Example #1
0
    key_parameters = {}
elif key_type == 'pgp':
    key_parameters = {'name_real' : 'Alf',
                      'name_email' : '*****@*****.**',
                      'key_type' : 'RSA',
                      'key_length' : 1024,
                      'key_usage' : 'cert',
                      'subkey_type' : 'RSA',
                      'subkey_length' : 1024,
                      'subkey_usage' : 'encrypt,sign,auth'}
elif key_type == 'squeak':
    key_parameters = {'bits' : 4096}


Alf = tp.User('Alf',
        key=ut.createPrivateKey(key_type, key_parameters),
        revoke_date=None,
        default_mail_access='allow',
        when_mail_exhausted='block',
        quota_size=100*1024*1024,
        mail_quota_size=10*1024*1024,
        max_message_size=None,
        user_class=None,
        auth_token=None)

resp = Alf.create(client)
assert(resp['status'] == 'ok')

if test_params.node_debug_enabled == True:
    print (client.send_debug({'action' : 'database'}))
    client.assert_integrity(True)
Example #2
0
elif key_type == 'pgp':
    key_parameters = {'name_real' : 'Alf',
                      'name_email' : '*****@*****.**',
                      'key_type' : 'RSA',
                      'key_length' : 1024,
                      'key_usage' : 'cert',
                      'subkey_type' : 'RSA',
                      'subkey_length' : 1024,
                      'subkey_usage' : 'encrypt,sign,auth'}
elif key_type == 'squeak':
    key_parameters = {'bits' : 4096}


Alf = tp.User(
        user_id='Alf',
        key=ut.createPrivateKey(key_type, key_parameters),
        revoke_date=None,
        #default_mail_access='allow',
        default_mail_access='proof_of_work/' + alf_proof_of_work_args,
        when_mail_exhausted='block',
        quota_size=user_quota,
        mail_quota_size=mail_quota,
        max_message_size=None,
        user_class=None,
        auth_token=None)


if key_type == 'dummy':
    read_key_parameters = {}
    post_key_parameters = {}
    delete_key_parameters = {}