2019-03-14 21:28:51 +01:00
|
|
|
import { assert } from "chai"
|
2019-03-18 13:04:59 +01:00
|
|
|
import * as Web3 from "web3"
|
2019-03-15 15:23:28 +01:00
|
|
|
import * as fs from "fs"
|
2019-02-21 18:07:02 +01:00
|
|
|
|
|
|
|
import { config } from "../config"
|
2019-03-15 15:23:28 +01:00
|
|
|
import { getMetadata } from "../utils"
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-15 15:23:28 +01:00
|
|
|
import { Ocean, DDO, Account } from "../../src" // @oceanprotocol/squid
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
describe("Consume Asset", () => {
|
2019-02-21 18:07:02 +01:00
|
|
|
let ocean: Ocean
|
|
|
|
|
|
|
|
let publisher: Account
|
|
|
|
let consumer: Account
|
|
|
|
|
2019-03-15 15:23:28 +01:00
|
|
|
const metadata = getMetadata()
|
2019-03-14 16:58:07 +01:00
|
|
|
|
|
|
|
let ddo: DDO
|
|
|
|
let serviceAgreementSignatureResult: {agreementId: string, signature: string}
|
2019-02-21 18:07:02 +01:00
|
|
|
|
|
|
|
before(async () => {
|
2019-03-18 13:04:59 +01:00
|
|
|
ocean = await Ocean.getInstance({
|
|
|
|
...config,
|
|
|
|
web3Provider: new Web3.providers
|
|
|
|
.HttpProvider("http://localhost:8545", 0, "0x00Bd138aBD70e2F00903268F3Db08f2D25677C9e", "node0"),
|
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
|
|
|
|
// Accounts
|
2019-03-21 03:17:36 +01:00
|
|
|
const instanceConfig = (ocean as any).instanceConfig
|
2019-03-21 03:02:05 +01:00
|
|
|
publisher = new Account("0x00Bd138aBD70e2F00903268F3Db08f2D25677C9e", instanceConfig)
|
2019-03-18 13:04:59 +01:00
|
|
|
publisher.setPassword("node0")
|
2019-03-21 03:02:05 +01:00
|
|
|
consumer = new Account("0x068Ed00cF0441e4829D9784fCBe7b9e26D4BD8d0", instanceConfig)
|
2019-03-18 13:04:59 +01:00
|
|
|
consumer.setPassword("secret")
|
2019-03-14 16:58:07 +01:00
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
it("should regiester a asset", async () => {
|
|
|
|
ddo = await ocean.assets.create(metadata as any, publisher)
|
|
|
|
|
|
|
|
assert.isDefined(ddo, "Register has not returned a DDO")
|
|
|
|
assert.match(ddo.id, /^did:op:[a-f0-9]{64}$/, "DDO id is not valid")
|
|
|
|
assert.isAtLeast(ddo.authentication.length, 1, "Default authentication not added")
|
|
|
|
assert.isDefined(ddo.findServiceByType("Access"), "DDO Access service doesn't exist")
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
it("should be able to request tokens for consumer", async () => {
|
2019-03-14 21:28:51 +01:00
|
|
|
const initialBalance = (await consumer.getBalance()).ocn
|
2019-03-14 16:58:07 +01:00
|
|
|
await consumer.requestTokens(metadata.base.price)
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
assert.equal((await consumer.getBalance()).ocn, initialBalance + metadata.base.price, "OCN Tokens not delivered")
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
it("should sign the service agreement", async () => {
|
2019-02-21 18:07:02 +01:00
|
|
|
const accessService = ddo.findServiceByType("Access")
|
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
serviceAgreementSignatureResult = await ocean.agreements.prepare(ddo.id, accessService.serviceDefinitionId, consumer)
|
2019-02-25 14:06:48 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
const {agreementId, signature} = serviceAgreementSignatureResult
|
|
|
|
assert.match(agreementId, /^[a-f0-9]{64}$/, "Service agreement ID seems not valid")
|
|
|
|
assert.match(signature, /^0x[a-f0-9]{130}$/, "Service agreement signature seems not valid")
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
it("should execute the service agreement", async () => {
|
2019-02-21 18:07:02 +01:00
|
|
|
const accessService = ddo.findServiceByType("Access")
|
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
const success = await ocean.agreements.create(
|
|
|
|
ddo.id,
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
accessService.serviceDefinitionId,
|
|
|
|
serviceAgreementSignatureResult.signature,
|
|
|
|
consumer,
|
|
|
|
publisher,
|
|
|
|
)
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-14 16:58:07 +01:00
|
|
|
assert.isTrue(success)
|
|
|
|
})
|
|
|
|
|
2019-03-18 13:04:59 +01:00
|
|
|
it("should lock the payment by the consumer", async () => {
|
2019-03-14 16:58:07 +01:00
|
|
|
const paid = await ocean.agreements.conditions
|
|
|
|
.lockReward(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
ddo.findServiceByType("Metadata").metadata.base.price,
|
2019-03-15 15:23:28 +01:00
|
|
|
consumer,
|
2019-03-14 16:58:07 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
assert.isTrue(paid, "The asset has not been paid correctly")
|
|
|
|
})
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-18 13:04:59 +01:00
|
|
|
it("should grant the access by the publisher", async () => {
|
2019-03-14 16:58:07 +01:00
|
|
|
const granted = await ocean.agreements.conditions
|
|
|
|
.grantAccess(serviceAgreementSignatureResult.agreementId, ddo.id, consumer.getId(), publisher)
|
|
|
|
|
|
|
|
assert.isTrue(granted, "The asset has not been granted correctly")
|
|
|
|
})
|
|
|
|
|
2019-03-15 15:23:28 +01:00
|
|
|
it("should consume and store the assets", async () => {
|
2019-03-14 16:58:07 +01:00
|
|
|
const accessService = ddo.findServiceByType("Access")
|
2019-02-21 18:07:02 +01:00
|
|
|
|
2019-03-15 15:23:28 +01:00
|
|
|
const folder = "/tmp/ocean/squid-js"
|
|
|
|
const path = await ocean.assets.consume(
|
|
|
|
serviceAgreementSignatureResult.agreementId,
|
|
|
|
ddo.id,
|
|
|
|
accessService.serviceDefinitionId,
|
|
|
|
consumer,
|
|
|
|
folder,
|
|
|
|
)
|
|
|
|
|
|
|
|
assert.include(path, folder, "The storage path is not correct.")
|
|
|
|
|
|
|
|
const files = await new Promise<string[]>((resolve) => {
|
|
|
|
fs.readdir(path, (err, fileList) => {
|
|
|
|
resolve(fileList)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
assert.deepEqual(files, ["README.md", "package.json"], "Stored files are not correct.")
|
2019-02-21 18:07:02 +01:00
|
|
|
})
|
|
|
|
})
|