2016-09-20 12:19:07 +02:00
|
|
|
pub mod client;
|
2016-10-17 15:53:33 +02:00
|
|
|
pub mod signer_client;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
extern crate ws;
|
|
|
|
extern crate ethcore_signer;
|
|
|
|
extern crate url;
|
|
|
|
extern crate futures;
|
|
|
|
extern crate ethcore_util as util;
|
|
|
|
extern crate ethcore_rpc as rpc;
|
|
|
|
extern crate serde;
|
|
|
|
extern crate serde_json;
|
|
|
|
extern crate rand;
|
|
|
|
extern crate tempdir;
|
2016-09-30 15:30:17 +02:00
|
|
|
extern crate jsonrpc_core;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
#[macro_use]
|
|
|
|
extern crate lazy_static;
|
|
|
|
#[macro_use]
|
|
|
|
extern crate matches;
|
|
|
|
|
2016-10-17 14:59:41 +02:00
|
|
|
#[macro_use]
|
|
|
|
extern crate log;
|
|
|
|
|
2016-09-29 14:48:44 +02:00
|
|
|
#[cfg(test)]
|
2016-09-30 15:30:17 +02:00
|
|
|
mod tests {
|
2016-09-20 12:19:07 +02:00
|
|
|
use futures::Future;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use client::{Rpc, RpcError};
|
2016-10-17 15:53:33 +02:00
|
|
|
use ethcore_signer;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_connection_refused() {
|
2016-10-17 15:53:33 +02:00
|
|
|
let (_srv, port, mut authcodes) = ethcore_signer::tests::serve();
|
|
|
|
|
|
|
|
let _ = authcodes.generate_new();
|
|
|
|
authcodes.to_file(&authcodes.path).unwrap();
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-10-17 15:53:33 +02:00
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port - 1),
|
|
|
|
authcodes.path.as_path());
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-09-20 12:19:07 +02:00
|
|
|
assert!(matches!(&conn, &Err(RpcError::WsError(_))));
|
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_authcode_fail() {
|
2016-10-17 15:53:33 +02:00
|
|
|
let (_srv, port, _) = ethcore_signer::tests::serve();
|
2016-09-20 12:19:07 +02:00
|
|
|
let path = PathBuf::from("nonexist");
|
|
|
|
|
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port), &path);
|
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-09-20 12:19:07 +02:00
|
|
|
assert!(matches!(&conn, &Err(RpcError::NoAuthCode)));
|
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_authcode_correct() {
|
2016-10-17 15:53:33 +02:00
|
|
|
let (_srv, port, mut authcodes) = ethcore_signer::tests::serve();
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-10-17 15:53:33 +02:00
|
|
|
let _ = authcodes.generate_new();
|
|
|
|
authcodes.to_file(&authcodes.path).unwrap();
|
|
|
|
|
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port),
|
|
|
|
authcodes.path.as_path());
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-10-18 16:10:06 +02:00
|
|
|
assert!(conn.is_ok())
|
2016-09-20 12:19:07 +02:00
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|