2016-09-20 12:19:07 +02:00
|
|
|
pub mod client;
|
2016-10-17 15:53:33 +02:00
|
|
|
pub mod signer_client;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
extern crate ethcore_util as util;
|
2017-04-13 16:32:07 +02:00
|
|
|
extern crate futures;
|
|
|
|
extern crate jsonrpc_core;
|
2017-05-24 12:24:07 +02:00
|
|
|
extern crate jsonrpc_ws_server as ws;
|
2017-04-13 16:32:07 +02:00
|
|
|
extern crate parity_rpc as rpc;
|
|
|
|
extern crate rand;
|
2016-09-20 12:19:07 +02:00
|
|
|
extern crate serde;
|
|
|
|
extern crate serde_json;
|
|
|
|
extern crate tempdir;
|
2017-04-13 16:32:07 +02:00
|
|
|
extern crate url;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-10-17 14:59:41 +02:00
|
|
|
#[macro_use]
|
|
|
|
extern crate log;
|
|
|
|
|
2017-05-24 12:24:07 +02:00
|
|
|
#[cfg(test)]
|
|
|
|
#[macro_use]
|
|
|
|
extern crate matches;
|
|
|
|
|
|
|
|
|
2016-09-29 14:48:44 +02:00
|
|
|
#[cfg(test)]
|
2016-09-30 15:30:17 +02:00
|
|
|
mod tests {
|
2017-02-14 22:45:43 +01:00
|
|
|
|
2016-09-20 12:19:07 +02:00
|
|
|
use futures::Future;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use client::{Rpc, RpcError};
|
2017-05-24 12:24:07 +02:00
|
|
|
use rpc;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_connection_refused() {
|
2017-05-24 12:24:07 +02:00
|
|
|
let (_srv, port, mut authcodes) = rpc::tests::ws::serve();
|
2016-10-17 15:53:33 +02:00
|
|
|
|
|
|
|
let _ = authcodes.generate_new();
|
|
|
|
authcodes.to_file(&authcodes.path).unwrap();
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-10-17 15:53:33 +02:00
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port - 1),
|
|
|
|
authcodes.path.as_path());
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-09-20 12:19:07 +02:00
|
|
|
assert!(matches!(&conn, &Err(RpcError::WsError(_))));
|
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_authcode_fail() {
|
2017-05-24 12:24:07 +02:00
|
|
|
let (_srv, port, _) = rpc::tests::ws::serve();
|
2016-09-20 12:19:07 +02:00
|
|
|
let path = PathBuf::from("nonexist");
|
|
|
|
|
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port), &path);
|
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-09-20 12:19:07 +02:00
|
|
|
assert!(matches!(&conn, &Err(RpcError::NoAuthCode)));
|
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_authcode_correct() {
|
2017-05-24 12:24:07 +02:00
|
|
|
let (_srv, port, mut authcodes) = rpc::tests::ws::serve();
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-10-17 15:53:33 +02:00
|
|
|
let _ = authcodes.generate_new();
|
|
|
|
authcodes.to_file(&authcodes.path).unwrap();
|
|
|
|
|
|
|
|
let connect = Rpc::connect(&format!("ws://127.0.0.1:{}", port),
|
|
|
|
authcodes.path.as_path());
|
2016-09-20 12:19:07 +02:00
|
|
|
|
2016-09-30 15:30:17 +02:00
|
|
|
let _ = connect.map(|conn| {
|
2016-10-18 16:10:06 +02:00
|
|
|
assert!(conn.is_ok())
|
2016-09-20 12:19:07 +02:00
|
|
|
}).wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|