summaryrefslogtreecommitdiffhomepage
path: root/packages/server/src
diff options
context:
space:
mode:
Diffstat (limited to 'packages/server/src')
-rw-r--r--packages/server/src/metadata/verifyAttestationWithMetadata.test.ts18
1 files changed, 10 insertions, 8 deletions
diff --git a/packages/server/src/metadata/verifyAttestationWithMetadata.test.ts b/packages/server/src/metadata/verifyAttestationWithMetadata.test.ts
index c846cd4..66f9a64 100644
--- a/packages/server/src/metadata/verifyAttestationWithMetadata.test.ts
+++ b/packages/server/src/metadata/verifyAttestationWithMetadata.test.ts
@@ -1,8 +1,10 @@
+import { assertEquals } from "https://deno.land/std@0.198.0/assert/mod.ts";
+
import { verifyAttestationWithMetadata } from "./verifyAttestationWithMetadata.ts";
import { MetadataStatement } from "../metadata/mdsTypes.ts";
import { isoBase64URL } from "../helpers/iso/index.ts";
-test("should verify attestation with metadata (android-safetynet)", async () => {
+Deno.test("should verify attestation with metadata (android-safetynet)", async () => {
const metadataStatementJSONSafetyNet: MetadataStatement = {
legalHeader:
"https://fidoalliance.org/metadata/metadata-statement-legal-header/",
@@ -54,10 +56,10 @@ test("should verify attestation with metadata (android-safetynet)", async () =>
x5c,
});
- expect(verified).toEqual(true);
+ assertEquals(verified, true);
});
-test("should verify attestation with rsa_emsa_pkcs1_sha256_raw authenticator algorithm in metadata", async () => {
+Deno.test("should verify attestation with rsa_emsa_pkcs1_sha256_raw authenticator algorithm in metadata", async () => {
const metadataStatement: MetadataStatement = {
legalHeader:
"https://fidoalliance.org/metadata/metadata-statement-legal-header/",
@@ -107,10 +109,10 @@ test("should verify attestation with rsa_emsa_pkcs1_sha256_raw authenticator alg
x5c,
});
- expect(verified).toEqual(true);
+ assertEquals(verified, true);
});
-test("should not validate certificate path when authenticator is self-referencing its attestation statement certificates", async () => {
+Deno.test("should not validate certificate path when authenticator is self-referencing its attestation statement certificates", async () => {
const metadataStatement: MetadataStatement = {
legalHeader:
"https://fidoalliance.org/metadata/metadata-statement-legal-header/",
@@ -176,10 +178,10 @@ test("should not validate certificate path when authenticator is self-referencin
x5c,
});
- expect(verified).toEqual(true);
+ assertEquals(verified, true);
});
-test("should verify idmelon attestation with updated root certificate", async () => {
+Deno.test("should verify idmelon attestation with updated root certificate", async () => {
/**
* See https://github.com/MasterKale/SimpleWebAuthn/issues/302 for more context, basically
* IDmelon's root cert in FIDO MDS was missing an extension. I worked with IDmelon to generate a
@@ -241,5 +243,5 @@ test("should verify idmelon attestation with updated root certificate", async ()
x5c,
});
- expect(verified).toEqual(true);
+ assertEquals(verified, true);
});