mirror of
https://github.com/google/nomulus.git
synced 2025-05-13 16:07:15 +02:00
Add necessary fields to the AllocationToken schema
See https://docs.google.com/document/d/1SSWrILRpx0Mtr4sdvlYwz9I8wJp5Gu_o4qlml3iJDKI This is just the base for now--we don't actually do anything with it. ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=243265164
This commit is contained in:
parent
3b87d4de64
commit
63807aa9be
11 changed files with 356 additions and 31 deletions
|
@ -16,19 +16,36 @@ package google.registry.model.domain.token;
|
||||||
|
|
||||||
import static com.google.common.base.Preconditions.checkArgument;
|
import static com.google.common.base.Preconditions.checkArgument;
|
||||||
import static com.google.common.base.Preconditions.checkState;
|
import static com.google.common.base.Preconditions.checkState;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenStatus.CANCELLED;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenStatus.ENDED;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenStatus.NOT_STARTED;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenStatus.VALID;
|
||||||
|
import static google.registry.util.CollectionUtils.forceEmptyToNull;
|
||||||
|
import static google.registry.util.CollectionUtils.nullToEmptyImmutableCopy;
|
||||||
import static google.registry.util.PreconditionsUtils.checkArgumentNotNull;
|
import static google.registry.util.PreconditionsUtils.checkArgumentNotNull;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
|
import com.google.common.base.Strings;
|
||||||
|
import com.google.common.collect.ImmutableMultimap;
|
||||||
|
import com.google.common.collect.ImmutableSet;
|
||||||
|
import com.google.common.collect.ImmutableSortedMap;
|
||||||
import com.googlecode.objectify.Key;
|
import com.googlecode.objectify.Key;
|
||||||
|
import com.googlecode.objectify.annotation.Embed;
|
||||||
import com.googlecode.objectify.annotation.Entity;
|
import com.googlecode.objectify.annotation.Entity;
|
||||||
import com.googlecode.objectify.annotation.Id;
|
import com.googlecode.objectify.annotation.Id;
|
||||||
import com.googlecode.objectify.annotation.Index;
|
import com.googlecode.objectify.annotation.Index;
|
||||||
|
import com.googlecode.objectify.annotation.Mapify;
|
||||||
|
import com.googlecode.objectify.annotation.OnLoad;
|
||||||
import google.registry.model.BackupGroupRoot;
|
import google.registry.model.BackupGroupRoot;
|
||||||
import google.registry.model.Buildable;
|
import google.registry.model.Buildable;
|
||||||
import google.registry.model.CreateAutoTimestamp;
|
import google.registry.model.CreateAutoTimestamp;
|
||||||
import google.registry.model.annotations.ReportedOn;
|
import google.registry.model.annotations.ReportedOn;
|
||||||
|
import google.registry.model.common.TimedTransitionProperty;
|
||||||
|
import google.registry.model.common.TimedTransitionProperty.TimeMapper;
|
||||||
|
import google.registry.model.common.TimedTransitionProperty.TimedTransition;
|
||||||
import google.registry.model.reporting.HistoryEntry;
|
import google.registry.model.reporting.HistoryEntry;
|
||||||
import java.util.Optional;
|
import java.util.Optional;
|
||||||
|
import java.util.Set;
|
||||||
import javax.annotation.Nullable;
|
import javax.annotation.Nullable;
|
||||||
import org.joda.time.DateTime;
|
import org.joda.time.DateTime;
|
||||||
|
|
||||||
|
@ -37,6 +54,31 @@ import org.joda.time.DateTime;
|
||||||
@Entity
|
@Entity
|
||||||
public class AllocationToken extends BackupGroupRoot implements Buildable {
|
public class AllocationToken extends BackupGroupRoot implements Buildable {
|
||||||
|
|
||||||
|
// Promotions should only move forward, and ENDED / CANCELLED are terminal states.
|
||||||
|
private static final ImmutableMultimap<TokenStatus, TokenStatus> VALID_TOKEN_STATUS_TRANSITIONS =
|
||||||
|
ImmutableMultimap.<TokenStatus, TokenStatus>builder()
|
||||||
|
.putAll(NOT_STARTED, VALID, CANCELLED)
|
||||||
|
.putAll(VALID, ENDED, CANCELLED)
|
||||||
|
.build();
|
||||||
|
|
||||||
|
/** Single-use tokens are invalid after use. Infinite-use tokens, predictably, are not. */
|
||||||
|
public enum TokenType {
|
||||||
|
SINGLE_USE,
|
||||||
|
UNLIMITED_USE
|
||||||
|
}
|
||||||
|
|
||||||
|
/** The status of this token with regards to any potential promotion. */
|
||||||
|
public enum TokenStatus {
|
||||||
|
/** Default status for a token. Either a promotion doesn't exist or it hasn't started. */
|
||||||
|
NOT_STARTED,
|
||||||
|
/** A promotion is currently running. */
|
||||||
|
VALID,
|
||||||
|
/** The promotion has ended. */
|
||||||
|
ENDED,
|
||||||
|
/** The promotion was manually invalidated. */
|
||||||
|
CANCELLED
|
||||||
|
}
|
||||||
|
|
||||||
/** The allocation token string. */
|
/** The allocation token string. */
|
||||||
@Id String token;
|
@Id String token;
|
||||||
|
|
||||||
|
@ -49,6 +91,61 @@ public class AllocationToken extends BackupGroupRoot implements Buildable {
|
||||||
/** When this token was created. */
|
/** When this token was created. */
|
||||||
CreateAutoTimestamp creationTime = CreateAutoTimestamp.create(null);
|
CreateAutoTimestamp creationTime = CreateAutoTimestamp.create(null);
|
||||||
|
|
||||||
|
/** Allowed registrar client IDs for this token, or null if all registrars are allowed. */
|
||||||
|
@Nullable Set<String> allowedClientIds;
|
||||||
|
|
||||||
|
/** Allowed TLDs for this token, or null if all TLDs are allowed. */
|
||||||
|
@Nullable Set<String> allowedTlds;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* For promotions, a discount off the base price for the first year between 0.0 and 1.0.
|
||||||
|
*
|
||||||
|
* <p>e.g. a value of 0.15 will mean a 15% discount off the base price for the first year.
|
||||||
|
*/
|
||||||
|
double discountFraction;
|
||||||
|
|
||||||
|
/** The type of the token, either single-use or unlimited-use. */
|
||||||
|
// TODO(b/130301183): this should not be nullable, we can remove this once we're sure it isn't
|
||||||
|
@Nullable TokenType tokenType;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Promotional token validity periods.
|
||||||
|
*
|
||||||
|
* <p>If the token is promotional, the status will be VALID at the start of the promotion and
|
||||||
|
* ENDED at the end. If manually cancelled, we will add a CANCELLED status.
|
||||||
|
*/
|
||||||
|
@Mapify(TimeMapper.class)
|
||||||
|
TimedTransitionProperty<TokenStatus, TokenStatusTransition> tokenStatusTransitions =
|
||||||
|
TimedTransitionProperty.forMapify(NOT_STARTED, TokenStatusTransition.class);
|
||||||
|
|
||||||
|
// TODO(b/130301183): Remove this after loading/saving all token entities
|
||||||
|
@OnLoad
|
||||||
|
void onLoad() {
|
||||||
|
if (tokenType == null) {
|
||||||
|
tokenType = TokenType.SINGLE_USE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A transition to a given token status at a specific time, for use in a TimedTransitionProperty.
|
||||||
|
*
|
||||||
|
* <p>Public because App Engine's security manager requires this for instantiation via reflection.
|
||||||
|
*/
|
||||||
|
@Embed
|
||||||
|
public static class TokenStatusTransition extends TimedTransition<TokenStatus> {
|
||||||
|
private TokenStatus tokenStatus;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public TokenStatus getValue() {
|
||||||
|
return tokenStatus;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void setValue(TokenStatus tokenStatus) {
|
||||||
|
this.tokenStatus = tokenStatus;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public String getToken() {
|
public String getToken() {
|
||||||
return token;
|
return token;
|
||||||
}
|
}
|
||||||
|
@ -69,6 +166,22 @@ public class AllocationToken extends BackupGroupRoot implements Buildable {
|
||||||
return Optional.ofNullable(creationTime.getTimestamp());
|
return Optional.ofNullable(creationTime.getTimestamp());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public ImmutableSet<String> getAllowedClientIds() {
|
||||||
|
return nullToEmptyImmutableCopy(allowedClientIds);
|
||||||
|
}
|
||||||
|
|
||||||
|
public ImmutableSet<String> getAllowedTlds() {
|
||||||
|
return nullToEmptyImmutableCopy(allowedTlds);
|
||||||
|
}
|
||||||
|
|
||||||
|
public double getDiscountFraction() {
|
||||||
|
return discountFraction;
|
||||||
|
}
|
||||||
|
|
||||||
|
public TokenType getTokenType() {
|
||||||
|
return tokenType;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Builder asBuilder() {
|
public Builder asBuilder() {
|
||||||
return new Builder(clone(this));
|
return new Builder(clone(this));
|
||||||
|
@ -82,17 +195,31 @@ public class AllocationToken extends BackupGroupRoot implements Buildable {
|
||||||
super(instance);
|
super(instance);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public AllocationToken build() {
|
||||||
|
checkArgumentNotNull(getInstance().tokenType, "Token type must be specified");
|
||||||
|
checkArgument(!Strings.isNullOrEmpty(getInstance().token), "Token must not be null or empty");
|
||||||
|
checkArgument(
|
||||||
|
getInstance().domainName == null || TokenType.SINGLE_USE.equals(getInstance().tokenType),
|
||||||
|
"Domain name can only be specified for SINGLE_USE tokens");
|
||||||
|
checkArgument(
|
||||||
|
getInstance().redemptionHistoryEntry == null
|
||||||
|
|| TokenType.SINGLE_USE.equals(getInstance().tokenType),
|
||||||
|
"Redemption history entry can only be specified for SINGLE_USE tokens");
|
||||||
|
return super.build();
|
||||||
|
}
|
||||||
|
|
||||||
public Builder setToken(String token) {
|
public Builder setToken(String token) {
|
||||||
checkState(getInstance().token == null, "token can only be set once");
|
checkState(getInstance().token == null, "Token can only be set once");
|
||||||
checkArgumentNotNull(token, "token must not be null");
|
checkArgumentNotNull(token, "Token must not be null");
|
||||||
checkArgument(!token.isEmpty(), "token must not be blank");
|
checkArgument(!token.isEmpty(), "Token must not be blank");
|
||||||
getInstance().token = token;
|
getInstance().token = token;
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
public Builder setRedemptionHistoryEntry(Key<HistoryEntry> redemptionHistoryEntry) {
|
public Builder setRedemptionHistoryEntry(Key<HistoryEntry> redemptionHistoryEntry) {
|
||||||
getInstance().redemptionHistoryEntry =
|
getInstance().redemptionHistoryEntry =
|
||||||
checkArgumentNotNull(redemptionHistoryEntry, "redemptionHistoryEntry must not be null");
|
checkArgumentNotNull(redemptionHistoryEntry, "Redemption history entry must not be null");
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -104,9 +231,43 @@ public class AllocationToken extends BackupGroupRoot implements Buildable {
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
public Builder setCreationTimeForTest(DateTime creationTime) {
|
public Builder setCreationTimeForTest(DateTime creationTime) {
|
||||||
checkState(
|
checkState(
|
||||||
getInstance().creationTime.getTimestamp() == null, "creationTime can only be set once");
|
getInstance().creationTime.getTimestamp() == null, "Creation time can only be set once");
|
||||||
getInstance().creationTime = CreateAutoTimestamp.create(creationTime);
|
getInstance().creationTime = CreateAutoTimestamp.create(creationTime);
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public Builder setAllowedClientIds(Set<String> allowedClientIds) {
|
||||||
|
getInstance().allowedClientIds = forceEmptyToNull(allowedClientIds);
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Builder setAllowedTlds(Set<String> allowedTlds) {
|
||||||
|
getInstance().allowedTlds = forceEmptyToNull(allowedTlds);
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Builder setDiscountFraction(double discountFraction) {
|
||||||
|
getInstance().discountFraction = discountFraction;
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Builder setTokenType(TokenType tokenType) {
|
||||||
|
checkState(getInstance().tokenType == null, "Token type can only be set once");
|
||||||
|
getInstance().tokenType = tokenType;
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Builder setTokenStatusTransitions(
|
||||||
|
ImmutableSortedMap<DateTime, TokenStatus> transitions) {
|
||||||
|
getInstance().tokenStatusTransitions =
|
||||||
|
TimedTransitionProperty.make(
|
||||||
|
transitions,
|
||||||
|
TokenStatusTransition.class,
|
||||||
|
VALID_TOKEN_STATUS_TRANSITIONS,
|
||||||
|
"",
|
||||||
|
NOT_STARTED,
|
||||||
|
"");
|
||||||
|
return this;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -154,7 +154,7 @@ public class Registry extends ImmutableObject implements Buildable {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A transition to a TLD state at a specific time, for use in a TimedTransitionProperty. Public
|
* A transition to a TLD state at a specific time, for use in a TimedTransitionProperty. Public
|
||||||
* because AppEngine's security manager requires this for instantiation via reflection.
|
* because App Engine's security manager requires this for instantiation via reflection.
|
||||||
*/
|
*/
|
||||||
@Embed
|
@Embed
|
||||||
public static class TldStateTransition extends TimedTransition<TldState> {
|
public static class TldStateTransition extends TimedTransition<TldState> {
|
||||||
|
@ -174,7 +174,8 @@ public class Registry extends ImmutableObject implements Buildable {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A transition to a given billing cost at a specific time, for use in a TimedTransitionProperty.
|
* A transition to a given billing cost at a specific time, for use in a TimedTransitionProperty.
|
||||||
* Public because AppEngine's security manager requires this for instantiation via reflection.
|
*
|
||||||
|
* <p>Public because App Engine's security manager requires this for instantiation via reflection.
|
||||||
*/
|
*/
|
||||||
@Embed
|
@Embed
|
||||||
public static class BillingCostTransition extends TimedTransition<Money> {
|
public static class BillingCostTransition extends TimedTransition<Money> {
|
||||||
|
|
|
@ -18,6 +18,7 @@ import static com.google.common.base.Preconditions.checkArgument;
|
||||||
import static com.google.common.collect.ImmutableSet.toImmutableSet;
|
import static com.google.common.collect.ImmutableSet.toImmutableSet;
|
||||||
import static com.google.common.collect.Queues.newArrayDeque;
|
import static com.google.common.collect.Queues.newArrayDeque;
|
||||||
import static com.google.common.collect.Sets.difference;
|
import static com.google.common.collect.Sets.difference;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.model.ofy.ObjectifyService.ofy;
|
import static google.registry.model.ofy.ObjectifyService.ofy;
|
||||||
import static google.registry.util.StringGenerator.DEFAULT_PASSWORD_LENGTH;
|
import static google.registry.util.StringGenerator.DEFAULT_PASSWORD_LENGTH;
|
||||||
import static java.nio.charset.StandardCharsets.UTF_8;
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||||
|
@ -117,6 +118,8 @@ class GenerateAllocationTokensCommand implements CommandWithRemoteApi {
|
||||||
.map(
|
.map(
|
||||||
t -> {
|
t -> {
|
||||||
AllocationToken.Builder token = new AllocationToken.Builder().setToken(t);
|
AllocationToken.Builder token = new AllocationToken.Builder().setToken(t);
|
||||||
|
// TODO(b/129471448): allow this to be unlimited-use as well
|
||||||
|
token.setTokenType(SINGLE_USE);
|
||||||
if (domainNames != null) {
|
if (domainNames != null) {
|
||||||
token.setDomainName(domainNames.removeFirst());
|
token.setDomainName(domainNames.removeFirst());
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,6 +14,7 @@
|
||||||
|
|
||||||
package google.registry.flows.domain;
|
package google.registry.flows.domain;
|
||||||
|
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.model.eppoutput.CheckData.DomainCheck.create;
|
import static google.registry.model.eppoutput.CheckData.DomainCheck.create;
|
||||||
import static google.registry.model.registry.Registry.TldState.PREDELEGATION;
|
import static google.registry.model.registry.Registry.TldState.PREDELEGATION;
|
||||||
import static google.registry.model.registry.Registry.TldState.START_DATE_SUNRISE;
|
import static google.registry.model.registry.Registry.TldState.START_DATE_SUNRISE;
|
||||||
|
@ -83,7 +84,11 @@ public class DomainCheckFlowTest
|
||||||
|
|
||||||
private ReservedList createReservedList() {
|
private ReservedList createReservedList() {
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder().setDomainName("anchor.tld").setToken("2fooBAR").build());
|
new AllocationToken.Builder()
|
||||||
|
.setDomainName("anchor.tld")
|
||||||
|
.setToken("2fooBAR")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.build());
|
||||||
return persistReservedList(
|
return persistReservedList(
|
||||||
"tld-reserved",
|
"tld-reserved",
|
||||||
"reserved,FULLY_BLOCKED",
|
"reserved,FULLY_BLOCKED",
|
||||||
|
@ -140,7 +145,8 @@ public class DomainCheckFlowTest
|
||||||
public void testSuccess_oneExists_allocationTokenIsValid() throws Exception {
|
public void testSuccess_oneExists_allocationTokenIsValid() throws Exception {
|
||||||
setEppInput("domain_check_allocationtoken.xml");
|
setEppInput("domain_check_allocationtoken.xml");
|
||||||
persistActiveDomain("example1.tld");
|
persistActiveDomain("example1.tld");
|
||||||
persistResource(new AllocationToken.Builder().setToken("abc123").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("abc123").setTokenType(SINGLE_USE).build());
|
||||||
doCheckTest(
|
doCheckTest(
|
||||||
create(false, "example1.tld", "In use"),
|
create(false, "example1.tld", "In use"),
|
||||||
create(true, "example2.tld", null),
|
create(true, "example2.tld", null),
|
||||||
|
@ -154,6 +160,7 @@ public class DomainCheckFlowTest
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("abc123")
|
.setToken("abc123")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
||||||
.build());
|
.build());
|
||||||
doCheckTest(
|
doCheckTest(
|
||||||
|
|
|
@ -21,6 +21,7 @@ import static google.registry.flows.FlowTestCase.UserPrivileges.SUPERUSER;
|
||||||
import static google.registry.model.billing.BillingEvent.Flag.ANCHOR_TENANT;
|
import static google.registry.model.billing.BillingEvent.Flag.ANCHOR_TENANT;
|
||||||
import static google.registry.model.billing.BillingEvent.Flag.SUNRISE;
|
import static google.registry.model.billing.BillingEvent.Flag.SUNRISE;
|
||||||
import static google.registry.model.domain.fee.Fee.FEE_EXTENSION_URIS;
|
import static google.registry.model.domain.fee.Fee.FEE_EXTENSION_URIS;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.model.eppcommon.StatusValue.OK;
|
import static google.registry.model.eppcommon.StatusValue.OK;
|
||||||
import static google.registry.model.eppcommon.StatusValue.PENDING_DELETE;
|
import static google.registry.model.eppcommon.StatusValue.PENDING_DELETE;
|
||||||
import static google.registry.model.eppcommon.StatusValue.SERVER_HOLD;
|
import static google.registry.model.eppcommon.StatusValue.SERVER_HOLD;
|
||||||
|
@ -175,7 +176,11 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
public void initCreateTest() {
|
public void initCreateTest() {
|
||||||
createTld("tld");
|
createTld("tld");
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder().setToken("abcDEF23456").setDomainName("anchor.tld").build());
|
new AllocationToken.Builder()
|
||||||
|
.setToken("abcDEF23456")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName("anchor.tld")
|
||||||
|
.build());
|
||||||
persistResource(
|
persistResource(
|
||||||
Registry.get("tld")
|
Registry.get("tld")
|
||||||
.asBuilder()
|
.asBuilder()
|
||||||
|
@ -423,6 +428,7 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("abc123")
|
.setToken("abc123")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 505L))
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 505L))
|
||||||
.build());
|
.build());
|
||||||
clock.advanceOneMilli();
|
clock.advanceOneMilli();
|
||||||
|
@ -436,7 +442,8 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
setEppInput("domain_create_allocationtoken.xml", ImmutableMap.of("DOMAIN", "example.tld"));
|
setEppInput("domain_create_allocationtoken.xml", ImmutableMap.of("DOMAIN", "example.tld"));
|
||||||
persistContactsAndHosts();
|
persistContactsAndHosts();
|
||||||
AllocationToken token =
|
AllocationToken token =
|
||||||
persistResource(new AllocationToken.Builder().setToken("abc123").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("abc123").setTokenType(SINGLE_USE).build());
|
||||||
clock.advanceOneMilli();
|
clock.advanceOneMilli();
|
||||||
doSuccessfulTest();
|
doSuccessfulTest();
|
||||||
HistoryEntry historyEntry =
|
HistoryEntry historyEntry =
|
||||||
|
@ -970,6 +977,7 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setDomainName("example-one.tld")
|
.setDomainName("example-one.tld")
|
||||||
.setToken("abcDEF23456")
|
.setToken("abcDEF23456")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.build());
|
.build());
|
||||||
persistResource(
|
persistResource(
|
||||||
Registry.get("tld")
|
Registry.get("tld")
|
||||||
|
@ -1016,6 +1024,7 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setDomainName("test-validate.tld")
|
.setDomainName("test-validate.tld")
|
||||||
.setToken("abcDEF23456")
|
.setToken("abcDEF23456")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.build());
|
.build());
|
||||||
persistResource(
|
persistResource(
|
||||||
Registry.get("tld")
|
Registry.get("tld")
|
||||||
|
@ -1040,7 +1049,11 @@ public class DomainCreateFlowTest extends ResourceFlowTestCase<DomainCreateFlow,
|
||||||
@Test
|
@Test
|
||||||
public void testSuccess_reservedDomain_viaAllocationTokenExtension() throws Exception {
|
public void testSuccess_reservedDomain_viaAllocationTokenExtension() throws Exception {
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder().setToken("abc123").setDomainName("resdom.tld").build());
|
new AllocationToken.Builder()
|
||||||
|
.setToken("abc123")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName("resdom.tld")
|
||||||
|
.build());
|
||||||
// Despite the domain being FULLY_BLOCKED, the non-superuser create succeeds the domain is also
|
// Despite the domain being FULLY_BLOCKED, the non-superuser create succeeds the domain is also
|
||||||
// RESERVED_FOR_SPECIFIC_USE and the correct allocation token is passed.
|
// RESERVED_FOR_SPECIFIC_USE and the correct allocation token is passed.
|
||||||
setEppInput("domain_create_allocationtoken.xml", ImmutableMap.of("DOMAIN", "resdom.tld"));
|
setEppInput("domain_create_allocationtoken.xml", ImmutableMap.of("DOMAIN", "resdom.tld"));
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
package google.registry.flows.domain.token;
|
package google.registry.flows.domain.token;
|
||||||
|
|
||||||
import static com.google.common.truth.Truth.assertThat;
|
import static com.google.common.truth.Truth.assertThat;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.testing.DatastoreHelper.createTld;
|
import static google.registry.testing.DatastoreHelper.createTld;
|
||||||
import static google.registry.testing.DatastoreHelper.persistResource;
|
import static google.registry.testing.DatastoreHelper.persistResource;
|
||||||
import static google.registry.testing.EppExceptionSubject.assertAboutEppExceptions;
|
import static google.registry.testing.EppExceptionSubject.assertAboutEppExceptions;
|
||||||
|
@ -57,7 +58,8 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
@Test
|
@Test
|
||||||
public void test_verifyToken_successfullyVerifiesValidToken() throws Exception {
|
public void test_verifyToken_successfullyVerifiesValidToken() throws Exception {
|
||||||
AllocationToken token =
|
AllocationToken token =
|
||||||
persistResource(new AllocationToken.Builder().setToken("tokeN").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("tokeN").setTokenType(SINGLE_USE).build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
new AllocationTokenFlowUtils(new AllocationTokenCustomLogic());
|
new AllocationTokenFlowUtils(new AllocationTokenCustomLogic());
|
||||||
assertThat(
|
assertThat(
|
||||||
|
@ -89,7 +91,8 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void test_verifyToken_callsCustomLogic() {
|
public void test_verifyToken_callsCustomLogic() {
|
||||||
persistResource(new AllocationToken.Builder().setToken("tokeN").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("tokeN").setTokenType(SINGLE_USE).build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
new AllocationTokenFlowUtils(new FailingAllocationTokenCustomLogic());
|
new AllocationTokenFlowUtils(new FailingAllocationTokenCustomLogic());
|
||||||
Exception thrown =
|
Exception thrown =
|
||||||
|
@ -107,7 +110,8 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void test_checkDomainsWithToken_successfullyVerifiesValidToken() {
|
public void test_checkDomainsWithToken_successfullyVerifiesValidToken() {
|
||||||
persistResource(new AllocationToken.Builder().setToken("tokeN").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("tokeN").setTokenType(SINGLE_USE).build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
new AllocationTokenFlowUtils(new AllocationTokenCustomLogic());
|
new AllocationTokenFlowUtils(new AllocationTokenCustomLogic());
|
||||||
assertThat(
|
assertThat(
|
||||||
|
@ -128,6 +132,7 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("tokeN")
|
.setToken("tokeN")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 101L))
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 101L))
|
||||||
.build());
|
.build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
|
@ -150,7 +155,8 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void test_checkDomainsWithToken_callsCustomLogic() {
|
public void test_checkDomainsWithToken_callsCustomLogic() {
|
||||||
persistResource(new AllocationToken.Builder().setToken("tokeN").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("tokeN").setTokenType(SINGLE_USE).build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
new AllocationTokenFlowUtils(new FailingAllocationTokenCustomLogic());
|
new AllocationTokenFlowUtils(new FailingAllocationTokenCustomLogic());
|
||||||
Exception thrown =
|
Exception thrown =
|
||||||
|
@ -168,7 +174,8 @@ public class AllocationTokenFlowUtilsTest extends ShardableTestCase {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void test_checkDomainsWithToken_resultsFromCustomLogicAreIntegrated() {
|
public void test_checkDomainsWithToken_resultsFromCustomLogicAreIntegrated() {
|
||||||
persistResource(new AllocationToken.Builder().setToken("tokeN").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder().setToken("tokeN").setTokenType(SINGLE_USE).build());
|
||||||
AllocationTokenFlowUtils flowUtils =
|
AllocationTokenFlowUtils flowUtils =
|
||||||
new AllocationTokenFlowUtils(new CustomResultAllocationTokenCustomLogic());
|
new AllocationTokenFlowUtils(new CustomResultAllocationTokenCustomLogic());
|
||||||
assertThat(
|
assertThat(
|
||||||
|
|
|
@ -16,13 +16,21 @@ package google.registry.model.domain.token;
|
||||||
|
|
||||||
import static com.google.common.truth.Truth.assertThat;
|
import static com.google.common.truth.Truth.assertThat;
|
||||||
import static com.google.common.truth.Truth8.assertThat;
|
import static com.google.common.truth.Truth8.assertThat;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.UNLIMITED_USE;
|
||||||
import static google.registry.model.ofy.ObjectifyService.ofy;
|
import static google.registry.model.ofy.ObjectifyService.ofy;
|
||||||
import static google.registry.testing.DatastoreHelper.persistResource;
|
import static google.registry.testing.DatastoreHelper.persistResource;
|
||||||
import static google.registry.testing.JUnitBackports.assertThrows;
|
import static google.registry.testing.JUnitBackports.assertThrows;
|
||||||
|
import static org.joda.time.DateTimeZone.UTC;
|
||||||
|
|
||||||
|
import com.google.common.collect.ImmutableSet;
|
||||||
|
import com.google.common.collect.ImmutableSortedMap;
|
||||||
import com.googlecode.objectify.Key;
|
import com.googlecode.objectify.Key;
|
||||||
import google.registry.model.EntityTestCase;
|
import google.registry.model.EntityTestCase;
|
||||||
|
import google.registry.model.domain.token.AllocationToken.TokenStatus;
|
||||||
|
import google.registry.model.domain.token.AllocationToken.TokenType;
|
||||||
import google.registry.model.reporting.HistoryEntry;
|
import google.registry.model.reporting.HistoryEntry;
|
||||||
|
import google.registry.util.DateTimeUtils;
|
||||||
import org.joda.time.DateTime;
|
import org.joda.time.DateTime;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
|
||||||
|
@ -31,15 +39,34 @@ public class AllocationTokenTest extends EntityTestCase {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testPersistence() {
|
public void testPersistence() {
|
||||||
AllocationToken token =
|
AllocationToken unlimitedUseToken =
|
||||||
|
persistResource(
|
||||||
|
new AllocationToken.Builder()
|
||||||
|
.setToken("abc123")
|
||||||
|
.setTokenType(UNLIMITED_USE)
|
||||||
|
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"))
|
||||||
|
.setAllowedTlds(ImmutableSet.of("dev", "app"))
|
||||||
|
.setAllowedClientIds(ImmutableSet.of("TheRegistrar, NewRegistrar"))
|
||||||
|
.setDiscountFraction(0.5)
|
||||||
|
.setTokenStatusTransitions(
|
||||||
|
ImmutableSortedMap.<DateTime, TokenStatus>naturalOrder()
|
||||||
|
.put(DateTimeUtils.START_OF_TIME, TokenStatus.NOT_STARTED)
|
||||||
|
.put(DateTime.now(UTC), TokenStatus.VALID)
|
||||||
|
.put(DateTime.now(UTC).plusWeeks(8), TokenStatus.ENDED)
|
||||||
|
.build())
|
||||||
|
.build());
|
||||||
|
assertThat(ofy().load().entity(unlimitedUseToken).now()).isEqualTo(unlimitedUseToken);
|
||||||
|
|
||||||
|
AllocationToken singleUseToken =
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("abc123")
|
.setToken("abc123")
|
||||||
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
||||||
.setDomainName("foo.example")
|
.setDomainName("foo.example")
|
||||||
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"))
|
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"))
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.build());
|
.build());
|
||||||
assertThat(ofy().load().entity(token).now()).isEqualTo(token);
|
assertThat(ofy().load().entity(singleUseToken).now()).isEqualTo(singleUseToken);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -48,6 +75,7 @@ public class AllocationTokenTest extends EntityTestCase {
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("abc123")
|
.setToken("abc123")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1L))
|
||||||
.setDomainName("blahdomain.fake")
|
.setDomainName("blahdomain.fake")
|
||||||
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"))
|
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"))
|
||||||
|
@ -60,7 +88,7 @@ public class AllocationTokenTest extends EntityTestCase {
|
||||||
@Test
|
@Test
|
||||||
public void testCreationTime_autoPopulates() {
|
public void testCreationTime_autoPopulates() {
|
||||||
AllocationToken tokenBeforePersisting =
|
AllocationToken tokenBeforePersisting =
|
||||||
new AllocationToken.Builder().setToken("abc123").build();
|
new AllocationToken.Builder().setToken("abc123").setTokenType(SINGLE_USE).build();
|
||||||
assertThat(tokenBeforePersisting.getCreationTime()).isEmpty();
|
assertThat(tokenBeforePersisting.getCreationTime()).isEmpty();
|
||||||
AllocationToken tokenAfterPersisting = persistResource(tokenBeforePersisting);
|
AllocationToken tokenAfterPersisting = persistResource(tokenBeforePersisting);
|
||||||
assertThat(tokenAfterPersisting.getCreationTime()).hasValue(clock.nowUtc());
|
assertThat(tokenAfterPersisting.getCreationTime()).hasValue(clock.nowUtc());
|
||||||
|
@ -71,12 +99,13 @@ public class AllocationTokenTest extends EntityTestCase {
|
||||||
AllocationToken.Builder builder =
|
AllocationToken.Builder builder =
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("foobar")
|
.setToken("foobar")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"));
|
.setCreationTimeForTest(DateTime.parse("2010-11-12T05:00:00Z"));
|
||||||
IllegalStateException thrown =
|
IllegalStateException thrown =
|
||||||
assertThrows(
|
assertThrows(
|
||||||
IllegalStateException.class,
|
IllegalStateException.class,
|
||||||
() -> builder.setCreationTimeForTest(DateTime.parse("2010-11-13T05:00:00Z")));
|
() -> builder.setCreationTimeForTest(DateTime.parse("2010-11-13T05:00:00Z")));
|
||||||
assertThat(thrown).hasMessageThat().isEqualTo("creationTime can only be set once");
|
assertThat(thrown).hasMessageThat().isEqualTo("Creation time can only be set once");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -84,6 +113,68 @@ public class AllocationTokenTest extends EntityTestCase {
|
||||||
AllocationToken.Builder builder = new AllocationToken.Builder().setToken("foobar");
|
AllocationToken.Builder builder = new AllocationToken.Builder().setToken("foobar");
|
||||||
IllegalStateException thrown =
|
IllegalStateException thrown =
|
||||||
assertThrows(IllegalStateException.class, () -> builder.setToken("barfoo"));
|
assertThrows(IllegalStateException.class, () -> builder.setToken("barfoo"));
|
||||||
assertThat(thrown).hasMessageThat().isEqualTo("token can only be set once");
|
assertThat(thrown).hasMessageThat().isEqualTo("Token can only be set once");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testSetTokenType_cantCallMoreThanOnce() {
|
||||||
|
AllocationToken.Builder builder =
|
||||||
|
new AllocationToken.Builder().setTokenType(TokenType.UNLIMITED_USE);
|
||||||
|
IllegalStateException thrown =
|
||||||
|
assertThrows(IllegalStateException.class, () -> builder.setTokenType(SINGLE_USE));
|
||||||
|
assertThat(thrown).hasMessageThat().isEqualTo("Token type can only be set once");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testBuild_domainNameOnlyOnSingleUse() {
|
||||||
|
AllocationToken.Builder builder =
|
||||||
|
new AllocationToken.Builder()
|
||||||
|
.setToken("foobar")
|
||||||
|
.setTokenType(TokenType.UNLIMITED_USE)
|
||||||
|
.setDomainName("foo.example");
|
||||||
|
IllegalArgumentException thrown = assertThrows(IllegalArgumentException.class, builder::build);
|
||||||
|
assertThat(thrown)
|
||||||
|
.hasMessageThat()
|
||||||
|
.isEqualTo("Domain name can only be specified for SINGLE_USE tokens");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testBuild_redemptionHistoryEntryOnlyInSingleUse() {
|
||||||
|
AllocationToken.Builder builder =
|
||||||
|
new AllocationToken.Builder()
|
||||||
|
.setToken("foobar")
|
||||||
|
.setTokenType(TokenType.UNLIMITED_USE)
|
||||||
|
.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, "hi"));
|
||||||
|
IllegalArgumentException thrown = assertThrows(IllegalArgumentException.class, builder::build);
|
||||||
|
assertThat(thrown)
|
||||||
|
.hasMessageThat()
|
||||||
|
.isEqualTo("Redemption history entry can only be specified for SINGLE_USE tokens");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testBuild_noTokenType() {
|
||||||
|
IllegalArgumentException thrown =
|
||||||
|
assertThrows(
|
||||||
|
IllegalArgumentException.class,
|
||||||
|
() -> new AllocationToken.Builder().setToken("foobar").build());
|
||||||
|
assertThat(thrown).hasMessageThat().isEqualTo("Token type must be specified");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testBuild_noToken() {
|
||||||
|
IllegalArgumentException thrown =
|
||||||
|
assertThrows(
|
||||||
|
IllegalArgumentException.class,
|
||||||
|
() -> new AllocationToken.Builder().setTokenType(SINGLE_USE).build());
|
||||||
|
assertThat(thrown).hasMessageThat().isEqualTo("Token must not be null or empty");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testBuild_emptyToken() {
|
||||||
|
IllegalArgumentException thrown =
|
||||||
|
assertThrows(
|
||||||
|
IllegalArgumentException.class,
|
||||||
|
() -> new AllocationToken.Builder().setToken("").setTokenType(SINGLE_USE).build());
|
||||||
|
assertThat(thrown).hasMessageThat().isEqualTo("Token must not be blank");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -231,9 +231,28 @@ class google.registry.model.domain.secdns.DelegationSignerData {
|
||||||
class google.registry.model.domain.token.AllocationToken {
|
class google.registry.model.domain.token.AllocationToken {
|
||||||
@Id java.lang.String token;
|
@Id java.lang.String token;
|
||||||
com.googlecode.objectify.Key<google.registry.model.reporting.HistoryEntry> redemptionHistoryEntry;
|
com.googlecode.objectify.Key<google.registry.model.reporting.HistoryEntry> redemptionHistoryEntry;
|
||||||
|
double discountFraction;
|
||||||
google.registry.model.CreateAutoTimestamp creationTime;
|
google.registry.model.CreateAutoTimestamp creationTime;
|
||||||
google.registry.model.UpdateAutoTimestamp updateTimestamp;
|
google.registry.model.UpdateAutoTimestamp updateTimestamp;
|
||||||
|
google.registry.model.common.TimedTransitionProperty<google.registry.model.domain.token.AllocationToken$TokenStatus, google.registry.model.domain.token.AllocationToken$TokenStatusTransition> tokenStatusTransitions;
|
||||||
|
google.registry.model.domain.token.AllocationToken$TokenType tokenType;
|
||||||
java.lang.String domainName;
|
java.lang.String domainName;
|
||||||
|
java.util.Set<java.lang.String> allowedClientIds;
|
||||||
|
java.util.Set<java.lang.String> allowedTlds;
|
||||||
|
}
|
||||||
|
enum google.registry.model.domain.token.AllocationToken$TokenStatus {
|
||||||
|
CANCELLED;
|
||||||
|
ENDED;
|
||||||
|
NOT_STARTED;
|
||||||
|
VALID;
|
||||||
|
}
|
||||||
|
class google.registry.model.domain.token.AllocationToken$TokenStatusTransition {
|
||||||
|
google.registry.model.domain.token.AllocationToken$TokenStatus tokenStatus;
|
||||||
|
org.joda.time.DateTime transitionTime;
|
||||||
|
}
|
||||||
|
enum google.registry.model.domain.token.AllocationToken$TokenType {
|
||||||
|
SINGLE_USE;
|
||||||
|
UNLIMITED_USE;
|
||||||
}
|
}
|
||||||
class google.registry.model.eppcommon.AuthInfo$PasswordAuth {
|
class google.registry.model.eppcommon.AuthInfo$PasswordAuth {
|
||||||
java.lang.String repoId;
|
java.lang.String repoId;
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
package google.registry.tools;
|
package google.registry.tools;
|
||||||
|
|
||||||
import static com.google.common.truth.Truth.assertThat;
|
import static com.google.common.truth.Truth.assertThat;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.model.ofy.ObjectifyService.ofy;
|
import static google.registry.model.ofy.ObjectifyService.ofy;
|
||||||
import static google.registry.testing.DatastoreHelper.persistResource;
|
import static google.registry.testing.DatastoreHelper.persistResource;
|
||||||
import static google.registry.testing.JUnitBackports.assertThrows;
|
import static google.registry.testing.JUnitBackports.assertThrows;
|
||||||
|
@ -129,7 +130,10 @@ public class DeleteAllocationTokensCommandTest
|
||||||
private static AllocationToken persistToken(
|
private static AllocationToken persistToken(
|
||||||
String token, @Nullable String domainName, boolean redeemed) {
|
String token, @Nullable String domainName, boolean redeemed) {
|
||||||
AllocationToken.Builder builder =
|
AllocationToken.Builder builder =
|
||||||
new AllocationToken.Builder().setToken(token).setDomainName(domainName);
|
new AllocationToken.Builder()
|
||||||
|
.setToken(token)
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName(domainName);
|
||||||
if (redeemed) {
|
if (redeemed) {
|
||||||
builder.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1051L));
|
builder.setRedemptionHistoryEntry(Key.create(HistoryEntry.class, 1051L));
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
package google.registry.tools;
|
package google.registry.tools;
|
||||||
|
|
||||||
import static com.google.common.truth.Truth.assertThat;
|
import static com.google.common.truth.Truth.assertThat;
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.model.ofy.ObjectifyService.ofy;
|
import static google.registry.model.ofy.ObjectifyService.ofy;
|
||||||
import static google.registry.testing.DatastoreHelper.persistResource;
|
import static google.registry.testing.DatastoreHelper.persistResource;
|
||||||
import static google.registry.testing.JUnitBackports.assertThrows;
|
import static google.registry.testing.JUnitBackports.assertThrows;
|
||||||
|
@ -94,7 +95,11 @@ public class GenerateAllocationTokensCommandTest
|
||||||
@Test
|
@Test
|
||||||
public void testSuccess_tokenCollision() throws Exception {
|
public void testSuccess_tokenCollision() throws Exception {
|
||||||
AllocationToken existingToken =
|
AllocationToken existingToken =
|
||||||
persistResource(new AllocationToken.Builder().setToken("DEADBEEF123456789ABC").build());
|
persistResource(
|
||||||
|
new AllocationToken.Builder()
|
||||||
|
.setToken("DEADBEEF123456789ABC")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.build());
|
||||||
runCommand("--number", "1", "--prefix", "DEADBEEF", "--length", "12");
|
runCommand("--number", "1", "--prefix", "DEADBEEF", "--length", "12");
|
||||||
assertAllocationTokens(existingToken, createToken("DEADBEEFDEFGHJKLMNPQ", null, null));
|
assertAllocationTokens(existingToken, createToken("DEADBEEFDEFGHJKLMNPQ", null, null));
|
||||||
assertInStdout("DEADBEEFDEFGHJKLMNPQ");
|
assertInStdout("DEADBEEFDEFGHJKLMNPQ");
|
||||||
|
@ -177,7 +182,8 @@ public class GenerateAllocationTokensCommandTest
|
||||||
String token,
|
String token,
|
||||||
@Nullable Key<HistoryEntry> redemptionHistoryEntry,
|
@Nullable Key<HistoryEntry> redemptionHistoryEntry,
|
||||||
@Nullable String domainName) {
|
@Nullable String domainName) {
|
||||||
AllocationToken.Builder builder = new AllocationToken.Builder().setToken(token);
|
AllocationToken.Builder builder =
|
||||||
|
new AllocationToken.Builder().setToken(token).setTokenType(SINGLE_USE);
|
||||||
if (redemptionHistoryEntry != null) {
|
if (redemptionHistoryEntry != null) {
|
||||||
builder.setRedemptionHistoryEntry(redemptionHistoryEntry);
|
builder.setRedemptionHistoryEntry(redemptionHistoryEntry);
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,6 +14,7 @@
|
||||||
|
|
||||||
package google.registry.tools;
|
package google.registry.tools;
|
||||||
|
|
||||||
|
import static google.registry.model.domain.token.AllocationToken.TokenType.SINGLE_USE;
|
||||||
import static google.registry.testing.DatastoreHelper.createHistoryEntryForEppResource;
|
import static google.registry.testing.DatastoreHelper.createHistoryEntryForEppResource;
|
||||||
import static google.registry.testing.DatastoreHelper.createTld;
|
import static google.registry.testing.DatastoreHelper.createTld;
|
||||||
import static google.registry.testing.DatastoreHelper.persistActiveDomain;
|
import static google.registry.testing.DatastoreHelper.persistActiveDomain;
|
||||||
|
@ -36,7 +37,11 @@ public class GetAllocationTokenCommandTest extends CommandTestCase<GetAllocation
|
||||||
public void testSuccess_oneToken() throws Exception {
|
public void testSuccess_oneToken() throws Exception {
|
||||||
AllocationToken token =
|
AllocationToken token =
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder().setToken("foo").setDomainName("foo.bar").build());
|
new AllocationToken.Builder()
|
||||||
|
.setToken("foo")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName("foo.bar")
|
||||||
|
.build());
|
||||||
runCommand("foo");
|
runCommand("foo");
|
||||||
assertInStdout(token.toString(), "Token foo was not redeemed.");
|
assertInStdout(token.toString(), "Token foo was not redeemed.");
|
||||||
}
|
}
|
||||||
|
@ -48,9 +53,14 @@ public class GetAllocationTokenCommandTest extends CommandTestCase<GetAllocation
|
||||||
ImmutableList.of(
|
ImmutableList.of(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("fee")
|
.setToken("fee")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setCreationTimeForTest(DateTime.parse("2015-04-07T22:19:17.044Z"))
|
.setCreationTimeForTest(DateTime.parse("2015-04-07T22:19:17.044Z"))
|
||||||
.build(),
|
.build(),
|
||||||
new AllocationToken.Builder().setToken("fii").setDomainName("bar.baz").build()));
|
new AllocationToken.Builder()
|
||||||
|
.setToken("fii")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName("bar.baz")
|
||||||
|
.build()));
|
||||||
runCommand("fee", "fii");
|
runCommand("fee", "fii");
|
||||||
assertInStdout(
|
assertInStdout(
|
||||||
tokens.get(0).toString(),
|
tokens.get(0).toString(),
|
||||||
|
@ -68,6 +78,7 @@ public class GetAllocationTokenCommandTest extends CommandTestCase<GetAllocation
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder()
|
new AllocationToken.Builder()
|
||||||
.setToken("foo")
|
.setToken("foo")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
.setDomainName("fqqdn.tld")
|
.setDomainName("fqqdn.tld")
|
||||||
.setRedemptionHistoryEntry(Key.create(createHistoryEntryForEppResource(domain)))
|
.setRedemptionHistoryEntry(Key.create(createHistoryEntryForEppResource(domain)))
|
||||||
.build());
|
.build());
|
||||||
|
@ -81,12 +92,14 @@ public class GetAllocationTokenCommandTest extends CommandTestCase<GetAllocation
|
||||||
public void testSuccess_oneTokenDoesNotExist() throws Exception {
|
public void testSuccess_oneTokenDoesNotExist() throws Exception {
|
||||||
AllocationToken token =
|
AllocationToken token =
|
||||||
persistResource(
|
persistResource(
|
||||||
new AllocationToken.Builder().setToken("foo").setDomainName("foo.bar").build());
|
new AllocationToken.Builder()
|
||||||
|
.setToken("foo")
|
||||||
|
.setTokenType(SINGLE_USE)
|
||||||
|
.setDomainName("foo.bar")
|
||||||
|
.build());
|
||||||
runCommand("foo", "bar");
|
runCommand("foo", "bar");
|
||||||
assertInStdout(
|
assertInStdout(
|
||||||
token.toString(),
|
token.toString(), "Token foo was not redeemed.", "ERROR: Token bar does not exist.");
|
||||||
"Token foo was not redeemed.",
|
|
||||||
"ERROR: Token bar does not exist.");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue