aboutsummaryrefslogtreecommitdiff
path: root/src/testing/test_exchange_api.conf
blob: d41a70b1b9a121a0dcaf606ec7a09bbabc293015 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
# This file is in the public domain.
#

[PATHS]
TALER_TEST_HOME = test_exchange_api_home/

[libeufin-bank]
CURRENCY = EUR
DEFAULT_CUSTOMER_DEBT_LIMIT = EUR:200
DEFAULT_ADMIN_DEBT_LIMIT = EUR:2000
REGISTRATION_BONUS_ENABLED = yes
REGISTRATION_BONUS = EUR:100
SUGGESTED_WITHDRAWAL_EXCHANGE = http://localhost:8081/
WIRE_TYPE = iban
IBAN_PAYTO_BIC = SANDBOXX
SERVE = tcp
PORT = 8082

[libeufin-bankdb-postgres]
CONFIG = postgresql:///talercheck


[taler]
CURRENCY = EUR
CURRENCY_ROUND_UNIT = EUR:0.01

[auditor]
BASE_URL = "http://localhost:8083/"
PORT = 8083
PUBLIC_KEY = 9QZ7CCC5QFMWE9FVF50MGYWV7JR92SFHY5KHT8A1A2VNHM37VCRG
TINY_AMOUNT = EUR:0.01
TALER_AUDITOR_SALT = "salt"

[auditordb-postgres]
CONFIG = "postgres:///talercheck"

[bank]
HTTP_PORT = 8082

[exchange]
TERMS_ETAG = exchange-tos-tops-v0
PRIVACY_ETAG = 0
AML_THRESHOLD = EUR:1000000
PORT = 8081
MASTER_PUBLIC_KEY = QD6H521CBJBW0Z7PRN0JTAGH5JCQ97RDZRPPV5TQZSE78NQRT3KG
DB = postgres
BASE_URL = "http://localhost:8081/"
EXPIRE_SHARD_SIZE ="300 ms"
EXPIRE_IDLE_SLEEP_INTERVAL ="1 s"
STEFAN_ABS = EUR:0
STEFAN_LOG = EUR:0.005

[exchangedb-postgres]
CONFIG = "postgres:///talercheck"

[taler-exchange-secmod-cs]
LOOKAHEAD_SIGN = "24 days"

[taler-exchange-secmod-rsa]
LOOKAHEAD_SIGN = "24 days"

[taler-exchange-secmod-eddsa]
LOOKAHEAD_SIGN = "24 days"
DURATION = "14 days"


[exchange-account-1]
PAYTO_URI = "payto://x-taler-bank/localhost/2?receiver-name=2"
ENABLE_DEBIT = YES
ENABLE_CREDIT = YES

[exchange-accountcredentials-1]
WIRE_GATEWAY_AUTH_METHOD = none
WIRE_GATEWAY_URL = "http://localhost:8082/accounts/2/taler-wire-gateway/"

[admin-accountcredentials-1]
WIRE_GATEWAY_AUTH_METHOD = none
WIRE_GATEWAY_URL = "http://localhost:8082/accounts/2/taler-wire-gateway/"

[exchange-account-2]
PAYTO_URI = "payto://x-taler-bank/localhost/2?receiver-name=2"
ENABLE_DEBIT = YES
ENABLE_CREDIT = YES

[exchange-accountcredentials-2]
WIRE_GATEWAY_AUTH_METHOD = basic
USERNAME = Exchange
PASSWORD = x
WIRE_GATEWAY_URL = "http://localhost:8082/accounts/2/taler-wire-gateway/"

[admin-accountcredentials-2]
WIRE_GATEWAY_AUTH_METHOD = basic
# For now, fakebank still checks against the Exchange account...
USERNAME = Exchange
PASSWORD = x
WIRE_GATEWAY_URL = "http://localhost:8082/accounts/2/taler-wire-gateway/"


[kyc-provider-test-oauth2]
LOGIC = oauth2
CONVERTER = taler-exchange-helper-converter-oauth2-address
# PROVIDED_CHECKS = DUMMY
KYC_OAUTH2_VALIDITY = forever
KYC_OAUTH2_TOKEN_URL = http://localhost:6666/oauth/v2/token
KYC_OAUTH2_AUTHORIZE_URL = http://localhost:6666/oauth/v2/login
KYC_OAUTH2_INFO_URL = http://localhost:6666/api/user/me
KYC_OAUTH2_CLIENT_ID = taler-exchange
KYC_OAUTH2_CLIENT_SECRET = exchange-secret
KYC_OAUTH2_POST_URL = http://example.com/
KYC_OAUTH2_CONVERTER_HELPER = taler-exchange-kyc-oauth2-test-converter.sh

[kyc-check-oauth-test-id]
VOLUNTARY = NO
# We use an external provider
TYPE = LINK
DESCRIPTION = "Oauth2 dummy authentication"
DESCRIPTION_I18N = {}
# No context requirements
REQUIRES =
# Measure to execute if check failed.
FALLBACK = manual-freeze
# This check runs on oauth2
PROVIDER_ID = test-oauth2

# If this "check" is triggered, we merely inform
# the user that their account has been frozen. The
# user cannot proceed manually.
[kyc-check-info-frozen]
VOLUNTARY = NO
TYPE = INFO
DESCRIPTION = "Your account is frozen pending investigation"
DESCRIPTION_I18N = {}
# No context requirements
REQUIRES =
# Measure to execute if check failed. Well,
# this check cannot really fail, but we stay
# where we are: frozen.
FALLBACK = manual-freeze

[aml-program-oauth-output-check]
DESCRIPTION = "Validates the output from OAauth2 and then permits the reserve closing to proceed"
# Command that runs on the output of the OAuth provider
# to decide what rules should apply next.
COMMAND = taler-exchange-helper-measure-test-oauth
# What measure to take if the COMMAND failed.
FALLBACK = manual-freeze

[kyc-measure-run-oauth]
# Get client ID via the OAuth test provider
CHECK_NAME = oauth-test-id
# AML program to run on the output of the OAuth provider
# to decide what rules should apply next.
PROGRAM = oauth-output-check
# Context to provide for check and program; empty.
CONTEXT = {}

# This is a base-measure that is being triggered
# whenever something goes wrong. We freeze the
# account and ask AML staff to investigate.
[kyc-measure-manual-freeze]
CHECK_NAME = info-frozen
# AML program that freezes the account and flags
# it for investigation.
PROGRAM = taler-exchange-helper-measure-freeze
# Context to provide for check and program; empty.
CONTEXT = {}

# This rule requests that the users passes KYC
# when closing the reserve.
[kyc-rule-close]
ENABLED = YES
# This is a public rule.
EXPOSED = YES
# All checks listed must be done (well, there is only one...)
IS_AND_COMBINATOR = YES
# This happens if the reserve is closed.
OPERATION_TYPE = CLOSE
# Threshold is 0, so any amount.
THRESHOLD = EUR:0
# Timeframe doesn't exactly matter with a threshold of EUR:0.
TIMEFRAME = 1d
# If the rule is triggered, ask the user to provide
# personal data via OAuth2
NEXT_MEASURES = run-oauth

[exchange-extension-age_restriction]
ENABLED = YES
#AGE_GROUPS = "8:10:12:14:16:18:21"