summaryrefslogtreecommitdiff
path: root/webhook/src/handler/tests/signature.rs
diff options
context:
space:
mode:
authorMatthieu <matthieu@developershouse.xyz>2021-10-13 13:09:35 +0400
committerMatthieu <matthieu@developershouse.xyz>2021-10-13 13:09:35 +0400
commit1a10e1778ce34d704545433f6f462f72e4b905dd (patch)
tree15e0701c3167f82212a824da0de61eadf5acf386 /webhook/src/handler/tests/signature.rs
parentf74b150c5aea3bb8c4fdcda19554a5ef1eecf726 (diff)
add more tests for the webhook
Diffstat (limited to 'webhook/src/handler/tests/signature.rs')
-rw-r--r--webhook/src/handler/tests/signature.rs30
1 files changed, 30 insertions, 0 deletions
diff --git a/webhook/src/handler/tests/signature.rs b/webhook/src/handler/tests/signature.rs
new file mode 100644
index 0000000..475e446
--- /dev/null
+++ b/webhook/src/handler/tests/signature.rs
@@ -0,0 +1,30 @@
+use crate::handler::signature::validate_signature;
+
+
+#[test]
+fn validate_signature_test() {
+ let signature = "543ec3547d57f9ddb1ec4c5c36503ebf288ffda3da3d510764c9a49c2abb57690ef974c63d174771bdd2481de1066966f57abbec12a3ec171b9f6e2373837002";
+ let public_key = "eefe0c24473737cb2035232e3b4eb91c206f0a14684168f3503f7d8316058d6f";
+ let content = "message de test incroyable".as_bytes().to_vec();
+ assert!(validate_signature(public_key, &content, signature))
+}
+
+#[test]
+fn validate_signature_reverse_test() {
+ let signature = "543ec3547d57f9ddb1ec4c5c36503ebf288ffda3da3d510764c9a49c2abb57690ef974c63d174771bdd2481de1066966f57abbec12a3ec171b9f6e2373837002";
+ let public_key = "c029eea18437292c87c62aec34e7d1bd4e38fe6126f3f7c446de6375dc666044";
+ let content = "ceci est un test qui ne fonctionnera pas!"
+ .as_bytes()
+ .to_vec();
+ assert!(!validate_signature(public_key, &content, signature))
+}
+
+#[test]
+fn invalid_hex() {
+ let signature = "zzz";
+ let public_key = "zzz";
+ let content = "ceci est un test qui ne fonctionnera pas!"
+ .as_bytes()
+ .to_vec();
+ assert!(!validate_signature(public_key, &content, signature))
+} \ No newline at end of file