sal-modular/sigsocket_client/tests/integration_test.rs
Sameh Abouel-saad 9f143ded9d Implement native and WASM WebSocket client for sigsocket communication
- Added `NativeClient` for non-WASM environments with automatic reconnection and message handling.
- Introduced `WasmClient` for WASM environments, supporting WebSocket communication and reconnection logic.
- Created protocol definitions for `SignRequest` and `SignResponse` with serialization and deserialization.
- Developed integration tests for the client functionality and sign request handling.
- Implemented WASM-specific tests to ensure compatibility and functionality in browser environments.
2025-06-04 13:03:15 +03:00

163 lines
5.3 KiB
Rust

//! Integration tests for sigsocket_client
use sigsocket_client::{SigSocketClient, SignRequest, SignResponse, SignRequestHandler, Result, SigSocketError};
/// Test sign request handler
struct TestSignHandler {
should_approve: bool,
}
impl TestSignHandler {
fn new(should_approve: bool) -> Self {
Self { should_approve }
}
}
impl SignRequestHandler for TestSignHandler {
fn handle_sign_request(&self, request: &SignRequest) -> Result<Vec<u8>> {
if self.should_approve {
// Create a test signature
let signature = format!("test_signature_for_{}", request.id);
Ok(signature.into_bytes())
} else {
Err(SigSocketError::Other("User rejected request".to_string()))
}
}
}
#[test]
fn test_sign_request_creation() {
let request = SignRequest::new("test-123", "dGVzdCBtZXNzYWdl");
assert_eq!(request.id, "test-123");
assert_eq!(request.message, "dGVzdCBtZXNzYWdl");
}
#[test]
fn test_sign_request_message_decoding() {
let request = SignRequest::new("test-123", "dGVzdCBtZXNzYWdl"); // "test message" in base64
let bytes = request.message_bytes().unwrap();
assert_eq!(bytes, b"test message");
let hex = request.message_hex().unwrap();
assert_eq!(hex, hex::encode(b"test message"));
}
#[test]
fn test_sign_response_creation() {
let response = SignResponse::new("test-123", "dGVzdCBtZXNzYWdl", "c2lnbmF0dXJl");
assert_eq!(response.id, "test-123");
assert_eq!(response.message, "dGVzdCBtZXNzYWdl");
assert_eq!(response.signature, "c2lnbmF0dXJl");
}
#[test]
fn test_sign_response_from_request() {
let request = SignRequest::new("test-123", "dGVzdCBtZXNzYWdl");
let signature = b"test_signature";
let response = SignResponse::from_request_and_signature(&request, signature);
assert_eq!(response.id, request.id);
assert_eq!(response.message, request.message);
assert_eq!(response.signature_bytes().unwrap(), signature);
}
#[test]
fn test_protocol_serialization() {
// Test SignRequest serialization
let request = SignRequest::new("req-456", "SGVsbG8gV29ybGQ="); // "Hello World" in base64
let json = serde_json::to_string(&request).unwrap();
let deserialized: SignRequest = serde_json::from_str(&json).unwrap();
assert_eq!(request, deserialized);
// Test SignResponse serialization
let response = SignResponse::new("req-456", "SGVsbG8gV29ybGQ=", "c2lnbmF0dXJlXzEyMw==");
let json = serde_json::to_string(&response).unwrap();
let deserialized: SignResponse = serde_json::from_str(&json).unwrap();
assert_eq!(response, deserialized);
}
#[test]
fn test_client_creation() {
let public_key = hex::decode("02f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9")
.unwrap();
let client = SigSocketClient::new("ws://localhost:8080/ws", public_key.clone()).unwrap();
assert_eq!(client.url(), "ws://localhost:8080/ws");
assert_eq!(client.public_key_hex(), hex::encode(&public_key));
assert!(!client.is_connected());
}
#[test]
fn test_client_invalid_url() {
let public_key = vec![1, 2, 3];
let result = SigSocketClient::new("invalid-url", public_key);
assert!(result.is_err());
}
#[test]
fn test_client_empty_public_key() {
let result = SigSocketClient::new("ws://localhost:8080/ws", vec![]);
assert!(result.is_err());
if let Err(error) = result {
assert!(matches!(error, SigSocketError::InvalidPublicKey(_)));
}
}
#[test]
fn test_sign_handler_approval() {
let handler = TestSignHandler::new(true);
let request = SignRequest::new("test-789", "dGVzdA==");
let result = handler.handle_sign_request(&request);
assert!(result.is_ok());
let signature = result.unwrap();
assert_eq!(signature, b"test_signature_for_test-789");
}
#[test]
fn test_sign_handler_rejection() {
let handler = TestSignHandler::new(false);
let request = SignRequest::new("test-789", "dGVzdA==");
let result = handler.handle_sign_request(&request);
assert!(result.is_err());
assert!(matches!(result.unwrap_err(), SigSocketError::Other(_)));
}
#[test]
fn test_error_display() {
let error = SigSocketError::NotConnected;
assert_eq!(error.to_string(), "Client is not connected");
let error = SigSocketError::Connection("test error".to_string());
assert_eq!(error.to_string(), "Connection error: test error");
}
// Test that demonstrates the expected usage pattern
#[test]
fn test_usage_pattern() {
// 1. Create client
let public_key = hex::decode("02f9308a019258c31049344f85f89d5229b531c845836f99b08601f113bce036f9")
.unwrap();
let mut client = SigSocketClient::new("ws://localhost:8080/ws", public_key).unwrap();
// 2. Set handler
client.set_sign_handler(TestSignHandler::new(true));
// 3. Verify state
assert!(!client.is_connected());
// 4. Create a test request/response cycle
let request = SignRequest::new("test-request", "dGVzdCBtZXNzYWdl");
let handler = TestSignHandler::new(true);
let signature = handler.handle_sign_request(&request).unwrap();
let response = SignResponse::from_request_and_signature(&request, &signature);
// 5. Verify the response
assert_eq!(response.id, request.id);
assert_eq!(response.message, request.message);
assert_eq!(response.signature_bytes().unwrap(), signature);
}