notedeck

One damus client to rule them all
git clone git://jb55.com/notedeck
Log | Files | Refs | README | LICENSE

commit 0c87d02fe05b57a05282e0c08f7ace166af6e2b1
parent f0763b1278b4476ebe8185eabb8f5e0bd2ba1086
Author: kernelkind <kernelkind@gmail.com>
Date:   Sun, 13 Apr 2025 17:19:03 -0400

fix zaps networking tests

Signed-off-by: kernelkind <kernelkind@gmail.com>

Diffstat:
Mcrates/notedeck/src/zaps/networking.rs | 16++++++++++++----
1 file changed, 12 insertions(+), 4 deletions(-)

diff --git a/crates/notedeck/src/zaps/networking.rs b/crates/notedeck/src/zaps/networking.rs @@ -295,7 +295,7 @@ fn generate_endpoint_url(lud16: &str) -> Result<Url, ZapError> { #[cfg(test)] mod tests { - use enostr::FullKeypair; + use enostr::{FullKeypair, NoteId}; use crate::zaps::networking::convert_lnurl_to_endpoint_url; @@ -343,12 +343,16 @@ mod tests { fn test_generate_invoice() { let rt = tokio::runtime::Runtime::new().expect("Failed to create runtime"); + let kp = FullKeypair::generate(); let maybe_invoice = rt.block_on(async { fetch_invoice_lud16( "jb55@sendsats.lol".to_owned(), 1000, FullKeypair::generate().secret_key.to_secret_bytes(), - None, + crate::zaps::ZapTargetOwned::Note(crate::NoteZapTargetOwned { + note_id: NoteId::new([0; 32]), + zap_recipient: kp.pubkey, + }), vec!["wss://relay.damus.io".to_owned()], ) .block_and_take() @@ -377,15 +381,19 @@ mod tests { let rt = tokio::runtime::Runtime::new().expect("Failed to create runtime"); let lnurl = "lnurl1dp68gurn8ghj7um9dej8xct5wvhxcmmv9uh8wetvdskkkmn0wahz7mrww4excup0df3r2dg3mj444"; - let kp = FullKeypair::generate(); let relay = "wss://relay.damus.io"; + let kp = FullKeypair::generate(); + let maybe_invoice = rt.block_on(async { fetch_invoice_lnurl( lnurl.to_owned(), 1000, kp.secret_key.to_secret_bytes(), - None, + crate::zaps::ZapTargetOwned::Note(crate::NoteZapTargetOwned { + note_id: NoteId::new([0; 32]), + zap_recipient: kp.pubkey, + }), [relay.to_owned()].to_vec(), ) .block_and_take()