Skip to content

Commit

Permalink
fix verifiable credentials status tests
Browse files Browse the repository at this point in the history
  • Loading branch information
patatoid committed Jan 26, 2025
1 parent eb38c95 commit ba14c59
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 16 deletions.
2 changes: 1 addition & 1 deletion lib/boruta/adapters/issuer-coordinator/signatures.ex
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ defmodule Boruta.IssuerCoordinator.Signatures do
)
|> Finch.request(OpenIDHttpClient) do
{:ok, %Finch.Response{status: 200, body: credential}} ->
{:ok, credential}
credential

_ ->
{:error, "Could not sign with universal key."}
Expand Down
30 changes: 15 additions & 15 deletions test/boruta/openid/verifiable_credentials_test.exs
Original file line number Diff line number Diff line change
Expand Up @@ -399,12 +399,12 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
|> String.split("~")
|> List.last()

VerifiableCredentials.verify_salt(token.client.private_key, valid_salt)
VerifiableCredentials.Status.verify_status_token(token.client.private_key, valid_salt)

assert valid_salt_key ==
VerifiableCredentials.Hotp.generate_hotp(
token.client.private_key,
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.shift(:valid)
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.Status.shift(:valid)
)

suspended_salt =
Expand All @@ -419,12 +419,12 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
|> String.split("~")
|> List.last()

VerifiableCredentials.verify_salt(token.client.private_key, suspended_salt)
VerifiableCredentials.Status.verify_status_token(token.client.private_key, suspended_salt)

assert suspended_salt_key ==
VerifiableCredentials.Hotp.generate_hotp(
token.client.private_key,
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.shift(:suspended)
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.Status.shift(:suspended)
)
end

Expand Down Expand Up @@ -486,7 +486,7 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
assert suspended_salt_key ==
VerifiableCredentials.Hotp.generate_hotp(
token.client.private_key,
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.shift(:suspended)
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.Status.shift(:suspended)
)
end

Expand Down Expand Up @@ -548,7 +548,7 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
assert revoked_salt_key ==
VerifiableCredentials.Hotp.generate_hotp(
token.client.private_key,
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.shift(:revoked)
div(:os.system_time(:seconds), 3600) + VerifiableCredentials.Status.shift(:revoked)
)
end

Expand Down Expand Up @@ -639,10 +639,10 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
assert String.split(salt, "~") |> List.last() ==
VerifiableCredentials.Hotp.generate_hotp(
secret,
div(:os.system_time(:seconds), expiration) + VerifiableCredentials.shift(:valid)
div(:os.system_time(:seconds), expiration) + VerifiableCredentials.Status.shift(:valid)
)

assert VerifiableCredentials.verify_salt(secret, salt) == :valid
assert VerifiableCredentials.Status.verify_status_token(secret, salt) == :valid
end

test "generate a valid salt" do
Expand All @@ -654,10 +654,10 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
assert String.split(salt, "~") |> List.last() ==
VerifiableCredentials.Hotp.generate_hotp(
secret,
div(:os.system_time(:seconds), expiration) + VerifiableCredentials.shift(:valid)
div(:os.system_time(:seconds), expiration) + VerifiableCredentials.Status.shift(:valid)
)

assert VerifiableCredentials.verify_salt(secret, salt) == :valid
assert VerifiableCredentials.Status.verify_status_token(secret, salt) == :valid
end

test "generate a thousand salt" do
Expand All @@ -669,7 +669,7 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
status = Enum.random(statuses)
expiration = Enum.random(1..3600)

assert salt = VerifiableCredentials.generate_sd_salt(secret, expiration, status)
assert salt = VerifiableCredentials.Status.generate_status_token(secret, expiration, status)
{status, salt}
end)

Expand All @@ -690,10 +690,10 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
VerifiableCredentials.Hotp.generate_hotp(
secret,
div(:os.system_time(:seconds), expiration) +
VerifiableCredentials.shift(:revoked)
VerifiableCredentials.Status.shift(:revoked)
)

assert VerifiableCredentials.verify_salt(secret, salt) == :revoked
assert VerifiableCredentials.Status.verify_status_token(secret, salt) == :revoked
end

test "generate a suspended salt" do
Expand All @@ -706,10 +706,10 @@ defmodule Boruta.Openid.VerifiableCredentialsTest do
VerifiableCredentials.Hotp.generate_hotp(
secret,
div(:os.system_time(:seconds), expiration) +
VerifiableCredentials.shift(:suspended)
VerifiableCredentials.Status.shift(:suspended)
)

assert VerifiableCredentials.verify_salt(secret, salt) == :suspended
assert VerifiableCredentials.Status.verify_status_token(secret, salt) == :suspended
end
end

Expand Down

0 comments on commit ba14c59

Please sign in to comment.