a06c9ec3d81879d7d45ceedb4b93aa96b9c9c994
[akkoma] / test / web / http_sigs / http_sig_test.exs
1 # http signatures
2 # Test data from https://tools.ietf.org/html/draft-cavage-http-signatures-08#appendix-C
3 defmodule Pleroma.Web.HTTPSignaturesTest do
4 use Pleroma.DataCase
5 alias Pleroma.Web.HTTPSignatures
6
7 @private_key (hd(:public_key.pem_decode(File.read!("test/web/http_sigs/priv.key")))
8 |> :public_key.pem_entry_decode())
9
10 @public_key (hd(:public_key.pem_decode(File.read!("test/web/http_sigs/pub.key")))
11 |> :public_key.pem_entry_decode())
12
13 @headers %{
14 "(request-target)" => "post /foo?param=value&pet=dog",
15 "host" => "example.com",
16 "date" => "Thu, 05 Jan 2014 21:31:40 GMT",
17 "content-type" => "application/json",
18 "digest" => "SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=",
19 "content-length" => "18"
20 }
21
22 @body "{\"hello\": \"world\"}"
23
24 @default_signature """
25 keyId="Test",algorithm="rsa-sha256",signature="jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w="
26 """
27
28 test "split up a signature" do
29 expected = %{
30 "keyId" => "Test",
31 "algorithm" => "rsa-sha256",
32 "signature" => "jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w=",
33 "headers" => ["date"]
34 }
35
36 assert HTTPSignatures.split_signature(@default_signature) == expected
37 end
38
39 test "validates the default case" do
40 signature = HTTPSignatures.split_signature(@default_signature)
41 assert HTTPSignatures.validate(@headers, signature, @public_key)
42 end
43
44 test "it contructs a signing string" do
45 expected = "date: Thu, 05 Jan 2014 21:31:40 GMT\ncontent-length: 18"
46 assert expected == HTTPSignatures.build_signing_string(@headers, ["date", "content-length"])
47 end
48 end