msg_auth_status/alloc_yes/
dkim_signatures.rs1use crate::dkim::DkimSignature;
4use crate::error::DkimSignatureError;
5
6#[derive(Debug, PartialEq)]
8pub enum DkimSignaturesError {}
9
10#[cfg(any(feature = "alloc", feature = "std"))]
12#[derive(Debug, Default)]
13pub struct DkimSignatures<'hdr> {
14 dkim_signatures: Vec<Result<DkimSignature<'hdr>, DkimSignatureError<'hdr>>>,
16}
17
18impl<'hdr> crate::traits::ResultsVerifier for DkimSignatures<'hdr> {
19 fn return_path_atleast_one_dkim_pass(&self, _selector: &str) -> bool {
20 false }
22}
23
24impl<'hdr> DkimSignatures<'hdr> {
25 #[cfg(feature = "mail_parser")]
27 pub fn from_mail_parser(
28 msg: &'hdr mail_parser::Message<'hdr>,
29 ) -> Result<Self, DkimSignaturesError> {
30 let mut new_self = Self {
31 dkim_signatures: vec![],
32 };
33
34 new_self.dkim_signatures = msg
35 .header_values("DKIM-Signature")
36 .map(|mh| mh.try_into())
37 .collect();
38
39 Ok(new_self)
40 }
41}
42
43#[cfg(test)]
44#[cfg(feature = "mail_parser")]
45mod test {
46 use super::*;
47 use insta::assert_debug_snapshot;
48 use rstest::rstest;
49 use std::{fs::File, io::Read, path::PathBuf};
50
51 fn load_test_data(file_location: &str) -> Vec<u8> {
52 let mut file = File::open(file_location).unwrap();
53 let mut data: Vec<u8> = vec![];
54 file.read_to_end(&mut data).unwrap();
55 data
56 }
57
58 #[rstest]
59 fn from_mail_parser(#[files("test_data/*.eml")] file_path: PathBuf) {
60 let new_snapshot_path = file_path.with_extension("snap");
61
62 insta::with_settings!({snapshot_path => new_snapshot_path}, {
63 insta::allow_duplicates! {
64 let raw = load_test_data(file_path.to_str().unwrap());
65 let parser = mail_parser::MessageParser::default();
66 let parsed_message = parser.parse(&raw).unwrap();
67 let status = DkimSignatures::from_mail_parser(&parsed_message).unwrap();
68 assert_debug_snapshot!(&status);
69 }
70 });
71 }
72}