mirror of
https://github.com/XRPLF/rippled.git
synced 2025-12-06 17:27:55 +00:00
The DepositAuth feature allows an account to require that it signs for any funds that are deposited to the account. For the time being this limits the account to accepting only XRP, although there are plans to allow IOU payments in the future. The lsfDepositAuth protections are not extended to offers. If an account creates an offer it is in effect saying, “I will accept funds from anyone who takes this offer.” Therefore, the typical user of the lsfDepositAuth flag will choose never to create any offers. But they can if they so choose. The DepositAuth feature leaves a small gap in its protections. An XRP payment is allowed to a destination account with the lsfDepositAuth flag set if: - The Destination XRP balance is less than or equal to the base reserve and - The value of the XRP Payment is less than or equal to the base reserve. This exception is intended to make it impossible for an account to wedge itself by spending all of its XRP on fees and leave itself unable to pay the fee to get more XRP. This commit - adds featureDepositAuth, - adds the lsfDepositAuth flag, - adds support for lsfDepositAuth in SetAccount.cpp - adds support in Payment.cpp for rejecting payments that don't meet the lsfDepositAuth requirements, - adds unit tests for Payment transactions to an an account with lsfDepositAuth set. - adds Escrow and PayChan support for lsfDepositAuth along with as unit tests.
465 lines
16 KiB
C++
465 lines
16 KiB
C++
//------------------------------------------------------------------------------
|
|
/*
|
|
This file is part of rippled: https://github.com/ripple/rippled
|
|
Copyright (c) 2016 Ripple Labs Inc.
|
|
|
|
Permission to use, copy, modify, and/or distribute this software for any
|
|
purpose with or without fee is hereby granted, provided that the above
|
|
copyright notice and this permission notice appear in all copies.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
//==============================================================================
|
|
|
|
#include <ripple/basics/StringUtilities.h>
|
|
#include <ripple/protocol/AmountConversions.h>
|
|
#include <ripple/protocol/Feature.h>
|
|
#include <ripple/protocol/JsonFields.h>
|
|
#include <ripple/protocol/Quality.h>
|
|
#include <ripple/protocol/Rate.h>
|
|
#include <test/jtx.h>
|
|
|
|
namespace ripple {
|
|
|
|
class AccountSet_test : public beast::unit_test::suite
|
|
{
|
|
public:
|
|
|
|
void testNullAccountSet()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), noripple(alice));
|
|
//ask for the ledger entry - account root, to check its flags
|
|
auto const jrr = env.le(alice);
|
|
BEAST_EXPECT((*env.le(alice))[ sfFlags ] == 0u);
|
|
}
|
|
|
|
void testMostFlags()
|
|
{
|
|
using namespace test::jtx;
|
|
Account const alice ("alice");
|
|
|
|
// Test without DepositAuth enabled initially.
|
|
Env env(*this, supported_amendments() - featureDepositAuth);
|
|
env.fund(XRP(10000), noripple(alice));
|
|
|
|
// Give alice a regular key so she can legally set and clear
|
|
// her asfDisableMaster flag.
|
|
Account const alie {"alie", KeyType::secp256k1};
|
|
env(regkey (alice, alie));
|
|
env.close();
|
|
|
|
auto testFlags = [this, &alice, &alie, &env]
|
|
(std::initializer_list<std::uint32_t> goodFlags)
|
|
{
|
|
std::uint32_t const orig_flags = (*env.le(alice))[ sfFlags ];
|
|
for (std::uint32_t flag {1u};
|
|
flag < std::numeric_limits<std::uint32_t>::digits; ++flag)
|
|
{
|
|
if (flag == asfNoFreeze)
|
|
{
|
|
// The asfNoFreeze flag can't be cleared. It is tested
|
|
// elsewhere.
|
|
continue;
|
|
}
|
|
else if (std::find (goodFlags.begin(), goodFlags.end(), flag) !=
|
|
goodFlags.end())
|
|
{
|
|
// Good flag
|
|
env.require(nflags(alice, flag));
|
|
env(fset(alice, flag), sig(alice));
|
|
env.close();
|
|
env.require(flags(alice, flag));
|
|
env(fclear(alice, flag), sig(alie));
|
|
env.close();
|
|
env.require(nflags(alice, flag));
|
|
std::uint32_t const now_flags = (*env.le(alice))[ sfFlags ];
|
|
BEAST_EXPECT(now_flags == orig_flags);
|
|
}
|
|
else
|
|
{
|
|
// Bad flag
|
|
BEAST_EXPECT((*env.le(alice))[ sfFlags ] == orig_flags);
|
|
env(fset(alice, flag), sig(alice));
|
|
env.close();
|
|
BEAST_EXPECT((*env.le(alice))[ sfFlags ] == orig_flags);
|
|
env(fclear(alice, flag), sig(alie));
|
|
env.close();
|
|
BEAST_EXPECT((*env.le(alice))[ sfFlags ] == orig_flags);
|
|
}
|
|
}
|
|
};
|
|
|
|
// Test with featureDepositAuth disabled.
|
|
testFlags ({asfRequireDest, asfRequireAuth, asfDisallowXRP,
|
|
asfGlobalFreeze, asfDisableMaster, asfDefaultRipple});
|
|
|
|
// Enable featureDepositAuth and retest.
|
|
env.enableFeature (featureDepositAuth);
|
|
env.close();
|
|
testFlags ({asfRequireDest, asfRequireAuth, asfDisallowXRP,
|
|
asfGlobalFreeze, asfDisableMaster, asfDefaultRipple,
|
|
asfDepositAuth});
|
|
}
|
|
|
|
void testSetAndResetAccountTxnID()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), noripple(alice));
|
|
|
|
std::uint32_t const orig_flags = (*env.le(alice))[ sfFlags ];
|
|
|
|
// asfAccountTxnID is special and not actually set as a flag,
|
|
// so we check the field presence instead
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfAccountTxnID));
|
|
env(fset(alice, asfAccountTxnID), sig(alice));
|
|
BEAST_EXPECT(env.le(alice)->isFieldPresent(sfAccountTxnID));
|
|
env(fclear(alice, asfAccountTxnID));
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfAccountTxnID));
|
|
std::uint32_t const now_flags = (*env.le(alice))[ sfFlags ];
|
|
BEAST_EXPECT(now_flags == orig_flags);
|
|
}
|
|
|
|
void testSetNoFreeze()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), noripple(alice));
|
|
env.memoize("eric");
|
|
env(regkey(alice, "eric"));
|
|
|
|
env.require(nflags(alice, asfNoFreeze));
|
|
env(fset(alice, asfNoFreeze), sig("eric"), ter(tecNEED_MASTER_KEY));
|
|
env(fset(alice, asfNoFreeze), sig(alice));
|
|
env.require(flags(alice, asfNoFreeze));
|
|
env(fclear(alice, asfNoFreeze), sig(alice));
|
|
// verify flag is still set (clear does not clear in this case)
|
|
env.require(flags(alice, asfNoFreeze));
|
|
}
|
|
|
|
void testDomain()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
auto jt = noop(alice);
|
|
// The Domain field is represented as the hex string of the lowercase
|
|
// ASCII of the domain. For example, the domain example.com would be
|
|
// represented as "6578616d706c652e636f6d".
|
|
//
|
|
// To remove the Domain field from an account, send an AccountSet with
|
|
// the Domain set to an empty string.
|
|
std::string const domain = "example.com";
|
|
jt[sfDomain.fieldName] = strHex(domain);
|
|
env(jt);
|
|
BEAST_EXPECT((*env.le(alice))[ sfDomain ] == makeSlice(domain));
|
|
|
|
jt[sfDomain.fieldName] = "";
|
|
env(jt);
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfDomain));
|
|
|
|
// The upper limit on the length is 256 bytes
|
|
// (defined as DOMAIN_BYTES_MAX in SetAccount)
|
|
// test the edge cases: 255, 256, 257.
|
|
std::size_t const maxLength = 256;
|
|
for (std::size_t len = maxLength - 1; len <= maxLength + 1; ++len)
|
|
{
|
|
std::string domain2 =
|
|
std::string(len - domain.length() - 1, 'a') + "." + domain;
|
|
|
|
BEAST_EXPECT (domain2.length() == len);
|
|
|
|
jt[sfDomain.fieldName] = strHex(domain2);
|
|
|
|
if (len <= maxLength)
|
|
{
|
|
env(jt);
|
|
BEAST_EXPECT((*env.le(alice))[ sfDomain ] == makeSlice(domain2));
|
|
}
|
|
else
|
|
{
|
|
env(jt, ter(telBAD_DOMAIN));
|
|
}
|
|
}
|
|
}
|
|
|
|
void testMessageKey()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
auto jt = noop(alice);
|
|
|
|
auto const rkp = randomKeyPair(KeyType::ed25519);
|
|
jt[sfMessageKey.fieldName] = strHex(rkp.first.slice());
|
|
env(jt);
|
|
BEAST_EXPECT(strHex((*env.le(alice))[ sfMessageKey ]) == strHex(rkp.first.slice()));
|
|
|
|
jt[sfMessageKey.fieldName] = "";
|
|
env(jt);
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfMessageKey));
|
|
|
|
jt[sfMessageKey.fieldName] = strHex("NOT_REALLY_A_PUBKEY");
|
|
env(jt, ter(telBAD_PUBLIC_KEY));
|
|
}
|
|
|
|
void testWalletID()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
auto jt = noop(alice);
|
|
|
|
uint256 somehash = from_hex_text<uint256>("9633ec8af54f16b5286db1d7b519ef49eefc050c0c8ac4384f1d88acd1bfdf05");
|
|
jt[sfWalletLocator.fieldName] = to_string(somehash);
|
|
env(jt);
|
|
BEAST_EXPECT((*env.le(alice))[ sfWalletLocator ] == somehash);
|
|
|
|
jt[sfWalletLocator.fieldName] = "";
|
|
env(jt);
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfWalletLocator));
|
|
}
|
|
|
|
void testEmailHash()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
auto jt = noop(alice);
|
|
|
|
uint128 somehash = from_hex_text<uint128>("fff680681c2f5e6095324e2e08838f221a72ab4f");
|
|
jt[sfEmailHash.fieldName] = to_string(somehash);
|
|
env(jt);
|
|
BEAST_EXPECT((*env.le(alice))[ sfEmailHash ] == somehash);
|
|
|
|
jt[sfEmailHash.fieldName] = "";
|
|
env(jt);
|
|
BEAST_EXPECT(! env.le(alice)->isFieldPresent(sfEmailHash));
|
|
}
|
|
|
|
void testTransferRate()
|
|
{
|
|
struct test_results
|
|
{
|
|
double set;
|
|
TER code;
|
|
double get;
|
|
};
|
|
|
|
using namespace test::jtx;
|
|
auto doTests = [this] (FeatureBitset const& features,
|
|
std::initializer_list<test_results> testData)
|
|
{
|
|
Env env (*this, features);
|
|
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
|
|
for (auto const& r : testData)
|
|
{
|
|
env(rate(alice, r.set), ter(r.code));
|
|
|
|
// If the field is not present expect the default value
|
|
if (!(*env.le(alice))[~sfTransferRate])
|
|
BEAST_EXPECT(r.get == 1.0);
|
|
else
|
|
BEAST_EXPECT(*(*env.le(alice))[~sfTransferRate] ==
|
|
r.get * QUALITY_ONE);
|
|
}
|
|
};
|
|
|
|
{
|
|
testcase ("Setting transfer rate (without fix1201)");
|
|
doTests (supported_amendments().reset(fix1201),
|
|
{
|
|
{ 1.0, tesSUCCESS, 1.0 },
|
|
{ 1.1, tesSUCCESS, 1.1 },
|
|
{ 2.0, tesSUCCESS, 2.0 },
|
|
{ 2.1, tesSUCCESS, 2.1 },
|
|
{ 0.0, tesSUCCESS, 1.0 },
|
|
{ 2.0, tesSUCCESS, 2.0 },
|
|
{ 0.9, temBAD_TRANSFER_RATE, 2.0 }});
|
|
}
|
|
|
|
{
|
|
testcase ("Setting transfer rate (with fix1201)");
|
|
doTests (supported_amendments(),
|
|
{
|
|
{ 1.0, tesSUCCESS, 1.0 },
|
|
{ 1.1, tesSUCCESS, 1.1 },
|
|
{ 2.0, tesSUCCESS, 2.0 },
|
|
{ 2.1, temBAD_TRANSFER_RATE, 2.0 },
|
|
{ 0.0, tesSUCCESS, 1.0 },
|
|
{ 2.0, tesSUCCESS, 2.0 },
|
|
{ 0.9, temBAD_TRANSFER_RATE, 2.0 }});
|
|
}
|
|
}
|
|
|
|
void testGateway()
|
|
{
|
|
using namespace test::jtx;
|
|
auto runTest = [](Env&& env, double tr)
|
|
{
|
|
Account const alice ("alice");
|
|
Account const bob ("bob");
|
|
Account const gw ("gateway");
|
|
auto const USD = gw["USD"];
|
|
|
|
env.fund(XRP(10000), gw, alice, bob);
|
|
env.trust(USD(3), alice, bob);
|
|
env(rate(gw, tr));
|
|
env.close();
|
|
|
|
auto const amount = USD(1);
|
|
Rate const rate (tr * QUALITY_ONE);
|
|
auto const amountWithRate =
|
|
toAmount<STAmount> (multiply(amount.value(), rate));
|
|
|
|
env(pay(gw, alice, USD(3)));
|
|
env(pay(alice, bob, USD(1)), sendmax(USD(3)));
|
|
|
|
env.require(balance(alice, USD(3) - amountWithRate));
|
|
env.require(balance(bob, USD(1)));
|
|
};
|
|
|
|
// Test gateway with allowed transfer rates
|
|
auto const noFix1201 = supported_amendments().reset(fix1201);
|
|
runTest (Env{*this, noFix1201}, 1.02);
|
|
runTest (Env{*this, noFix1201}, 1);
|
|
runTest (Env{*this, noFix1201}, 2);
|
|
runTest (Env{*this, noFix1201}, 2.1);
|
|
runTest (Env{*this, supported_amendments()}, 1.02);
|
|
runTest (Env{*this, supported_amendments()}, 2);
|
|
|
|
// Test gateway when amendment is set after transfer rate
|
|
{
|
|
Env env (*this, noFix1201);
|
|
Account const alice ("alice");
|
|
Account const bob ("bob");
|
|
Account const gw ("gateway");
|
|
auto const USD = gw["USD"];
|
|
double const tr = 2.75;
|
|
|
|
env.fund(XRP(10000), gw, alice, bob);
|
|
env.trust(USD(3), alice, bob);
|
|
env(rate(gw, tr));
|
|
env.close();
|
|
env.enableFeature(fix1201);
|
|
env.close();
|
|
|
|
auto const amount = USD(1);
|
|
Rate const rate (tr * QUALITY_ONE);
|
|
auto const amountWithRate =
|
|
toAmount<STAmount> (multiply(amount.value(), rate));
|
|
|
|
env(pay(gw, alice, USD(3)));
|
|
env(pay(alice, bob, amount), sendmax(USD(3)));
|
|
|
|
env.require(balance(alice, USD(3) - amountWithRate));
|
|
env.require(balance(bob, amount));
|
|
}
|
|
}
|
|
|
|
void testBadInputs(bool withFeatures)
|
|
{
|
|
using namespace test::jtx;
|
|
std::unique_ptr<Env> penv {
|
|
withFeatures ? new Env(*this) : new Env(*this, FeatureBitset{})};
|
|
Env& env = *penv;
|
|
Account const alice ("alice");
|
|
env.fund(XRP(10000), alice);
|
|
|
|
auto jt = fset(alice, asfDisallowXRP);
|
|
jt[jss::ClearFlag] = asfDisallowXRP;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfRequireAuth);
|
|
jt[jss::ClearFlag] = asfRequireAuth;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfRequireDest);
|
|
jt[jss::ClearFlag] = asfRequireDest;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfDisallowXRP);
|
|
jt[sfFlags.fieldName] = tfAllowXRP;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfRequireAuth);
|
|
jt[sfFlags.fieldName] = tfOptionalAuth;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfRequireDest);
|
|
jt[sfFlags.fieldName] = tfOptionalDestTag;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
jt = fset(alice, asfRequireDest);
|
|
jt[sfFlags.fieldName] = tfAccountSetMask;
|
|
env(jt, ter(temINVALID_FLAG));
|
|
|
|
env(fset (alice, asfDisableMaster),
|
|
sig(alice),
|
|
ter(withFeatures ? tecNO_ALTERNATIVE_KEY : tecNO_REGULAR_KEY));
|
|
}
|
|
|
|
void testRequireAuthWithDir()
|
|
{
|
|
using namespace test::jtx;
|
|
Env env(*this);
|
|
Account const alice ("alice");
|
|
Account const bob ("bob");
|
|
|
|
env.fund(XRP(10000), alice);
|
|
env.close();
|
|
|
|
// alice should have an empty directory.
|
|
BEAST_EXPECT(dirIsEmpty (*env.closed(), keylet::ownerDir(alice)));
|
|
|
|
// Give alice a signer list, then there will be stuff in the directory.
|
|
env(signers(alice, 1, { { bob, 1} }));
|
|
env.close();
|
|
BEAST_EXPECT(! dirIsEmpty (*env.closed(), keylet::ownerDir(alice)));
|
|
|
|
env(fset (alice, asfRequireAuth), ter(tecOWNERS));
|
|
}
|
|
|
|
void run()
|
|
{
|
|
testNullAccountSet();
|
|
testMostFlags();
|
|
testSetAndResetAccountTxnID();
|
|
testSetNoFreeze();
|
|
testDomain();
|
|
testGateway();
|
|
testMessageKey();
|
|
testWalletID();
|
|
testEmailHash();
|
|
testBadInputs(true);
|
|
testBadInputs(false);
|
|
testRequireAuthWithDir();
|
|
testTransferRate();
|
|
}
|
|
|
|
|
|
};
|
|
|
|
BEAST_DEFINE_TESTSUITE(AccountSet,app,ripple);
|
|
|
|
}
|
|
|