1 {-#LANGUAGE OverloadedStrings#-}
4 import Data.ByteString (ByteString)
5 import qualified Data.ByteString as B
10 import Test.Tasty.HUnit
12 import qualified Crypto.Macaroon.Tests
13 import qualified Crypto.Macaroon.Serializer.Base64.Tests
15 main = defaultMain tests
18 tests = testGroup "Tests" [ sanityCheck
19 , Crypto.Macaroon.Tests.tests
20 , Crypto.Macaroon.Serializer.Base64.Tests.tests
23 sanityCheck :: TestTree
24 sanityCheck = testGroup "Python HMAC Sanity check" [ checkKey
33 secret = "this is our super secret key; only we should know it"
36 public = "we used our secret key"
39 key = B.take 32 secret
42 mac1 = toBytes $ (hmac key public :: HMAC SHA256)
45 mac2 = toBytes $ (hmac mac1 "account = 3735928559" :: HMAC SHA256)
48 mac3 = toBytes $ (hmac mac2 "time < 2015-01-01T00:00" :: HMAC SHA256)
51 mac4 = toBytes $ (hmac mac3 "email = alice@example.org" :: HMAC SHA256)
54 checkKey = testCase "Truncated key" $
55 key @?= "this is our super secret key; on"
57 checkMac1 = testCase "HMAC key" $
58 "C60B4B3540BB1B2F2EF28D1C895691CC4A5E07A38A9D3B1C3379FB485293372F" @=? hex mac1
60 checkMac2 = testCase "HMAC key account" $
61 "5C933DC9A7D036DFCD1740B4F26D737397A1FF635EAC900F3226973503CAAAA5" @=? hex mac2
63 checkMac3 = testCase "HMAC key account time" $
64 "7A559B20C8B607009EBCE138C200585E9D0DECA6D23B3EAD6C5E0BA6861D3858" @=? hex mac3
66 checkMac4 = testCase "HMAC key account time email" $
67 "E42BBB02A9A5A303483CB6295C497AE51AD1D5CB10003CBE548D907E7E62F5E4" @=? hex mac4