22#include <xrpl/protocol/Feature.h>
23#include <xrpl/protocol/jss.h>
46 Json::Value const meta = env.
rpc(
"tx", txHash)[jss::result][jss::meta];
49 if (!BEAST_EXPECT(meta.
isMember(sfDeliveredAmount.jsonName)))
55 BEAST_EXPECT(meta[sfDeliveredAmount.jsonName] == jsonExpect);
56 BEAST_EXPECT(meta[jss::delivered_amount] == jsonExpect);
70 jv[jss::TransactionType] = jss::PaymentChannelCreate;
71 jv[jss::Account] = account.human();
72 jv[jss::Destination] = to.
human();
74 jv[sfSettleDelay.jsonName] = settleDelay.
count();
94 env.fund(
XRP(10000), alice, becky, carol, gw);
110 auto const acctDelFee{
drops(env.current()->fees().increment)};
122 env(
trust(becky, gw[
"USD"](1000)));
129 env(
offer(carol, gw[
"USD"](51),
XRP(51)));
132 env(
signers(carol, 1, {{alice, 1}, {becky, 1}}));
151 auto const aliceOldBalance{env.balance(alice)};
152 auto const beckyOldBalance{env.balance(becky)};
168 env.balance(becky) ==
169 aliceOldBalance + beckyOldBalance - acctDelFee);
190 for (
int i = 0; i < 8; ++i)
194 auto const beckyOldBalance{env.balance(becky)};
195 auto const carolOldBalance{env.balance(carol)};
201 BEAST_EXPECT(env.closed()->exists(
205 BEAST_EXPECT(env.closed()->exists(
218 BEAST_EXPECT(!env.closed()->exists(
220 BEAST_EXPECT(!env.closed()->exists(
222 BEAST_EXPECT(!env.closed()->exists(
228 env.balance(becky) ==
229 carolOldBalance + beckyOldBalance - acctDelFee);
251 env.fund(
XRP(10000), alice, gw);
255 for (
int i{0}; i < 45; ++i)
257 env(
offer(alice, gw[
"USD"](1),
XRP(1)));
260 env.require(
offers(alice, 45));
268 BEAST_EXPECT(env.closed()->exists(aliceRootKey));
269 BEAST_EXPECT(env.closed()->exists(alicePageKey));
272 auto const acctDelFee{
drops(env.current()->fees().increment)};
273 auto const aliceBalance{env.balance(alice)};
279 BEAST_EXPECT(!env.closed()->exists(aliceRootKey));
280 BEAST_EXPECT(!env.closed()->exists(alicePageKey));
300 env.fund(
XRP(100000), alice, becky, gw);
306 for (
int i{0}; i < 200; ++i)
308 env(
offer(alice, gw[
"USD"](1),
XRP(1)));
309 env(
offer(becky, gw[
"USD"](1),
XRP(1)));
312 env.require(
offers(alice, 200));
313 env.require(
offers(becky, 200));
327 auto const acctDelFee{
drops(env.current()->fees().increment)};
338 using namespace std::chrono_literals;
354 bool const withTokenEscrow =
355 env.current()->rules().enabled(featureTokenEscrow);
360 auto const USD = gw1[
"USD"];
361 env.fund(
XRP(100000), carol, gw1);
364 env.trust(USD(10000), carol);
366 env(
pay(gw1, carol, USD(100)));
389 Keylet const alicePayChanKey{
393 alice, becky,
XRP(57), 4s, env.now() + 2s, alice.
pk()));
399 auto const beckyBalance{env.balance(becky)};
410 Keylet const& payChanKeylet,
413 jv[jss::TransactionType] = jss::PaymentChannelClaim;
415 jv[jss::Account] = account.human();
416 jv[sfChannel.jsonName] =
to_string(payChanKeylet.key);
417 jv[sfPublicKey.jsonName] =
strHex(pk.slice());
420 env(payChanClose(alice, alicePayChanKey, alice.
pk()));
425 env.enableFeature(fixPayChanRecipientOwnerDir);
442 env(payChanClose(alice, gwPayChanKey, alice.
pk()));
446 auto const aliceBalance{env.balance(alice)};
468 env.fund(
XRP(10000), alice, becky);
473 BEAST_EXPECT(env.closed()->exists(beckyAcctKey));
475 using namespace std::chrono_literals;
477 auto const payChanXRP =
XRP(37);
480 alice, becky, payChanXRP, 4s, env.now() + 1h, alice.
pk()));
482 BEAST_EXPECT(env.closed()->exists(payChanKey));
487 auto const beckyPreDelBalance{env.balance(becky)};
489 auto const acctDelFee{
drops(env.current()->fees().increment)};
495 BEAST_EXPECT(!env.closed()->exists(beckyAcctKey));
501 drops(env.current()->fees().accountReserve(0)) -
XRP(1)),
506 env(
pay(alice, becky,
XRP(10)));
510 BEAST_EXPECT(env.closed()->exists(beckyAcctKey));
511 BEAST_EXPECT(env.balance(becky) ==
XRP(10));
515 auto payChanClaim = [&]() {
517 jv[jss::TransactionType] = jss::PaymentChannelClaim;
518 jv[jss::Account] = alice.
human();
519 jv[sfChannel.jsonName] =
to_string(payChanKey.key);
520 jv[sfBalance.jsonName] =
527 BEAST_EXPECT(env.balance(becky) ==
XRP(10) + payChanXRP);
543 env.fund(
XRP(10000), alice, becky);
551 BEAST_EXPECT(env.closed()->exists(aliceAcctKey));
553 auto const alicePreDelBal{env.balance(alice)};
554 auto const beckyPreDelBal{env.balance(becky)};
556 auto const acctDelFee{
drops(env.current()->fees().increment)};
562 BEAST_EXPECT(env.current()->exists(aliceAcctKey));
563 BEAST_EXPECT(env.balance(alice) == alicePreDelBal);
564 BEAST_EXPECT(env.balance(becky) == beckyPreDelBal);
568 env.enableFeature(featureDeletableAccounts);
572 BEAST_EXPECT(env.closed()->exists(aliceAcctKey));
576 BEAST_EXPECT(!env.current()->exists(aliceAcctKey));
578 env.balance(becky) == alicePreDelBal + beckyPreDelBal - acctDelFee);
581 BEAST_EXPECT(!env.closed()->exists(aliceAcctKey));
597 env.fund(
XRP(10000000), alice, gw);
607 constexpr int offerCount{1001};
608 for (
int i{0}; i < offerCount; ++i)
610 env(
offer(alice, gw[currency](1),
XRP(1)));
615 if (currency[0] >
'Z')
620 if (currency[1] >
'Z')
625 if (currency[2] >
'Z')
641 BEAST_EXPECT(closed->exists(aliceOwnerDirKey));
645 BEAST_EXPECT(closed->exists(
keylet::page(aliceOwnerDirKey, i)));
655 auto const acctDelFee{
drops(env.current()->fees().increment)};
660 env.require(
offers(alice, offerCount));
663 env.require(
offers(alice, offerCount - 1));
666 auto const alicePreDelBal{env.balance(alice)};
676 BEAST_EXPECT(!closed->exists(aliceOwnerDirKey));
697 testcase(
"Implicitly created trust line");
702 auto const BUX{gw[
"BUX"]};
704 env.fund(
XRP(10000), alice, gw);
709 env(
offer(alice, BUX(30),
XRP(30)));
715 env.require(
balance(alice, BUX(30)));
722 auto const acctDelFee{
drops(env.current()->fees().increment)};
742 testcase(
"Balance too small for fee");
750 env.fund(env.current()->fees().accountReserve(0),
noripple(alice));
755 env(
noop(alice),
fee(env.balance(alice) -
XRP(1)));
758 auto const acctDelFee{
drops(env.current()->fees().increment)};
759 BEAST_EXPECT(acctDelFee > env.balance(alice));
765 auto const masterBalance{env.balance(env.master)};
773 BEAST_EXPECT(env.balance(env.master) == masterBalance);
778 BEAST_EXPECT(env.balance(alice) ==
XRP(1));
784 BEAST_EXPECT(env.balance(env.master) == masterBalance);
793 using namespace test::jtx;
799 env.
fund(
XRP(100000), alice, bob);
806 env.require(
owners(bob, 250));
823 auto const acctDelFee{
drops(env.current()->fees().increment)};
824 auto const bobOldBalance{env.balance(bob)};
842 testcase(
"Destination Constraints");
844 using namespace test::jtx;
852 env.
fund(
XRP(100000), alice, becky, carol);
869 auto const acctDelFee{
drops(env.current()->fees().increment)};
888 auto const beckyOldBalance{env.balance(becky)};
899 "Destination Constraints with DepositPreauth and Credentials");
901 using namespace test::jtx;
908 char const credType[] =
"abcd";
911 env.
fund(
XRP(100000), alice, becky, carol, daria);
921 std::string const credIdx = jv[jss::result][jss::index].asString();
926 auto const acctDelFee{
drops(env.current()->fees().increment)};
986 {
"48004829F915654A81B11C4AB8218D96FED67F209B58328A72314FB6E"
1000 auto const jNoCred =
1003 jNoCred.isObject() && jNoCred.isMember(jss::result) &&
1004 jNoCred[jss::result].isMember(jss::error) &&
1005 jNoCred[jss::result][jss::error] ==
"entryNotFound");
1008 testcase(
"Credentials that aren't required");
1016 env, daria, carol, credType)[jss::result][jss::index]
1027 auto const jNoCred =
1031 jNoCred.isObject() && jNoCred.isMember(jss::result) &&
1032 jNoCred[jss::result].isMember(jss::error) &&
1033 jNoCred[jss::result][jss::error] ==
"entryNotFound");
1040 env.fund(
XRP(5000), eaton, fred);
1049 env, eaton, carol, credType)[jss::result][jss::index]
1060 auto const acctDelFee{
drops(env.current()->fees().increment)};
1070 auto const jNoCred =
1074 jNoCred.isObject() && jNoCred.isMember(jss::result) &&
1075 jNoCred[jss::result].isMember(jss::error) &&
1076 jNoCred[jss::result][jss::error] ==
"entryNotFound");
1083 env.fund(
XRP(10000), john);
1087 uint32_t
const t = env.current()
1089 .parentCloseTime.time_since_epoch()
1092 jv[sfExpiration.jsonName] = t;
1099 jv[jss::result][jss::index].asString();
1116 jv.isObject() && jv.isMember(jss::result) &&
1117 jv[jss::result].isMember(jss::error) &&
1118 jv[jss::result][jss::error] ==
"entryNotFound");
1124 testcase(
"Credentials feature disabled");
1125 using namespace test::jtx;
1132 env.fund(
XRP(100000), alice, becky, carol);
1144 auto const acctDelFee{
drops(env.current()->fees().increment)};
1147 "098B7F1B146470A1C5084DC7832C04A72939E3EBC58E68AB8B579BA072B0CE"
1166 testcase(
"Deleting Issuer deletes issued credentials");
1168 using namespace test::jtx;
1174 char const credType[] =
"abcd";
1177 env.
fund(
XRP(100000), alice, becky, carol);
1189 std::string const credIdx = jv[jss::result][jss::index].asString();
1194 auto const acctDelFee{
drops(env.current()->fees().increment)};
1199 BEAST_EXPECT(!env.le(credIdx));
1203 jv.isObject() && jv.isMember(jss::result) &&
1204 jv[jss::result].isMember(jss::error) &&
1205 jv[jss::result][jss::error] ==
"entryNotFound");
1210 testcase(
"Deleting Subject deletes issued credentials");
1212 using namespace test::jtx;
1218 char const credType[] =
"abcd";
1221 env.
fund(
XRP(100000), alice, becky, carol);
1233 std::string const credIdx = jv[jss::result][jss::index].asString();
1238 auto const acctDelFee{
drops(env.current()->fees().increment)};
1243 BEAST_EXPECT(!env.le(credIdx));
1247 jv.isObject() && jv.isMember(jss::result) &&
1248 jv[jss::result].isMember(jss::error) &&
1249 jv[jss::result][jss::error] ==
"entryNotFound");
std::string asString() const
Returns the unquoted string value.
bool isMember(char const *key) const
Return true if the object has a member named key.
testcase_t testcase
Memberspace for declaring test cases.
Slice slice() const noexcept
Json::Value getJson(JsonOptions=JsonOptions::none) const override
void testBalanceTooSmallForFee()
void verifyDeliveredAmount(jtx::Env &env, STAmount const &amount)
void testDeleteCredentialsOwner()
void run() override
Runs the suite.
void testAmendmentEnable()
void testDestinationDepositAuthCredentials()
static Json::Value payChanCreate(jtx::Account const &account, jtx::Account const &to, STAmount const &amount, NetClock::duration const &settleDelay, NetClock::time_point const &cancelAfter, PublicKey const &pk)
void testImplicitlyCreatedTrustline()
Immutable cryptographic account descriptor.
PublicKey const & pk() const
Return the public key.
AccountID id() const
Returns the Account ID.
static Account const master
The master account.
std::string const & human() const
Returns the human readable public key.
A transaction testing environment.
std::shared_ptr< STTx const > tx() const
Return the tx data for the last JTx.
bool close(NetClock::time_point closeTime, std::optional< std::chrono::milliseconds > consensusDelay=std::nullopt)
Close and advance the ledger.
Json::Value rpc(unsigned apiVersion, std::unordered_map< std::string, std::string > const &headers, std::string const &cmd, Args &&... args)
Execute an RPC command.
void fund(bool setDefaultRipple, STAmount const &amount, Account const &account)
Set a multisignature on a JTx.
Match the number of items in the account's owner directory.
Set the regular signature on a JTx.
Set the expected result code for a JTx The test will fail if the code doesn't match.
Set a ticket sequence on a JTx.
Keylet account(AccountID const &id) noexcept
AccountID root.
Keylet page(uint256 const &root, std::uint64_t index=0) noexcept
A page in a directory.
Keylet ownerDir(AccountID const &id) noexcept
The root page of an account's directory.
Keylet signers(AccountID const &account) noexcept
A SignerList.
static ticket_t const ticket
Keylet check(AccountID const &id, std::uint32_t seq) noexcept
A Check.
Keylet offer(AccountID const &id, std::uint32_t seq) noexcept
An offer from an account.
Keylet depositPreauth(AccountID const &owner, AccountID const &preauthorized) noexcept
A DepositPreauth.
Keylet payChan(AccountID const &src, AccountID const &dst, std::uint32_t seq) noexcept
A PaymentChannel.
Json::Value create(A const &account, A const &dest, STAmount const &sendMax)
Create a check.
Json::Value cancel(jtx::Account const &dest, uint256 const &checkId)
Cancel a check.
Json::Value create(jtx::Account const &subject, jtx::Account const &issuer, std::string_view credType)
Json::Value accept(jtx::Account const &subject, jtx::Account const &issuer, std::string_view credType)
Json::Value ledgerEntry(jtx::Env &env, jtx::Account const &subject, jtx::Account const &issuer, std::string_view credType)
Json::Value auth(Account const &account, Account const &auth)
Preauthorize for deposit.
Json::Value authCredentials(jtx::Account const &account, std::vector< AuthorizeCredentials > const &auth)
Json::Value setValid(jtx::Account const &account)
Json::Value create(AccountID const &account, AccountID const &to, STAmount const &amount)
Json::Value cancel(AccountID const &account, Account const &from, std::uint32_t seq)
Json::Value create(Account const &account, std::uint32_t count)
Create one of more tickets.
Json::Value regkey(Account const &account, disabled_t)
Disable the regular key.
Json::Value signers(Account const &account, std::uint32_t quorum, std::vector< signer > const &v)
owner_count< ltOFFER > offers
Match the number of offers in the account's owner directory.
PrettyAmount drops(Integer i)
Returns an XRP PrettyAmount, which is trivially convertible to STAmount.
Json::Value trust(Account const &account, STAmount const &amount, std::uint32_t flags)
Modify a trust line.
Json::Value fset(Account const &account, std::uint32_t on, std::uint32_t off=0)
Add and/or remove flag.
Json::Value pay(AccountID const &account, AccountID const &to, AnyAmount amount)
Create a payment.
FeatureBitset testable_amendments()
void incLgrSeqForAccDel(jtx::Env &env, jtx::Account const &acc, std::uint32_t margin=0)
Json::Value offer(Account const &account, STAmount const &takerPays, STAmount const &takerGets, std::uint32_t flags)
Create an offer.
Json::Value acctdelete(Account const &account, Account const &dest)
Delete account.
XRP_t const XRP
Converts to XRP Issue or STAmount.
Json::Value offer_cancel(Account const &account, std::uint32_t offerSeq)
Cancel an offer.
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
constexpr std::uint32_t asfDepositAuth
constexpr std::uint32_t asfAllowTrustLineLocking
constexpr std::uint32_t asfRequireDest
constexpr std::uint32_t tfImmediateOrCancel
std::string strHex(FwdIt begin, FwdIt end)
std::string to_string(base_uint< Bits, Tag > const &a)
constexpr std::uint32_t tfClose
A pair of SHAMap key and LedgerEntryType.
Set the "CancelAfter" time tag on a JTx.
Set the "FinishAfter" time tag on a JTx.
T time_since_epoch(T... args)