2019-06-20 00:20:09 +02:00
|
|
|
import { assert } from 'chai'
|
|
|
|
import * as fs from 'fs'
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
import { config } from '../config'
|
|
|
|
import { getMetadata } from '../utils'
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
import { Ocean, DDO, Account, ConditionState } from '../../src' // @oceanprotocol/squid
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
describe('Consume Asset', () => {
|
2019-02-21 18:07:02 +01:00
|
|
|
let ocean: Ocean
|
|
|
|
|
|
|
|
let publisher: Account
|
|
|
|
let consumer: Account
|
|
|
|
|
2019-06-26 20:57:50 +02:00
|
|
|
let metadata = getMetadata()
|
2019-03-14 16:58:07 +01:00
|
|
|
|
|
|
|
let ddo: DDO
|
2019-06-20 00:20:09 +02:00
|
|
|
let serviceAgreementSignatureResult: {
|
|
|
|
agreementId: string
|
|
|
|
signature: string
|
|
|
|
}
|
2019-02-21 18:07:02 +01:00
|
|
|
|
|
|
|
before(async () => {
|
2019-04-01 12:40:45 +02:00
|
|
|
ocean = await Ocean.getInstance(config)
|
2019-02-21 18:07:02 +01:00
|
|
|
|
|
|
|
// Accounts
|
2019-06-24 13:06:38 +02:00
|
|
|
;[publisher, consumer] = await ocean.accounts.list()
|
2019-06-26 20:57:50 +02:00
|
|
|
|
|
|
|
if (!ocean.keeper.dispenser) {
|
|
|
|
metadata = getMetadata(0)
|
|
|
|
}
|
2019-03-14 16:58:07 +01:00
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-08-15 13:23:56 +02:00
|
|
|
it('should register an asset', async () => {
|
2019-03-14 16:58:07 +01:00
|
|
|
ddo = await ocean.assets.create(metadata as any, publisher)
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.isDefined(ddo, 'Register has not returned a DDO')
|
|
|
|
assert.match(ddo.id, /^did:op:[a-f0-9]{64}$/, 'DDO id is not valid')
|
2019-09-09 12:18:54 +02:00
|
|
|
assert.isAtLeast(ddo.authentication.length, 1, 'Default authentication not added')
|
|
|
|
assert.isDefined(ddo.findServiceByType('access'), "DDO access service doesn't exist")
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should be able to request tokens for consumer', async () => {
|
2019-03-14 21:28:51 +01:00
|
|
|
const initialBalance = (await consumer.getBalance()).ocn
|
2019-09-09 12:18:54 +02:00
|
|
|
const claimedTokens = +metadata.main.price * 10 ** -(await ocean.keeper.token.decimals())
|
2019-06-26 20:57:50 +02:00
|
|
|
|
|
|
|
try {
|
|
|
|
await consumer.requestTokens(claimedTokens)
|
|
|
|
} catch {}
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-09-09 12:18:54 +02:00
|
|
|
assert.equal((await consumer.getBalance()).ocn, initialBalance + claimedTokens, 'OCN Tokens not delivered')
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should sign the service agreement', async () => {
|
2019-08-16 14:12:31 +02:00
|
|
|
const accessService = ddo.findServiceByType('access')
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-09-09 12:18:54 +02:00
|
|
|
serviceAgreementSignatureResult = await ocean.agreements.prepare(ddo.id, accessService.index, consumer)
|
2019-02-25 14:06:48 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const { agreementId, signature } = serviceAgreementSignatureResult
|
2019-09-09 12:18:54 +02:00
|
|
|
assert.match(agreementId, /^0x[a-f0-9]{64}$/, 'Service agreement ID seems not valid')
|
|
|
|
assert.match(signature, /^0x[a-f0-9]{130}$/, 'Service agreement signature seems not valid')
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should execute the service agreement', async () => {
|
2019-08-16 14:12:31 +02:00
|
|
|
const accessService = ddo.findServiceByType('access')
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
const success = await ocean.agreements.create(
|
|
|
|
ddo.id,
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
2019-08-16 16:12:42 +02:00
|
|
|
accessService.index,
|
2019-03-14 16:58:07 +01:00
|
|
|
serviceAgreementSignatureResult.signature,
|
|
|
|
consumer,
|
2019-06-20 00:20:09 +02:00
|
|
|
publisher
|
2019-03-14 16:58:07 +01:00
|
|
|
)
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
assert.isTrue(success)
|
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should get the agreement conditions status not fulfilled', async () => {
|
2019-09-09 12:18:54 +02:00
|
|
|
const status = await ocean.agreements.status(serviceAgreementSignatureResult.agreementId)
|
2019-04-15 14:28:17 +02:00
|
|
|
|
|
|
|
assert.deepEqual(status, {
|
|
|
|
lockReward: ConditionState.Unfulfilled,
|
|
|
|
accessSecretStore: ConditionState.Unfulfilled,
|
2019-06-20 00:20:09 +02:00
|
|
|
escrowReward: ConditionState.Unfulfilled
|
2019-04-15 14:28:17 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should lock the payment by the consumer', async () => {
|
|
|
|
const paid = await ocean.agreements.conditions.lockReward(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
2019-08-16 16:12:42 +02:00
|
|
|
ddo.findServiceByType('metadata').attributes.main.price,
|
2019-06-20 00:20:09 +02:00
|
|
|
consumer
|
|
|
|
)
|
2019-03-14 16:58:07 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.isTrue(paid, 'The asset has not been paid correctly')
|
2019-03-14 16:58:07 +01:00
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-05-21 15:32:01 +02:00
|
|
|
// The test will fail because Brizo grants the access faster
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should grant the access by the publisher', async () => {
|
2019-05-21 15:32:01 +02:00
|
|
|
try {
|
2019-06-20 00:20:09 +02:00
|
|
|
const granted = await ocean.agreements.conditions.grantAccess(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
ddo.id,
|
|
|
|
consumer.getId(),
|
|
|
|
publisher
|
|
|
|
)
|
2019-03-14 16:58:07 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.isTrue(granted, 'The asset has not been granted correctly')
|
2019-04-01 12:40:45 +02:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const accessGranted = await ocean.keeper.conditions.accessSecretStoreCondition.checkPermissions(
|
|
|
|
consumer.getId(),
|
|
|
|
ddo.id
|
|
|
|
)
|
2019-04-01 12:40:45 +02:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.isTrue(accessGranted, 'Consumer has been granted.')
|
|
|
|
} catch {}
|
2019-03-14 16:58:07 +01:00
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should get the agreement conditions status fulfilled', async () => {
|
2019-09-09 12:18:54 +02:00
|
|
|
const status = await ocean.agreements.status(serviceAgreementSignatureResult.agreementId)
|
2019-04-15 14:28:17 +02:00
|
|
|
|
|
|
|
assert.deepEqual(status, {
|
|
|
|
lockReward: ConditionState.Fulfilled,
|
|
|
|
accessSecretStore: ConditionState.Fulfilled,
|
2019-06-20 00:20:09 +02:00
|
|
|
escrowReward: ConditionState.Unfulfilled
|
2019-04-15 14:28:17 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
it('should consume and store the assets', async () => {
|
2019-08-16 14:12:31 +02:00
|
|
|
const accessService = ddo.findServiceByType('access')
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const folder = '/tmp/ocean/squid-js-1'
|
2019-03-15 15:23:28 +01:00
|
|
|
const path = await ocean.assets.consume(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
ddo.id,
|
2019-08-16 16:12:42 +02:00
|
|
|
accessService.index,
|
2019-03-15 15:23:28 +01:00
|
|
|
consumer,
|
2019-06-20 00:20:09 +02:00
|
|
|
folder
|
2019-03-15 15:23:28 +01:00
|
|
|
)
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.include(path, folder, 'The storage path is not correct.')
|
2019-03-15 15:23:28 +01:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const files = await new Promise<string[]>(resolve => {
|
2019-06-24 13:06:38 +02:00
|
|
|
fs.readdir(path, (e, fileList) => {
|
2019-03-15 15:23:28 +01:00
|
|
|
resolve(fileList)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-09-09 12:18:54 +02:00
|
|
|
assert.deepEqual(files, ['README.md', 'package.json'], 'Stored files are not correct.')
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
2019-04-03 17:57:47 +02:00
|
|
|
|
2019-08-15 13:23:56 +02:00
|
|
|
it('should consume and store one asset', async () => {
|
2019-08-16 14:12:31 +02:00
|
|
|
const accessService = ddo.findServiceByType('access')
|
2019-04-03 17:57:47 +02:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const folder = '/tmp/ocean/squid-js-2'
|
2019-04-03 17:57:47 +02:00
|
|
|
const path = await ocean.assets.consume(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
ddo.id,
|
2019-08-16 16:12:42 +02:00
|
|
|
accessService.index,
|
2019-04-03 17:57:47 +02:00
|
|
|
consumer,
|
|
|
|
folder,
|
2019-06-20 00:20:09 +02:00
|
|
|
1
|
2019-04-03 17:57:47 +02:00
|
|
|
)
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.include(path, folder, 'The storage path is not correct.')
|
2019-04-03 17:57:47 +02:00
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
const files = await new Promise<string[]>(resolve => {
|
2019-06-24 13:06:38 +02:00
|
|
|
fs.readdir(path, (e, fileList) => {
|
2019-04-03 17:57:47 +02:00
|
|
|
resolve(fileList)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-06-20 00:20:09 +02:00
|
|
|
assert.deepEqual(files, ['README.md'], 'Stored files are not correct.')
|
2019-04-03 17:57:47 +02:00
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|