Conversation
Co-authored-by: contact <contact@ophir.dev>
|
Cursor Agent can help with this pull request. Just |
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent the tests (both rust and sql) should check the actual hmac hashes are correct |
|
I significantly improved the
Learn more about Cursor Agents |
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent make the documentation of the new function more readable by less-technical users and beginner developers. For the example, show how to validate hmac signatures from shopify: https://shopify.dev/docs/apps/build/webhooks/subscribe/https . The example should be tested in one of the it_works*.sql tests The changelog.md should be updated too |
|
I implemented a new
Learn more about Cursor Agents |
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent Do not use the text component do display an error message in examples or in tests ! Use the redirect component to redirect to an error page when the hash does not match. The algorithm parameter should also let the user specify the desired output format: hex or base64 |
|
I enhanced the
Learn more about Cursor Agents |
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent cargo clippy, fmt and test |
|
I refactored the
Learn more about Cursor Agents |
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent add a test sql file (not an it_works* file) with your example code that checks an hmac body signature, and a .rs file in tests that calls the file, first with an invalid signature in the headers, then with a valid one. |
|
I implemented comprehensive testing for webhook HMAC signature validation, covering scenarios for valid, invalid, and missing signatures. This ensures the
Learn more about Cursor Agents |
Co-authored-by: contact <contact@ophir.dev>
…tency - Changed function parameters to remove Option types for data and key in the HMAC function. - Improved SQL documentation and examples for HMAC usage, including clearer descriptions and updated error handling. - Enhanced test cases for webhook HMAC validation to ensure accurate signature checks and responses. - Removed obsolete test file for HMAC with null values.
- Modified conditions in SQL queries to check for NULL values alongside signature mismatches. - Enhanced documentation on NULL handling for HMAC checks to improve clarity and portability.
Add
sqlpage.hmacfunction to provide cryptographic HMAC capabilities for secure authentication and data integrity, with comprehensive documentation.