1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-22 07:28:10 +00:00

tests: fix relative imports

This commit is contained in:
matejcik 2019-09-11 14:43:32 +02:00
parent e3ceef2af6
commit e89a913b1b
68 changed files with 73 additions and 73 deletions

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import debuglink, messages
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.skip_t2

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib.cardano import get_address
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib.cardano import get_address
from trezorlib.tools import parse_path
from .common import MNEMONIC_SHAMIR_20_3of6
from ..common import MNEMONIC_SHAMIR_20_3of6
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib.cardano import get_public_key
from trezorlib.tools import parse_path
from .common import MNEMONIC_SHAMIR_20_3of6
from ..common import MNEMONIC_SHAMIR_20_3of6
@pytest.mark.altcoin

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import cardano, messages
from .common import MNEMONIC_SHAMIR_20_3of6
from ..common import MNEMONIC_SHAMIR_20_3of6
PROTOCOL_MAGICS = {"mainnet": 764824073, "testnet": 1097911063}

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import messages as proto
from .common import MNEMONIC12
from ..common import MNEMONIC12
PIN4 = "1234"
PIN6 = "789456"

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import misc
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgCipherkeyvalue:

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib.eos import get_public_key
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -20,7 +20,7 @@ from trezorlib import eos
from trezorlib.messages import EosSignedTx
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
CHAIN_ID = "cf057bbfb72640471fd910bcb67639c22df9f92470936cddc1ade0e2f2e7dc4f"
ADDRESS_N = parse_path("m/44'/194'/0'/0/0")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import ethereum
from trezorlib.tools import H_
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import ethereum
from trezorlib.tools import H_
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import ethereum
from trezorlib.tools import H_
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -20,7 +20,7 @@ from trezorlib import ethereum, messages
from trezorlib.exceptions import TrezorFailure
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
TO_ADDR = "0x1d1c328764a41bda0492b66baa30c4a339ff85ef"

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, ckd_public as bip32, messages as proto
from trezorlib.tools import H_, CallException, parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
def getmultisig(chain, nr, xpubs, signatures=[b"", b"", b""]):

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import btc, ckd_public as bip32, messages as proto
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgGetaddressShow:

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import messages as proto, misc
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgGetECDHSessionKey:

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, ckd_public as bip32, messages as proto
from trezorlib.tools import H_
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgGetpublickey:

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc
from trezorlib.tools import H_, CallException
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgGetpublickeyCurve:

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import lisk
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
LISK_PATH = parse_path("m/44h/134h/0h/1h")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import lisk
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
LISK_PATH = parse_path("m/44h/134h/0h/0h")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import lisk
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
LISK_PATH = parse_path("m/44h/134h/0h/0h")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, debuglink, device
from trezorlib.messages.PassphraseSourceType import HOST as PASSPHRASE_ON_HOST
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.setup_client(uninitialized=True)

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import monero
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import monero
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import nem
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import nem
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
# assertion data from T1

View File

@ -20,7 +20,7 @@ from trezorlib import messages as proto, nem
from trezorlib.messages import ButtonRequestType as B
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
# assertion data from T1

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import nem
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
# assertion data from T1

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import nem
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
# assertion data from T1

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import messages as proto, nem
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
# assertion data from T1

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import device, messages as proto
from .common import MNEMONIC12
from ..common import MNEMONIC12
PIN4 = "1234"
PIN6 = "789456"

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import messages as proto
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.skip_t2

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import device, exceptions, messages
from .common import MNEMONIC_SHAMIR_20_3of6, recovery_enter_shares
from ..common import MNEMONIC_SHAMIR_20_3of6, recovery_enter_shares
pytestmark = pytest.mark.skip_t1

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import device, messages
from trezorlib.exceptions import TrezorFailure
from .common import recovery_enter_shares
from ..common import recovery_enter_shares
pytestmark = pytest.mark.skip_t1

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import device, exceptions, messages
from .common import MNEMONIC_SHAMIR_20_2of3_2of3_GROUPS, recovery_enter_shares
from ..common import MNEMONIC_SHAMIR_20_2of3_2of3_GROUPS, recovery_enter_shares
pytestmark = pytest.mark.skip_t1

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import device, messages
from trezorlib.exceptions import TrezorFailure
from .common import MNEMONIC_SHAMIR_20_2of3_2of3_GROUPS, recovery_enter_shares
from ..common import MNEMONIC_SHAMIR_20_2of3_2of3_GROUPS, recovery_enter_shares
pytestmark = pytest.mark.skip_t1

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import device, messages as proto
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.skip_t1

View File

@ -19,7 +19,7 @@ from mnemonic import Mnemonic
from trezorlib import device, messages as proto
from .common import generate_entropy
from ..common import generate_entropy
@pytest.mark.skip_t2

View File

@ -24,7 +24,7 @@ from shamir_mnemonic import MnemonicError
from trezorlib import device, messages as proto
from trezorlib.messages import ButtonRequestType as B, ResetDeviceBackupType
from .common import click_through, generate_entropy, read_and_confirm_mnemonic
from ..common import click_through, generate_entropy, read_and_confirm_mnemonic
EXTERNAL_ENTROPY = b"zlutoucky kun upel divoke ody" * 2

View File

@ -19,7 +19,7 @@ from mnemonic import Mnemonic
from trezorlib import messages as proto
from .common import generate_entropy
from ..common import generate_entropy
@pytest.mark.skip_t2

View File

@ -22,7 +22,7 @@ import shamir_mnemonic as shamir
from trezorlib import device, messages as proto
from trezorlib.messages import ButtonRequestType as B, ResetDeviceBackupType
from .common import click_through, generate_entropy, read_and_confirm_mnemonic
from ..common import click_through, generate_entropy, read_and_confirm_mnemonic
EXTERNAL_ENTROPY = b"zlutoucky kun upel divoke ody" * 2

View File

@ -22,7 +22,7 @@ from mnemonic import Mnemonic
from trezorlib import device, messages as proto
from trezorlib.messages import ButtonRequestType as B
from .common import (
from ..common import (
MNEMONIC12,
click_through,
generate_entropy,

View File

@ -21,7 +21,7 @@ import pytest
from trezorlib import messages as proto, misc
from trezorlib.tools import H_
from .common import MNEMONIC12
from ..common import MNEMONIC12
def check_path(identity):

View File

@ -21,7 +21,7 @@ import pytest
from trezorlib import btc
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgSignmessage:

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -21,7 +21,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgSignmessageSegwit:

View File

@ -21,7 +21,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
class TestMsgSignmessageSegwitNative:

View File

@ -19,8 +19,8 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import H_, CallException, btc_hash, parse_path
from .common import MNEMONIC12
from .tx_cache import tx_cache
from ..common import MNEMONIC12
from ..tx_cache import tx_cache
TXHASH_157041 = bytes.fromhex(
"1570416eb4302cf52979afd5e6909e37d8fdd874301f7cc87e547e509cb1caa6"

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import H_, CallException, parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Bcash")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import H_, CallException, parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Bgold")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TXHASH_3bf506 = bytes.fromhex(
"3bf506c81ce84eda891679ddc797d162c17c60b15d6c0ac23be5e31369e7235f"

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Dash")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Decred Testnet")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Groestlcoin")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
# KMD has no usable backends, use cached TX only
TX_API = tx_cache("Komodo", allow_fetch=False)

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import H_, CallException, parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Testnet")

View File

@ -18,7 +18,7 @@ from trezorlib import btc, messages as proto
from trezorlib.ckd_public import deserialize
from trezorlib.tools import H_, parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Testnet")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Zcash Testnet")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import messages as proto, stellar
from trezorlib.tools import CallException, parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -53,7 +53,7 @@ import pytest
from trezorlib import messages as proto, stellar
from trezorlib.tools import parse_path
from .common import MNEMONIC12
from ..common import MNEMONIC12
@pytest.mark.altcoin

View File

@ -19,8 +19,8 @@ import pytest
from trezorlib import btc, ckd_public as bip32, messages as proto
from trezorlib.tools import CallException, parse_path
from .common import MNEMONIC12
from .tx_cache import tx_cache
from ..common import MNEMONIC12
from ..tx_cache import tx_cache
TX_API = tx_cache("Bitcoin")

View File

@ -19,8 +19,8 @@ import pytest
from trezorlib import btc, ckd_public as bip32, messages as proto
from trezorlib.tools import H_, parse_path
from .common import MNEMONIC12
from .tx_cache import tx_cache
from ..common import MNEMONIC12
from ..tx_cache import tx_cache
TX_API = tx_cache("Testnet")

View File

@ -19,7 +19,7 @@ import pytest
from trezorlib import btc, messages as proto
from trezorlib.tools import CallException, parse_path
from .tx_cache import tx_cache
from ..tx_cache import tx_cache
TX_API = tx_cache("Bitcoin")

View File

@ -19,8 +19,8 @@ import pytest
from trezorlib import btc, debuglink, device, messages as proto, misc
from trezorlib.exceptions import TrezorFailure
from .common import MNEMONIC12
from .tx_cache import tx_cache
from ..common import MNEMONIC12
from ..tx_cache import tx_cache
TXHASH_d5f65e = bytes.fromhex(
"d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882"

View File

@ -18,7 +18,7 @@ import pytest
from trezorlib import btc
from .common import MNEMONIC_SHAMIR_20_3of6
from ..common import MNEMONIC_SHAMIR_20_3of6
@pytest.mark.setup_client(mnemonic=MNEMONIC_SHAMIR_20_3of6, passphrase=True)

View File

@ -22,7 +22,7 @@ from trezorlib import btc, device, messages
from trezorlib.messages import ButtonRequestType as B, ResetDeviceBackupType
from trezorlib.tools import parse_path
from .common import click_through, read_and_confirm_mnemonic, recovery_enter_shares
from ..common import click_through, read_and_confirm_mnemonic, recovery_enter_shares
@pytest.mark.skip_t1

View File

@ -20,7 +20,7 @@ from trezorlib import btc, device, messages
from trezorlib.messages import ButtonRequestType as B, ResetDeviceBackupType
from trezorlib.tools import parse_path
from .common import click_through, read_and_confirm_mnemonic, recovery_enter_shares
from ..common import click_through, read_and_confirm_mnemonic, recovery_enter_shares
@pytest.mark.skip_t1

View File

@ -18,8 +18,8 @@ import pytest
from trezorlib import btc, messages as proto
from .common import MNEMONIC12
from .tx_cache import tx_cache
from ..common import MNEMONIC12
from ..tx_cache import tx_cache
TXHASH_d5f65e = bytes.fromhex(
"d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882"