|
1 | | -use base64::engine::general_purpose::URL_SAFE_NO_PAD; |
2 | | -use base64::Engine; |
3 | | -use mockito::Matcher; |
4 | | -use serde_json::json; |
5 | | -use std::collections::HashMap; |
6 | | -use std::time::SystemTime; |
7 | | -use vss_client::headers::LnurlAuthJwt; |
8 | | -use vss_client::headers::VssHeaderProvider; |
| 1 | +#[cfg(feature = "lnurl-auth")] |
| 2 | +mod lnurl_auth_jwt_tests { |
| 3 | + use base64::engine::general_purpose::URL_SAFE_NO_PAD; |
| 4 | + use base64::Engine; |
| 5 | + use mockito::Matcher; |
| 6 | + use serde_json::json; |
| 7 | + use std::collections::HashMap; |
| 8 | + use std::time::SystemTime; |
| 9 | + use vss_client::headers::LnurlAuthJwt; |
| 10 | + use vss_client::headers::VssHeaderProvider; |
9 | 11 |
|
10 | | -const APPLICATION_JSON: &'static str = "application/json"; |
| 12 | + const APPLICATION_JSON: &'static str = "application/json"; |
11 | 13 |
|
12 | | -fn lnurl_auth_response(jwt: &str) -> String { |
13 | | - json!({ |
14 | | - "status": "OK", |
15 | | - "token": jwt, |
16 | | - }) |
17 | | - .to_string() |
18 | | -} |
19 | | - |
20 | | -fn jwt_with_expiry(exp: u64) -> String { |
21 | | - let claims = json!({ |
22 | | - "exp": exp, |
23 | | - }) |
24 | | - .to_string(); |
25 | | - let ignored = URL_SAFE_NO_PAD.encode("ignored"); |
26 | | - let encoded = URL_SAFE_NO_PAD.encode(claims); |
27 | | - format!("{}.{}.{}", ignored, encoded, ignored) |
28 | | -} |
| 14 | + fn lnurl_auth_response(jwt: &str) -> String { |
| 15 | + json!({ |
| 16 | + "status": "OK", |
| 17 | + "token": jwt, |
| 18 | + }) |
| 19 | + .to_string() |
| 20 | + } |
29 | 21 |
|
30 | | -#[tokio::test] |
31 | | -async fn test_lnurl_auth_jwt() { |
32 | | - // Initialize LNURL Auth JWT provider connecting to the mock server. |
33 | | - let addr = mockito::server_address(); |
34 | | - let base_url = format!("http://localhost:{}", addr.port()); |
35 | | - let lnurl_auth_jwt = LnurlAuthJwt::new(&[0; 32], base_url.clone(), HashMap::new()).unwrap(); |
36 | | - { |
37 | | - // First request will be provided with an expired JWT token. |
38 | | - let k1 = "0000000000000000000000000000000000000000000000000000000000000000"; |
39 | | - let expired_jwt = jwt_with_expiry(0); |
40 | | - let lnurl = mockito::mock("GET", "/") |
41 | | - .expect(1) |
42 | | - .with_status(200) |
43 | | - .with_body(format!("{}/verify?tag=login&k1={}", base_url, k1)) |
44 | | - .create(); |
45 | | - let lnurl_verification = mockito::mock("GET", "/verify") |
46 | | - .match_query(Matcher::AllOf(vec![ |
47 | | - Matcher::UrlEncoded("k1".into(), k1.into()), |
48 | | - Matcher::Regex("sig=".into()), |
49 | | - Matcher::Regex("key=".into()), |
50 | | - ])) |
51 | | - .expect(1) |
52 | | - .with_status(200) |
53 | | - .with_header(reqwest::header::CONTENT_TYPE.as_str(), APPLICATION_JSON) |
54 | | - .with_body(lnurl_auth_response(&expired_jwt)) |
55 | | - .create(); |
56 | | - assert_eq!( |
57 | | - lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
58 | | - &format!("Bearer {}", expired_jwt), |
59 | | - ); |
60 | | - lnurl.assert(); |
61 | | - lnurl_verification.assert(); |
| 22 | + fn jwt_with_expiry(exp: u64) -> String { |
| 23 | + let claims = json!({ |
| 24 | + "exp": exp, |
| 25 | + }) |
| 26 | + .to_string(); |
| 27 | + let ignored = URL_SAFE_NO_PAD.encode("ignored"); |
| 28 | + let encoded = URL_SAFE_NO_PAD.encode(claims); |
| 29 | + format!("{}.{}.{}", ignored, encoded, ignored) |
62 | 30 | } |
63 | | - { |
64 | | - // Second request will be provided with a non-expired JWT token. |
65 | | - // This will be cached. |
66 | | - let k1 = "1000000000000000000000000000000000000000000000000000000000000000"; |
67 | | - let valid_jwt = jwt_with_expiry( |
68 | | - SystemTime::now().duration_since(SystemTime::UNIX_EPOCH).unwrap().as_secs() + 60 * 60 * 24 * 365, |
69 | | - ); |
70 | | - let lnurl = mockito::mock("GET", "/") |
71 | | - .expect(1) |
72 | | - .with_status(200) |
73 | | - .with_body(format!("{}/verify?tag=login&k1={}", base_url, k1)) |
74 | | - .create(); |
75 | | - let lnurl_verification = mockito::mock("GET", "/verify") |
76 | | - .match_query(Matcher::AllOf(vec![ |
77 | | - Matcher::UrlEncoded("k1".into(), k1.into()), |
78 | | - Matcher::Regex("sig=".to_string()), |
79 | | - Matcher::Regex("key=".to_string()), |
80 | | - ])) |
81 | | - .expect(1) |
82 | | - .with_status(200) |
83 | | - .with_header(reqwest::header::CONTENT_TYPE.as_str(), APPLICATION_JSON) |
84 | | - .with_body(lnurl_auth_response(&valid_jwt)) |
85 | | - .create(); |
86 | | - assert_eq!( |
87 | | - lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
88 | | - &format!("Bearer {}", valid_jwt), |
89 | | - ); |
90 | | - assert_eq!( |
91 | | - lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
92 | | - &format!("Bearer {}", valid_jwt), |
93 | | - ); |
94 | | - lnurl.assert(); |
95 | | - lnurl_verification.assert(); |
| 31 | + |
| 32 | + #[tokio::test] |
| 33 | + async fn test_lnurl_auth_jwt() { |
| 34 | + // Initialize LNURL Auth JWT provider connecting to the mock server. |
| 35 | + let addr = mockito::server_address(); |
| 36 | + let base_url = format!("http://localhost:{}", addr.port()); |
| 37 | + let lnurl_auth_jwt = LnurlAuthJwt::new(&[0; 32], base_url.clone(), HashMap::new()).unwrap(); |
| 38 | + { |
| 39 | + // First request will be provided with an expired JWT token. |
| 40 | + let k1 = "0000000000000000000000000000000000000000000000000000000000000000"; |
| 41 | + let expired_jwt = jwt_with_expiry(0); |
| 42 | + let lnurl = mockito::mock("GET", "/") |
| 43 | + .expect(1) |
| 44 | + .with_status(200) |
| 45 | + .with_body(format!("{}/verify?tag=login&k1={}", base_url, k1)) |
| 46 | + .create(); |
| 47 | + let lnurl_verification = mockito::mock("GET", "/verify") |
| 48 | + .match_query(Matcher::AllOf(vec![ |
| 49 | + Matcher::UrlEncoded("k1".into(), k1.into()), |
| 50 | + Matcher::Regex("sig=".into()), |
| 51 | + Matcher::Regex("key=".into()), |
| 52 | + ])) |
| 53 | + .expect(1) |
| 54 | + .with_status(200) |
| 55 | + .with_header(reqwest::header::CONTENT_TYPE.as_str(), APPLICATION_JSON) |
| 56 | + .with_body(lnurl_auth_response(&expired_jwt)) |
| 57 | + .create(); |
| 58 | + assert_eq!( |
| 59 | + lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
| 60 | + &format!("Bearer {}", expired_jwt), |
| 61 | + ); |
| 62 | + lnurl.assert(); |
| 63 | + lnurl_verification.assert(); |
| 64 | + } |
| 65 | + { |
| 66 | + // Second request will be provided with a non-expired JWT token. |
| 67 | + // This will be cached. |
| 68 | + let k1 = "1000000000000000000000000000000000000000000000000000000000000000"; |
| 69 | + let valid_jwt = jwt_with_expiry( |
| 70 | + SystemTime::now().duration_since(SystemTime::UNIX_EPOCH).unwrap().as_secs() + 60 * 60 * 24 * 365, |
| 71 | + ); |
| 72 | + let lnurl = mockito::mock("GET", "/") |
| 73 | + .expect(1) |
| 74 | + .with_status(200) |
| 75 | + .with_body(format!("{}/verify?tag=login&k1={}", base_url, k1)) |
| 76 | + .create(); |
| 77 | + let lnurl_verification = mockito::mock("GET", "/verify") |
| 78 | + .match_query(Matcher::AllOf(vec![ |
| 79 | + Matcher::UrlEncoded("k1".into(), k1.into()), |
| 80 | + Matcher::Regex("sig=".to_string()), |
| 81 | + Matcher::Regex("key=".to_string()), |
| 82 | + ])) |
| 83 | + .expect(1) |
| 84 | + .with_status(200) |
| 85 | + .with_header(reqwest::header::CONTENT_TYPE.as_str(), APPLICATION_JSON) |
| 86 | + .with_body(lnurl_auth_response(&valid_jwt)) |
| 87 | + .create(); |
| 88 | + assert_eq!( |
| 89 | + lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
| 90 | + &format!("Bearer {}", valid_jwt), |
| 91 | + ); |
| 92 | + assert_eq!( |
| 93 | + lnurl_auth_jwt.get_headers().await.unwrap().get("authorization").unwrap(), |
| 94 | + &format!("Bearer {}", valid_jwt), |
| 95 | + ); |
| 96 | + lnurl.assert(); |
| 97 | + lnurl_verification.assert(); |
| 98 | + } |
96 | 99 | } |
97 | 100 | } |
0 commit comments