Compare commits

..

9 Commits

Author SHA1 Message Date
tequ
10e76c0475 Merge branch 'dev' into test-hook-fee 2026-03-01 13:28:00 +09:00
tequ
b2b160e9ea Update util_keylet fee test 2026-02-24 17:23:11 +09:00
tequ
164b1765b6 Merge branch 'dev' into test-hook-fee 2026-02-24 16:47:28 +09:00
RichardAH
3a2e3e99c4 Merge branch 'dev' into test-hook-fee 2026-02-18 09:35:05 +10:00
tequ
176de80369 Updated tests to align with the changes merged into the dev branch. 2026-02-17 10:37:27 +09:00
RichardAH
508a16cbe4 Merge branch 'dev' into test-hook-fee 2026-02-17 11:34:28 +10:00
tequ
9eb539da2b Merge branch 'dev' into test-hook-fee 2026-02-16 14:25:00 +09:00
tequ
335dcb1351 Merge branch 'dev' into test-hook-fee 2026-01-27 21:00:06 +09:00
tequ
5d9071695a Add tests for Hooks fee 2026-01-20 12:12:45 +09:00
2 changed files with 412 additions and 188 deletions

File diff suppressed because it is too large Load Diff

View File

@@ -2730,23 +2730,26 @@ DEFINE_HOOK_FUNCTION(
return serialize_keylet(kl, memory, write_ptr, write_len);
}
// These keylet types are not yet implemented. Their
// corresponding amendments are not yet supported on the
// network. Each case needs a full implementation (see
// above cases for reference) before its amendment can be
// enabled.
// featureXChainBridge
case keylet_code::BRIDGE:
case keylet_code::XCHAIN_OWNED_CLAIM_ID:
case keylet_code::XCHAIN_OWNED_CREATE_ACCOUNT_CLAIM_ID:
// featureMPTokensV1
case keylet_code::XCHAIN_OWNED_CREATE_ACCOUNT_CLAIM_ID: {
if (!applyCtx.view().rules().enabled(featureXChainBridge))
return INVALID_ARGUMENT;
}
case keylet_code::MPTOKEN_ISSUANCE:
case keylet_code::MPTOKEN:
// featureCredentials
case keylet_code::CREDENTIAL:
// featurePermissionedDomains
case keylet_code::PERMISSIONED_DOMAIN:
return INVALID_ARGUMENT;
case keylet_code::MPTOKEN: {
if (!applyCtx.view().rules().enabled(featureMPTokensV1))
return INVALID_ARGUMENT;
}
case keylet_code::CREDENTIAL: {
if (!applyCtx.view().rules().enabled(featureCredentials))
return INVALID_ARGUMENT;
}
case keylet_code::PERMISSIONED_DOMAIN: {
if (!applyCtx.view().rules().enabled(
featurePermissionedDomains))
return INVALID_ARGUMENT;
}
}
}
catch (std::exception& e)