From 5648b8bd1ddff001f153ff5b8a279d777048bba6 Mon Sep 17 00:00:00 2001 From: Lance Date: Tue, 11 Feb 2025 18:06:06 -0500 Subject: [PATCH] prettier Signed-off-by: Lance --- signify-ts-test/src/utils/report.ts | 89 ++++++------ signify-ts-test/src/utils/resolve-env.ts | 13 +- signify-ts-test/src/utils/test-util.ts | 98 ++++++------- signify-ts-test/src/vlei-issuance.ts | 9 +- signify-ts-test/test/reg-pilot-api.ts | 132 +++++++++--------- .../test/run-workflow-bank.test.ts | 14 +- .../test/utils/workflow-step-runners.ts | 26 ++-- signify-ts-test/test/vlei-verification.ts | 2 +- 8 files changed, 197 insertions(+), 186 deletions(-) diff --git a/signify-ts-test/src/utils/report.ts b/signify-ts-test/src/utils/report.ts index 5992202..bfd0345 100644 --- a/signify-ts-test/src/utils/report.ts +++ b/signify-ts-test/src/utils/report.ts @@ -93,12 +93,12 @@ export async function generate_reports( keeper: signify.Keeper, unsignedReports: string[], reportTypes: string[], - copyFolder?: string + copyFolder?: string, ) { let zipsProcessed = 0; const signedReports = [] as string[]; console.log( - `Generating ${reportTypes} signed reports from orig reports: ${unsignedReports}` + `Generating ${reportTypes} signed reports from orig reports: ${unsignedReports}`, ); for (const unsignedReport of unsignedReports) { @@ -118,7 +118,7 @@ export async function generate_reports( reportTypes, keeper, ecrAid, - signedDirPrefixed + signedDirPrefixed, ); assert.equal(signedReports.length > 0, true); @@ -128,7 +128,7 @@ export async function generate_reports( fs.mkdirSync(tempDir, { recursive: true }); assert.equal( await createFailReports(failDirPrefixed, signedDirPrefixed), - true + true, ); } @@ -136,13 +136,13 @@ export async function generate_reports( fs.cpSync( signedDirPrefixed, path.join(dataDir, copyFolder, "signed_reports", ecrAid), - { recursive: true } + { recursive: true }, ); if (reportTypes.includes(FAIL_TYPE)) { fs.cpSync( failDirPrefixed, path.join(dataDir, copyFolder, "fail_reports", ecrAid), - { recursive: true } + { recursive: true }, ); } } @@ -164,7 +164,7 @@ export async function createSignedReports( reportTypes: string[] = [SIMPLE_TYPE], keeper: signify.Keeper, ecrAid: string, - signedDirPrefixed: string + signedDirPrefixed: string, ): Promise { const fileName = path.basename(filePath, path.extname(filePath)); const signedReports = [] as string[]; @@ -184,14 +184,14 @@ export async function createSignedReports( const foundPath = findReportsDir(testPaths.tmpReportsDir); if (!foundPath) { throw new Error( - `No reports directory found in ${testPaths.tmpReportsDir}` + `No reports directory found in ${testPaths.tmpReportsDir}`, ); } const complexManifest = await buildManifest( foundPath, false, keeper, - ecrAid + ecrAid, ); const complexManJson = JSON.stringify(complexManifest, null, 2); if (reportTypes.includes(EXTERNAL_MAN_TYPE)) { @@ -202,34 +202,34 @@ export async function createSignedReports( const signedRepPath = path.join(signedDirPrefixed, shortFileName); console.log( `Creating ${EXTERNAL_MAN_TYPE} packaged signed report ` + - signedRepPath + signedRepPath, ); await createExternalManifestZip( signedRepPath, filePath, - complexManJson + complexManJson, ); signedReports.push(signedRepPath); } if (reportTypes.includes(UNZIPPED_TYPE)) { const manPath = await writeReportsJson( testPaths.tmpReportsDir, - complexManJson + complexManJson, ); if (reportTypes.includes(UNFOLDERED_TYPE)) { //generate unfoldered zip, like older xbrl spec const unfolderedShortFileName = `${UNFOLDERED_TYPE}_${UNZIPPED_TYPE}_${fileName}_signed${fileExtension}`; const unfolderedRepPath = path.join( signedDirPrefixed, - unfolderedShortFileName + unfolderedShortFileName, ); console.log( - "Creating unfoldered+unzipped signed report " + unfolderedRepPath + "Creating unfoldered+unzipped signed report " + unfolderedRepPath, ); const sufZip = await transferTempToZip( testPaths.tmpReportsDir, unfolderedRepPath, - false + false, ); validateReport(new AdmZip(sufZip)); signedReports.push(unfolderedRepPath); @@ -249,7 +249,7 @@ export async function createSignedReports( // just copy the zip file here for a single digest/signature fsExtra.copySync( filePath, - path.join(testPaths.tmpReportsDir, path.basename(filePath)) + path.join(testPaths.tmpReportsDir, path.basename(filePath)), ); console.log(`Copied ${filePath} to ${testPaths.tmpReportsDir}`); // } @@ -258,14 +258,14 @@ export async function createSignedReports( testPaths.tmpReportsDir, true, keeper, - ecrAid + ecrAid, ); const simpleManJson = JSON.stringify(simpleManifest, null, 2); const manifestPath = path.join( testPaths.tmpReportsDir, "META-INF", - "reports.json" + "reports.json", ); console.log(`Writing manifest with digests/signatures ${manifestPath}`); @@ -280,7 +280,7 @@ export async function createSignedReports( console.log(`Creating simple packaged signed report ${signedRepPath}`); const sfZip = await transferTempToZip( testPaths.tmpReportsDir, - signedRepPath + signedRepPath, ); validateReport(new AdmZip(sfZip)); signedReports.push(signedRepPath); @@ -293,14 +293,14 @@ export async function getEbaSignedReport( filePath: string, signedDirPath: string, aid: string, - keeper: signify.Keeper + keeper: signify.Keeper, ): Promise { const signedZips = await createSignedReports( filePath, [SIMPLE_TYPE], keeper, aid, - path.join(signedDirPath, aid) + path.join(signedDirPath, aid), ); return signedZips[0]; } @@ -309,7 +309,7 @@ async function buildManifest( repDirPath: string, simple: boolean, keeper: signify.Keeper, - ecrAid: string + ecrAid: string, ): Promise { const reportEntries = await fs.promises.readdir(repDirPath, { withFileTypes: true, @@ -344,7 +344,7 @@ async function buildManifest( async function createFailReports( failDirPrefixed: string, - signedDirPrefixed: string + signedDirPrefixed: string, ): Promise { const failFuncs: Array<(manifestPath: string) => Promise> = [ genMissingSignature, @@ -504,13 +504,14 @@ async function listReportZips(dir: string): Promise { const zipEntries = zip.getEntries(); if ( zipEntries.some( - (entry) => entry.isDirectory && entry.entryName.endsWith("reports/") + (entry) => + entry.isDirectory && entry.entryName.endsWith("reports/"), ) ) { if (reportZips.length > 0) { throw new Error( "Multiple report zips found in but we dont handle that case currnetly " + - dir + dir, ); } reportZips.push(zipFile); @@ -522,7 +523,7 @@ async function listReportZips(dir: string): Promise { } async function removeMetaInfReportsJson( - manifestPath: string + manifestPath: string, ): Promise { if (fs.existsSync(manifestPath)) { console.log(`Removing ${manifestPath}`); @@ -536,7 +537,7 @@ async function removeMetaInfReportsJson( async function addSignatureToReport( signatureBlock: Signature, keeper: signify.Keeper, - ecrAid: string + ecrAid: string, ): Promise { const sigs = [] as string[]; for (const signer of keeper.signers as Signer[]) { @@ -550,7 +551,7 @@ async function addSignatureToReport( } assert( sigs.length > 0, - `No signatures added to signature block ${signatureBlock}` + `No signatures added to signature block ${signatureBlock}`, ); signatureBlock.sigs = sigs; signatureBlock.aid = ecrAid; @@ -561,7 +562,7 @@ async function addSignatureToReport( async function addDigestToReport( reportPath: string, signatureBlock: Signature, - simple = false + simple = false, ): Promise { const reportName = path.basename(reportPath); const buffer = await fs.promises.readFile(reportPath); @@ -583,7 +584,7 @@ async function addDigestToReport( async function transferTempToZip( tempDir: string, filePath: string, - allowSubDir: boolean = true + allowSubDir: boolean = true, ): Promise { const zip = new AdmZip(); if (allowSubDir) { @@ -611,7 +612,7 @@ async function transferTempToZip( } else { console.log(`Zip file created at ${filePath}`); console.log( - `Zip file contains: ${zip.getEntries().map((entry) => entry.entryName)}` + `Zip file contains: ${zip.getEntries().map((entry) => entry.entryName)}`, ); } @@ -643,15 +644,15 @@ async function getRepPath(fullTemp: string): Promise { if (dirs.includes("META-INF")) { if (dirs.includes("reports")) { console.log( - "Non-foldered report, found META-INF and reports directories" + "Non-foldered report, found META-INF and reports directories", ); } else if (repZip.length > 0) { console.log( - "Packaged report, found META-INF and zip with reports directories" + "Packaged report, found META-INF and zip with reports directories", ); } else { throw new Error( - "Report has META-INF but no reports directory or zip " + fullTemp + "Report has META-INF but no reports directory or zip " + fullTemp, ); } } else { @@ -668,7 +669,7 @@ async function getRepPath(fullTemp: string): Promise { assert( found, "Report is missing dir with META-INF and/or reports directory in " + - fullTemp + fullTemp, ); } return repDirPath; @@ -677,7 +678,7 @@ async function getRepPath(fullTemp: string): Promise { async function createExternalManifestZip( signedRepPath: string, origZipFilePath: string, - manJson: string + manJson: string, ): Promise { // Create a temporary directory const tempDir = path.join(process.cwd(), "tempZipDir"); @@ -706,7 +707,7 @@ async function createExternalManifestZip( fsExtra.removeSync(tempDir); console.log( - `${EXTERNAL_MAN_TYPE} zip package file created at: ${signedRepPath}` + `${EXTERNAL_MAN_TYPE} zip package file created at: ${signedRepPath}`, ); } @@ -714,14 +715,14 @@ function validateReport(zip: AdmZip) { const zipEntries = zip.getEntries(); // Check for META-INF directory and report.json const metaInfEntry = zipEntries.find((entry) => - entry.entryName.endsWith("META-INF/") + entry.entryName.endsWith("META-INF/"), ); if (!metaInfEntry) { throw new Error("META-INF directory not found in the zip file"); } const reportJsonEntry = zipEntries.find((entry) => - entry.entryName.endsWith("META-INF/reports.json") + entry.entryName.endsWith("META-INF/reports.json"), ); if (!reportJsonEntry) { throw new Error("report.json not found in META-INF directory"); @@ -729,20 +730,20 @@ function validateReport(zip: AdmZip) { // Check for reports directory or zip file const reportsEntry = zipEntries.find( - (entry) => entry.entryName.endsWith("reports/") && entry.isDirectory + (entry) => entry.entryName.endsWith("reports/") && entry.isDirectory, ); const reportsZipEntry = zipEntries.find((entry) => - entry.entryName.endsWith(".zip") + entry.entryName.endsWith(".zip"), ); if (!reportsEntry && !reportsZipEntry) { throw new Error( - "Neither reports directory nor zip file found in the zip file" + "Neither reports directory nor zip file found in the zip file", ); } console.log( - "Validation passed: META-INF directory with report.json and either reports directory or zip file found." + "Validation passed: META-INF directory with report.json and either reports directory or zip file found.", ); } @@ -768,7 +769,7 @@ function findReportsDir(dirPath: string): string | null { async function writeReportsJson( fullTemp: string, - manJson: string + manJson: string, ): Promise { const dirPath = await getRepPath(fullTemp); const manifestPath = path.join(dirPath, "META-INF", "reports.json"); diff --git a/signify-ts-test/src/utils/resolve-env.ts b/signify-ts-test/src/utils/resolve-env.ts index 5ca19a2..4b68c96 100644 --- a/signify-ts-test/src/utils/resolve-env.ts +++ b/signify-ts-test/src/utils/resolve-env.ts @@ -294,12 +294,15 @@ export class TestKeria { `Container State: ${portInUse.State}\n` + `Container Status: ${portInUse.Status}`, ); - if (pullImage) { - console.log(`Existing container running on ${portInUse}, stopping that one`) + if (pullImage) { + console.log( + `Existing container running on ${portInUse}, stopping that one`, + ); await pContainer.stop(); - } - else { - console.log(`Existing container running on ${portInUse}, using that one`) + } else { + console.log( + `Existing container running on ${portInUse}, using that one`, + ); container = pContainer; } } diff --git a/signify-ts-test/src/utils/test-util.ts b/signify-ts-test/src/utils/test-util.ts index b90b37f..618bcae 100644 --- a/signify-ts-test/src/utils/test-util.ts +++ b/signify-ts-test/src/utils/test-util.ts @@ -45,7 +45,7 @@ export function sleep(ms: number): Promise { export async function admitSinglesig( client: SignifyClient, aidName: string, - recipientAid: HabState + recipientAid: HabState, ) { const grantMsgSaid = await waitAndMarkNotification(client, "/exn/ipex/grant"); @@ -93,7 +93,7 @@ export async function assertNotifications( export async function createAid( client: SignifyClient, - name: string + name: string, ): Promise { const [prefix, oobi] = await getOrCreateIdentifier(client, name); return { prefix, oobi, name }; @@ -116,7 +116,7 @@ export function createTimestamp() { export async function getEndRoles( client: SignifyClient, alias: string, - role?: string + role?: string, ): Promise { const path = role !== undefined @@ -131,7 +131,7 @@ export async function getEndRoles( export async function getGrantedCredential( client: SignifyClient, - credId: string + credId: string, ): Promise { const credentialList = await client.credentials().list({ filter: { "-d": credId }, @@ -148,7 +148,7 @@ export async function getIssuedCredential( issuerClient: SignifyClient, issuerAID: HabState, recipientAID: HabState, - schemaSAID: string + schemaSAID: string, ) { const credentialList = await issuerClient.credentials().list({ filter: { @@ -164,7 +164,7 @@ export async function getIssuedCredential( export async function getOrCreateAID( client: SignifyClient, name: string, - kargs: CreateIdentiferArgs + kargs: CreateIdentiferArgs, ): Promise { try { return await client.identifiers().get(name); @@ -189,7 +189,7 @@ export async function getOrCreateAID( */ export async function getOrCreateClient( bran: string | undefined = undefined, - getOnly: boolean = false + getOnly: boolean = false, ): Promise { const env = TestEnvironment.getInstance(); await ready(); @@ -199,7 +199,7 @@ export async function getOrCreateClient( env.keriaAdminUrl, bran, Tier.low, - env.keriaBootUrl + env.keriaBootUrl, ); try { console.log("KERIA client connecting to ", env.keriaAdminUrl); @@ -212,7 +212,7 @@ export async function getOrCreateClient( await client.connect(); } else { throw new Error( - "Could not connect to client w/ bran " + bran + e.message + "Could not connect to client w/ bran " + bran + e.message, ); } } @@ -237,7 +237,7 @@ export async function getOrCreateClient( export async function getOrCreateClients( count: number, brans: string[] | undefined = undefined, - getOnly: boolean = false + getOnly: boolean = false, ): Promise { const tasks: Promise[] = []; for (let i = 0; i < count; i++) { @@ -260,7 +260,7 @@ export async function getOrCreateClients( export async function getOrCreateContact( client: SignifyClient, name: string, - oobi: string + oobi: string, ): Promise { const list = await client.contacts().list(undefined, "alias", `^${name}$`); // console.log("contacts.list", list); @@ -289,7 +289,7 @@ export async function getOrCreateContact( export async function getOrCreateIdentifier( client: SignifyClient, name: string, - kargs: CreateIdentiferArgs | undefined = undefined + kargs: CreateIdentiferArgs | undefined = undefined, ): Promise<[string, string]> { let id: any = undefined; try { @@ -336,7 +336,7 @@ export async function getOrIssueCredential( schema: string, rules?: any, source?: any, - privacy = false + privacy = false, ): Promise { const credentialList = await issuerClient.credentials().list(); @@ -347,7 +347,7 @@ export async function getOrIssueCredential( cred.sad.i === issuerAid.prefix && cred.sad.a.i === recipientAid.prefix && cred.sad.a.AID === credData.AID! && - cred.status.et != "rev" + cred.status.et != "rev", ); if (credential) return credential; } @@ -374,7 +374,7 @@ export async function getOrIssueCredential( export async function revokeCredential( issuerClient: SignifyClient, issuerAid: Aid, - credentialSaid: string + credentialSaid: string, ): Promise { const credentialList = await issuerClient.credentials().list(); @@ -390,7 +390,7 @@ export async function revokeCredential( export async function getStates(client: SignifyClient, prefixes: string[]) { const participantStates = await Promise.all( - prefixes.map((p) => client.keyStates().get(p)) + prefixes.map((p) => client.keyStates().get(p)), ); return participantStates.map((s: any[]) => s[0]); } @@ -402,7 +402,7 @@ export async function hasEndRole( client: SignifyClient, alias: string, role: string, - eid: string + eid: string, ): Promise { const list = await getEndRoles(client, alias, role); for (const i of list) { @@ -435,7 +435,7 @@ export async function warnNotifications( export async function deleteOperations( client: SignifyClient, - op: Operation + op: Operation, ) { if (op.metadata?.depends) { await deleteOperations(client, op.metadata.depends); @@ -446,7 +446,7 @@ export async function deleteOperations( export async function getReceivedCredential( client: SignifyClient, - credId: string + credId: string, ): Promise { const credentialList = await client.credentials().list({ filter: { @@ -466,7 +466,7 @@ export async function getReceivedCredential( */ export async function markAndRemoveNotification( client: SignifyClient, - note: Notification + note: Notification, ): Promise { try { await client.notifications().mark(note.i); @@ -480,7 +480,7 @@ export async function markAndRemoveNotification( */ export async function markNotification( client: SignifyClient, - note: Notification + note: Notification, ): Promise { await client.notifications().mark(note.i); } @@ -488,7 +488,7 @@ export async function markNotification( export async function resolveOobi( client: SignifyClient, oobi: string, - alias?: string + alias?: string, ) { const op = await client.oobis().resolve(oobi, alias); await waitOperation(client, op); @@ -497,7 +497,7 @@ export async function resolveOobi( export async function waitForCredential( client: SignifyClient, credSAID: string, - MAX_RETRIES: number = 10 + MAX_RETRIES: number = 10, ) { let retryCount = 0; while (retryCount < MAX_RETRIES) { @@ -513,14 +513,14 @@ export async function waitForCredential( export async function waitAndMarkNotification( client: SignifyClient, - route: string + route: string, ) { const notes = await waitForNotifications(client, route); await Promise.all( notes.map((note) => { client.notifications().mark(note.i); - }) + }), ); return notes[notes.length - 1]?.a.d ?? ""; @@ -529,7 +529,7 @@ export async function waitAndMarkNotification( export async function waitForNotifications( client: SignifyClient, route: string, - options: RetryOptions = {} + options: RetryOptions = {}, ): Promise { return retry(async () => { const response: { notes: Notification[] } = await client @@ -537,7 +537,7 @@ export async function waitForNotifications( .list(); const notes = response.notes.filter( - (note) => note.a.r === route && note.r === false + (note) => note.a.r === route && note.r === false, ); if (!notes.length) { @@ -555,7 +555,7 @@ export async function waitForNotifications( export async function waitOperation( client: SignifyClient, op: Operation | string, - signal?: AbortSignal + signal?: AbortSignal, ): Promise> { if (typeof op === "string") { op = await client.operations().get(op); @@ -573,11 +573,11 @@ export async function waitOperation( export async function getOrCreateRegistry( client: SignifyClient, aid: Aid, - registryName: string + registryName: string, ): Promise<{ name: string; regk: string }> { let registries = await client.registries().list(aid.name); registries = registries.filter( - (reg: { name: string }) => reg.name == registryName + (reg: { name: string }) => reg.name == registryName, ); if (registries.length > 0) { assert.equal(registries.length, 1); @@ -588,7 +588,7 @@ export async function getOrCreateRegistry( await waitOperation(client, await regResult.op()); registries = await client.registries().list(aid.name); registries = registries.filter( - (reg: { name: string }) => reg.name == registryName + (reg: { name: string }) => reg.name == registryName, ); } console.log(registries); @@ -600,7 +600,7 @@ export async function sendGrantMessage( senderClient: SignifyClient, senderAid: Aid, recipientAid: Aid, - credential: any + credential: any, ) { const [grant, gsigs, gend] = await senderClient.ipex().grant({ senderName: senderAid.name, @@ -621,11 +621,11 @@ export async function sendGrantMessage( export async function sendAdmitMessage( senderClient: SignifyClient, senderAid: Aid, - recipientAid: Aid + recipientAid: Aid, ) { const notifications = await waitForNotifications( senderClient, - "/exn/ipex/grant" + "/exn/ipex/grant", ); assert.equal(notifications.length, 1); const grantNotification = notifications[0]; @@ -648,7 +648,7 @@ export async function sendAdmitMessage( export async function dockerLogin( username: string, - password: string + password: string, ): Promise { return new Promise((resolve, reject) => { exec( @@ -660,14 +660,14 @@ export async function dockerLogin( } console.log(`Docker login successful: ${stdout}`); resolve(); - } + }, ); }); } export async function pullContainer( docker: Docker, - kimageName: string + kimageName: string, ): Promise { // Pull Docker image await new Promise((resolve, reject) => { @@ -691,7 +691,7 @@ export async function pullContainer( export async function performHealthCheck( url: string, timeout: number = 12000, - interval: number = 1000 + interval: number = 1000, ) { const start = Date.now(); while (Date.now() - start < timeout) { @@ -712,12 +712,12 @@ export async function performHealthCheck( export async function runDockerCompose( file: string, command: string, - service: string + service: string, ): Promise { const running = await isDockerComposeRunning(file); if (!running) { console.log( - `Starting docker compose command: ${file} ${command} ${service}` + `Starting docker compose command: ${file} ${command} ${service}`, ); return new Promise((resolve, reject) => { exec( @@ -729,12 +729,12 @@ export async function runDockerCompose( } console.log(stdout); resolve(true); - } + }, ); }); } else { console.log( - `Docker compose is already running: ${file} ${command} ${service}` + `Docker compose is already running: ${file} ${command} ${service}`, ); return running; } @@ -743,12 +743,12 @@ export async function runDockerCompose( export async function stopDockerCompose( file: string, command: string, - service: string + service: string, ): Promise { const running = await isDockerComposeRunning(file); if (running) { console.log( - `Stopping docker compose command: ${file} ${command} ${service}` + `Stopping docker compose command: ${file} ${command} ${service}`, ); return new Promise((resolve, reject) => { exec( @@ -760,12 +760,12 @@ export async function stopDockerCompose( } console.log(stdout); resolve(true); - } + }, ); }); } else { console.log( - `Docker compose is already stopped: ${file} ${command} ${service}` + `Docker compose is already stopped: ${file} ${command} ${service}`, ); return running; } @@ -787,7 +787,7 @@ export async function isDockerComposeRunning( vleiServerPort: number = 7723, witnessPort: number = 5642, verifierPort: number = 7676, - apiPort: number = 8000 + apiPort: number = 8000, ): Promise { const ports = [ { name: "vleiServerPort", port: vleiServerPort }, @@ -801,14 +801,14 @@ export async function isDockerComposeRunning( ports.map(async ({ name, port }) => { const inUse = await isPortInUse(port); return inUse ? name : null; - }) + }), ); const inUsePorts = portsInUse.filter(Boolean); if (inUsePorts.length === ports.length) { console.log( - "All specified ports are in use. Skipping docker compose check." + "All specified ports are in use. Skipping docker compose check.", ); return true; } else if (inUsePorts.length > 0) { diff --git a/signify-ts-test/src/vlei-issuance.ts b/signify-ts-test/src/vlei-issuance.ts index fe091e3..ea80628 100644 --- a/signify-ts-test/src/vlei-issuance.ts +++ b/signify-ts-test/src/vlei-issuance.ts @@ -58,7 +58,14 @@ import { import { ApiUser } from "./utils/test-data"; import { TestEnvironment } from "./utils/resolve-env"; -import { buildCredentials, buildTestData, buildUserData, CredentialInfo, EcrTestData, User } from "vlei-verifier-workflows"; +import { + buildCredentials, + buildTestData, + buildUserData, + CredentialInfo, + EcrTestData, + User, +} from "vlei-verifier-workflows"; export class VleiIssuance { configPath: string = "config/"; diff --git a/signify-ts-test/test/reg-pilot-api.ts b/signify-ts-test/test/reg-pilot-api.ts index 90752c7..4d8a92f 100644 --- a/signify-ts-test/test/reg-pilot-api.ts +++ b/signify-ts-test/test/reg-pilot-api.ts @@ -50,7 +50,7 @@ export async function run_api_test(apiUsers: ApiUser[], fast = true) { else if (apiUsers.length == 1) await single_user_test(apiUsers[0], fast); else console.log( - `Invalid ecr AID count. Expected 1 or 3, got ${apiUsers.length}` + `Invalid ecr AID count. Expected 1 or 3, got ${apiUsers.length}`, ); } @@ -60,7 +60,7 @@ export async function run_api_test_no_delegation(apiUsers: ApiUser[]) { export async function run_api_admin_test( apiUsers: ApiUser[], - adminUser: ApiUser + adminUser: ApiUser, ) { await admin_test(apiUsers, adminUser); } @@ -69,13 +69,13 @@ export async function run_api_revocation_test( requestorClient: SignifyClient, requestorAidAlias: string, requestorAidPrefix: string, - credentials: Map + credentials: Map, ) { await revoked_cred_upload_test( credentials, requestorAidAlias, requestorAidPrefix, - requestorClient + requestorClient, ); } @@ -121,7 +121,7 @@ async function single_user_test(user: ApiUser, fast = false) { if (user.creds[i]["cred"].sad.a.i === user.ecrAid.prefix) { const foundEcr = isEbaDataSubmitter( user.creds[i]["cred"], - user.ecrAid.prefix + user.ecrAid.prefix, ); if (foundEcr) { ecrUser = user; @@ -133,7 +133,7 @@ async function single_user_test(user: ApiUser, fast = false) { const lresp = await login( user, user.creds[i]["cred"], - user.creds[i]["credCesr"] + user.creds[i]["credCesr"], ); // if (lresp.status) { // sleep(1000); @@ -186,7 +186,7 @@ async function single_user_test(user: ApiUser, fast = false) { await apiAdapter.dropReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); const startUpload = new Date().getTime(); @@ -199,7 +199,7 @@ async function single_user_test(user: ApiUser, fast = false) { signedReport, signedZipBuf, signedZipDig, - user.roleClient + user.roleClient, ); const endUpload = new Date().getTime(); console.log(`Upload time: ${endUpload - startUpload} ms`); @@ -315,7 +315,7 @@ export async function single_user_eba_test(user: ApiUser) { if (user.creds[i]["cred"].sad.a.i === user.ecrAid.prefix) { const foundEcr = isEbaDataSubmitter( user.creds[i]["cred"], - user.ecrAid.prefix + user.ecrAid.prefix, ); if (foundEcr) { ecrUser = user; @@ -327,14 +327,14 @@ export async function single_user_eba_test(user: ApiUser) { const token = await ebaLogin( user, user.creds[i]["cred"], - user.creds[i]["credCesr"] + user.creds[i]["credCesr"], ); if (token && foundEcr) { const decodedToken = jwt.decode(token); if (decodedToken && typeof decodedToken === "object") { assert.equal( decodedToken["data"]["signifyResource"], - user.ecrAid.prefix + user.ecrAid.prefix, ); console.log("EBA login succeeded with expected AID", decodedToken); } else { @@ -354,7 +354,7 @@ export async function single_user_eba_test(user: ApiUser) { await fs.promises.readFile(signedReport), user.roleClient, token, - env + env, ); console.log("EBA upload response", signedUpResp); assert.equal(signedUpResp.status, 200); @@ -393,7 +393,7 @@ async function multi_user_test(apiUsers: Array) { process.cwd(), "data", signedDir, - user.ecrAid.prefix + user.ecrAid.prefix, ); // try to ping the api let ppath = "/ping"; @@ -406,7 +406,7 @@ async function multi_user_test(apiUsers: Array) { let sresp = await apiAdapter.getReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); // login with the ecr credential @@ -417,7 +417,7 @@ async function multi_user_test(apiUsers: Array) { await login(user, user.creds[i]["cred"], user.creds[i]["credCesr"]); const foundEcr = isEbaDataSubmitter( user.creds[i]["cred"], - user.ecrAid.prefix + user.ecrAid.prefix, ); if (foundEcr) { ecrCred = user.creds[i]["cred"]; @@ -438,13 +438,13 @@ async function multi_user_test(apiUsers: Array) { await apiAdapter.dropReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); // succeeds to query report status sresp = await apiAdapter.getReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); const sbody = await sresp.json(); console.log("Multi-user current report status", sbody); @@ -467,7 +467,7 @@ async function multi_user_test(apiUsers: Array) { await apiAdapter.dropReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); console.log(`Processing file: ${signedReport}`); const signedZipBuf = fs.readFileSync(`${signedReport}`); @@ -478,13 +478,13 @@ async function multi_user_test(apiUsers: Array) { signedReport, signedZipBuf, signedZipDig, - user.roleClient + user.roleClient, ); await checkSignedUpload( signedUpResp, path.basename(signedReport), signedZipDig, - user + user, ); user.uploadDig = signedZipDig; break; @@ -495,7 +495,7 @@ async function multi_user_test(apiUsers: Array) { let sresp = await apiAdapter.getReportStatusByAid( user1.idAlias, user1.ecrAid.prefix, - user1.roleClient + user1.roleClient, ); assert.equal(sresp.status, 202); let sbody = await sresp.json(); @@ -504,7 +504,7 @@ async function multi_user_test(apiUsers: Array) { sresp = await apiAdapter.getReportStatusByAid( user1.idAlias, user3.ecrAid.prefix, - user1.roleClient + user1.roleClient, ); assert.equal(sresp.status, 401); @@ -513,7 +513,7 @@ async function multi_user_test(apiUsers: Array) { user1.idAlias, user3.ecrAid.prefix, user3.uploadDig, - user1.roleClient + user1.roleClient, ); assert.equal(sresp.status, 401); @@ -522,7 +522,7 @@ async function multi_user_test(apiUsers: Array) { user2.idAlias, user2.ecrAid.prefix, user1.uploadDig, - user2.roleClient + user2.roleClient, ); assert.equal(sresp.status, 200); @@ -530,7 +530,7 @@ async function multi_user_test(apiUsers: Array) { sresp = await apiAdapter.getLeiReportStatusesByAid( user1.idAlias, user1.ecrAid.prefix, - user1.roleClient + user1.roleClient, ); assert.equal(sresp.status, 202); sbody = await sresp.json(); @@ -545,7 +545,7 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { __dirname, "data", signedDir, - user.ecrAid.prefix + user.ecrAid.prefix, ); // try to ping the api let ppath = "/ping"; @@ -558,7 +558,7 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { let sresp = await apiAdapter.getReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); // login with the ecr credential @@ -569,7 +569,7 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { await login(user, user.creds[i]["cred"], user.creds[i]["credCesr"]); const foundEcr = isEbaDataSubmitter( user.creds[i]["cred"], - user.ecrAid.prefix + user.ecrAid.prefix, ); if (foundEcr) { ecrCred = user.creds[i]["cred"]; @@ -590,13 +590,13 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { await apiAdapter.dropReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); // succeeds to query report status sresp = await apiAdapter.getReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); assert.equal(sresp.status, 202); const sbody = await sresp.json(); @@ -618,7 +618,7 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { await apiAdapter.dropReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); console.log(`Processing file: ${signedReport}`); const signedZipBuf = fs.readFileSync(`${signedReport}`); @@ -629,13 +629,13 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { signedReport, signedZipBuf, signedZipDig, - user.roleClient + user.roleClient, ); await checkSignedUpload( signedUpResp, path.basename(signedReport), signedZipDig, - user + user, ); user.uploadDig = signedZipDig; break; @@ -645,12 +645,12 @@ async function admin_test(apiUsers: Array, adminUser: ApiUser) { await login( adminUser, adminUser.creds[0]["cred"], - adminUser.creds[0]["credCesr"] + adminUser.creds[0]["credCesr"], ); let sresp = await apiAdapter.getReportsStatusAdmin( adminUser.idAlias, adminUser.ecrAid.prefix, - adminUser.roleClient + adminUser.roleClient, ); assert.equal(sresp.status, 200); let sbody = await sresp.json(); @@ -678,7 +678,7 @@ async function revoked_cred_upload_test( credentials: Map, requestorAidAlias: string, requestorAidPrefix: string, - requestorClient: SignifyClient + requestorClient: SignifyClient, ) { const env = TestEnvironment.getInstance(); const apiAdapter = new ApiAdapter(env.apiBaseUrl, env.filerBaseUrl); @@ -691,7 +691,7 @@ async function revoked_cred_upload_test( process.cwd(), "data", signedDir, - ecr_cred_prev_state.ecrAid.prefix + ecr_cred_prev_state.ecrAid.prefix, ); // try to ping the api let ppath = "/ping"; @@ -705,12 +705,12 @@ async function revoked_cred_upload_test( await login( ecr_cred_prev_state, ecr_cred_prev_state.creds[0]["cred"], - ecr_cred_prev_state.creds[0]["credCesr"] + ecr_cred_prev_state.creds[0]["credCesr"], ); await checkLogin( ecr_cred_prev_state, ecr_cred_prev_state.creds[0]["cred"], - false + false, ); // Get the current working directory @@ -720,7 +720,7 @@ async function revoked_cred_upload_test( // sanity check that the report verifies const keeper = ecr_cred_prev_state.roleClient.manager!.get( - ecr_cred_prev_state.ecrAid + ecr_cred_prev_state.ecrAid, ); const signer = keeper.signers[0]; @@ -731,7 +731,7 @@ async function revoked_cred_upload_test( await apiAdapter.dropReportStatusByAid( ecr_cred_prev_state.idAlias, ecr_cred_prev_state.ecrAid.prefix, - ecr_cred_prev_state.roleClient + ecr_cred_prev_state.roleClient, ); console.log(`Processing file: ${signedReport}`); const signedZipBuf = fs.readFileSync(`${signedReport}`); @@ -742,13 +742,13 @@ async function revoked_cred_upload_test( signedReport, signedZipBuf, signedZipDig, - ecr_cred_prev_state.roleClient + ecr_cred_prev_state.roleClient, ); await checkSignedUpload( signedUpResp, path.basename(signedReport), signedZipDig, - ecr_cred_prev_state + ecr_cred_prev_state, ); ecr_cred_prev_state.uploadDig = signedZipDig; } @@ -757,7 +757,7 @@ async function revoked_cred_upload_test( let sresp = await apiAdapter.getReportStatusByAid( ecr_cred_prev_state.idAlias, ecr_cred_prev_state.ecrAid.prefix, - ecr_cred_prev_state.roleClient + ecr_cred_prev_state.roleClient, ); assert.equal(sresp.status, 202); let sbody = await sresp.json(); @@ -769,7 +769,7 @@ async function revoked_cred_upload_test( requestorAidPrefix, requestorClient, ecr_cred_revoke.creds[0]["cred"], - ecr_cred_revoke.creds[0]["credCesr"] + ecr_cred_revoke.creds[0]["credCesr"], ); await checkLogin(ecr_cred_revoke, ecr_cred_revoke.creds[0]["cred"], true); @@ -777,24 +777,24 @@ async function revoked_cred_upload_test( await login( ecr_cred_prev_state, ecr_cred_prev_state.creds[0]["cred"], - ecr_cred_revoke.creds[0]["credCesr"] + ecr_cred_revoke.creds[0]["credCesr"], ); await checkLogin( ecr_cred_prev_state, ecr_cred_prev_state.creds[0]["cred"], - true + true, ); // 4th case. Presenting new ECR credentail with new SAID await login( ecr_cred_new_state, ecr_cred_new_state.creds[0]["cred"], - ecr_cred_new_state.creds[0]["credCesr"] + ecr_cred_new_state.creds[0]["credCesr"], ); await checkLogin( ecr_cred_new_state, ecr_cred_new_state.creds[0]["cred"], - false + false, ); } @@ -802,7 +802,7 @@ export async function checkSignedUpload( signedUpResp: Response, fileName: string, signedZipDig: string, - user: ApiUser + user: ApiUser, ): Promise { const env = TestEnvironment.getInstance(); const apiAdapter = new ApiAdapter(env.apiBaseUrl, env.filerBaseUrl); @@ -822,7 +822,7 @@ export async function checkSignedUpload( user.idAlias, user.ecrAid.prefix, signedZipDig, - user.roleClient + user.roleClient, ); assert.equal(sresp.status, 200); const signedUploadBody = await sresp.json(); @@ -837,7 +837,7 @@ export async function checkSignedUpload( sresp = await apiAdapter.getReportStatusByAid( user.idAlias, user.ecrAid.prefix, - user.roleClient + user.roleClient, ); assert.equal(sresp.status, 202); const twoUploadsBody = await sresp.json(); @@ -859,7 +859,7 @@ export async function checkFailUpload( failUpResp: Response, fileName: string, failZipDig: string, - ecrAid: HabState + ecrAid: HabState, ): Promise { const env = TestEnvironment.getInstance(); const apiAdapter = new ApiAdapter(env.apiBaseUrl, env.filerBaseUrl); @@ -890,7 +890,7 @@ export async function checkFailUpload( ecrAid.name, ecrAid.prefix, failZipDig, - roleClient + roleClient, ); assert.equal(sresp.status, 200); const signedUploadBody = await sresp.json(); @@ -903,7 +903,7 @@ export async function checkFailUpload( } export async function checkBadDigestUpload( - badDigestUpResp: Response + badDigestUpResp: Response, ): Promise { assert.equal(badDigestUpResp.status, 400); const badDigestUpBody = await badDigestUpResp.json(); @@ -913,7 +913,7 @@ export async function checkBadDigestUpload( } export async function checkNonPrefixedDigestUpload( - badDigestUpResp: Response + badDigestUpResp: Response, ): Promise { assert.equal(badDigestUpResp.status, 400); const badDigestUpBody = await badDigestUpResp.json(); @@ -924,7 +924,7 @@ export async function checkNonPrefixedDigestUpload( export function getSignedReports( signedDirPrefixed: string, - files?: string[] + files?: string[], ): string[] { const fileNames = files || fs.readdirSync(signedDirPrefixed); return fileNames.map((fileName) => path.join(signedDirPrefixed, fileName)); @@ -934,7 +934,7 @@ async function checkLogin( user: ApiUser, cred: any, credRevoked: boolean = false, - noDelegation: boolean = false + noDelegation: boolean = false, ) { const env = TestEnvironment.getInstance(); let heads = new Headers(); @@ -952,20 +952,20 @@ async function checkLogin( assert.equal(cresp.status, 401); assert.equal( cbody["msg"], - `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential revoked, info: Credential was revoked` + `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential revoked, info: Credential was revoked`, ); } else if (noDelegation) { assert.equal(cresp.status, 401); assert.equal( cbody["msg"], - `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential unauthorized, info: ECR chain validation failed, LE chain validation failed, The QVI AID must be delegated` + `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential unauthorized, info: ECR chain validation failed, LE chain validation failed, The QVI AID must be delegated`, ); } else { assert.equal(cresp.status, 200); assert.equal(cbody["aid"], `${user.ecrAid.prefix}`); assert.equal( cbody["msg"], - `AID ${user.ecrAid.prefix} w/ lei ${cred.sad.a.LEI} has valid login account` + `AID ${user.ecrAid.prefix} w/ lei ${cred.sad.a.LEI} has valid login account`, ); assert.equal(cbody["said"], cred.sad.d); } @@ -973,7 +973,7 @@ async function checkLogin( assert.equal(cresp.status, 401); assert.equal( cbody["msg"], - `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential unauthorized, info: Can't authorize cred with OOR schema` + `identifier ${user.ecrAid.prefix} presented credentials ${cred.sad.d}, w/ status Credential unauthorized, info: Can't authorize cred with OOR schema`, ); } return cresp; @@ -1007,7 +1007,7 @@ async function login(user: ApiUser, cred: any, credCesr: any) { assert.equal(lresp.status, 202); assert.equal( ljson["msg"], - `${cred.sad.d} for ${cred.sad.a.i} as issuee is Credential cryptographically valid` + `${cred.sad.d} for ${cred.sad.a.i} as issuee is Credential cryptographically valid`, ); } return lresp; @@ -1052,7 +1052,7 @@ async function presentRevocation( requestorAidPrefix: string, requestorClient: SignifyClient, cred: any, - credCesr: any + credCesr: any, ) { const env = TestEnvironment.getInstance(); let heads = new Headers(); @@ -1072,7 +1072,7 @@ async function presentRevocation( let sreq = await requestorClient.createSignedRequest( requestorAidAlias, url, - lreq + lreq, ); const lresp = await fetch(url, sreq); console.log("login response", lresp); @@ -1083,7 +1083,7 @@ async function presentRevocation( assert.equal(credJson[0].sad.a.i, `${cred.sad.a.i}`); assert.equal( ljson["msg"], - `${cred.sad.d} for ${cred.sad.a.i} as issuee is Credential cryptographically valid` + `${cred.sad.d} for ${cred.sad.a.i} as issuee is Credential cryptographically valid`, ); return lresp; } diff --git a/signify-ts-test/test/run-workflow-bank.test.ts b/signify-ts-test/test/run-workflow-bank.test.ts index e311f68..2414ce2 100755 --- a/signify-ts-test/test/run-workflow-bank.test.ts +++ b/signify-ts-test/test/run-workflow-bank.test.ts @@ -103,7 +103,7 @@ console.log( "refresh:", refresh, "clean:", - clean + clean, ); beforeAll(async () => { @@ -125,7 +125,7 @@ test("api-verifier-bank-test-workflow", async function run() { const workflowPath = path.join( testPaths.workflowsDir, - "bank-api-verifier-test-workflow.yaml" + "bank-api-verifier-test-workflow.yaml", ); const workflow = loadWorkflow(workflowPath); @@ -142,7 +142,7 @@ test("api-verifier-bank-test-workflow", async function run() { test("eba-verifier-prep-only", async function run() { console.warn( - "eba-verifier-prep-only is not a real test but allows for the preparation of the EBA verifier test" + "eba-verifier-prep-only is not a real test but allows for the preparation of the EBA verifier test", ); await downloadConfigWorkflowReports(bankName, false, false, false, refresh); // await generateBankConfig(bankNum); @@ -159,7 +159,7 @@ test("eba-verifier-bank-test-workflow", async function run() { const workflowPath = path.join( testPaths.workflowsDir, - "eba-verifier-test-workflow.yaml" + "eba-verifier-test-workflow.yaml", ); const workflow = loadWorkflow(workflowPath); @@ -176,7 +176,7 @@ test("eba-verifier-bank-test-workflow", async function run() { test("vlei-issuance-reports-bank-test-workflow", async function run() { console.log( - `Running vlei-issuance-reports-bank-test-workflow for bank: ${bankName}` + `Running vlei-issuance-reports-bank-test-workflow for bank: ${bankName}`, ); process.env.REPORT_TYPES = SIMPLE_TYPE; @@ -187,7 +187,7 @@ test("vlei-issuance-reports-bank-test-workflow", async function run() { configJson = await getConfig(testPaths.testUserConfigFile); console.log( - `Running vlei issuance and reports generation test for bank: ${bankName}` + `Running vlei issuance and reports generation test for bank: ${bankName}`, ); const bankDirPath = testPaths.testUserDir; const workflowName = "workflow.yaml"; @@ -201,7 +201,7 @@ test("vlei-issuance-reports-bank-test-workflow", async function run() { wr.registerRunner("api_test", new ApiTestStepRunner()); wr.registerRunner( "vlei_verification_test", - new VleiVerificationTestStepRunner() + new VleiVerificationTestStepRunner(), ); const workflowRunResult = await wr.runWorkflow(); assert.equal(workflowRunResult, true); diff --git a/signify-ts-test/test/utils/workflow-step-runners.ts b/signify-ts-test/test/utils/workflow-step-runners.ts index fdac5bc..0d665d2 100644 --- a/signify-ts-test/test/utils/workflow-step-runners.ts +++ b/signify-ts-test/test/utils/workflow-step-runners.ts @@ -28,14 +28,14 @@ export class GenerateReportXmlStepRunner extends StepRunner { vi: VleiIssuance, stepName: string, step: any, - configJson: any + configJson: any, ): Promise { const testData = getReportGenTestData(); const aidData = await buildAidData(configJson); const clients = await getOrCreateClients( 1, [aidData[step.aid].agent.secret], - true + true, ); const roleClient = clients[0]; const ecrAid = await roleClient.identifiers().get(step.aid); @@ -44,20 +44,20 @@ export class GenerateReportXmlStepRunner extends StepRunner { __dirname, "../data", testData["failDir"], - ecrAid.prefix + ecrAid.prefix, ); const signedDirPrefixed = path.join( __dirname, "../data", testData["signedDir"], - ecrAid.prefix + ecrAid.prefix, ); const result = await generate_reports( ecrAid.prefix, keeper, testData["unsignedReports"], testData["reportTypes"], - step.copy_folder + step.copy_folder, ); return result; } @@ -69,7 +69,7 @@ export class GenerateReportStepRunner extends StepRunner { vi: VleiIssuance, stepName: string, step: any, - configJson: any + configJson: any, ): Promise { const paths = TestPaths.getInstance(); const zipWithCopies = createZipWithCopies( @@ -77,7 +77,7 @@ export class GenerateReportStepRunner extends StepRunner { paths.testUserName, paths.maxReportMb, paths.refreshTestData, - paths.testUserNum + paths.testUserNum, ); paths.testReportGeneratedUnsignedZip = zipWithCopies; } @@ -89,7 +89,7 @@ export class SignReportStepRunner extends StepRunner { vi: VleiIssuance, stepName: string, step: any, - configJson: any + configJson: any, ): Promise { const env = TestEnvironment.getInstance(); const paths = TestPaths.getInstance(); @@ -100,7 +100,7 @@ export class SignReportStepRunner extends StepRunner { paths.testReportGeneratedUnsignedZip, paths.testSignedReports, user.ecrAid.prefix, - keeper + keeper, ); } } @@ -111,7 +111,7 @@ export class ApiTestStepRunner extends StepRunner { vi: VleiIssuance, stepName: string, step: any, - configJson: any + configJson: any, ): Promise { let env = TestEnvironment.getInstance(); const apiUsers = await getApiTestData(configJson, env, step.aids); @@ -121,7 +121,7 @@ export class ApiTestStepRunner extends StepRunner { const clients = await getOrCreateClients( 1, [aidData[step.requestor_aid].agent.secret], - true + true, ); const roleClient = clients[clients.length - 1]; const requestorAid = await roleClient @@ -132,7 +132,7 @@ export class ApiTestStepRunner extends StepRunner { roleClient, step.requestor_aid, requestorAidPrefix, - new Map() // TODO: instead of new Map() must be map of creds. + new Map(), // TODO: instead of new Map() must be map of creds. ); } else if (step.test_case == "api_test_admin") { const adminUser = await getApiTestData(configJson, env, [step.admin_aid]); @@ -156,7 +156,7 @@ export class VleiVerificationTestStepRunner extends StepRunner { vi: VleiIssuance, stepName: string, step: any, - configJson: any = null + configJson: any = null, ): Promise { let env = TestEnvironment.getInstance(); const apiUsers = await getApiTestData(configJson, env, step.aids); diff --git a/signify-ts-test/test/vlei-verification.ts b/signify-ts-test/test/vlei-verification.ts index 35df4ef..c131366 100644 --- a/signify-ts-test/test/vlei-verification.ts +++ b/signify-ts-test/test/vlei-verification.ts @@ -12,7 +12,7 @@ let apiAdapter: ApiAdapter; // afterEach(async () => {}); // beforeAll(async () => { -// const testKeria = +// const testKeria = // env = TestEnvironment.getInstance("docker",); // apiAdapter = new ApiAdapter(env.apiBaseUrl, env.filerBaseUrl); // });