def taa_disable_request(tconf, domain_state):
    identifier = "identifier"
    update_nym(domain_state, identifier, TRUSTEE)
    operation = {TXN_TYPE: TXN_AUTHOR_AGREEMENT_DISABLE}
    return Request(identifier=identifier,
                   signature="sign",
                   operation=operation)
def test_update_state(nym_handler):
    txns = []
    for i in range(5):
        update_nym(nym_handler.state, "identifier{}".format(i), STEWARD)

    for txn in txns:
        nym_data = get_nym_details(nym_handler.state, get_reply_nym(txn))
        assert nym_data[ROLE] == STEWARD
def test_dynamic_validation_from_steward(ledgers_freeze_handler, domain_state,
                                         ledgers_freeze_request):
    identifier = "test_identifier"
    update_nym(domain_state, identifier, STEWARD)
    ledgers_freeze_request._identifier = identifier
    with pytest.raises(UnauthorizedClientRequest,
                       match="Only trustee can freeze ledgers"):
        ledgers_freeze_handler.dynamic_validation(ledgers_freeze_request, 0)
def ledgers_freeze_request(tconf, ledgers_freeze_handler, domain_state):
    identifier = "identifier"
    update_nym(domain_state, identifier, TRUSTEE)
    return Request(identifier=identifier,
                   operation={
                       TXN_TYPE: LEDGERS_FREEZE,
                       LEDGERS_IDS: [909]
                   })
def test_dynamic_validation_steward_create_steward_before_limit(nym_handler):
    identifier = "test_identifier"
    update_nym(nym_handler.state, identifier, STEWARD)
    request = Request(identifier=identifier,
                      operation={
                          TXN_TYPE: NYM,
                          ROLE: STEWARD
                      })
    nym_handler.dynamic_validation(request)
def test_dynamic_validation(nym_handler):
    identifier = "test_identifier"
    update_nym(nym_handler.state, identifier, STEWARD)
    request = Request(identifier=identifier,
                      operation={
                          TXN_TYPE: NYM,
                          ROLE: ""
                      })
    nym_handler.dynamic_validation(request)
def test_dynamic_validation_from_steward(txn_author_agreement_aml_handler,
                                         domain_state, aml_request):
    identifier = "test_identifier"
    update_nym(domain_state, identifier, STEWARD)
    aml_request._identifier = identifier
    with pytest.raises(
            UnauthorizedClientRequest,
            match="Only trustee can update transaction author agreement and AML"
    ):
        txn_author_agreement_aml_handler.dynamic_validation(aml_request)
Exemple #8
0
def taa_request(tconf, domain_state, taa_pp_time):
    identifier = "identifier"
    update_nym(domain_state, identifier, TRUSTEE)
    operation = {TXN_TYPE: TXN_AUTHOR_AGREEMENT,
                 TXN_AUTHOR_AGREEMENT_TEXT: "text",
                 TXN_AUTHOR_AGREEMENT_VERSION: "version{}".format(randomString(5)),
                 TXN_AUTHOR_AGREEMENT_RATIFICATION_TS: taa_pp_time - 5}
    return Request(identifier=identifier,
                   signature="sign",
                   operation=operation)
Exemple #9
0
def taa_request(tconf, txn_author_agreement_handler, domain_state):
    identifier = "identifier"
    update_nym(domain_state, identifier, TRUSTEE)
    return Request(identifier=identifier,
                   signature="sign",
                   operation={
                       TXN_TYPE: TXN_AUTHOR_AGREEMENT,
                       TXN_AUTHOR_AGREEMENT_TEXT: "text",
                       TXN_AUTHOR_AGREEMENT_VERSION: "version"
                   })
def test_update_nym(nym_handler):
    identifier = "identifier"
    txn1 = create_nym_txn(identifier, STEWARD)
    txn2 = create_nym_txn(identifier, "")

    update_nym(nym_handler.state, identifier, STEWARD)
    nym_data = get_nym_details(nym_handler.state, identifier)
    assert get_payload_data(txn1)[ROLE] == nym_data[ROLE]

    update_nym(nym_handler.state, identifier, "")
    nym_data = get_nym_details(nym_handler.state, identifier)
    assert get_payload_data(txn2)[ROLE] == nym_data[ROLE]
def aml_request(tconf, txn_author_agreement_aml_handler, domain_state):
    identifier = "identifier"
    update_nym(domain_state, identifier, TRUSTEE)
    return Request(identifier=identifier,
                   operation={
                       TXN_TYPE: TXN_AUTHOR_AGREEMENT_AML,
                       AML_VERSION: "AML_VERSION",
                       AML: {
                           "test": "test"
                       },
                       AML_CONTEXT: "AML_CONTEXT"
                   })
def test_dynamic_validation_msg_from_not_steward(nym_handler):
    identifier = "test_identifier"
    update_nym(nym_handler.state, identifier, "")
    request = Request(identifier=identifier,
                      operation={
                          TXN_TYPE: NYM,
                          ROLE: ""
                      })

    with pytest.raises(UnauthorizedClientRequest) as e:
        nym_handler.dynamic_validation(request)
    assert "Only Steward is allowed to do these transactions" \
           in e._excinfo[1].args[0]
def test_dynamic_validation_steward_create_steward_after_limit(nym_handler):
    identifier = "test_identifier"
    update_nym(nym_handler.state, identifier, STEWARD)
    old_steward_threshold = nym_handler.config.stewardThreshold
    nym_handler.config.stewardThreshold = 1
    nym_handler._steward_count = 1

    request = Request(identifier=identifier,
                      operation={
                          TXN_TYPE: NYM,
                          ROLE: STEWARD
                      })

    with pytest.raises(UnauthorizedClientRequest) as e:
        nym_handler.dynamic_validation(request)
    assert "New stewards cannot be added by other stewards as there are already" \
           in e._excinfo[1].args[0]

    nym_handler.config.stewardThreshold = old_steward_threshold