2017-03-15 21:03:01 +00:00
|
|
|
package params_test
|
|
|
|
|
|
|
|
import (
|
2024-08-08 08:35:11 +00:00
|
|
|
"encoding/json"
|
2017-12-04 16:11:14 +00:00
|
|
|
"fmt"
|
2017-03-15 21:03:01 +00:00
|
|
|
"io/ioutil"
|
2023-09-12 12:45:32 +00:00
|
|
|
"path"
|
2017-03-15 21:03:01 +00:00
|
|
|
"path/filepath"
|
|
|
|
"testing"
|
2017-08-10 15:31:29 +00:00
|
|
|
|
2019-01-04 11:44:01 +00:00
|
|
|
validator "gopkg.in/go-playground/validator.v9"
|
2017-03-15 21:03:01 +00:00
|
|
|
|
2020-01-02 09:10:19 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
2018-06-08 11:29:50 +00:00
|
|
|
"github.com/status-im/status-go/params"
|
2018-09-13 16:31:29 +00:00
|
|
|
"github.com/status-im/status-go/t/utils"
|
2017-03-15 21:03:01 +00:00
|
|
|
)
|
|
|
|
|
2018-09-21 14:09:31 +00:00
|
|
|
func TestNewNodeConfigWithDefaults(t *testing.T) {
|
|
|
|
c, err := params.NewNodeConfigWithDefaults(
|
|
|
|
"/some/data/path",
|
2022-10-20 10:33:23 +00:00
|
|
|
params.GoerliNetworkID,
|
2020-02-20 13:05:05 +00:00
|
|
|
params.WithFleet(params.FleetProd),
|
2018-09-21 14:09:31 +00:00
|
|
|
params.WithLES(),
|
|
|
|
params.WithMailserver(),
|
|
|
|
)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, "/some/data/path", c.DataDir)
|
|
|
|
assert.Equal(t, "/some/data/path/keystore", c.KeyStoreDir)
|
|
|
|
// assert Whisper
|
2021-05-14 10:55:42 +00:00
|
|
|
assert.Equal(t, true, c.WakuConfig.Enabled)
|
|
|
|
assert.Equal(t, "/some/data/path/waku", c.WakuConfig.DataDir)
|
2018-09-21 14:09:31 +00:00
|
|
|
// assert MailServer
|
2021-05-14 10:55:42 +00:00
|
|
|
assert.Equal(t, false, c.WakuConfig.EnableMailServer)
|
2018-09-21 14:09:31 +00:00
|
|
|
// assert cluster
|
|
|
|
assert.Equal(t, false, c.NoDiscovery)
|
2020-02-20 13:05:05 +00:00
|
|
|
assert.Equal(t, params.FleetProd, c.ClusterConfig.Fleet)
|
2018-09-21 14:09:31 +00:00
|
|
|
assert.NotEmpty(t, c.ClusterConfig.BootNodes)
|
|
|
|
assert.NotEmpty(t, c.ClusterConfig.StaticNodes)
|
2020-08-20 09:05:39 +00:00
|
|
|
assert.NotEmpty(t, c.ClusterConfig.PushNotificationsServers)
|
2018-09-21 14:09:31 +00:00
|
|
|
// assert LES
|
|
|
|
assert.Equal(t, true, c.LightEthConfig.Enabled)
|
|
|
|
// assert other
|
|
|
|
assert.Equal(t, false, c.HTTPEnabled)
|
|
|
|
assert.Equal(t, false, c.IPCEnabled)
|
2020-08-20 09:05:39 +00:00
|
|
|
|
2024-02-02 21:08:48 +00:00
|
|
|
assert.Equal(t, "", c.RuntimeLogLevel)
|
|
|
|
|
2022-03-08 13:17:26 +00:00
|
|
|
assert.Equal(t, "/some/data/path/archivedata", c.TorrentConfig.DataDir)
|
|
|
|
assert.Equal(t, "/some/data/path/torrents", c.TorrentConfig.TorrentDir)
|
|
|
|
assert.Equal(t, 9025, c.TorrentConfig.Port)
|
|
|
|
assert.Equal(t, false, c.TorrentConfig.Enabled)
|
|
|
|
|
2020-08-20 09:05:39 +00:00
|
|
|
assert.NoError(t, c.UpdateWithDefaults())
|
|
|
|
assert.NotEmpty(t, c.ShhextConfig.DefaultPushNotificationsServers)
|
2018-08-26 10:54:58 +00:00
|
|
|
}
|
2018-08-21 13:48:58 +00:00
|
|
|
|
2018-09-21 14:09:31 +00:00
|
|
|
func TestNewConfigFromJSON(t *testing.T) {
|
2023-04-26 20:39:51 +00:00
|
|
|
tmpDir := t.TempDir()
|
2019-01-17 12:56:22 +00:00
|
|
|
json := `{
|
2018-08-26 10:54:58 +00:00
|
|
|
"NetworkId": 3,
|
|
|
|
"DataDir": "` + tmpDir + `",
|
2018-09-13 16:31:29 +00:00
|
|
|
"KeyStoreDir": "` + tmpDir + `",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "` + path.Join(tmpDir, "keycard/pairings.json") + `",
|
2022-03-08 13:17:26 +00:00
|
|
|
"NoDiscovery": true,
|
2024-02-02 21:08:48 +00:00
|
|
|
"TorrentConfig": {
|
|
|
|
"Port": 9025,
|
|
|
|
"Enabled": false,
|
|
|
|
"DataDir": "` + tmpDir + `/archivedata",
|
|
|
|
"TorrentDir": "` + tmpDir + `/torrents"
|
|
|
|
},
|
|
|
|
"RuntimeLogLevel": "DEBUG"
|
2019-01-17 12:56:22 +00:00
|
|
|
}`
|
|
|
|
c, err := params.NewConfigFromJSON(json)
|
2018-08-26 10:54:58 +00:00
|
|
|
require.NoError(t, err)
|
2018-09-13 16:31:29 +00:00
|
|
|
require.Equal(t, uint64(3), c.NetworkID)
|
|
|
|
require.Equal(t, tmpDir, c.DataDir)
|
|
|
|
require.Equal(t, tmpDir, c.KeyStoreDir)
|
2022-03-08 13:17:26 +00:00
|
|
|
require.Equal(t, false, c.TorrentConfig.Enabled)
|
|
|
|
require.Equal(t, 9025, c.TorrentConfig.Port)
|
|
|
|
require.Equal(t, tmpDir+"/archivedata", c.TorrentConfig.DataDir)
|
|
|
|
require.Equal(t, tmpDir+"/torrents", c.TorrentConfig.TorrentDir)
|
2024-02-02 21:08:48 +00:00
|
|
|
require.Equal(t, "DEBUG", c.RuntimeLogLevel)
|
2017-03-15 21:03:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfigWriteRead(t *testing.T) {
|
2023-04-26 20:39:51 +00:00
|
|
|
tmpDir := t.TempDir()
|
2017-08-07 10:48:14 +00:00
|
|
|
|
2022-10-20 10:33:23 +00:00
|
|
|
nodeConfig, err := utils.MakeTestNodeConfigWithDataDir("", tmpDir, params.GoerliNetworkID)
|
2017-12-04 16:11:14 +00:00
|
|
|
require.Nil(t, err, "cannot create new config object")
|
2017-08-04 16:14:17 +00:00
|
|
|
|
2017-12-04 16:11:14 +00:00
|
|
|
err = nodeConfig.Save()
|
|
|
|
require.Nil(t, err, "cannot persist configuration")
|
2017-05-02 14:30:11 +00:00
|
|
|
|
2017-12-04 16:11:14 +00:00
|
|
|
loadedConfigData, err := ioutil.ReadFile(filepath.Join(nodeConfig.DataDir, "config.json"))
|
|
|
|
require.Nil(t, err, "cannot read configuration from disk")
|
2018-09-13 16:31:29 +00:00
|
|
|
loadedConfig := string(loadedConfigData)
|
2022-10-20 10:33:23 +00:00
|
|
|
require.Contains(t, loadedConfig, fmt.Sprintf(`"NetworkId": %d`, params.GoerliNetworkID))
|
2018-09-13 16:31:29 +00:00
|
|
|
require.Contains(t, loadedConfig, fmt.Sprintf(`"DataDir": "%s"`, tmpDir))
|
2017-03-15 21:03:01 +00:00
|
|
|
}
|
2017-08-10 15:31:29 +00:00
|
|
|
|
|
|
|
// TestNodeConfigValidate checks validation of individual fields.
|
|
|
|
func TestNodeConfigValidate(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
Name string
|
|
|
|
Config string
|
|
|
|
Error string
|
|
|
|
FieldErrors map[string]string // map[Field]Tag
|
2018-09-13 16:31:29 +00:00
|
|
|
CheckFunc func(*testing.T, *params.NodeConfig)
|
2017-08-10 15:31:29 +00:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
Name: "Valid JSON config",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
2024-06-05 13:03:34 +00:00
|
|
|
"RootDataDir": "/tmp/data",
|
2018-09-13 16:31:29 +00:00
|
|
|
"DataDir": "/tmp/data",
|
|
|
|
"KeyStoreDir": "/tmp/data",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/tmp/data/keycard/pairings.json",
|
2019-01-22 07:08:29 +00:00
|
|
|
"NoDiscovery": true
|
2017-08-10 15:31:29 +00:00
|
|
|
}`,
|
|
|
|
},
|
|
|
|
{
|
2018-09-13 16:31:29 +00:00
|
|
|
Name: "Invalid JSON config",
|
|
|
|
Config: `{"NetworkId": }`,
|
|
|
|
Error: "invalid character '}'",
|
2017-08-10 15:31:29 +00:00
|
|
|
},
|
|
|
|
{
|
2018-09-13 16:31:29 +00:00
|
|
|
Name: "Invalid field type",
|
|
|
|
Config: `{"NetworkId": "abc"}`,
|
|
|
|
Error: "json: cannot unmarshal string into Go struct field",
|
2017-08-10 15:31:29 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate all required fields",
|
|
|
|
Config: `{}`,
|
|
|
|
FieldErrors: map[string]string{
|
2023-09-12 12:45:32 +00:00
|
|
|
"NetworkID": "required",
|
|
|
|
"DataDir": "required",
|
|
|
|
"KeyStoreDir": "required",
|
|
|
|
"KeycardPairingDataFile": "required",
|
2017-08-10 15:31:29 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2018-09-13 16:31:29 +00:00
|
|
|
Name: "Validate that Name does not contain slash",
|
2017-08-10 15:31:29 +00:00
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
2018-09-13 16:31:29 +00:00
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2019-01-22 07:08:29 +00:00
|
|
|
"Name": "invalid/name"
|
2017-08-10 15:31:29 +00:00
|
|
|
}`,
|
|
|
|
FieldErrors: map[string]string{
|
|
|
|
"Name": "excludes",
|
|
|
|
},
|
|
|
|
},
|
2018-09-13 16:31:29 +00:00
|
|
|
{
|
|
|
|
Name: "Validate that NodeKey is checked for validity",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-13 16:31:29 +00:00
|
|
|
"NoDiscovery": true,
|
2019-01-22 07:08:29 +00:00
|
|
|
"NodeKey": "foo"
|
2018-09-13 16:31:29 +00:00
|
|
|
}`,
|
|
|
|
Error: "NodeKey is invalid",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate that UpstreamConfig.URL is validated if UpstreamConfig is enabled",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-13 16:31:29 +00:00
|
|
|
"NoDiscovery": true,
|
|
|
|
"UpstreamConfig": {
|
|
|
|
"Enabled": true,
|
|
|
|
"URL": "[bad.url]"
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
Error: "'[bad.url]' is invalid",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate that UpstreamConfig.URL is not validated if UpstreamConfig is disabled",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-13 16:31:29 +00:00
|
|
|
"NoDiscovery": true,
|
|
|
|
"UpstreamConfig": {
|
|
|
|
"Enabled": false,
|
|
|
|
"URL": "[bad.url]"
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate that UpstreamConfig.URL validation passes if UpstreamConfig.URL is valid",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-13 16:31:29 +00:00
|
|
|
"NoDiscovery": true,
|
|
|
|
"UpstreamConfig": {
|
|
|
|
"Enabled": true,
|
|
|
|
"URL": "` + params.MainnetEthereumNetworkURL + `"
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate that ClusterConfig.BootNodes is verified to not be empty if discovery is disabled",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2019-01-22 07:08:29 +00:00
|
|
|
"NoDiscovery": false
|
2018-09-13 16:31:29 +00:00
|
|
|
}`,
|
|
|
|
Error: "NoDiscovery is false, but ClusterConfig.BootNodes is empty",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Validate that ClusterConfig.RendezvousNodes is verified to be empty if Rendezvous is disabled",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-13 16:31:29 +00:00
|
|
|
"NoDiscovery": true,
|
2019-01-22 07:08:29 +00:00
|
|
|
"Rendezvous": true
|
2018-09-13 16:31:29 +00:00
|
|
|
}`,
|
|
|
|
Error: "Rendezvous is enabled, but ClusterConfig.RendezvousNodes is empty",
|
|
|
|
},
|
2018-09-24 18:07:34 +00:00
|
|
|
{
|
|
|
|
Name: "Validate that PFSEnabled & InstallationID are checked for validity",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-09-24 18:07:34 +00:00
|
|
|
"NoDiscovery": true,
|
2021-05-14 10:55:42 +00:00
|
|
|
"WakuConfig": {
|
2018-09-24 18:07:34 +00:00
|
|
|
"Enabled": true,
|
|
|
|
"DataDir": "/foo"
|
2019-01-17 12:56:22 +00:00
|
|
|
},
|
|
|
|
"ShhextConfig": {
|
|
|
|
"PFSEnabled": true
|
2018-09-24 18:07:34 +00:00
|
|
|
}
|
|
|
|
}`,
|
|
|
|
Error: "PFSEnabled is true, but InstallationID is empty",
|
|
|
|
},
|
2018-10-12 12:58:32 +00:00
|
|
|
{
|
|
|
|
Name: "Default HTTP virtual hosts is localhost and CORS is empty",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeyStoreDir": "/some/dir",
|
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json"
|
2018-10-12 12:58:32 +00:00
|
|
|
}`,
|
|
|
|
CheckFunc: func(t *testing.T, config *params.NodeConfig) {
|
|
|
|
require.Equal(t, []string{"localhost"}, config.HTTPVirtualHosts)
|
|
|
|
require.Nil(t, config.HTTPCors)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Set HTTP virtual hosts and CORS",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2018-10-12 12:58:32 +00:00
|
|
|
"HTTPVirtualHosts": ["my.domain.com"],
|
2019-01-22 07:08:29 +00:00
|
|
|
"HTTPCors": ["http://my.domain.com:8080"]
|
2018-10-12 12:58:32 +00:00
|
|
|
}`,
|
|
|
|
CheckFunc: func(t *testing.T, config *params.NodeConfig) {
|
|
|
|
require.Equal(t, []string{"my.domain.com"}, config.HTTPVirtualHosts)
|
|
|
|
require.Equal(t, []string{"http://my.domain.com:8080"}, config.HTTPCors)
|
|
|
|
},
|
|
|
|
},
|
2019-01-22 07:08:29 +00:00
|
|
|
{
|
|
|
|
Name: "ShhextConfig is not required",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeyStoreDir": "/some/dir",
|
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json"
|
2019-01-22 07:08:29 +00:00
|
|
|
}`,
|
|
|
|
},
|
2020-02-26 19:35:47 +00:00
|
|
|
{
|
|
|
|
Name: "Missing APIModules",
|
2023-09-12 12:45:32 +00:00
|
|
|
Config: `{"NetworkId": 1, "DataDir": "/tmp/data", "KeyStoreDir": "/tmp/data", "KeycardPairingDataFile": "/tmp/data/keycard/pairings.json", "APIModules" :""}`,
|
2020-02-26 19:35:47 +00:00
|
|
|
FieldErrors: map[string]string{
|
|
|
|
"APIModules": "required",
|
|
|
|
},
|
|
|
|
},
|
2022-03-08 13:17:26 +00:00
|
|
|
{
|
|
|
|
Name: "Validate that TorrentConfig.DataDir and TorrentConfig.TorrentDir can't be empty strings",
|
|
|
|
Config: `{
|
|
|
|
"NetworkId": 1,
|
|
|
|
"DataDir": "/some/dir",
|
|
|
|
"KeyStoreDir": "/some/dir",
|
2023-09-12 12:45:32 +00:00
|
|
|
"KeycardPairingDataFile": "/some/dir/keycard/pairings.json",
|
2022-03-08 13:17:26 +00:00
|
|
|
"TorrentConfig": {
|
|
|
|
"Enabled": true,
|
|
|
|
"Port": 9025,
|
|
|
|
"DataDir": "",
|
|
|
|
"TorrentDir": ""
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
Error: `TorrentConfig.DataDir and TorrentConfig.TorrentDir cannot be ""`,
|
|
|
|
},
|
2017-08-10 15:31:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
2019-01-04 11:44:01 +00:00
|
|
|
t.Run(tc.Name, func(t *testing.T) {
|
|
|
|
config, err := params.NewConfigFromJSON(tc.Config)
|
|
|
|
switch err := err.(type) {
|
|
|
|
case validator.ValidationErrors:
|
|
|
|
for _, ve := range err {
|
|
|
|
require.Contains(t, tc.FieldErrors, ve.Field())
|
|
|
|
require.Equal(t, tc.FieldErrors[ve.Field()], ve.Tag())
|
|
|
|
}
|
|
|
|
case error:
|
|
|
|
if tc.Error == "" {
|
|
|
|
require.NoError(t, err)
|
|
|
|
} else {
|
2019-04-29 12:05:49 +00:00
|
|
|
fmt.Println(tc.Error)
|
2019-01-04 11:44:01 +00:00
|
|
|
require.Contains(t, err.Error(), tc.Error)
|
|
|
|
}
|
|
|
|
case nil:
|
|
|
|
if tc.Error != "" {
|
|
|
|
require.Error(t, err, "Error should be '%v'", tc.Error)
|
|
|
|
}
|
|
|
|
require.Nil(t, tc.FieldErrors)
|
|
|
|
if tc.CheckFunc != nil {
|
|
|
|
tc.CheckFunc(t, config)
|
|
|
|
}
|
2018-09-13 16:31:29 +00:00
|
|
|
}
|
2019-01-04 11:44:01 +00:00
|
|
|
})
|
2017-08-10 15:31:29 +00:00
|
|
|
}
|
|
|
|
}
|
2024-08-08 08:35:11 +00:00
|
|
|
|
|
|
|
func TestMarshalWalletConfigJSON(t *testing.T) {
|
|
|
|
walletConfig := params.WalletConfig{
|
|
|
|
OpenseaAPIKey: "some-key",
|
|
|
|
RaribleMainnetAPIKey: "some-key2",
|
|
|
|
}
|
|
|
|
bytes, err := json.Marshal(walletConfig)
|
|
|
|
require.NoError(t, err)
|
|
|
|
// check if sensitive fields are not present
|
|
|
|
require.NotContains(t, string(bytes), "OpenseaAPIKey")
|
|
|
|
require.Contains(t, string(bytes), "StatusProxyEnabled")
|
|
|
|
|
|
|
|
// check if deserializing are still working with sensitive fields
|
|
|
|
walletConfig = params.WalletConfig{}
|
|
|
|
err = json.Unmarshal([]byte(`{"OpenseaAPIKey":"some-key", "StatusProxyEnabled":true}`), &walletConfig)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "some-key", walletConfig.OpenseaAPIKey)
|
|
|
|
require.True(t, walletConfig.StatusProxyEnabled)
|
|
|
|
}
|