Compare commits
No commits in common. "master" and "manage-vouchers-in-single-function" have entirely different histories.
master
...
manage-vou
@ -21,7 +21,7 @@ RUN make VISE_PATH=/build/go-vise -B
|
|||||||
WORKDIR /build/sarafu-vise
|
WORKDIR /build/sarafu-vise
|
||||||
RUN echo "Building on $BUILDPLATFORM, building for $TARGETPLATFORM"
|
RUN echo "Building on $BUILDPLATFORM, building for $TARGETPLATFORM"
|
||||||
RUN go mod download
|
RUN go mod download
|
||||||
RUN go build -tags logdebug,online -o sarafu-at -ldflags="-X main.build=${BUILD} -s -w" cmd/africastalking/main.go
|
RUN go build -tags logwarn,online -o sarafu-at -ldflags="-X main.build=${BUILD} -s -w" cmd/africastalking/main.go
|
||||||
|
|
||||||
FROM debian:bookworm-slim
|
FROM debian:bookworm-slim
|
||||||
|
|
||||||
|
4
go.mod
4
go.mod
@ -3,9 +3,9 @@ module git.grassecon.net/grassrootseconomics/sarafu-vise
|
|||||||
go 1.23.4
|
go 1.23.4
|
||||||
|
|
||||||
require (
|
require (
|
||||||
git.defalsify.org/vise.git v0.3.2-0.20250401123711-d481b04a6805
|
git.defalsify.org/vise.git v0.3.1
|
||||||
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d
|
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250411080608-34957e5b6ff8
|
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250310093912-8145b4bd004b
|
||||||
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2
|
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2
|
||||||
git.grassecon.net/grassrootseconomics/visedriver-africastalking v0.0.0-20250129070628-5a539172c694
|
git.grassecon.net/grassrootseconomics/visedriver-africastalking v0.0.0-20250129070628-5a539172c694
|
||||||
github.com/alecthomas/assert/v2 v2.2.2
|
github.com/alecthomas/assert/v2 v2.2.2
|
||||||
|
10
go.sum
10
go.sum
@ -1,19 +1,9 @@
|
|||||||
git.defalsify.org/vise.git v0.3.1 h1:A6FhMcur09ft/JzUPGXR+KpA17fltfeBnasyvLMZmq4=
|
git.defalsify.org/vise.git v0.3.1 h1:A6FhMcur09ft/JzUPGXR+KpA17fltfeBnasyvLMZmq4=
|
||||||
git.defalsify.org/vise.git v0.3.1/go.mod h1:jyBMe1qTYUz3mmuoC9JQ/TvFeW0vTanCUcPu3H8p4Ck=
|
git.defalsify.org/vise.git v0.3.1/go.mod h1:jyBMe1qTYUz3mmuoC9JQ/TvFeW0vTanCUcPu3H8p4Ck=
|
||||||
git.defalsify.org/vise.git v0.3.2-0.20250401123711-d481b04a6805 h1:FnT39aqXcP5YWhwPDBABopSjCu2SlbPFoOVitSpAVxU=
|
|
||||||
git.defalsify.org/vise.git v0.3.2-0.20250401123711-d481b04a6805/go.mod h1:jyBMe1qTYUz3mmuoC9JQ/TvFeW0vTanCUcPu3H8p4Ck=
|
|
||||||
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d h1:5mzLas+jxTUtusOKx4XvU+n2QvrV/mH17MnJRy46siQ=
|
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d h1:5mzLas+jxTUtusOKx4XvU+n2QvrV/mH17MnJRy46siQ=
|
||||||
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d/go.mod h1:wgQJZGIS6QuNLHqDhcsvehsbn5PvgV7aziRebMnJi60=
|
git.grassecon.net/grassrootseconomics/common v0.0.0-20250121134736-ba8cbbccea7d/go.mod h1:wgQJZGIS6QuNLHqDhcsvehsbn5PvgV7aziRebMnJi60=
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250310093912-8145b4bd004b h1:xiTpaqWWoF5qcnarY/9ZkT6aVdnKwqztb2gzIahJn4w=
|
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250310093912-8145b4bd004b h1:xiTpaqWWoF5qcnarY/9ZkT6aVdnKwqztb2gzIahJn4w=
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250310093912-8145b4bd004b/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250310093912-8145b4bd004b/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401111804-2eed990921c5 h1:DwBZHP4sebfHxK8EU2nlA2CXU81+a7Kj/pnC5vDPcf4=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401111804-2eed990921c5/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401115503-5b41c8dc6440 h1:eWrBZMM3pBMCFyRl4rO/aaR+OmOMFJxogNyFAFry+EM=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401115503-5b41c8dc6440/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401122510-441e289854ad h1:tYjanaCf6mF+iXRtDx5gckQm5vhZYx9N/JlNIBZj1m0=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250401122510-441e289854ad/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250411080608-34957e5b6ff8 h1:Emesd0rybSLhPwZwqdvLsk/P9ZsT+7CQwQV/mrjQp3o=
|
|
||||||
git.grassecon.net/grassrootseconomics/sarafu-api v0.9.0-beta.1.0.20250411080608-34957e5b6ff8/go.mod h1:gOn89ipaDcDvmQXRMQYKUqcw/sJcwVOPVt2eC6Geip8=
|
|
||||||
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2 h1:YFztSsexCUgFo6M0tbngRwYdgJd3LQV3RO/Jw09u3+k=
|
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2 h1:YFztSsexCUgFo6M0tbngRwYdgJd3LQV3RO/Jw09u3+k=
|
||||||
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2/go.mod h1:6B6ByxXOiRY0NR7K02Bf3fEu7z+2c/6q8PFVNjC5G8w=
|
git.grassecon.net/grassrootseconomics/visedriver v0.9.0-beta.2/go.mod h1:6B6ByxXOiRY0NR7K02Bf3fEu7z+2c/6q8PFVNjC5G8w=
|
||||||
git.grassecon.net/grassrootseconomics/visedriver-africastalking v0.0.0-20250129070628-5a539172c694 h1:DjJlBSz0S13acft5XZDWk7ZYnzElym0xLMYEVgyNJ+E=
|
git.grassecon.net/grassrootseconomics/visedriver-africastalking v0.0.0-20250129070628-5a539172c694 h1:DjJlBSz0S13acft5XZDWk7ZYnzElym0xLMYEVgyNJ+E=
|
||||||
|
@ -245,7 +245,6 @@ func (h *MenuHandlers) CreateAccount(ctx context.Context, sym string, input []by
|
|||||||
|
|
||||||
func (h *MenuHandlers) CheckAccountCreated(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
func (h *MenuHandlers) CheckAccountCreated(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
var res resource.Result
|
var res resource.Result
|
||||||
flag_language_set, _ := h.flagManager.GetFlag("flag_language_set")
|
|
||||||
flag_account_created, _ := h.flagManager.GetFlag("flag_account_created")
|
flag_account_created, _ := h.flagManager.GetFlag("flag_account_created")
|
||||||
|
|
||||||
store := h.userdataStore
|
store := h.userdataStore
|
||||||
@ -257,46 +256,35 @@ func (h *MenuHandlers) CheckAccountCreated(ctx context.Context, sym string, inpu
|
|||||||
|
|
||||||
_, err := store.ReadEntry(ctx, sessionId, storedb.DATA_PUBLIC_KEY)
|
_, err := store.ReadEntry(ctx, sessionId, storedb.DATA_PUBLIC_KEY)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if db.IsNotFound(err) {
|
if !db.IsNotFound(err) {
|
||||||
// reset major flags
|
return res, err
|
||||||
res.FlagReset = append(res.FlagReset, flag_language_set)
|
}
|
||||||
res.FlagReset = append(res.FlagReset, flag_account_created)
|
|
||||||
|
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
res.FlagSet = append(res.FlagSet, flag_account_created)
|
res.FlagSet = append(res.FlagSet, flag_account_created)
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// CheckBlockedStatus:
|
// ResetValidPin resets the flag_valid_pin flag.
|
||||||
// 1. Checks whether the DATA_SELF_PIN_RESET is 1 and sets the flag_account_pin_reset
|
func (h *MenuHandlers) ResetValidPin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
// 2. resets the account blocked flag if the PIN attempts have been reset by an admin.
|
var res resource.Result
|
||||||
|
flag_valid_pin, _ := h.flagManager.GetFlag("flag_valid_pin")
|
||||||
|
res.FlagReset = append(res.FlagReset, flag_valid_pin)
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CheckBlockedStatus resets the account blocked flag if the PIN attempts have been reset by an admin.
|
||||||
func (h *MenuHandlers) CheckBlockedStatus(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
func (h *MenuHandlers) CheckBlockedStatus(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
var res resource.Result
|
var res resource.Result
|
||||||
store := h.userdataStore
|
store := h.userdataStore
|
||||||
|
|
||||||
flag_account_blocked, _ := h.flagManager.GetFlag("flag_account_blocked")
|
flag_account_blocked, _ := h.flagManager.GetFlag("flag_account_blocked")
|
||||||
flag_account_pin_reset, _ := h.flagManager.GetFlag("flag_account_pin_reset")
|
|
||||||
|
|
||||||
sessionId, ok := ctx.Value("SessionId").(string)
|
sessionId, ok := ctx.Value("SessionId").(string)
|
||||||
if !ok {
|
if !ok {
|
||||||
return res, fmt.Errorf("missing session")
|
return res, fmt.Errorf("missing session")
|
||||||
}
|
}
|
||||||
|
|
||||||
res.FlagReset = append(res.FlagReset, flag_account_pin_reset)
|
|
||||||
|
|
||||||
selfPinReset, err := store.ReadEntry(ctx, sessionId, storedb.DATA_SELF_PIN_RESET)
|
|
||||||
if err == nil {
|
|
||||||
pinResetValue, _ := strconv.ParseUint(string(selfPinReset), 0, 64)
|
|
||||||
if pinResetValue == 1 {
|
|
||||||
res.FlagSet = append(res.FlagSet, flag_account_pin_reset)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
currentWrongPinAttempts, err := store.ReadEntry(ctx, sessionId, storedb.DATA_INCORRECT_PIN_ATTEMPTS)
|
currentWrongPinAttempts, err := store.ReadEntry(ctx, sessionId, storedb.DATA_INCORRECT_PIN_ATTEMPTS)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if !db.IsNotFound(err) {
|
if !db.IsNotFound(err) {
|
||||||
@ -305,6 +293,7 @@ func (h *MenuHandlers) CheckBlockedStatus(ctx context.Context, sym string, input
|
|||||||
}
|
}
|
||||||
|
|
||||||
pinAttemptsValue, _ := strconv.ParseUint(string(currentWrongPinAttempts), 0, 64)
|
pinAttemptsValue, _ := strconv.ParseUint(string(currentWrongPinAttempts), 0, 64)
|
||||||
|
|
||||||
if pinAttemptsValue == 0 {
|
if pinAttemptsValue == 0 {
|
||||||
res.FlagReset = append(res.FlagReset, flag_account_blocked)
|
res.FlagReset = append(res.FlagReset, flag_account_blocked)
|
||||||
return res, nil
|
return res, nil
|
||||||
@ -347,6 +336,29 @@ func (h *MenuHandlers) ResetIncorrectPin(ctx context.Context, sym string, input
|
|||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// VerifyNewPin checks if a new PIN meets the required format criteria.
|
||||||
|
func (h *MenuHandlers) VerifyNewPin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
|
res := resource.Result{}
|
||||||
|
_, ok := ctx.Value("SessionId").(string)
|
||||||
|
if !ok {
|
||||||
|
return res, fmt.Errorf("missing session")
|
||||||
|
}
|
||||||
|
flag_valid_pin, _ := h.flagManager.GetFlag("flag_valid_pin")
|
||||||
|
if string(input) != "0" {
|
||||||
|
pinInput := string(input)
|
||||||
|
// Validate that the PIN is a 4-digit number.
|
||||||
|
if pin.IsValidPIN(pinInput) {
|
||||||
|
res.FlagSet = append(res.FlagSet, flag_valid_pin)
|
||||||
|
} else {
|
||||||
|
res.FlagReset = append(res.FlagReset, flag_valid_pin)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
res.FlagSet = append(res.FlagSet, flag_valid_pin)
|
||||||
|
}
|
||||||
|
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
// SaveTemporaryPin saves the valid PIN input to the DATA_TEMPORARY_VALUE,
|
// SaveTemporaryPin saves the valid PIN input to the DATA_TEMPORARY_VALUE,
|
||||||
// during the account creation process
|
// during the account creation process
|
||||||
// and during the change PIN process.
|
// and during the change PIN process.
|
||||||
@ -359,20 +371,15 @@ func (h *MenuHandlers) SaveTemporaryPin(ctx context.Context, sym string, input [
|
|||||||
return res, fmt.Errorf("missing session")
|
return res, fmt.Errorf("missing session")
|
||||||
}
|
}
|
||||||
|
|
||||||
flag_invalid_pin, _ := h.flagManager.GetFlag("flag_invalid_pin")
|
flag_incorrect_pin, _ := h.flagManager.GetFlag("flag_incorrect_pin")
|
||||||
|
|
||||||
if string(input) == "0" {
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
accountPIN := string(input)
|
accountPIN := string(input)
|
||||||
|
|
||||||
// Validate that the PIN has a valid format.
|
// Validate that the PIN is a 4-digit number.
|
||||||
if !pin.IsValidPIN(accountPIN) {
|
if !pin.IsValidPIN(accountPIN) {
|
||||||
res.FlagSet = append(res.FlagSet, flag_invalid_pin)
|
res.FlagSet = append(res.FlagSet, flag_incorrect_pin)
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
res.FlagReset = append(res.FlagReset, flag_invalid_pin)
|
res.FlagReset = append(res.FlagReset, flag_incorrect_pin)
|
||||||
|
|
||||||
// Hash the PIN
|
// Hash the PIN
|
||||||
hashedPIN, err := pin.HashPIN(string(accountPIN))
|
hashedPIN, err := pin.HashPIN(string(accountPIN))
|
||||||
@ -391,6 +398,87 @@ func (h *MenuHandlers) SaveTemporaryPin(ctx context.Context, sym string, input [
|
|||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SaveOthersTemporaryPin allows authorized users to set temporary PINs for blocked numbers.
|
||||||
|
func (h *MenuHandlers) SaveOthersTemporaryPin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
|
var res resource.Result
|
||||||
|
var err error
|
||||||
|
|
||||||
|
store := h.userdataStore
|
||||||
|
sessionId, ok := ctx.Value("SessionId").(string)
|
||||||
|
if !ok {
|
||||||
|
return res, fmt.Errorf("missing session")
|
||||||
|
}
|
||||||
|
|
||||||
|
temporaryPin := string(input)
|
||||||
|
|
||||||
|
// Validate that the input is a 4-digit number.
|
||||||
|
if !pin.IsValidPIN(temporaryPin) {
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Retrieve the blocked number associated with this session
|
||||||
|
blockedNumber, err := store.ReadEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER)
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to read blockedNumber entry with", "key", storedb.DATA_BLOCKED_NUMBER, "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Hash the temporary PIN
|
||||||
|
hashedPIN, err := pin.HashPIN(string(temporaryPin))
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to hash temporaryPin", "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save the hashed temporary PIN for that blocked number
|
||||||
|
err = store.WriteEntry(ctx, string(blockedNumber), storedb.DATA_TEMPORARY_VALUE, []byte(hashedPIN))
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to write hashed temporaryPin entry with", "key", storedb.DATA_TEMPORARY_VALUE, "value", temporaryPin, "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CheckBlockedNumPinMisMatch checks if the provided PIN matches a temporary PIN stored for a blocked number.
|
||||||
|
func (h *MenuHandlers) CheckBlockedNumPinMisMatch(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
|
res := resource.Result{}
|
||||||
|
flag_pin_mismatch, _ := h.flagManager.GetFlag("flag_pin_mismatch")
|
||||||
|
sessionId, ok := ctx.Value("SessionId").(string)
|
||||||
|
if !ok {
|
||||||
|
return res, fmt.Errorf("missing session")
|
||||||
|
}
|
||||||
|
if string(input) == "0" {
|
||||||
|
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get blocked number from storage.
|
||||||
|
store := h.userdataStore
|
||||||
|
blockedNumber, err := store.ReadEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER)
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to read blockedNumber entry with", "key", storedb.DATA_BLOCKED_NUMBER, "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
// Get Hashed temporary PIN for the blocked number.
|
||||||
|
hashedTemporaryPin, err := store.ReadEntry(ctx, string(blockedNumber), storedb.DATA_TEMPORARY_VALUE)
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to read hashedTemporaryPin entry with", "key", storedb.DATA_TEMPORARY_VALUE, "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
if len(hashedTemporaryPin) == 0 {
|
||||||
|
logg.ErrorCtxf(ctx, "hashedTemporaryPin is empty", "key", storedb.DATA_TEMPORARY_VALUE)
|
||||||
|
return res, fmt.Errorf("Data error encountered")
|
||||||
|
}
|
||||||
|
|
||||||
|
if pin.VerifyPIN(string(hashedTemporaryPin), string(input)) {
|
||||||
|
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
||||||
|
} else {
|
||||||
|
res.FlagSet = append(res.FlagSet, flag_pin_mismatch)
|
||||||
|
}
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
// ResetInvalidPIN resets the invalid PIN flag
|
// ResetInvalidPIN resets the invalid PIN flag
|
||||||
func (h *MenuHandlers) ResetInvalidPIN(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
func (h *MenuHandlers) ResetInvalidPIN(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
var res resource.Result
|
var res resource.Result
|
||||||
@ -407,7 +495,6 @@ func (h *MenuHandlers) ConfirmPinChange(ctx context.Context, sym string, input [
|
|||||||
return res, fmt.Errorf("missing session")
|
return res, fmt.Errorf("missing session")
|
||||||
}
|
}
|
||||||
flag_pin_mismatch, _ := h.flagManager.GetFlag("flag_pin_mismatch")
|
flag_pin_mismatch, _ := h.flagManager.GetFlag("flag_pin_mismatch")
|
||||||
flag_account_pin_reset, _ := h.flagManager.GetFlag("flag_account_pin_reset")
|
|
||||||
|
|
||||||
if string(input) == "0" {
|
if string(input) == "0" {
|
||||||
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
||||||
@ -438,68 +525,14 @@ func (h *MenuHandlers) ConfirmPinChange(ctx context.Context, sym string, input [
|
|||||||
logg.ErrorCtxf(ctx, "failed to write DATA_ACCOUNT_PIN entry with", "key", storedb.DATA_ACCOUNT_PIN, "hashedPIN value", hashedTemporaryPin, "error", err)
|
logg.ErrorCtxf(ctx, "failed to write DATA_ACCOUNT_PIN entry with", "key", storedb.DATA_ACCOUNT_PIN, "hashedPIN value", hashedTemporaryPin, "error", err)
|
||||||
return res, err
|
return res, err
|
||||||
}
|
}
|
||||||
// set the DATA_SELF_PIN_RESET as 0
|
|
||||||
err = store.WriteEntry(ctx, sessionId, storedb.DATA_SELF_PIN_RESET, []byte("0"))
|
|
||||||
if err != nil {
|
|
||||||
logg.ErrorCtxf(ctx, "failed to write DATA_SELF_PIN_RESET entry with", "key", storedb.DATA_SELF_PIN_RESET, "self PIN reset value", "0", "error", err)
|
|
||||||
return res, err
|
|
||||||
}
|
|
||||||
res.FlagReset = append(res.FlagReset, flag_account_pin_reset)
|
|
||||||
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// ValidateBlockedNumber performs validation of phone numbers during the Reset other's PIN.
|
|
||||||
// It checks phone number format and verifies registration status.
|
|
||||||
// If valid, it writes the number under DATA_BLOCKED_NUMBER on the admin account
|
|
||||||
func (h *MenuHandlers) ValidateBlockedNumber(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
|
||||||
var res resource.Result
|
|
||||||
var err error
|
|
||||||
|
|
||||||
flag_unregistered_number, _ := h.flagManager.GetFlag("flag_unregistered_number")
|
|
||||||
store := h.userdataStore
|
|
||||||
sessionId, ok := ctx.Value("SessionId").(string)
|
|
||||||
if !ok {
|
|
||||||
return res, fmt.Errorf("missing session")
|
|
||||||
}
|
|
||||||
|
|
||||||
if string(input) == "0" {
|
|
||||||
res.FlagReset = append(res.FlagReset, flag_unregistered_number)
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
blockedNumber := string(input)
|
|
||||||
formattedNumber, err := phone.FormatPhoneNumber(blockedNumber)
|
|
||||||
if err != nil {
|
|
||||||
res.FlagSet = append(res.FlagSet, flag_unregistered_number)
|
|
||||||
logg.ErrorCtxf(ctx, "Failed to format the phone number: %s", blockedNumber, "error", err)
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
_, err = store.ReadEntry(ctx, formattedNumber, storedb.DATA_PUBLIC_KEY)
|
|
||||||
if err != nil {
|
|
||||||
if db.IsNotFound(err) {
|
|
||||||
logg.InfoCtxf(ctx, "Invalid or unregistered number")
|
|
||||||
res.FlagSet = append(res.FlagSet, flag_unregistered_number)
|
|
||||||
return res, nil
|
|
||||||
} else {
|
|
||||||
logg.ErrorCtxf(ctx, "Error on ValidateBlockedNumber", "error", err)
|
|
||||||
return res, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
err = store.WriteEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER, []byte(formattedNumber))
|
|
||||||
if err != nil {
|
|
||||||
return res, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// ResetOthersPin handles the PIN reset process for other users' accounts by:
|
// ResetOthersPin handles the PIN reset process for other users' accounts by:
|
||||||
// 1. Retrieving the blocked phone number from the session
|
// 1. Retrieving the blocked phone number from the session
|
||||||
// 2. Writing the DATA_SELF_PIN_RESET on the blocked phone number
|
// 2. Fetching the hashed temporary PIN associated with that number
|
||||||
// 3. Resetting the DATA_INCORRECT_PIN_ATTEMPTS to 0 for the blocked phone number
|
// 3. Updating the account PIN with the temporary PIN
|
||||||
func (h *MenuHandlers) ResetOthersPin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
func (h *MenuHandlers) ResetOthersPin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
var res resource.Result
|
var res resource.Result
|
||||||
store := h.userdataStore
|
store := h.userdataStore
|
||||||
@ -512,11 +545,19 @@ func (h *MenuHandlers) ResetOthersPin(ctx context.Context, sym string, input []b
|
|||||||
logg.ErrorCtxf(ctx, "failed to read blockedPhonenumber entry with", "key", storedb.DATA_BLOCKED_NUMBER, "error", err)
|
logg.ErrorCtxf(ctx, "failed to read blockedPhonenumber entry with", "key", storedb.DATA_BLOCKED_NUMBER, "error", err)
|
||||||
return res, err
|
return res, err
|
||||||
}
|
}
|
||||||
|
hashedTemporaryPin, err := store.ReadEntry(ctx, string(blockedPhonenumber), storedb.DATA_TEMPORARY_VALUE)
|
||||||
// set the DATA_SELF_PIN_RESET for the account
|
|
||||||
err = store.WriteEntry(ctx, string(blockedPhonenumber), storedb.DATA_SELF_PIN_RESET, []byte("1"))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return res, nil
|
logg.ErrorCtxf(ctx, "failed to read hashedTmporaryPin entry with", "key", storedb.DATA_TEMPORARY_VALUE, "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
if len(hashedTemporaryPin) == 0 {
|
||||||
|
logg.ErrorCtxf(ctx, "hashedTemporaryPin is empty", "key", storedb.DATA_TEMPORARY_VALUE)
|
||||||
|
return res, fmt.Errorf("Data error encountered")
|
||||||
|
}
|
||||||
|
|
||||||
|
err = store.WriteEntry(ctx, string(blockedPhonenumber), storedb.DATA_ACCOUNT_PIN, []byte(hashedTemporaryPin))
|
||||||
|
if err != nil {
|
||||||
|
return res, err
|
||||||
}
|
}
|
||||||
|
|
||||||
err = store.WriteEntry(ctx, string(blockedPhonenumber), storedb.DATA_INCORRECT_PIN_ATTEMPTS, []byte(string("0")))
|
err = store.WriteEntry(ctx, string(blockedPhonenumber), storedb.DATA_INCORRECT_PIN_ATTEMPTS, []byte(string("0")))
|
||||||
@ -587,26 +628,64 @@ func (h *MenuHandlers) ResetUnregisteredNumber(ctx context.Context, sym string,
|
|||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ValidateBlockedNumber performs validation of phone numbers, specifically for blocked numbers in the system.
|
||||||
|
// It checks phone number format and verifies registration status.
|
||||||
|
func (h *MenuHandlers) ValidateBlockedNumber(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
|
var res resource.Result
|
||||||
|
var err error
|
||||||
|
|
||||||
|
flag_unregistered_number, _ := h.flagManager.GetFlag("flag_unregistered_number")
|
||||||
|
store := h.userdataStore
|
||||||
|
sessionId, ok := ctx.Value("SessionId").(string)
|
||||||
|
if !ok {
|
||||||
|
return res, fmt.Errorf("missing session")
|
||||||
|
}
|
||||||
|
|
||||||
|
if string(input) == "0" {
|
||||||
|
res.FlagReset = append(res.FlagReset, flag_unregistered_number)
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
blockedNumber := string(input)
|
||||||
|
formattedNumber, err := phone.FormatPhoneNumber(blockedNumber)
|
||||||
|
if err != nil {
|
||||||
|
res.FlagSet = append(res.FlagSet, flag_unregistered_number)
|
||||||
|
logg.ErrorCtxf(ctx, "Failed to format the phone number: %s", blockedNumber, "error", err)
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = store.ReadEntry(ctx, formattedNumber, storedb.DATA_PUBLIC_KEY)
|
||||||
|
if err != nil {
|
||||||
|
if db.IsNotFound(err) {
|
||||||
|
logg.InfoCtxf(ctx, "Invalid or unregistered number")
|
||||||
|
res.FlagSet = append(res.FlagSet, flag_unregistered_number)
|
||||||
|
return res, nil
|
||||||
|
} else {
|
||||||
|
logg.ErrorCtxf(ctx, "Error on ValidateBlockedNumber", "error", err)
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = store.WriteEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER, []byte(formattedNumber))
|
||||||
|
if err != nil {
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
// VerifyCreatePin checks whether the confirmation PIN is similar to the temporary PIN
|
// VerifyCreatePin checks whether the confirmation PIN is similar to the temporary PIN
|
||||||
// If similar, it sets the USERFLAG_PIN_SET flag and writes the account PIN allowing the user
|
// If similar, it sets the USERFLAG_PIN_SET flag and writes the account PIN allowing the user
|
||||||
// to access the main menu.
|
// to access the main menu.
|
||||||
func (h *MenuHandlers) VerifyCreatePin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
func (h *MenuHandlers) VerifyCreatePin(ctx context.Context, sym string, input []byte) (resource.Result, error) {
|
||||||
var res resource.Result
|
var res resource.Result
|
||||||
|
|
||||||
sessionId, ok := ctx.Value("SessionId").(string)
|
|
||||||
if !ok {
|
|
||||||
return res, fmt.Errorf("missing session")
|
|
||||||
}
|
|
||||||
|
|
||||||
flag_valid_pin, _ := h.flagManager.GetFlag("flag_valid_pin")
|
flag_valid_pin, _ := h.flagManager.GetFlag("flag_valid_pin")
|
||||||
flag_pin_mismatch, _ := h.flagManager.GetFlag("flag_pin_mismatch")
|
flag_pin_mismatch, _ := h.flagManager.GetFlag("flag_pin_mismatch")
|
||||||
flag_pin_set, _ := h.flagManager.GetFlag("flag_pin_set")
|
flag_pin_set, _ := h.flagManager.GetFlag("flag_pin_set")
|
||||||
|
|
||||||
if string(input) == "0" {
|
sessionId, ok := ctx.Value("SessionId").(string)
|
||||||
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
if !ok {
|
||||||
return res, nil
|
return res, fmt.Errorf("missing session")
|
||||||
}
|
}
|
||||||
|
|
||||||
store := h.userdataStore
|
store := h.userdataStore
|
||||||
hashedTemporaryPin, err := store.ReadEntry(ctx, sessionId, storedb.DATA_TEMPORARY_VALUE)
|
hashedTemporaryPin, err := store.ReadEntry(ctx, sessionId, storedb.DATA_TEMPORARY_VALUE)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -619,15 +698,14 @@ func (h *MenuHandlers) VerifyCreatePin(ctx context.Context, sym string, input []
|
|||||||
}
|
}
|
||||||
|
|
||||||
if pin.VerifyPIN(string(hashedTemporaryPin), string(input)) {
|
if pin.VerifyPIN(string(hashedTemporaryPin), string(input)) {
|
||||||
res.FlagSet = append(res.FlagSet, flag_valid_pin)
|
res.FlagSet = []uint32{flag_valid_pin}
|
||||||
|
res.FlagReset = []uint32{flag_pin_mismatch}
|
||||||
res.FlagSet = append(res.FlagSet, flag_pin_set)
|
res.FlagSet = append(res.FlagSet, flag_pin_set)
|
||||||
res.FlagReset = append(res.FlagReset, flag_pin_mismatch)
|
|
||||||
} else {
|
} else {
|
||||||
res.FlagSet = append(res.FlagSet, flag_pin_mismatch)
|
res.FlagSet = []uint32{flag_pin_mismatch}
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// save the hashed PIN as the new account PIN
|
|
||||||
err = store.WriteEntry(ctx, sessionId, storedb.DATA_ACCOUNT_PIN, []byte(hashedTemporaryPin))
|
err = store.WriteEntry(ctx, sessionId, storedb.DATA_ACCOUNT_PIN, []byte(hashedTemporaryPin))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logg.ErrorCtxf(ctx, "failed to write DATA_ACCOUNT_PIN entry with", "key", storedb.DATA_ACCOUNT_PIN, "value", hashedTemporaryPin, "error", err)
|
logg.ErrorCtxf(ctx, "failed to write DATA_ACCOUNT_PIN entry with", "key", storedb.DATA_ACCOUNT_PIN, "value", hashedTemporaryPin, "error", err)
|
||||||
@ -1631,24 +1709,19 @@ func (h *MenuHandlers) InviteValidRecipient(ctx context.Context, sym string, inp
|
|||||||
l := gotext.NewLocale(translationDir, code)
|
l := gotext.NewLocale(translationDir, code)
|
||||||
l.AddDomain("default")
|
l.AddDomain("default")
|
||||||
|
|
||||||
recipient, err := store.ReadEntry(ctx, sessionId, storedb.DATA_TEMPORARY_VALUE)
|
recipient, _ := store.ReadEntry(ctx, sessionId, storedb.DATA_TEMPORARY_VALUE)
|
||||||
if err != nil {
|
if len(recipient) == 0 {
|
||||||
logg.ErrorCtxf(ctx, "Failed to read invalid recipient info", "error", err)
|
logg.ErrorCtxf(ctx, "recipient is empty", "key", storedb.DATA_TEMPORARY_VALUE)
|
||||||
return res, err
|
return res, fmt.Errorf("Data error encountered")
|
||||||
}
|
}
|
||||||
|
|
||||||
if !phone.IsValidPhoneNumber(string(recipient)) {
|
// TODO
|
||||||
logg.InfoCtxf(ctx, "corrupted recipient", "key", storedb.DATA_TEMPORARY_VALUE, "recipient", recipient)
|
// send an invitation SMS
|
||||||
return res, nil
|
// if successful
|
||||||
}
|
// res.Content = l.Get("Your invitation to %s to join Sarafu Network has been sent.", string(recipient))
|
||||||
|
|
||||||
_, err = h.accountService.SendUpsellSMS(ctx, sessionId, string(recipient))
|
|
||||||
if err != nil {
|
|
||||||
res.Content = l.Get("Your invite request for %s to Sarafu Network failed. Please try again later.", string(recipient))
|
res.Content = l.Get("Your invite request for %s to Sarafu Network failed. Please try again later.", string(recipient))
|
||||||
return res, nil
|
return res, nil
|
||||||
}
|
|
||||||
res.Content = l.Get("Your invitation to %s to join Sarafu Network has been sent.", string(recipient))
|
|
||||||
return res, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ResetTransactionAmount resets the transaction amount and invalid flag.
|
// ResetTransactionAmount resets the transaction amount and invalid flag.
|
||||||
|
@ -566,7 +566,7 @@ func TestSaveTemporaryPin(t *testing.T) {
|
|||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
flag_invalid_pin, _ := fm.GetFlag("flag_invalid_pin")
|
flag_incorrect_pin, _ := fm.GetFlag("flag_incorrect_pin")
|
||||||
|
|
||||||
// Create the MenuHandlers instance with the mock flag manager
|
// Create the MenuHandlers instance with the mock flag manager
|
||||||
h := &MenuHandlers{
|
h := &MenuHandlers{
|
||||||
@ -584,14 +584,14 @@ func TestSaveTemporaryPin(t *testing.T) {
|
|||||||
name: "Valid Pin entry",
|
name: "Valid Pin entry",
|
||||||
input: []byte("1234"),
|
input: []byte("1234"),
|
||||||
expectedResult: resource.Result{
|
expectedResult: resource.Result{
|
||||||
FlagReset: []uint32{flag_invalid_pin},
|
FlagReset: []uint32{flag_incorrect_pin},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Invalid Pin entry",
|
name: "Invalid Pin entry",
|
||||||
input: []byte("12343"),
|
input: []byte("12343"),
|
||||||
expectedResult: resource.Result{
|
expectedResult: resource.Result{
|
||||||
FlagSet: []uint32{flag_invalid_pin},
|
FlagSet: []uint32{flag_incorrect_pin},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -1843,7 +1843,53 @@ func TestGetProfile(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestConfirmPinChange(t *testing.T) {
|
func TestVerifyNewPin(t *testing.T) {
|
||||||
|
sessionId := "session123"
|
||||||
|
|
||||||
|
fm, _ := NewFlagManager(flagsPath)
|
||||||
|
mockState := state.NewState(16)
|
||||||
|
|
||||||
|
flag_valid_pin, _ := fm.GetFlag("flag_valid_pin")
|
||||||
|
mockAccountService := new(mocks.MockAccountService)
|
||||||
|
h := &MenuHandlers{
|
||||||
|
flagManager: fm,
|
||||||
|
accountService: mockAccountService,
|
||||||
|
st: mockState,
|
||||||
|
}
|
||||||
|
ctx := context.WithValue(context.Background(), "SessionId", sessionId)
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input []byte
|
||||||
|
expectedResult resource.Result
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Test with valid pin",
|
||||||
|
input: []byte("1234"),
|
||||||
|
expectedResult: resource.Result{
|
||||||
|
FlagSet: []uint32{flag_valid_pin},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Test with invalid pin",
|
||||||
|
input: []byte("123"),
|
||||||
|
expectedResult: resource.Result{
|
||||||
|
FlagReset: []uint32{flag_valid_pin},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
//Call the function under test
|
||||||
|
res, _ := h.VerifyNewPin(ctx, "verify_new_pin", tt.input)
|
||||||
|
|
||||||
|
//Assert that the result set to content is what was expected
|
||||||
|
assert.Equal(t, res, tt.expectedResult, "Result should contain flags set according to user input")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestConfirmPin(t *testing.T) {
|
||||||
sessionId := "session123"
|
sessionId := "session123"
|
||||||
|
|
||||||
mockState := state.NewState(16)
|
mockState := state.NewState(16)
|
||||||
@ -1852,8 +1898,6 @@ func TestConfirmPinChange(t *testing.T) {
|
|||||||
|
|
||||||
fm, _ := NewFlagManager(flagsPath)
|
fm, _ := NewFlagManager(flagsPath)
|
||||||
flag_pin_mismatch, _ := fm.GetFlag("flag_pin_mismatch")
|
flag_pin_mismatch, _ := fm.GetFlag("flag_pin_mismatch")
|
||||||
flag_account_pin_reset, _ := fm.GetFlag("flag_account_pin_reset")
|
|
||||||
|
|
||||||
mockAccountService := new(mocks.MockAccountService)
|
mockAccountService := new(mocks.MockAccountService)
|
||||||
h := &MenuHandlers{
|
h := &MenuHandlers{
|
||||||
userdataStore: store,
|
userdataStore: store,
|
||||||
@ -1873,7 +1917,7 @@ func TestConfirmPinChange(t *testing.T) {
|
|||||||
input: []byte("1234"),
|
input: []byte("1234"),
|
||||||
temporarypin: "1234",
|
temporarypin: "1234",
|
||||||
expectedResult: resource.Result{
|
expectedResult: resource.Result{
|
||||||
FlagReset: []uint32{flag_pin_mismatch, flag_account_pin_reset},
|
FlagReset: []uint32{flag_pin_mismatch},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -2292,8 +2336,10 @@ func TestCheckBlockedStatus(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Logf(err.Error())
|
t.Logf(err.Error())
|
||||||
}
|
}
|
||||||
flag_account_blocked, _ := fm.GetFlag("flag_account_blocked")
|
flag_account_blocked, err := fm.GetFlag("flag_account_blocked")
|
||||||
flag_account_pin_reset, _ := fm.GetFlag("flag_account_pin_reset")
|
if err != nil {
|
||||||
|
t.Logf(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
h := &MenuHandlers{
|
h := &MenuHandlers{
|
||||||
userdataStore: store,
|
userdataStore: store,
|
||||||
@ -2308,15 +2354,13 @@ func TestCheckBlockedStatus(t *testing.T) {
|
|||||||
{
|
{
|
||||||
name: "Currently blocked account",
|
name: "Currently blocked account",
|
||||||
currentWrongPinAttempts: "4",
|
currentWrongPinAttempts: "4",
|
||||||
expectedResult: resource.Result{
|
expectedResult: resource.Result{},
|
||||||
FlagReset: []uint32{flag_account_pin_reset},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Account with 0 wrong PIN attempts",
|
name: "Account with 0 wrong PIN attempts",
|
||||||
currentWrongPinAttempts: "0",
|
currentWrongPinAttempts: "0",
|
||||||
expectedResult: resource.Result{
|
expectedResult: resource.Result{
|
||||||
FlagReset: []uint32{flag_account_pin_reset, flag_account_blocked},
|
FlagReset: []uint32{flag_account_blocked},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -2845,6 +2889,173 @@ func TestValidateBlockedNumber(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSaveOthersTemporaryPin(t *testing.T) {
|
||||||
|
sessionId := "session123"
|
||||||
|
blockedNumber := "+254712345678"
|
||||||
|
testPin := "1234"
|
||||||
|
|
||||||
|
ctx, userStore := InitializeTestStore(t)
|
||||||
|
ctx = context.WithValue(ctx, "SessionId", sessionId)
|
||||||
|
|
||||||
|
h := &MenuHandlers{
|
||||||
|
userdataStore: userStore,
|
||||||
|
}
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
sessionId string
|
||||||
|
blockedNumber string
|
||||||
|
testPin string
|
||||||
|
setup func() error // Setup function for each test case
|
||||||
|
expectedError bool
|
||||||
|
verifyResult func(t *testing.T) // Function to verify the result
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Missing Session ID",
|
||||||
|
sessionId: "", // Empty session ID
|
||||||
|
blockedNumber: blockedNumber,
|
||||||
|
testPin: testPin,
|
||||||
|
setup: nil,
|
||||||
|
expectedError: true,
|
||||||
|
verifyResult: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Failed to Read Blocked Number",
|
||||||
|
sessionId: sessionId,
|
||||||
|
blockedNumber: blockedNumber,
|
||||||
|
testPin: testPin,
|
||||||
|
setup: func() error {
|
||||||
|
// Do not write the blocked number to simulate a read failure
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
expectedError: true,
|
||||||
|
verifyResult: nil,
|
||||||
|
},
|
||||||
|
|
||||||
|
{
|
||||||
|
name: "Successfully save hashed PIN",
|
||||||
|
sessionId: sessionId,
|
||||||
|
blockedNumber: blockedNumber,
|
||||||
|
testPin: testPin,
|
||||||
|
setup: func() error {
|
||||||
|
// Write the blocked number to the store
|
||||||
|
return userStore.WriteEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER, []byte(blockedNumber))
|
||||||
|
},
|
||||||
|
expectedError: false,
|
||||||
|
verifyResult: func(t *testing.T) {
|
||||||
|
// Read the stored hashed PIN
|
||||||
|
othersHashedPin, err := userStore.ReadEntry(ctx, blockedNumber, storedb.DATA_TEMPORARY_VALUE)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify that the stored hashed PIN matches the original PIN
|
||||||
|
if !pin.VerifyPIN(string(othersHashedPin), testPin) {
|
||||||
|
t.Fatal("stored hashed PIN does not match the original PIN")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
// Set up the context with the session ID
|
||||||
|
ctx := context.WithValue(context.Background(), "SessionId", tt.sessionId)
|
||||||
|
|
||||||
|
// Run the setup function if provided
|
||||||
|
if tt.setup != nil {
|
||||||
|
err := tt.setup()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Call the function under test
|
||||||
|
_, err := h.SaveOthersTemporaryPin(ctx, "save_others_temporary_pin", []byte(tt.testPin))
|
||||||
|
|
||||||
|
// Assert the error
|
||||||
|
if tt.expectedError {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the result if a verification function is provided
|
||||||
|
if tt.verifyResult != nil {
|
||||||
|
tt.verifyResult(t)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCheckBlockedNumPinMisMatch(t *testing.T) {
|
||||||
|
sessionId := "session123"
|
||||||
|
blockedNumber := "+254712345678"
|
||||||
|
testPin := "1234"
|
||||||
|
mockState := state.NewState(128)
|
||||||
|
|
||||||
|
ctx, userStore := InitializeTestStore(t)
|
||||||
|
ctx = context.WithValue(ctx, "SessionId", sessionId)
|
||||||
|
|
||||||
|
hashedPIN, err := pin.HashPIN(testPin)
|
||||||
|
if err != nil {
|
||||||
|
logg.ErrorCtxf(ctx, "failed to hash testPin", "error", err)
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fm, err := NewFlagManager(flagsPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
flag_pin_mismatch, _ := fm.GetFlag("flag_pin_mismatch")
|
||||||
|
|
||||||
|
h := &MenuHandlers{
|
||||||
|
userdataStore: userStore,
|
||||||
|
st: mockState,
|
||||||
|
flagManager: fm,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write initial data to the store
|
||||||
|
err = userStore.WriteEntry(ctx, sessionId, storedb.DATA_BLOCKED_NUMBER, []byte(blockedNumber))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
err = userStore.WriteEntry(ctx, blockedNumber, storedb.DATA_TEMPORARY_VALUE, []byte(hashedPIN))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input []byte
|
||||||
|
expectedResult resource.Result
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Successful PIN match",
|
||||||
|
input: []byte(testPin),
|
||||||
|
expectedResult: resource.Result{
|
||||||
|
FlagReset: []uint32{flag_pin_mismatch},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "PIN mismatch",
|
||||||
|
input: []byte("1345"),
|
||||||
|
expectedResult: resource.Result{
|
||||||
|
FlagSet: []uint32{flag_pin_mismatch},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
res, err := h.CheckBlockedNumPinMisMatch(ctx, "sym", tt.input)
|
||||||
|
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Equal(t, tt.expectedResult, res)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestGetCurrentProfileInfo(t *testing.T) {
|
func TestGetCurrentProfileInfo(t *testing.T) {
|
||||||
sessionId := "session123"
|
sessionId := "session123"
|
||||||
ctx, store := InitializeTestStore(t)
|
ctx, store := InitializeTestStore(t)
|
||||||
@ -3001,6 +3212,30 @@ func TestResetOthersPin(t *testing.T) {
|
|||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestResetValidPin(t *testing.T) {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
fm, err := NewFlagManager(flagsPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
flag_valid_pin, _ := fm.GetFlag("flag_valid_pin")
|
||||||
|
|
||||||
|
expectedResult := resource.Result{
|
||||||
|
FlagReset: []uint32{flag_valid_pin},
|
||||||
|
}
|
||||||
|
|
||||||
|
h := &MenuHandlers{
|
||||||
|
flagManager: fm,
|
||||||
|
}
|
||||||
|
|
||||||
|
res, err := h.ResetValidPin(ctx, "reset_valid_pin", []byte(""))
|
||||||
|
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, expectedResult, res)
|
||||||
|
}
|
||||||
|
|
||||||
func TestResetUnregisteredNumber(t *testing.T) {
|
func TestResetUnregisteredNumber(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
|
@ -99,6 +99,7 @@ func (ls *LocalHandlerService) GetHandler(accountService remote.AccountService)
|
|||||||
ls.DbRs.AddLocalFunc("verify_yob", appHandlers.VerifyYob)
|
ls.DbRs.AddLocalFunc("verify_yob", appHandlers.VerifyYob)
|
||||||
ls.DbRs.AddLocalFunc("reset_incorrect_date_format", appHandlers.ResetIncorrectYob)
|
ls.DbRs.AddLocalFunc("reset_incorrect_date_format", appHandlers.ResetIncorrectYob)
|
||||||
ls.DbRs.AddLocalFunc("initiate_transaction", appHandlers.InitiateTransaction)
|
ls.DbRs.AddLocalFunc("initiate_transaction", appHandlers.InitiateTransaction)
|
||||||
|
ls.DbRs.AddLocalFunc("verify_new_pin", appHandlers.VerifyNewPin)
|
||||||
ls.DbRs.AddLocalFunc("confirm_pin_change", appHandlers.ConfirmPinChange)
|
ls.DbRs.AddLocalFunc("confirm_pin_change", appHandlers.ConfirmPinChange)
|
||||||
ls.DbRs.AddLocalFunc("quit_with_help", appHandlers.QuitWithHelp)
|
ls.DbRs.AddLocalFunc("quit_with_help", appHandlers.QuitWithHelp)
|
||||||
ls.DbRs.AddLocalFunc("fetch_community_balance", appHandlers.FetchCommunityBalance)
|
ls.DbRs.AddLocalFunc("fetch_community_balance", appHandlers.FetchCommunityBalance)
|
||||||
@ -107,10 +108,13 @@ func (ls *LocalHandlerService) GetHandler(accountService remote.AccountService)
|
|||||||
ls.DbRs.AddLocalFunc("view_voucher", appHandlers.ViewVoucher)
|
ls.DbRs.AddLocalFunc("view_voucher", appHandlers.ViewVoucher)
|
||||||
ls.DbRs.AddLocalFunc("set_voucher", appHandlers.SetVoucher)
|
ls.DbRs.AddLocalFunc("set_voucher", appHandlers.SetVoucher)
|
||||||
ls.DbRs.AddLocalFunc("get_voucher_details", appHandlers.GetVoucherDetails)
|
ls.DbRs.AddLocalFunc("get_voucher_details", appHandlers.GetVoucherDetails)
|
||||||
|
ls.DbRs.AddLocalFunc("reset_valid_pin", appHandlers.ResetValidPin)
|
||||||
|
ls.DbRs.AddLocalFunc("check_pin_mismatch", appHandlers.CheckBlockedNumPinMisMatch)
|
||||||
ls.DbRs.AddLocalFunc("validate_blocked_number", appHandlers.ValidateBlockedNumber)
|
ls.DbRs.AddLocalFunc("validate_blocked_number", appHandlers.ValidateBlockedNumber)
|
||||||
ls.DbRs.AddLocalFunc("retrieve_blocked_number", appHandlers.RetrieveBlockedNumber)
|
ls.DbRs.AddLocalFunc("retrieve_blocked_number", appHandlers.RetrieveBlockedNumber)
|
||||||
ls.DbRs.AddLocalFunc("reset_unregistered_number", appHandlers.ResetUnregisteredNumber)
|
ls.DbRs.AddLocalFunc("reset_unregistered_number", appHandlers.ResetUnregisteredNumber)
|
||||||
ls.DbRs.AddLocalFunc("reset_others_pin", appHandlers.ResetOthersPin)
|
ls.DbRs.AddLocalFunc("reset_others_pin", appHandlers.ResetOthersPin)
|
||||||
|
ls.DbRs.AddLocalFunc("save_others_temporary_pin", appHandlers.SaveOthersTemporaryPin)
|
||||||
ls.DbRs.AddLocalFunc("get_current_profile_info", appHandlers.GetCurrentProfileInfo)
|
ls.DbRs.AddLocalFunc("get_current_profile_info", appHandlers.GetCurrentProfileInfo)
|
||||||
ls.DbRs.AddLocalFunc("check_transactions", appHandlers.CheckTransactions)
|
ls.DbRs.AddLocalFunc("check_transactions", appHandlers.CheckTransactions)
|
||||||
ls.DbRs.AddLocalFunc("get_transactions", appHandlers.GetTransactionsList)
|
ls.DbRs.AddLocalFunc("get_transactions", appHandlers.GetTransactionsList)
|
||||||
|
@ -202,7 +202,23 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"input": "0700000000",
|
"input": "0700000000",
|
||||||
"expectedContent": "{secondary_session_id} will get a PIN reset request.\nPlease enter your PIN to confirm:\n0:Back\n9:Quit"
|
"expectedContent": "Please enter new PIN for: {secondary_session_id}\n0:Back"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"input": "11111",
|
||||||
|
"expectedContent": "The PIN you have entered is invalid.Please try a 4 digit number instead.\n1:Retry\n9:Quit"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"input": "1",
|
||||||
|
"expectedContent": "Please enter new PIN for: {secondary_session_id}\n0:Back"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"input": "1111",
|
||||||
|
"expectedContent": "Please confirm new PIN for: {secondary_session_id}\n0:Back"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"input": "1111",
|
||||||
|
"expectedContent": "Please enter your PIN:"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"input": "1234",
|
"input": "1234",
|
||||||
@ -596,7 +612,7 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"input": "1234",
|
"input": "1234",
|
||||||
"expectedContent": "My profile:\nName: foo bar\nGender: male\nAge: 80\nLocation: Kilifi\nYou provide: Bananas\nYour alias: Not Provided\n\n0:Back\n9:Quit"
|
"expectedContent": "My profile:\nName: foo bar\nGender: male\nAge: 80\nLocation: Kilifi\nYou provide: Bananas\nYour alias: \n\n0:Back\n9:Quit"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"input": "0",
|
"input": "0",
|
||||||
|
@ -1,2 +0,0 @@
|
|||||||
{{.retrieve_blocked_number}} will get a PIN reset request.
|
|
||||||
Please enter your PIN to confirm:
|
|
@ -1,12 +0,0 @@
|
|||||||
LOAD retrieve_blocked_number 0
|
|
||||||
RELOAD retrieve_blocked_number
|
|
||||||
MAP retrieve_blocked_number
|
|
||||||
MOUT back 0
|
|
||||||
MOUT quit 9
|
|
||||||
LOAD authorize_account 6
|
|
||||||
HALT
|
|
||||||
RELOAD authorize_account
|
|
||||||
CATCH incorrect_pin flag_incorrect_pin 1
|
|
||||||
INCMP _ 0
|
|
||||||
INCMP quit 9
|
|
||||||
INCMP pin_reset_result *
|
|
@ -1,2 +0,0 @@
|
|||||||
{{.retrieve_blocked_number}} atapokea ombi la kuweka upya PIN.
|
|
||||||
Tafadhali weka PIN yako kudhibitisha:
|
|
@ -1,7 +1,4 @@
|
|||||||
MOUT back 0
|
LOAD save_temporary_pin 6
|
||||||
HALT
|
HALT
|
||||||
INCMP _ 0
|
|
||||||
LOAD verify_create_pin 8
|
LOAD verify_create_pin 8
|
||||||
RELOAD verify_create_pin
|
|
||||||
CATCH pin_mismatch flag_pin_mismatch 1
|
|
||||||
INCMP account_creation *
|
INCMP account_creation *
|
||||||
|
1
services/registration/confirm_others_new_pin
Normal file
1
services/registration/confirm_others_new_pin
Normal file
@ -0,0 +1 @@
|
|||||||
|
Please confirm new PIN for: {{.retrieve_blocked_number}}
|
14
services/registration/confirm_others_new_pin.vis
Normal file
14
services/registration/confirm_others_new_pin.vis
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
CATCH incorrect_pin flag_incorrect_pin 1
|
||||||
|
RELOAD retrieve_blocked_number
|
||||||
|
MAP retrieve_blocked_number
|
||||||
|
CATCH invalid_others_pin flag_valid_pin 0
|
||||||
|
CATCH pin_reset_result flag_account_authorized 1
|
||||||
|
LOAD save_others_temporary_pin 6
|
||||||
|
RELOAD save_others_temporary_pin
|
||||||
|
MOUT back 0
|
||||||
|
HALT
|
||||||
|
INCMP _ 0
|
||||||
|
LOAD check_pin_mismatch 6
|
||||||
|
RELOAD check_pin_mismatch
|
||||||
|
CATCH others_pin_mismatch flag_pin_mismatch 1
|
||||||
|
INCMP pin_entry *
|
1
services/registration/confirm_others_new_pin_swa
Normal file
1
services/registration/confirm_others_new_pin_swa
Normal file
@ -0,0 +1 @@
|
|||||||
|
Tafadhali thibitisha PIN mpya ya: {{.retrieve_blocked_number}}
|
@ -1,7 +1,7 @@
|
|||||||
|
LOAD confirm_pin_change 0
|
||||||
MOUT back 0
|
MOUT back 0
|
||||||
HALT
|
HALT
|
||||||
INCMP _ 0
|
INCMP _ 0
|
||||||
LOAD confirm_pin_change 0
|
|
||||||
RELOAD confirm_pin_change
|
RELOAD confirm_pin_change
|
||||||
CATCH pin_mismatch flag_pin_mismatch 1
|
CATCH pin_reset_mismatch flag_pin_mismatch 1
|
||||||
INCMP pin_reset_success *
|
INCMP * pin_reset_success
|
||||||
|
@ -2,8 +2,8 @@ LOAD create_account 0
|
|||||||
CATCH account_creation_failed flag_account_creation_failed 1
|
CATCH account_creation_failed flag_account_creation_failed 1
|
||||||
MOUT exit 0
|
MOUT exit 0
|
||||||
HALT
|
HALT
|
||||||
INCMP quit 0
|
|
||||||
LOAD save_temporary_pin 6
|
LOAD save_temporary_pin 6
|
||||||
RELOAD save_temporary_pin
|
RELOAD save_temporary_pin
|
||||||
CATCH invalid_pin flag_invalid_pin 1
|
CATCH . flag_incorrect_pin 1
|
||||||
|
INCMP quit 0
|
||||||
INCMP confirm_create_pin *
|
INCMP confirm_create_pin *
|
||||||
|
5
services/registration/create_pin_mismatch.vis
Normal file
5
services/registration/create_pin_mismatch.vis
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
MOUT retry 1
|
||||||
|
MOUT quit 9
|
||||||
|
HALT
|
||||||
|
INCMP confirm_create_pin 1
|
||||||
|
INCMP quit 9
|
@ -7,4 +7,4 @@ INCMP _ 0
|
|||||||
LOAD validate_blocked_number 6
|
LOAD validate_blocked_number 6
|
||||||
RELOAD validate_blocked_number
|
RELOAD validate_blocked_number
|
||||||
CATCH unregistered_number flag_unregistered_number 1
|
CATCH unregistered_number flag_unregistered_number 1
|
||||||
INCMP authorize_reset_others_pin *
|
INCMP enter_others_new_pin *
|
||||||
|
1
services/registration/enter_others_new_pin
Normal file
1
services/registration/enter_others_new_pin
Normal file
@ -0,0 +1 @@
|
|||||||
|
Please enter new PIN for: {{.retrieve_blocked_number}}
|
9
services/registration/enter_others_new_pin.vis
Normal file
9
services/registration/enter_others_new_pin.vis
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
LOAD retrieve_blocked_number 0
|
||||||
|
RELOAD retrieve_blocked_number
|
||||||
|
MAP retrieve_blocked_number
|
||||||
|
MOUT back 0
|
||||||
|
HALT
|
||||||
|
LOAD verify_new_pin 6
|
||||||
|
RELOAD verify_new_pin
|
||||||
|
INCMP _ 0
|
||||||
|
INCMP * confirm_others_new_pin
|
1
services/registration/enter_others_new_pin_swa
Normal file
1
services/registration/enter_others_new_pin_swa
Normal file
@ -0,0 +1 @@
|
|||||||
|
Tafadhali weka PIN mpya ya: {{.retrieve_blocked_number}}
|
1
services/registration/invalid_others_pin
Normal file
1
services/registration/invalid_others_pin
Normal file
@ -0,0 +1 @@
|
|||||||
|
The PIN you have entered is invalid.Please try a 4 digit number instead.
|
5
services/registration/invalid_others_pin.vis
Normal file
5
services/registration/invalid_others_pin.vis
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
MOUT retry 1
|
||||||
|
MOUT quit 9
|
||||||
|
HALT
|
||||||
|
INCMP enter_others_new_pin 1
|
||||||
|
INCMP quit 9
|
@ -1 +1 @@
|
|||||||
The PIN you entered is invalid. The PIN must be a 4 digit number.
|
The PIN you entered is invalid.The PIN must be a 4 digit number.
|
@ -9,7 +9,7 @@ MOUT my_address 6
|
|||||||
MOUT my_account_alias 7
|
MOUT my_account_alias 7
|
||||||
MOUT back 0
|
MOUT back 0
|
||||||
HALT
|
HALT
|
||||||
INCMP ^ 0
|
INCMP main 0
|
||||||
INCMP edit_profile 1
|
INCMP edit_profile 1
|
||||||
INCMP change_language 2
|
INCMP change_language 2
|
||||||
INCMP balances 3
|
INCMP balances 3
|
||||||
|
@ -2,5 +2,6 @@ MOUT back 0
|
|||||||
HALT
|
HALT
|
||||||
INCMP _ 0
|
INCMP _ 0
|
||||||
RELOAD save_temporary_pin
|
RELOAD save_temporary_pin
|
||||||
CATCH invalid_pin flag_invalid_pin 1
|
RELOAD verify_new_pin
|
||||||
INCMP confirm_pin_change *
|
CATCH invalid_pin flag_valid_pin 0
|
||||||
|
INCMP * confirm_pin_change
|
||||||
|
1
services/registration/others_pin_mismatch
Normal file
1
services/registration/others_pin_mismatch
Normal file
@ -0,0 +1 @@
|
|||||||
|
The PIN you have entered is not a match
|
1
services/registration/others_pin_mismatch_swa
Normal file
1
services/registration/others_pin_mismatch_swa
Normal file
@ -0,0 +1 @@
|
|||||||
|
PIN uliyoweka hailingani.Jaribu tena.
|
@ -1,6 +1,7 @@
|
|||||||
LOAD set_back 6
|
LOAD set_back 6
|
||||||
LOAD authorize_account 16
|
LOAD authorize_account 16
|
||||||
LOAD reset_allow_update 4
|
LOAD reset_allow_update 4
|
||||||
|
LOAD verify_new_pin 2
|
||||||
LOAD save_temporary_pin 1
|
LOAD save_temporary_pin 1
|
||||||
LOAD reset_incorrect 0
|
LOAD reset_incorrect 0
|
||||||
LOAD reset_invalid_pin 6
|
LOAD reset_invalid_pin 6
|
||||||
|
1
services/registration/pin_reset_mismatch
Normal file
1
services/registration/pin_reset_mismatch
Normal file
@ -0,0 +1 @@
|
|||||||
|
The PIN is not a match. Try again
|
6
services/registration/pin_reset_mismatch.vis
Normal file
6
services/registration/pin_reset_mismatch.vis
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
MOUT retry 1
|
||||||
|
MOUT quit 9
|
||||||
|
HALT
|
||||||
|
INCMP _ 1
|
||||||
|
INCMP quit 9
|
||||||
|
INCMP . *
|
1
services/registration/pin_reset_mismatch_swa
Normal file
1
services/registration/pin_reset_mismatch_swa
Normal file
@ -0,0 +1 @@
|
|||||||
|
PIN uliyoweka hailingani.Jaribu tena.
|
@ -1,4 +1,3 @@
|
|||||||
CATCH _ flag_account_authorized 0
|
|
||||||
LOAD retrieve_blocked_number 0
|
LOAD retrieve_blocked_number 0
|
||||||
MAP retrieve_blocked_number
|
MAP retrieve_blocked_number
|
||||||
LOAD reset_others_pin 6
|
LOAD reset_others_pin 6
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
MOUT back 0
|
MOUT back 0
|
||||||
MOUT quit 9
|
MOUT quit 9
|
||||||
HALT
|
HALT
|
||||||
INCMP ^ 0
|
INCMP main 0
|
||||||
INCMP quit 9
|
INCMP quit 9
|
||||||
INCMP . *
|
INCMP . *
|
||||||
|
@ -9,7 +9,7 @@ flag,flag_account_authorized,15,this is set to allow a user access guarded nodes
|
|||||||
flag,flag_invalid_recipient,16,this is set when the transaction recipient is invalid
|
flag,flag_invalid_recipient,16,this is set when the transaction recipient is invalid
|
||||||
flag,flag_invalid_recipient_with_invite,17,this is set when the transaction recipient is valid but not on the platform
|
flag,flag_invalid_recipient_with_invite,17,this is set when the transaction recipient is valid but not on the platform
|
||||||
flag,flag_invalid_amount,18,this is set when the given transaction amount is invalid
|
flag,flag_invalid_amount,18,this is set when the given transaction amount is invalid
|
||||||
flag,flag_incorrect_pin,19,this is set when the provided PIN does not match the current account's PIN
|
flag,flag_incorrect_pin,19,this is set when the provided PIN is invalid or does not match the current account's PIN
|
||||||
flag,flag_valid_pin,20,this is set when the given PIN is valid
|
flag,flag_valid_pin,20,this is set when the given PIN is valid
|
||||||
flag,flag_allow_update,21,this is set to allow a user to update their profile data
|
flag,flag_allow_update,21,this is set to allow a user to update their profile data
|
||||||
flag,flag_single_edit,22,this is set to allow a user to edit a single profile item such as year of birth
|
flag,flag_single_edit,22,this is set to allow a user to edit a single profile item such as year of birth
|
||||||
@ -31,4 +31,3 @@ flag,flag_back_set,37,this is set when it is a back navigation
|
|||||||
flag,flag_account_blocked,38,this is set when an account has been blocked after the allowed incorrect PIN attempts have been exceeded
|
flag,flag_account_blocked,38,this is set when an account has been blocked after the allowed incorrect PIN attempts have been exceeded
|
||||||
flag,flag_invalid_pin,39,this is set when the given PIN is invalid(is less than or more than 4 digits)
|
flag,flag_invalid_pin,39,this is set when the given PIN is invalid(is less than or more than 4 digits)
|
||||||
flag,flag_alias_set,40,this is set when an account alias has been assigned to a user
|
flag,flag_alias_set,40,this is set when an account alias has been assigned to a user
|
||||||
flag,flag_account_pin_reset,41,this is set on an account when an admin triggers a PIN reset for them
|
|
||||||
|
|
@ -2,14 +2,13 @@ LOAD check_blocked_status 1
|
|||||||
RELOAD check_blocked_status
|
RELOAD check_blocked_status
|
||||||
LOAD check_account_created 2
|
LOAD check_account_created 2
|
||||||
RELOAD check_account_created
|
RELOAD check_account_created
|
||||||
CATCH self_reset_pin flag_account_pin_reset 1
|
|
||||||
CATCH blocked_account flag_account_blocked 1
|
CATCH blocked_account flag_account_blocked 1
|
||||||
CATCH select_language flag_language_set 0
|
CATCH select_language flag_language_set 0
|
||||||
CATCH terms flag_account_created 0
|
CATCH terms flag_account_created 0
|
||||||
CATCH create_pin flag_pin_set 0
|
|
||||||
LOAD check_account_status 0
|
LOAD check_account_status 0
|
||||||
RELOAD check_account_status
|
RELOAD check_account_status
|
||||||
CATCH api_failure flag_api_call_error 1
|
CATCH api_failure flag_api_call_error 1
|
||||||
CATCH account_pending flag_account_pending 1
|
CATCH account_pending flag_account_pending 1
|
||||||
|
CATCH create_pin flag_pin_set 0
|
||||||
CATCH main flag_account_success 1
|
CATCH main flag_account_success 1
|
||||||
HALT
|
HALT
|
||||||
|
@ -1,2 +0,0 @@
|
|||||||
A PIN reset has been done on your account.
|
|
||||||
Please enter a new four number PIN:
|
|
@ -1,6 +0,0 @@
|
|||||||
LOAD reset_invalid_pin 6
|
|
||||||
HALT
|
|
||||||
LOAD save_temporary_pin 1
|
|
||||||
RELOAD save_temporary_pin
|
|
||||||
CATCH invalid_pin flag_invalid_pin 1
|
|
||||||
INCMP confirm_pin_change *
|
|
@ -1,2 +0,0 @@
|
|||||||
Uwekaji upya wa PIN umefanyika kwenye akaunti yako.
|
|
||||||
Tafadhali weka PIN mpya ya nambari nne:
|
|
@ -65,8 +65,6 @@ const (
|
|||||||
DATA_ACCOUNT_ALIAS
|
DATA_ACCOUNT_ALIAS
|
||||||
//currently suggested alias by the api awaiting user's confirmation as accepted account alias
|
//currently suggested alias by the api awaiting user's confirmation as accepted account alias
|
||||||
DATA_SUGGESTED_ALIAS
|
DATA_SUGGESTED_ALIAS
|
||||||
//Key used to store a value of 1 for a user to reset their own PIN once they access the menu.
|
|
||||||
DATA_SELF_PIN_RESET
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
Loading…
Reference in New Issue
Block a user