From 16e7488cffd4fe9d79855ad2b70f07d6cb036188 Mon Sep 17 00:00:00 2001
From: Jean-Paul Calderone <exarkun@twistedmatrix.com>
Date: Wed, 13 Nov 2019 10:03:52 -0500
Subject: [PATCH] Add a `created` column to the voucher schema

And a corresponding `created` field to the voucher model object which
propagates to the web view.
---
 src/_zkapauthorizer/_plugin.py                |  5 +-
 src/_zkapauthorizer/model.py                  | 60 ++++++++++++++----
 .../tests/test_client_resource.py             | 62 ++++++++++++-------
 src/_zkapauthorizer/tests/test_controller.py  | 11 ++--
 src/_zkapauthorizer/tests/test_model.py       | 47 ++++++++------
 src/_zkapauthorizer/tests/test_plugin.py      | 10 +--
 zkapauthorizer.nix                            |  3 +-
 7 files changed, 135 insertions(+), 63 deletions(-)

diff --git a/src/_zkapauthorizer/_plugin.py b/src/_zkapauthorizer/_plugin.py
index 355642d..0711f2c 100644
--- a/src/_zkapauthorizer/_plugin.py
+++ b/src/_zkapauthorizer/_plugin.py
@@ -20,6 +20,9 @@ Tahoe-LAFS.
 from weakref import (
     WeakValueDictionary,
 )
+from datetime import (
+    datetime,
+)
 
 import attr
 
@@ -93,7 +96,7 @@ class ZKAPAuthorizer(object):
         try:
             s = self._stores[key]
         except KeyError:
-            s = VoucherStore.from_node_config(node_config)
+            s = VoucherStore.from_node_config(node_config, datetime.now)
             self._stores[key] = s
         return s
 
diff --git a/src/_zkapauthorizer/model.py b/src/_zkapauthorizer/model.py
index cf61f82..b42f78e 100644
--- a/src/_zkapauthorizer/model.py
+++ b/src/_zkapauthorizer/model.py
@@ -24,7 +24,9 @@ from json import (
     loads,
     dumps,
 )
-
+from datetime import (
+    datetime,
+)
 from sqlite3 import (
     OperationalError,
     connect as _connect,
@@ -32,6 +34,9 @@ from sqlite3 import (
 
 import attr
 
+from aniso8601 import (
+    parse_datetime,
+)
 from twisted.python.filepath import (
     FilePath,
 )
@@ -117,6 +122,7 @@ def open_and_initialize(path, required_schema_version, connect=None):
             """
             CREATE TABLE IF NOT EXISTS [vouchers] (
                 [number] text,
+                [created] text,            -- An ISO8601 date+time string.
                 [redeemed] num DEFAULT 0,
 
                 PRIMARY KEY([number])
@@ -168,12 +174,17 @@ class VoucherStore(object):
 
     :ivar allmydata.node._Config node_config: The Tahoe-LAFS node configuration object for
         the node that owns the persisted vouchers.
+
+    :ivar now: A no-argument callable that returns the time of the call as a
+        ``datetime`` instance.
     """
     database_path = attr.ib(validator=attr.validators.instance_of(FilePath))
+    now = attr.ib()
+
     _connection = attr.ib()
 
     @classmethod
-    def from_node_config(cls, node_config, connect=None):
+    def from_node_config(cls, node_config, now, connect=None):
         """
         Create or open the ``VoucherStore`` for a given node.
 
@@ -181,6 +192,8 @@ class VoucherStore(object):
             configuration object for the node for which we want to open a
             store.
 
+        :param now: See ``VoucherStore.now``.
+
         :param connect: An alternate database connection function.  This is
             primarily for the purposes of the test suite.
         """
@@ -192,6 +205,7 @@ class VoucherStore(object):
         )
         return cls(
             db_path,
+            now,
             conn,
         )
 
@@ -205,7 +219,7 @@ class VoucherStore(object):
         cursor.execute(
             """
             SELECT
-                [number], [redeemed]
+                [number], [created], [redeemed]
             FROM
                 [vouchers]
             WHERE
@@ -216,7 +230,7 @@ class VoucherStore(object):
         refs = cursor.fetchall()
         if len(refs) == 0:
             raise KeyError(voucher)
-        return Voucher(refs[0][0], bool(refs[0][1]))
+        return Voucher.from_row(refs[0])
 
     @with_cursor
     def add(self, cursor, voucher, tokens):
@@ -228,11 +242,15 @@ class VoucherStore(object):
 
         :param list[RandomToken]: The tokens to add alongside the voucher.
         """
+        now = self.now()
+        if not isinstance(now, datetime):
+            raise TypeError("{} returned {}, expected datetime".format(self.now, now))
+
         cursor.execute(
             """
-            INSERT OR IGNORE INTO [vouchers] ([number]) VALUES (?)
+            INSERT OR IGNORE INTO [vouchers] ([number], [created]) VALUES (?, ?)
             """,
-            (voucher,)
+            (voucher, self.now())
         )
         if cursor.rowcount:
             # Something was inserted.  Insert the tokens, too.  It's okay to
@@ -259,14 +277,14 @@ class VoucherStore(object):
         """
         cursor.execute(
             """
-            SELECT [number], [redeemed] FROM [vouchers]
+            SELECT [number], [created], [redeemed] FROM [vouchers]
             """,
         )
         refs = cursor.fetchall()
 
         return list(
-            Voucher(number, bool(redeemed))
-            for (number, redeemed)
+            Voucher.from_row(row)
+            for row
             in refs
         )
 
@@ -396,8 +414,23 @@ class RandomToken(object):
 @attr.s
 class Voucher(object):
     number = attr.ib()
+    created = attr.ib(default=None, validator=attr.validators.optional(attr.validators.instance_of(datetime)))
     redeemed = attr.ib(default=False, validator=attr.validators.instance_of(bool))
 
+    @classmethod
+    def from_row(cls, row):
+        print(row[1])
+        return cls(
+            row[0],
+            # All Python datetime-based date/time libraries fail to handle
+            # leap seconds.  This parse call might raise an exception of the
+            # value represents a leap second.  However, since we also use
+            # Python to generate the data in the first place, it should never
+            # represent a leap second... I hope.
+            parse_datetime(row[1], delimiter=u" "),
+            bool(row[2]),
+        )
+
     @classmethod
     def from_json(cls, json):
         values = loads(json)
@@ -419,6 +452,9 @@ class Voucher(object):
 
 
     def to_json_v1(self):
-        result = attr.asdict(self)
-        result[u"version"] = 1
-        return result
+        return {
+            u"number": self.number,
+            u"created": None if self.created is None else self.created.isoformat(),
+            u"redeemed": self.redeemed,
+            u"version": 1,
+        }
diff --git a/src/_zkapauthorizer/tests/test_client_resource.py b/src/_zkapauthorizer/tests/test_client_resource.py
index c456f32..e816998 100644
--- a/src/_zkapauthorizer/tests/test_client_resource.py
+++ b/src/_zkapauthorizer/tests/test_client_resource.py
@@ -27,6 +27,9 @@ from .._base64 import (
     urlsafe_b64decode,
 )
 
+from datetime import (
+    datetime,
+)
 from json import (
     dumps,
     loads,
@@ -78,6 +81,7 @@ from hypothesis.strategies import (
     integers,
     binary,
     text,
+    datetimes,
 )
 
 from twisted.internet.defer import (
@@ -201,18 +205,22 @@ def invalid_bodies():
     )
 
 
-def root_from_config(config):
+def root_from_config(config, now):
     """
     Create a client root resource from a Tahoe-LAFS configuration.
 
     :param _Config config: The Tahoe-LAFS configuration.
 
+    :param now: A no-argument callable that returns the time of the call as a
+        ``datetime`` instance.
+
     :return IResource: The root client resource.
     """
     return from_configuration(
         config,
         VoucherStore.from_node_config(
             config,
+            now,
             memory_connect,
         ),
     )
@@ -230,7 +238,7 @@ class ResourceTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
         self.assertThat(
             getChildForRequest(root, request),
             Provides([IResource]),
@@ -256,7 +264,7 @@ class UnblindedTokenTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
 
         if num_tokens:
             # Put in a number of tokens with which to test.
@@ -290,7 +298,7 @@ class UnblindedTokenTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
 
         if num_tokens:
             # Put in a number of tokens with which to test.
@@ -324,7 +332,7 @@ class UnblindedTokenTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
 
         if num_tokens:
             # Put in a number of tokens with which to test.
@@ -389,7 +397,7 @@ class UnblindedTokenTests(TestCase):
 
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
 
         # Put in a number of tokens with which to test.
         redeeming = root.controller.redeem(voucher, num_tokens)
@@ -481,7 +489,7 @@ class VoucherTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
         agent = RequestTraversalAgent(root)
         producer = FileBodyProducer(
             BytesIO(dumps({u"voucher": voucher})),
@@ -512,7 +520,7 @@ class VoucherTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
         agent = RequestTraversalAgent(root)
         producer = FileBodyProducer(
             BytesIO(body),
@@ -542,7 +550,7 @@ class VoucherTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
         agent = RequestTraversalAgent(root)
         url = u"http://127.0.0.1/voucher/{}".format(
             quote(
@@ -571,7 +579,7 @@ class VoucherTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, datetime.now)
         agent = RequestTraversalAgent(root)
         requesting = agent.request(
             b"GET",
@@ -584,25 +592,25 @@ class VoucherTests(TestCase):
             ),
         )
 
-    @given(tahoe_configs(client_nonredeemer_configurations()), vouchers())
-    def test_get_known_voucher_unredeemed(self, get_config, voucher):
+    @given(tahoe_configs(client_nonredeemer_configurations()), datetimes(), vouchers())
+    def test_get_known_voucher_unredeemed(self, get_config, now, voucher):
         """
         When a voucher is first ``PUT`` and then later a ``GET`` is issued for the
         same voucher then the response code is **OK** and details about the
         voucher are included in a json-encoded response body.
         """
-        return self._test_get_known_voucher(get_config, voucher, False)
+        return self._test_get_known_voucher(get_config, now, voucher, False)
 
-    @given(tahoe_configs(client_dummyredeemer_configurations()), vouchers())
-    def test_get_known_voucher_redeemed(self, get_config, voucher):
+    @given(tahoe_configs(client_dummyredeemer_configurations()), datetimes(), vouchers())
+    def test_get_known_voucher_redeemed(self, get_config, now, voucher):
         """
         When a voucher is first ``PUT`` and then later a ``GET`` is issued for the
         same voucher then the response code is **OK** and details about the
         voucher are included in a json-encoded response body.
         """
-        return self._test_get_known_voucher(get_config, voucher, True)
+        return self._test_get_known_voucher(get_config, now, voucher, True)
 
-    def _test_get_known_voucher(self, get_config, voucher, redeemed):
+    def _test_get_known_voucher(self, get_config, now, voucher, redeemed):
         """
         Assert that a voucher that is ``PUT`` and then ``GET`` is represented in
         the JSON response.
@@ -612,7 +620,7 @@ class VoucherTests(TestCase):
         """
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, lambda: now)
         agent = RequestTraversalAgent(root)
 
         producer = FileBodyProducer(
@@ -649,15 +657,19 @@ class VoucherTests(TestCase):
                     AfterPreprocessing(
                         json_content,
                         succeeded(
-                            Equals(Voucher(voucher, redeemed=redeemed).marshal()),
+                            Equals(Voucher(
+                                voucher,
+                                created=now,
+                                redeemed=redeemed,
+                            ).marshal()),
                         ),
                     ),
                 ),
             ),
         )
 
-    @given(tahoe_configs(), lists(vouchers(), unique=True))
-    def test_list_vouchers(self, get_config, vouchers):
+    @given(tahoe_configs(), datetimes(), lists(vouchers(), unique=True))
+    def test_list_vouchers(self, get_config, now, vouchers):
         """
         A ``GET`` to the ``VoucherCollection`` itself returns a list of existing
         vouchers.
@@ -668,7 +680,7 @@ class VoucherTests(TestCase):
         # state behind that invalidates future iterations.
         tempdir = self.useFixture(TempDir())
         config = get_config(tempdir.join(b"tahoe"), b"tub.port")
-        root = root_from_config(config)
+        root = root_from_config(config, lambda: now)
         agent = RequestTraversalAgent(root)
 
         note("{} vouchers".format(len(vouchers)))
@@ -705,7 +717,11 @@ class VoucherTests(TestCase):
                         succeeded(
                             Equals({
                                 u"vouchers": list(
-                                    Voucher(voucher, redeemed=True).marshal()
+                                    Voucher(
+                                        voucher,
+                                        created=now,
+                                        redeemed=True,
+                                    ).marshal()
                                     for voucher
                                     in vouchers
                                 ),
diff --git a/src/_zkapauthorizer/tests/test_controller.py b/src/_zkapauthorizer/tests/test_controller.py
index 6001b29..032ed09 100644
--- a/src/_zkapauthorizer/tests/test_controller.py
+++ b/src/_zkapauthorizer/tests/test_controller.py
@@ -58,6 +58,7 @@ from hypothesis import (
 )
 from hypothesis.strategies import (
     integers,
+    datetimes,
 )
 from twisted.python.url import (
     URL,
@@ -116,8 +117,8 @@ class PaymentControllerTests(TestCase):
     """
     Tests for ``PaymentController``.
     """
-    @given(tahoe_configs(), vouchers())
-    def test_not_redeemed_while_redeeming(self, get_config, voucher):
+    @given(tahoe_configs(), datetimes(), vouchers())
+    def test_not_redeemed_while_redeeming(self, get_config, now, voucher):
         """
         A ``Voucher`` is not marked redeemed before ``IRedeemer.redeem``
         completes.
@@ -128,6 +129,7 @@ class PaymentControllerTests(TestCase):
                 tempdir.join(b"node"),
                 b"tub.port",
             ),
+            now=lambda: now,
             connect=memory_connect,
         )
         controller = PaymentController(
@@ -142,14 +144,15 @@ class PaymentControllerTests(TestCase):
             Equals(False),
         )
 
-    @given(tahoe_configs(), vouchers())
-    def test_redeemed_after_redeeming(self, get_config, voucher):
+    @given(tahoe_configs(), datetimes(), vouchers())
+    def test_redeemed_after_redeeming(self, get_config, now, voucher):
         tempdir = self.useFixture(TempDir())
         store = VoucherStore.from_node_config(
             get_config(
                 tempdir.join(b"node"),
                 b"tub.port",
             ),
+            now=lambda: now,
             connect=memory_connect,
         )
         controller = PaymentController(
diff --git a/src/_zkapauthorizer/tests/test_model.py b/src/_zkapauthorizer/tests/test_model.py
index 282e3c3..319b363 100644
--- a/src/_zkapauthorizer/tests/test_model.py
+++ b/src/_zkapauthorizer/tests/test_model.py
@@ -50,6 +50,7 @@ from hypothesis import (
 )
 from hypothesis.strategies import (
     lists,
+    datetimes,
 )
 
 from twisted.python.filepath import (
@@ -93,8 +94,8 @@ class VoucherStoreTests(TestCase):
         )
 
 
-    @given(tahoe_configs(), vouchers())
-    def test_get_missing(self, get_config, voucher):
+    @given(tahoe_configs(), datetimes(), vouchers())
+    def test_get_missing(self, get_config, now, voucher):
         """
         ``VoucherStore.get`` raises ``KeyError`` when called with a
         voucher not previously added to the store.
@@ -103,6 +104,7 @@ class VoucherStoreTests(TestCase):
         config = get_config(tempdir.join(b"node"), b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
         self.assertThat(
@@ -110,8 +112,8 @@ class VoucherStoreTests(TestCase):
             raises(KeyError),
         )
 
-    @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True))
-    def test_add(self, get_config, voucher, tokens):
+    @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True), datetimes())
+    def test_add(self, get_config, voucher, tokens, now):
         """
         ``VoucherStore.get`` returns a ``Voucher`` representing a voucher
         previously added to the store with ``VoucherStore.add``.
@@ -120,6 +122,7 @@ class VoucherStoreTests(TestCase):
         config = get_config(tempdir.join(b"node"), b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
         store.add(voucher, tokens)
@@ -128,11 +131,12 @@ class VoucherStoreTests(TestCase):
             MatchesStructure(
                 number=Equals(voucher),
                 redeemed=Equals(False),
+                created=Equals(now),
             ),
         )
 
-    @given(tahoe_configs(), vouchers(), lists(random_tokens(), unique=True))
-    def test_add_idempotent(self, get_config, voucher, tokens):
+    @given(tahoe_configs(), vouchers(), datetimes(), lists(random_tokens(), unique=True))
+    def test_add_idempotent(self, get_config, voucher, now, tokens):
         """
         More than one call to ``VoucherStore.add`` with the same argument results
         in the same state as a single call.
@@ -141,6 +145,7 @@ class VoucherStoreTests(TestCase):
         config = get_config(tempdir.join(b"node"), b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
         store.add(voucher, tokens)
@@ -149,12 +154,13 @@ class VoucherStoreTests(TestCase):
             store.get(voucher),
             MatchesStructure(
                 number=Equals(voucher),
+                created=Equals(now),
             ),
         )
 
 
-    @given(tahoe_configs(), lists(vouchers(), unique=True))
-    def test_list(self, get_config, vouchers):
+    @given(tahoe_configs(), datetimes(), lists(vouchers(), unique=True))
+    def test_list(self, get_config, now, vouchers):
         """
         ``VoucherStore.list`` returns a ``list`` containing a ``Voucher`` object
         for each voucher previously added.
@@ -164,6 +170,7 @@ class VoucherStoreTests(TestCase):
         config = get_config(nodedir, b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
 
@@ -173,14 +180,14 @@ class VoucherStoreTests(TestCase):
         self.assertThat(
             store.list(),
             Equals(list(
-                Voucher(number)
+                Voucher(number, created=now)
                 for number
                 in vouchers
             )),
         )
 
-    @given(tahoe_configs())
-    def test_uncreateable_store_directory(self, get_config):
+    @given(tahoe_configs(), datetimes())
+    def test_uncreateable_store_directory(self, get_config, now):
         """
         If the underlying directory in the node configuration cannot be created
         then ``VoucherStore.from_node_config`` raises ``StoreOpenError``.
@@ -197,6 +204,7 @@ class VoucherStoreTests(TestCase):
         self.assertThat(
             lambda: VoucherStore.from_node_config(
                 config,
+                lambda: now,
                 memory_connect,
             ),
             Raises(
@@ -218,8 +226,8 @@ class VoucherStoreTests(TestCase):
         )
 
 
-    @given(tahoe_configs())
-    def test_unopenable_store(self, get_config):
+    @given(tahoe_configs(), datetimes())
+    def test_unopenable_store(self, get_config, now):
         """
         If the underlying database file cannot be opened then
         ``VoucherStore.from_node_config`` raises ``StoreOpenError``.
@@ -230,7 +238,7 @@ class VoucherStoreTests(TestCase):
         config = get_config(nodedir, b"tub.port")
 
         # Create the underlying database file.
-        store = VoucherStore.from_node_config(config)
+        store = VoucherStore.from_node_config(config, lambda: now)
 
         # Prevent further access to it.
         store.database_path.chmod(0o000)
@@ -238,6 +246,7 @@ class VoucherStoreTests(TestCase):
         self.assertThat(
             lambda: VoucherStore.from_node_config(
                 config,
+                lambda: now,
             ),
             raises(StoreOpenError),
         )
@@ -263,8 +272,8 @@ class UnblindedTokenStoreTests(TestCase):
     """
     Tests for ``UnblindedToken``-related functionality of ``VoucherStore``.
     """
-    @given(tahoe_configs(), vouchers(), lists(unblinded_tokens(), unique=True))
-    def test_unblinded_tokens_round_trip(self, get_config, voucher_value, tokens):
+    @given(tahoe_configs(), datetimes(), vouchers(), lists(unblinded_tokens(), unique=True))
+    def test_unblinded_tokens_round_trip(self, get_config, now, voucher_value, tokens):
         """
         Unblinded tokens that are added to the store can later be retrieved.
         """
@@ -272,6 +281,7 @@ class UnblindedTokenStoreTests(TestCase):
         config = get_config(tempdir.join(b"node"), b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
         store.insert_unblinded_tokens_for_voucher(voucher_value, tokens)
@@ -282,8 +292,8 @@ class UnblindedTokenStoreTests(TestCase):
         more_unblinded_tokens = store.extract_unblinded_tokens(1)
         self.expectThat([], Equals(more_unblinded_tokens))
 
-    @given(tahoe_configs(), vouchers(), random_tokens(), unblinded_tokens())
-    def test_mark_vouchers_redeemed(self, get_config, voucher_value, token, one_token):
+    @given(tahoe_configs(), datetimes(), vouchers(), random_tokens(), unblinded_tokens())
+    def test_mark_vouchers_redeemed(self, get_config, now, voucher_value, token, one_token):
         """
         The voucher for unblinded tokens that are added to the store is marked as
         redeemed.
@@ -292,6 +302,7 @@ class UnblindedTokenStoreTests(TestCase):
         config = get_config(tempdir.join(b"node"), b"tub.port")
         store = VoucherStore.from_node_config(
             config,
+            lambda: now,
             memory_connect,
         )
         store.add(voucher_value, [token])
diff --git a/src/_zkapauthorizer/tests/test_plugin.py b/src/_zkapauthorizer/tests/test_plugin.py
index ae958bc..9c97ea7 100644
--- a/src/_zkapauthorizer/tests/test_plugin.py
+++ b/src/_zkapauthorizer/tests/test_plugin.py
@@ -52,6 +52,7 @@ from hypothesis import (
 )
 from hypothesis.strategies import (
     just,
+    datetimes,
 )
 from foolscap.broker import (
     Broker,
@@ -97,6 +98,7 @@ from ..controller import (
 from .strategies import (
     minimal_tahoe_configs,
     tahoe_configs,
+    client_dummyredeemer_configurations,
     server_configurations,
     announcements,
     vouchers,
@@ -246,9 +248,7 @@ class ServerPluginTests(TestCase):
         )
 
 
-tahoe_configs_with_dummy_redeemer = minimal_tahoe_configs({
-    u"privatestorageio-zkapauthz-v1": just({u"redeemer": u"dummy"}),
-})
+tahoe_configs_with_dummy_redeemer = tahoe_configs(client_dummyredeemer_configurations())
 
 tahoe_configs_with_mismatched_issuer = minimal_tahoe_configs({
     u"privatestorageio-zkapauthz-v1": just({u"ristretto-issuer-root-url": u"https://another-issuer.example.invalid/"}),
@@ -310,6 +310,7 @@ class ClientPluginTests(TestCase):
 
     @given(
         tahoe_configs_with_dummy_redeemer,
+        datetimes(),
         announcements(),
         vouchers(),
         random_tokens(),
@@ -323,6 +324,7 @@ class ClientPluginTests(TestCase):
     def test_unblinded_tokens_extracted(
             self,
             get_config,
+            now,
             announcement,
             voucher,
             token,
@@ -343,7 +345,7 @@ class ClientPluginTests(TestCase):
             b"tub.port",
         )
 
-        store = VoucherStore.from_node_config(node_config)
+        store = VoucherStore.from_node_config(node_config, lambda: now)
         store.add(voucher, [token])
         store.insert_unblinded_tokens_for_voucher(voucher, [unblinded_token])
 
diff --git a/zkapauthorizer.nix b/zkapauthorizer.nix
index fb54924..77bbf66 100644
--- a/zkapauthorizer.nix
+++ b/zkapauthorizer.nix
@@ -1,5 +1,5 @@
 { buildPythonPackage, sphinx, circleci-cli
-, attrs, zope_interface, twisted, tahoe-lafs, privacypass
+, attrs, zope_interface, aniso8601, twisted, tahoe-lafs, privacypass
 , fixtures, testtools, hypothesis, pyflakes, treq, coverage
 , hypothesisProfile ? null
 , collectCoverage ? false
@@ -27,6 +27,7 @@ buildPythonPackage rec {
   propagatedBuildInputs = [
     attrs
     zope_interface
+    aniso8601
     twisted
     tahoe-lafs
     privacypass
-- 
GitLab