@@ -6,15 +6,8 @@ use wasm_bindgen_test::wasm_bindgen_test;
6
6
use jsonwebtoken:: errors:: ErrorKind ;
7
7
use jsonwebtoken:: jwk:: Jwk ;
8
8
use jsonwebtoken:: {
9
- // crypto::{sign, verify},
10
- decode,
11
- decode_header,
12
- encode,
13
- Algorithm ,
14
- DecodingKey ,
15
- EncodingKey ,
16
- Header ,
17
- Validation ,
9
+ crypto:: { sign, verify} ,
10
+ decode, decode_header, encode, Algorithm , DecodingKey , EncodingKey , Header , Validation ,
18
11
} ;
19
12
20
13
#[ derive( Debug , PartialEq , Eq , Clone , Serialize , Deserialize ) ]
@@ -24,23 +17,23 @@ pub struct Claims {
24
17
exp : i64 ,
25
18
}
26
19
27
- // #[test]
28
- // #[wasm_bindgen_test]
29
- // fn sign_hs256() {
30
- // let result =
31
- // sign(b"hello world", &EncodingKey::from_secret(b"secret"), Algorithm::HS256).unwrap();
32
- // let expected = "c0zGLzKEFWj0VxWuufTXiRMk5tlI5MbGDAYhzaxIYjo";
33
- // assert_eq!(result, expected);
34
- // }
20
+ #[ test]
21
+ #[ wasm_bindgen_test]
22
+ fn sign_hs256 ( ) {
23
+ let result =
24
+ sign ( b"hello world" , & EncodingKey :: from_secret ( b"secret" ) , Algorithm :: HS256 ) . unwrap ( ) ;
25
+ let expected = "c0zGLzKEFWj0VxWuufTXiRMk5tlI5MbGDAYhzaxIYjo" ;
26
+ assert_eq ! ( result, expected) ;
27
+ }
35
28
36
- // #[test]
37
- // #[wasm_bindgen_test]
38
- // fn verify_hs256() {
39
- // let sig = "c0zGLzKEFWj0VxWuufTXiRMk5tlI5MbGDAYhzaxIYjo";
40
- // let valid = verify(sig, b"hello world", &DecodingKey::from_secret(b"secret"), Algorithm::HS256)
41
- // .unwrap();
42
- // assert!(valid);
43
- // }
29
+ #[ test]
30
+ #[ wasm_bindgen_test]
31
+ fn verify_hs256 ( ) {
32
+ let sig = "c0zGLzKEFWj0VxWuufTXiRMk5tlI5MbGDAYhzaxIYjo" ;
33
+ let valid = verify ( sig, b"hello world" , & DecodingKey :: from_secret ( b"secret" ) , Algorithm :: HS256 )
34
+ . unwrap ( ) ;
35
+ assert ! ( valid) ;
36
+ }
44
37
45
38
#[ test]
46
39
#[ wasm_bindgen_test]
0 commit comments