164 lines
4.8 KiB
Go
164 lines
4.8 KiB
Go
package rest
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
)
|
|
|
|
type testNetworksCatalog struct {
|
|
Name string `json:"name"`
|
|
DefaultChainID int `json:"defaultChainId"`
|
|
ExplorerURL string `json:"explorerUrl"`
|
|
TokenListURL string `json:"tokenListUrl"`
|
|
GeneratedBy string `json:"generatedBy"`
|
|
Chains []struct {
|
|
ChainID string `json:"chainId"`
|
|
ChainIDDecimal int `json:"chainIdDecimal"`
|
|
ChainName string `json:"chainName"`
|
|
ShortName string `json:"shortName"`
|
|
RPCURLs []string `json:"rpcUrls"`
|
|
BlockExplorerURL []string `json:"blockExplorerUrls"`
|
|
InfoURL string `json:"infoURL"`
|
|
ExplorerAPIURL string `json:"explorerApiUrl"`
|
|
Testnet bool `json:"testnet"`
|
|
} `json:"chains"`
|
|
}
|
|
|
|
type testTokenList struct {
|
|
Name string `json:"name"`
|
|
Keywords []string
|
|
Extensions struct {
|
|
DefaultChainID int `json:"defaultChainId"`
|
|
ExplorerURL string `json:"explorerUrl"`
|
|
NetworksConfigURL string `json:"networksConfigUrl"`
|
|
} `json:"extensions"`
|
|
Tokens []struct {
|
|
ChainID int `json:"chainId"`
|
|
Address string `json:"address"`
|
|
Symbol string `json:"symbol"`
|
|
Decimals int `json:"decimals"`
|
|
Extensions struct {
|
|
UnitOfAccount string `json:"unitOfAccount"`
|
|
UnitDescription string `json:"unitDescription"`
|
|
} `json:"extensions"`
|
|
} `json:"tokens"`
|
|
}
|
|
|
|
func setupConfigHandler() http.Handler {
|
|
server := NewServer(nil, 138)
|
|
mux := http.NewServeMux()
|
|
server.SetupRoutes(mux)
|
|
return server.addMiddleware(mux)
|
|
}
|
|
|
|
func TestConfigNetworksEndpointProvidesWalletMetadata(t *testing.T) {
|
|
handler := setupConfigHandler()
|
|
req := httptest.NewRequest(http.MethodGet, "/api/config/networks", nil)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200, got %d", w.Code)
|
|
}
|
|
|
|
if got := w.Header().Get("Access-Control-Allow-Origin"); got == "" {
|
|
t.Fatal("expected CORS header on config endpoint")
|
|
}
|
|
|
|
var payload testNetworksCatalog
|
|
if err := json.Unmarshal(w.Body.Bytes(), &payload); err != nil {
|
|
t.Fatalf("failed to parse networks payload: %v", err)
|
|
}
|
|
|
|
if payload.DefaultChainID != 138 {
|
|
t.Fatalf("expected defaultChainId 138, got %d", payload.DefaultChainID)
|
|
}
|
|
if payload.ExplorerURL == "" || payload.TokenListURL == "" || payload.GeneratedBy == "" {
|
|
t.Fatal("expected root metadata fields to be populated")
|
|
}
|
|
if len(payload.Chains) < 3 {
|
|
t.Fatalf("expected multiple chain entries, got %d", len(payload.Chains))
|
|
}
|
|
|
|
var foundChain138 bool
|
|
for _, chain := range payload.Chains {
|
|
if chain.ChainIDDecimal != 138 {
|
|
continue
|
|
}
|
|
foundChain138 = true
|
|
if chain.ShortName == "" || chain.InfoURL == "" || chain.ExplorerAPIURL == "" {
|
|
t.Fatal("expected Chain 138 optional metadata to be populated")
|
|
}
|
|
if len(chain.RPCURLs) == 0 || len(chain.BlockExplorerURL) == 0 {
|
|
t.Fatal("expected Chain 138 RPC and explorer URLs")
|
|
}
|
|
if chain.Testnet {
|
|
t.Fatal("expected Chain 138 to be marked as mainnet")
|
|
}
|
|
}
|
|
|
|
if !foundChain138 {
|
|
t.Fatal("expected Chain 138 entry in networks catalog")
|
|
}
|
|
}
|
|
|
|
func TestConfigTokenListEndpointProvidesOptionalMetadata(t *testing.T) {
|
|
handler := setupConfigHandler()
|
|
req := httptest.NewRequest(http.MethodGet, "/api/config/token-list", nil)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200, got %d", w.Code)
|
|
}
|
|
|
|
var payload testTokenList
|
|
if err := json.Unmarshal(w.Body.Bytes(), &payload); err != nil {
|
|
t.Fatalf("failed to parse token list payload: %v", err)
|
|
}
|
|
|
|
if len(payload.Keywords) == 0 {
|
|
t.Fatal("expected token list keywords")
|
|
}
|
|
if payload.Extensions.DefaultChainID != 138 || payload.Extensions.ExplorerURL == "" || payload.Extensions.NetworksConfigURL == "" {
|
|
t.Fatal("expected root-level token list extensions")
|
|
}
|
|
|
|
var foundCXAUC bool
|
|
var foundCUSDT bool
|
|
for _, token := range payload.Tokens {
|
|
switch token.Symbol {
|
|
case "cXAUC":
|
|
foundCXAUC = true
|
|
if token.Extensions.UnitOfAccount == "" || token.Extensions.UnitDescription == "" {
|
|
t.Fatal("expected cXAUC optional unit metadata")
|
|
}
|
|
case "cUSDT":
|
|
foundCUSDT = true
|
|
if token.Decimals != 6 {
|
|
t.Fatalf("expected cUSDT decimals 6, got %d", token.Decimals)
|
|
}
|
|
}
|
|
}
|
|
|
|
if !foundCXAUC || !foundCUSDT {
|
|
t.Fatal("expected cXAUC and cUSDT in token list")
|
|
}
|
|
}
|
|
|
|
func TestConfigEndpointsSupportOptionsPreflight(t *testing.T) {
|
|
handler := setupConfigHandler()
|
|
req := httptest.NewRequest(http.MethodOptions, "/api/config/token-list", nil)
|
|
w := httptest.NewRecorder()
|
|
handler.ServeHTTP(w, req)
|
|
|
|
if w.Code != http.StatusOK {
|
|
t.Fatalf("expected 200 preflight response, got %d", w.Code)
|
|
}
|
|
if got := w.Header().Get("Access-Control-Allow-Methods"); got == "" {
|
|
t.Fatal("expected Access-Control-Allow-Methods header")
|
|
}
|
|
}
|