMember(jss::engine_result) && jr[jss::engine_result] == "tesSUCCESS");
75 BEAST_EXPECT(!jr.isMember(jss::warnings));
76
77 // submit_multisigned
78 env(signers(bob, 1, {{alice, 1}}), sig(bob));
79 env(regkey(alice, ali));
80 env.close();
81
82 Json::Value set_tx;
83 set_tx[jss::Account] = bob.human();
84 set_tx[jss::TransactionType] = jss::AccountSet;
85 set_tx[jss::Fee] = (8 * env.current()->fees().base).jsonClipped();
86 set_tx[jss::Sequence] = env.seq(bob);
87 set_tx[jss::SigningPubKey] = "";
88
89 Json::Value sign_for;
90 sign_for[jss::tx_json] = set_tx;
91 sign_for[jss::account] = alice.human();
92 sign_for[jss::secret] = ali.name();
93 jr = env.rpc("json", "sign_for", to_string(sign_for))[jss::result];
94 BEAST_EXPECT(jr[jss::status] == "success");
95 BEAST_EXPECT(!jr.isMember(jss::warnings));
96
97 Json::Value ms_req;
98 ms_req[jss::tx_json] = jr[jss::tx_json];
99 jr = env.rpc("json", "submit_multisigned", to_string(ms_req))[jss::result];
100 BEAST_EXPECT(jr.isMember(jss::engine_result) && jr[jss::engine_result] == "tesSUCCESS");
101 BEAST_EXPECT(!jr.isMember(jss::warnings));
102
103 // set up an amendment warning. Nothing changes
104
105 env.app().getOPs().setAmendmentWarned();
106
107 current = env.current();
108 // ledger_accept
109 jr = env.rpc("ledger_accept")[jss::result];
110 BEAST_EXPECT(jr[jss::ledger_current_index] == current->seq() + 1);
111 BEAST_EXPECT(!jr.isMember(jss::warnings));
112
113 // ledger_current
114 jr = env.rpc("ledger_current")[jss::result];
115 BEAST_EXPECT(jr[jss::ledger_current_index] == current->seq() + 1);
116 BEAST_EXPECT(!jr.isMember(jss::warnings));
117
118 // owner_info
119 jr = env.rpc("owner_info", alice.human())[jss::result];
120 BEAST_EXPECT(jr.isMember(jss::accepted) && jr.isMember(jss::current));
121 BEAST_EXPECT(!jr.isMember(jss::warnings));
122
123 // path_find
124 pf_req[jss::subcommand] = "create";
125 pf_req[jss::source_account] = alice.human();
126 pf_req[jss::destination_account] = bob.human();
127 pf_req[jss::destination_amount] = bob["USD"](20).value().getJson(JsonOptions::none);
128 jr = wsc->invoke("path_find", pf_req)[jss::result];
129 BEAST_EXPECT(
130 jr.isMember(jss::alternatives) && jr[jss::alternatives].isArray() && jr[jss::alternatives].size() == 1);
131 BEAST_EXPECT(!jr.isMember(jss::warnings));
132
133 // submit
134 jt = env.jt(noop(alice));
135 s.erase();
136 jt.stx->add(s);
137 jr = env.rpc("submit", strHex(s.slice()))[jss::result];
138 BEAST_EXPECT(jr.isMember(jss::engine_result) && jr[jss::engine_result] == "tesSUCCESS");
139 BEAST_EXPECT(!jr.isMember(jss::warnings));
140
141 // submit_multisigned
142 env(signers(bob, 1, {{alice, 1}}), sig(bob));
143 env(regkey(alice, ali));
144 env.close();
145
146 set_tx[jss::Account] = bob.human();
147 set_tx[jss::TransactionType] = jss::AccountSet;
148 set_tx[jss::Fee] = (8 * env.current()->fees().base).jsonClipped();
149 set_tx[jss::Sequence] = env.seq(bob);
150 set_tx[jss::SigningPubKey] = "";
151
152 sign_for[jss::tx_json] = set_tx;
153 sign_for[jss::account] = alice.human();
154 sign_for[jss::secret] = ali.name();
155 jr = env.rpc("json", "sign_for", to_string(sign_for))[jss::result];
156 BEAST_EXPECT(jr[jss::status] == "success");
157 BEAST_EXPECT(!jr.isMember(jss::warnings));
158
159 ms_req[jss::tx_json] = jr[jss::tx_json];
160 jr = env.rpc("json", "submit_multisigned", to_string(ms_req))[jss::result];
161 BEAST_EXPECT(jr.isMember(jss::engine_result) && jr[jss::engine_result] == "tesSUCCESS");
162 BEAST_EXPECT(!jr.isMember(jss::warnings));
163
164 // make the network amendment blocked...now all the same
165 // requests should fail
166
167 env.app().getOPs().setAmendmentBlocked();
168
169 // ledger_accept
170 jr = env.rpc("ledger_accept")[jss::result];
171 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
172 BEAST_EXPECT(jr[jss::status] == "error");
173 BEAST_EXPECT(!jr.isMember(jss::warnings));
174
175 // ledger_current
176 jr = env.rpc("ledger_current")[jss::result];
177 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
178 BEAST_EXPECT(jr[jss::status] == "error");
179 BEAST_EXPECT(!jr.isMember(jss::warnings));
180
181 // owner_info
182 jr = env.rpc("owner_info", alice.human())[jss::result];
183 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
184 BEAST_EXPECT(jr[jss::status] == "error");
185 BEAST_EXPECT(!jr.isMember(jss::warnings));
186
187 // path_find
188 jr = wsc->invoke("path_find", pf_req)[jss::result];
189 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
190 BEAST_EXPECT(jr[jss::status] == "error");
191 BEAST_EXPECT(!jr.isMember(jss::warnings));
192
193 // submit
194 jr = env.rpc("submit", strHex(s.slice()))[jss::result];
195 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
196 BEAST_EXPECT(jr[jss::status] == "error");
197 BEAST_EXPECT(!jr.isMember(jss::warnings));
198
199 // submit_multisigned
200 set_tx[jss::Sequence] = env.seq(bob);
201 sign_for[jss::tx_json] = set_tx;
202 jr = env.rpc("json", "sign_for", to_string(sign_for))[jss::result];
203 BEAST_EXPECT(jr[jss::status] == "success");
204 ms_req[jss::tx_json] = jr[jss::tx_json];
205 jr = env.rpc("json", "submit_multisigned", to_string(ms_req))[jss::result];
206 BEAST_EXPECT(jr.isMember(jss::error) && jr[jss::error] == "amendmentBlocked");
207 BEAST_EXPECT(!jr.isMember(jss::warnings));
208 }
209
210public:
211 void
212 run() override
213 {
215 }
216};
217
218BEAST_DEFINE_TESTSUITE(AmendmentBlocked, rpc, xrpl);
219
220} // namespace xrpl
Represents a JSON value.
Definition json_value.h:130
A testsuite class.
Definition suite.h:51
void run() override
Runs the suite.
Slice slice() const noexcept
Definition Serializer.h:44
std::unique_ptr< WSClient > makeWSClient(Config const &cfg, bool v2, unsigned rpc_version, std::unordered_map< std::string, std::string > const &headers)
Returns a client operating through WebSockets/S.
Definition WSClient.cpp:285
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
Definition algorithm.h:5
std::string to_string(base_uint< Bits, Tag > const &a)
Definition base_uint.h:597
std::string strHex(FwdIt begin, FwdIt end)
Definition strHex.h:10
@ current
This was a new validation and was added.