mirror of
https://github.com/status-im/status-go.git
synced 2025-02-12 23:06:51 +00:00
author shashankshampi <shashank.sanket1995@gmail.com> 1729780155 +0530 committer shashankshampi <shashank.sanket1995@gmail.com> 1730274350 +0530 test: Code Migration from status-cli-tests fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments fix(ci)_: remove workspace and tmp dir This ensures we do not encounter weird errors like: ``` + ln -s /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907 /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go ln: failed to create symbolic link '/home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go': File exists script returned exit code 1 ``` Signed-off-by: Jakub Sokołowski <jakub@status.im> chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 cleanup added logger and cleanup review comments changes fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 test_: remove port bind chore(wallet)_: move route execution code to separate module chore_: replace geth logger with zap logger (#5962) closes: #6002 feat(telemetry)_: add metrics for message reliability (#5899) * feat(telemetry)_: track message reliability Add metrics for dial errors, missed messages, missed relevant messages, and confirmed delivery. * fix_: handle error from json marshal chore_: use zap logger as request logger iterates: status-im/status-desktop#16536 test_: unique project per run test_: use docker compose v2, more concrete project name fix(codecov)_: ignore folders without tests Otherwise Codecov reports incorrect numbers when making changes. https://docs.codecov.com/docs/ignoring-paths Signed-off-by: Jakub Sokołowski <jakub@status.im> test_: verify schema of signals during init; fix schema verification warnings (#5947) fix_: update defaultGorushURL (#6011) fix(tests)_: use non-standard port to avoid conflicts We have observed `nimbus-eth2` build failures reporting this port: ```json { "lvl": "NTC", "ts": "2024-10-28 13:51:32.308+00:00", "msg": "REST HTTP server could not be started", "topics": "beacnde", "address": "127.0.0.1:5432", "reason": "(98) Address already in use" } ``` https://ci.status.im/job/nimbus-eth2/job/platforms/job/linux/job/x86_64/job/main/job/PR-6683/3/ Signed-off-by: Jakub Sokołowski <jakub@status.im> fix_: create request logger ad-hoc in tests Fixes `TestCall` failing when run concurrently. chore_: configure codecov (#6005) * chore_: configure codecov * fix_: after_n_builds
99 lines
2.8 KiB
Go
99 lines
2.8 KiB
Go
package rpc
|
|
|
|
import (
|
|
"fmt"
|
|
"sort"
|
|
"strings"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"github.com/status-im/status-go/params"
|
|
)
|
|
|
|
const (
|
|
ProviderMain = "main"
|
|
ProviderFallback = "fallback"
|
|
ProviderStatusProxy = "status-proxy"
|
|
ProviderStatusProxyFallback = ProviderStatusProxy + "-fallback"
|
|
ProviderStatusProxyFallback2 = ProviderStatusProxy + "-fallback2"
|
|
)
|
|
|
|
type Provider struct {
|
|
Key string
|
|
URL string
|
|
Auth string
|
|
Priority int
|
|
}
|
|
|
|
func (p Provider) authenticationNeeded() bool {
|
|
return len(p.Auth) > 0
|
|
}
|
|
|
|
func getProviderPriorityByURL(url string) int {
|
|
// Currently we have 5 providers and we want to use them in the following order:
|
|
// 1. StatusProxy - Node Fleet
|
|
// 2. StatusProxy - Infura
|
|
// 3. Direct Infura
|
|
// 4. StatusProxy - Grove
|
|
// 5. Direct Grove
|
|
if strings.Contains(url, "api.status.im/nodefleet/") || strings.Contains(url, "anvil") {
|
|
return 0
|
|
} else if strings.Contains(url, "api.status.im/infura/") {
|
|
return 1
|
|
} else if strings.Contains(url, "infura.io/") {
|
|
return 2
|
|
} else if strings.Contains(url, "api.status.im/grove/") {
|
|
return 3
|
|
}
|
|
|
|
return 4
|
|
}
|
|
|
|
func getProviderConfig(providerConfigs []params.ProviderConfig, providerName string) (params.ProviderConfig, error) {
|
|
for _, providerConfig := range providerConfigs {
|
|
if providerConfig.Name == providerName {
|
|
return providerConfig, nil
|
|
}
|
|
}
|
|
return params.ProviderConfig{}, fmt.Errorf("provider config not found for provider: %s", providerName)
|
|
}
|
|
|
|
func createProvider(key, url, credentials string, providers *[]Provider) {
|
|
priority := getProviderPriorityByURL(url)
|
|
*providers = append(*providers, Provider{
|
|
Key: key,
|
|
URL: url,
|
|
Auth: credentials,
|
|
Priority: priority,
|
|
})
|
|
}
|
|
|
|
func (c *Client) prepareProviders(network *params.Network) []Provider {
|
|
var providers []Provider
|
|
|
|
// Retrieve the proxy provider configuration
|
|
proxyProvider, err := getProviderConfig(c.providerConfigs, ProviderStatusProxy)
|
|
if err != nil {
|
|
c.logger.Warn("could not find provider config for status-proxy", zap.Error(err))
|
|
}
|
|
|
|
// Add main and fallback providers
|
|
createProvider(ProviderMain, network.RPCURL, "", &providers)
|
|
createProvider(ProviderFallback, network.FallbackURL, "", &providers)
|
|
|
|
// If the proxy provider is enabled, add it and its fallback options
|
|
if proxyProvider.Enabled {
|
|
credentials := proxyProvider.User + ":" + proxyProvider.Password
|
|
createProvider(ProviderStatusProxy, network.DefaultRPCURL, credentials, &providers)
|
|
createProvider(ProviderStatusProxyFallback, network.DefaultFallbackURL, credentials, &providers)
|
|
createProvider(ProviderStatusProxyFallback2, network.DefaultFallbackURL2, credentials, &providers)
|
|
}
|
|
|
|
// Sort providers by priority
|
|
sort.Slice(providers, func(i, j int) bool {
|
|
return providers[i].Priority < providers[j].Priority
|
|
})
|
|
|
|
return providers
|
|
}
|