@@ -5,7 +5,7 @@ use common::{create_service_and_client_nodes, get_lsps_message};
5
5
6
6
use lightning:: util:: hash_tables:: HashSet ;
7
7
use lightning_liquidity:: events:: LiquidityEvent ;
8
- use lightning_liquidity:: lsps0:: ser:: LSPSRequestId ;
8
+ use lightning_liquidity:: lsps0:: ser:: { LSPSDateTime , LSPSRequestId } ;
9
9
use lightning_liquidity:: lsps5:: client:: LSPS5ClientConfig ;
10
10
use lightning_liquidity:: lsps5:: event:: { LSPS5ClientEvent , LSPS5ServiceEvent } ;
11
11
use lightning_liquidity:: lsps5:: msgs:: WebhookNotificationMethod ;
@@ -70,7 +70,9 @@ impl HttpClient for MockHttpClientWrapper {
70
70
71
71
#[ test]
72
72
fn webhook_registration_flow ( ) {
73
- let lsps5_service_config: LSPS5ServiceConfig = LSPS5ServiceConfig :: default ( ) ;
73
+ let mock_client = Arc :: new ( MockHttpClient :: new ( true ) ) ;
74
+ let mut lsps5_service_config: LSPS5ServiceConfig = LSPS5ServiceConfig :: default ( ) ;
75
+ lsps5_service_config = lsps5_service_config. with_http_client ( MockHttpClientWrapper ( mock_client) ) ;
74
76
let service_config = LiquidityServiceConfig {
75
77
#[ cfg( lsps1_service) ]
76
78
lsps1_service_config : None ,
@@ -147,6 +149,8 @@ fn webhook_registration_flow() {
147
149
_ => panic ! ( "Unexpected event" ) ,
148
150
}
149
151
152
+ service_node. liquidity_manager . next_event ( ) . unwrap ( ) ; // Skip the WebhookNotificationSent event
153
+
150
154
// Test list_webhooks - now capture the request ID
151
155
let list_request_id = client_handler. list_webhooks ( service_node_id)
152
156
. expect ( "Failed to send list_webhooks request" ) ;
@@ -238,6 +242,8 @@ fn webhook_registration_flow() {
238
242
_ => panic ! ( "Unexpected event" ) ,
239
243
}
240
244
245
+ service_node. liquidity_manager . next_event ( ) . unwrap ( ) ; // Skip the WebhookNotificationSent event
246
+
241
247
// Test remove_webhook - now capture the request ID
242
248
let remove_request_id = client_handler. remove_webhook ( service_node_id, app_name. to_string ( ) )
243
249
. expect ( "Failed to send remove_webhook request" ) ;
@@ -278,7 +284,9 @@ fn webhook_registration_flow() {
278
284
279
285
#[ test]
280
286
fn webhook_error_handling_test ( ) {
281
- let lsps5_service_config: LSPS5ServiceConfig = LSPS5ServiceConfig :: default ( ) ;
287
+ let mock_client = Arc :: new ( MockHttpClient :: new ( true ) ) ;
288
+ let mut lsps5_service_config: LSPS5ServiceConfig = LSPS5ServiceConfig :: default ( ) ;
289
+ lsps5_service_config = lsps5_service_config. with_http_client ( MockHttpClientWrapper ( mock_client) ) ;
282
290
let service_config = LiquidityServiceConfig {
283
291
#[ cfg( lsps1_service) ]
284
292
lsps1_service_config : None ,
@@ -439,7 +447,6 @@ fn webhook_notification_delivery_test() {
439
447
let mock_client = Arc :: new ( MockHttpClient :: new ( true ) ) ;
440
448
let mock_client_for_verification = mock_client. clone ( ) ;
441
449
442
-
443
450
let signing_key = SecretKey :: from_slice ( & [ 42 ; 32 ] ) . unwrap ( ) ;
444
451
445
452
let mut lsps5_service_config = LSPS5ServiceConfig :: default ( ) ;
@@ -818,7 +825,7 @@ fn unknown_method_and_malformed_notification_test() {
818
825
819
826
// Test Case 1: Unknown notification method
820
827
// Spec: "Notification delivery services MUST ignore any notification method it does not recognize."
821
- let timestamp1 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
828
+ let timestamp1 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
822
829
let unknown_notification = create_notification ( "lsps5.unknown_method" , json ! ( { "some" : "data" } ) ) ;
823
830
let body1 = unknown_notification. to_string ( ) ;
824
831
let signature1 = sign_notification_with_key ( & body1, & timestamp1) ;
@@ -842,7 +849,7 @@ fn unknown_method_and_malformed_notification_test() {
842
849
// Missing required jsonrpc field
843
850
} ) . to_string ( ) ;
844
851
845
- let timestamp2 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
852
+ let timestamp2 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
846
853
let signature2 = sign_notification_with_key ( & invalid_jsonrpc, & timestamp2) ;
847
854
848
855
let invalid_jsonrpc_result = client_handler. parse_webhook_notification (
@@ -863,7 +870,7 @@ fn unknown_method_and_malformed_notification_test() {
863
870
// Missing required params field
864
871
} ) . to_string ( ) ;
865
872
866
- let timestamp3 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
873
+ let timestamp3 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
867
874
let signature3 = sign_notification_with_key ( & missing_params, & timestamp3) ;
868
875
869
876
let missing_params_result = client_handler. parse_webhook_notification (
@@ -878,7 +885,7 @@ fn unknown_method_and_malformed_notification_test() {
878
885
879
886
// Test Case 4: Extra unrecognized parameters in notification
880
887
// Spec: "Notification delivery services MUST ignore any parameters it does not recognize."
881
- let timestamp4 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
888
+ let timestamp4 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
882
889
let extra_params_notification = create_notification (
883
890
"lsps5.expiry_soon" ,
884
891
json ! ( {
@@ -902,7 +909,7 @@ fn unknown_method_and_malformed_notification_test() {
902
909
903
910
// Test Case 5: Valid signature verification
904
911
// Spec requires validating the signature against the timestamp and notification body
905
- let timestamp5 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
912
+ let timestamp5 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
906
913
let valid_notification = create_notification ( "lsps5.payment_incoming" , json ! ( { } ) ) ;
907
914
let body5 = valid_notification. to_string ( ) ;
908
915
let signature5 = sign_notification_with_key ( & body5, & timestamp5) ;
@@ -919,7 +926,7 @@ fn unknown_method_and_malformed_notification_test() {
919
926
920
927
// Test Case 6: Invalid signature
921
928
// Spec: The notification delivery service "MUST validate the signature against the message template"
922
- let timestamp6 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
929
+ let timestamp6 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
923
930
let notification6 = create_notification ( "lsps5.payment_incoming" , json ! ( { } ) ) ;
924
931
let body6 = notification6. to_string ( ) ;
925
932
let invalid_signature = "lspsig:abcdef1234567890" ; // Invalid signature
@@ -936,7 +943,7 @@ fn unknown_method_and_malformed_notification_test() {
936
943
937
944
// Test Case 7: Invalid JSON
938
945
// Spec requires the body to be a valid JSON-RPC 2.0 Notification Object
939
- let timestamp7 = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
946
+ let timestamp7 = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
940
947
let invalid_json = "{not valid json" ;
941
948
let signature7 = sign_notification_with_key ( invalid_json, & timestamp7) ;
942
949
@@ -961,7 +968,7 @@ fn unknown_method_and_malformed_notification_test() {
961
968
] ;
962
969
963
970
for ( method, params) in standard_methods. iter ( ) {
964
- let timestamp = Utc :: now ( ) . format ( "%Y-%m-%dT%H:%M:%S%.3fZ" ) . to_string ( ) ;
971
+ let timestamp = LSPSDateTime :: now ( ) . to_rfc3339 ( ) ;
965
972
let notification = create_notification ( method, params. clone ( ) ) ;
966
973
let body = notification. to_string ( ) ;
967
974
let signature = sign_notification_with_key ( & body, & timestamp) ;
0 commit comments