@@ -361,7 +361,7 @@ func TestSignRequest(t *testing.T) {
361361 signatureName : "sig1" ,
362362 signer : (func () Signer {
363363 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
364- fields := HeaderList ([] string { "@authority" , "date" , "content-type" } )
364+ fields := Headers ( "@authority" , "date" , "content-type" )
365365 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
366366 signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , config , fields )
367367 return * signer
@@ -378,7 +378,7 @@ func TestSignRequest(t *testing.T) {
378378 signatureName : "sig1" ,
379379 signer : (func () Signer {
380380 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
381- fields := HeaderList ([] string { "@authorityxx" , "date" , "content-type" } )
381+ fields := Headers ( "@authorityxx" , "date" , "content-type" )
382382 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
383383 signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , config , fields )
384384 return * signer
@@ -395,7 +395,7 @@ func TestSignRequest(t *testing.T) {
395395 signatureName : "sig1" ,
396396 signer : (func () Signer {
397397 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
398- fields := HeaderList ([] string { "@authority" , "date-not-really" , "content-type" } )
398+ fields := Headers ( "@authority" , "date-not-really" , "content-type" )
399399 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
400400 signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , config , fields )
401401 return * signer
@@ -557,7 +557,7 @@ func readResponse(s string) *http.Response {
557557
558558func TestSignAndVerifyHMAC (t * testing.T ) {
559559 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
560- fields := HeaderList ([] string { "@authority" , "date" , "content-type" } )
560+ fields := Headers ( "@authority" , "date" , "content-type" )
561561 signatureName := "sig1"
562562 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
563563 signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , config , fields )
@@ -577,7 +577,7 @@ func TestSignAndVerifyHMAC(t *testing.T) {
577577
578578func TestSignAndVerifyHMACBad (t * testing.T ) {
579579 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
580- fields := HeaderList ([] string { "@authority" , "date" , "content-type" } )
580+ fields := Headers ( "@authority" , "date" , "content-type" )
581581 signatureName := "sig1"
582582 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
583583 signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , config , fields )
@@ -598,7 +598,7 @@ func TestSignAndVerifyHMACBad(t *testing.T) {
598598
599599func TestCreated (t * testing.T ) {
600600 testOnceWithConfig := func (t * testing.T , createdTime int64 , verifyConfig * VerifyConfig , wantSuccess bool ) {
601- fields := HeaderList ([] string { "@status" , "date" , "content-type" } )
601+ fields := Headers ( "@status" , "date" , "content-type" )
602602 signatureName := "sigres"
603603 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
604604 signConfig := NewSignConfig ().SignCreated (true ).setFakeCreated (createdTime )
@@ -650,7 +650,7 @@ func TestCreated(t *testing.T) {
650650}
651651
652652func TestSignAndVerifyResponseHMAC (t * testing.T ) {
653- fields := HeaderList ([] string { "@status" , "date" , "content-type" } )
653+ fields := Headers ( "@status" , "date" , "content-type" )
654654 signatureName := "sigres"
655655 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
656656 config := NewSignConfig ().SetExpires (999 ) // should have expired long ago (but will be ignored by verifier)
@@ -673,7 +673,7 @@ func TestSignAndVerifyResponseHMAC(t *testing.T) {
673673
674674func TestSignAndVerifyRSAPSS (t * testing.T ) {
675675 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
676- fields := HeaderList ([] string { "@authority" , "date" , "content-type" } )
676+ fields := Headers ( "@authority" , "date" , "content-type" )
677677 signatureName := "sig1"
678678 prvKey , err := loadRSAPSSPrivateKey (rsaPSSPrvKey )
679679 if err != nil {
@@ -700,7 +700,7 @@ func TestSignAndVerifyRSAPSS(t *testing.T) {
700700
701701func TestSignAndVerifyRSA (t * testing.T ) {
702702 config := NewSignConfig ().SignAlg (false ).setFakeCreated (1618884475 )
703- fields := HeaderList ([] string { "@authority" , "date" , "content-type" } )
703+ fields := Headers ( "@authority" , "date" , "content-type" )
704704 signatureName := "sig1"
705705 prvKey , err := parseRsaPrivateKeyFromPemStr (rsaPrvKey )
706706 if err != nil {
@@ -817,7 +817,8 @@ func TestSignResponse(t *testing.T) {
817817 signatureName : "sig1" ,
818818 signer : (func () Signer {
819819 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
820- signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , NewSignConfig ().setFakeCreated (1618889999 ), HeaderList ([]string {"@status" , "date" , "content-type" }))
820+ signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , NewSignConfig ().setFakeCreated (1618889999 ), Headers (
821+ "@status" , "date" , "content-type" ))
821822 return * signer
822823 })(),
823824 res : readResponse (httpres1 ),
@@ -832,7 +833,10 @@ func TestSignResponse(t *testing.T) {
832833 signatureName : "sig1" ,
833834 signer : (func () Signer {
834835 key , _ := base64 .StdEncoding .DecodeString ("uzvJfB4u3N0Jy4T7NZ75MDVcr8zSTInedJtkgcu46YW4XByzNJjxBdtjUkdJPBtbmHhIDi6pcl8jsasjlTMtDQ==" )
835- signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , NewSignConfig ().setFakeCreated (1618889999 ), HeaderList ([]string {"@status" , "date" , "content-type" }))
836+ signer , _ := NewHMACSHA256Signer ("test-shared-secret" , key , NewSignConfig ().setFakeCreated (1618889999 ), Headers (
837+
838+ "@status" , "date" , "content-type" ,
839+ ))
836840 return * signer
837841 })(),
838842 res : nil ,
@@ -1071,7 +1075,7 @@ func TestRequestResponse(t *testing.T) {
10711075 t .Errorf ("Could not generate P-256 keypair" )
10721076 }
10731077 req := readRequest (httpreq2 )
1074- signer1 , err := NewP256Signer ("key9" , priv1 , NewSignConfig (), HeaderList ([] string { "@request-target" } ))
1078+ signer1 , err := NewP256Signer ("key9" , priv1 , NewSignConfig (), Headers ( "@request-target" ))
10751079 if err != nil {
10761080 t .Errorf ("Could not create signer" )
10771081 }
@@ -1083,7 +1087,7 @@ func TestRequestResponse(t *testing.T) {
10831087 req .Header .Add ("Signature" , sig1 )
10841088
10851089 // Server verifies request and signs response
1086- verifier1 , err := NewP256Verifier ("key9" , pub1 , NewVerifyConfig (), HeaderList ([] string { "@request-target" } ))
1090+ verifier1 , err := NewP256Verifier ("key9" , pub1 , NewVerifyConfig (), Headers ( "@request-target" ))
10871091 if err != nil {
10881092 t .Errorf ("Could not create verifier: %v" , err )
10891093 }
@@ -1101,7 +1105,7 @@ func TestRequestResponse(t *testing.T) {
11011105 if err != nil {
11021106 t .Errorf ("Could not parse sig1" )
11031107 }
1104- signer2 , err := NewP256Signer ("key10" , priv2 , NewSignConfig ().SetRequestResponse ("sig1" , sig1Value ), HeaderList ([] string { "@status" } ))
1108+ signer2 , err := NewP256Signer ("key10" , priv2 , NewSignConfig ().SetRequestResponse ("sig1" , sig1Value ), Headers ( "@status" ))
11051109 if err != nil {
11061110 t .Errorf ("Could not create signer" )
11071111 }
@@ -1113,15 +1117,15 @@ func TestRequestResponse(t *testing.T) {
11131117 res .Header .Add ("Signature" , sig2 )
11141118
11151119 // Client verifies response
1116- verifier2 , err := NewP256Verifier ("key10" , pub2 , NewVerifyConfig ().SetRequestResponse ("sigxx" , sig1Value ).SetVerifyCreated (false ), HeaderList ([] string { "@status" } ))
1120+ verifier2 , err := NewP256Verifier ("key10" , pub2 , NewVerifyConfig ().SetRequestResponse ("sigxx" , sig1Value ).SetVerifyCreated (false ), Headers ( "@status" ))
11171121 if err != nil {
11181122 t .Errorf ("Could not create second verifier: %v" , err )
11191123 }
11201124 err = VerifyResponse ("sig2" , * verifier2 , res )
11211125 if err == nil {
11221126 t .Errorf ("Verification should have failed, wrong sig name in SetRequestResponse" )
11231127 }
1124- verifier2 , err = NewP256Verifier ("key10" , pub2 , NewVerifyConfig ().SetRequestResponse ("sig1" , sig1Value ).SetVerifyCreated (false ), HeaderList ([] string { "@status" } ))
1128+ verifier2 , err = NewP256Verifier ("key10" , pub2 , NewVerifyConfig ().SetRequestResponse ("sig1" , sig1Value ).SetVerifyCreated (false ), Headers ( "@status" ))
11251129 if err != nil {
11261130 t .Errorf ("Could not create second verifier: %v" , err )
11271131 }
@@ -1165,7 +1169,7 @@ func TestDictionary(t *testing.T) {
11651169func TestMultipleSignatures (t * testing.T ) {
11661170 priv1 , _ , err := genP256KeyPair () // no pub, no verify
11671171 res := readResponse (httpres2 )
1168- signer1 , err := NewP256Signer ("key10" , priv1 , NewSignConfig ().SignCreated (false ), HeaderList ([] string { "Content-Type" , "Digest" } ))
1172+ signer1 , err := NewP256Signer ("key10" , priv1 , NewSignConfig ().SignCreated (false ), Headers ( "Content-Type" , "Digest" ))
11691173 if err != nil {
11701174 t .Errorf ("Could not create signer" )
11711175 }
@@ -1245,7 +1249,7 @@ func Test_signRequestDebug(t *testing.T) {
12451249 name : "normal header, sec. 2.1.1" ,
12461250 args : args {
12471251 signatureName : "sig1" ,
1248- signer : makeHMACSigner (* NewSignConfig ().SignCreated (false ), HeaderList ([] string { "example-dictionary" } )),
1252+ signer : makeHMACSigner (* NewSignConfig ().SignCreated (false ), Headers ( "example-dictionary" )),
12491253 req : readRequest (dict1 ),
12501254 },
12511255 wantSignatureInputHeader : "sig1=(\" example-dictionary\" );alg=\" hmac-sha256\" ;keyid=\" test-key-hmac\" " ,
@@ -1257,7 +1261,7 @@ func Test_signRequestDebug(t *testing.T) {
12571261 name : "cross-line header, trim" ,
12581262 args : args {
12591263 signatureName : "sig1" ,
1260- signer : makeHMACSigner (* NewSignConfig ().SignCreated (false ), HeaderList ([] string { "example-dictionary" } )),
1264+ signer : makeHMACSigner (* NewSignConfig ().SignCreated (false ), Headers ( "example-dictionary" )),
12611265 req : readRequest (dict2 ),
12621266 },
12631267 wantSignatureInputHeader : "sig1=(\" example-dictionary\" );alg=\" hmac-sha256\" ;keyid=\" test-key-hmac\" " ,
@@ -1270,7 +1274,7 @@ func Test_signRequestDebug(t *testing.T) {
12701274 args : args {
12711275 signatureName : "sig1" ,
12721276 signer : makeHMACSigner (* NewSignConfig ().SignCreated (false ),
1273- HeaderList ([] string { "X-OWS-Header" , "X-Obs-Fold-Header" , "Cache-Control" , "Example-Dictionary" } )),
1277+ Headers ( "X-OWS-Header" , "X-Obs-Fold-Header" , "Cache-Control" , "Example-Dictionary" )),
12741278 req : readRequest (httpreq4 ),
12751279 },
12761280 wantSignatureInputHeader : "sig1=(\" x-ows-header\" \" x-obs-fold-header\" \" cache-control\" \" example-dictionary\" );alg=\" hmac-sha256\" ;keyid=\" test-key-hmac\" " ,
0 commit comments