Blacked the code

This commit is contained in:
Eliot Berriot 2018-06-09 15:36:16 +02:00
parent b6fc0051fa
commit 62ca3bd736
No known key found for this signature in database
GPG key ID: DD6965E2476E5C27
279 changed files with 8861 additions and 9527 deletions

View file

@ -8,36 +8,31 @@ from funkwhale_api.federation import keys
def test_can_sign_and_verify_request(nodb_factories):
private, public = nodb_factories['federation.KeyPair']()
auth = nodb_factories['federation.SignatureAuth'](key=private)
request = nodb_factories['federation.SignedRequest'](
auth=auth
)
private, public = nodb_factories["federation.KeyPair"]()
auth = nodb_factories["federation.SignatureAuth"](key=private)
request = nodb_factories["federation.SignedRequest"](auth=auth)
prepared_request = request.prepare()
assert 'date' in prepared_request.headers
assert 'signature' in prepared_request.headers
assert signing.verify(
prepared_request, public) is None
assert "date" in prepared_request.headers
assert "signature" in prepared_request.headers
assert signing.verify(prepared_request, public) is None
def test_can_sign_and_verify_request_digest(nodb_factories):
private, public = nodb_factories['federation.KeyPair']()
auth = nodb_factories['federation.SignatureAuth'](key=private)
request = nodb_factories['federation.SignedRequest'](
auth=auth,
method='post',
data=b'hello=world'
private, public = nodb_factories["federation.KeyPair"]()
auth = nodb_factories["federation.SignatureAuth"](key=private)
request = nodb_factories["federation.SignedRequest"](
auth=auth, method="post", data=b"hello=world"
)
prepared_request = request.prepare()
assert 'date' in prepared_request.headers
assert 'digest' in prepared_request.headers
assert 'signature' in prepared_request.headers
assert "date" in prepared_request.headers
assert "digest" in prepared_request.headers
assert "signature" in prepared_request.headers
assert signing.verify(prepared_request, public) is None
def test_verify_fails_with_wrong_key(nodb_factories):
wrong_private, wrong_public = nodb_factories['federation.KeyPair']()
request = nodb_factories['federation.SignedRequest']()
wrong_private, wrong_public = nodb_factories["federation.KeyPair"]()
request = nodb_factories["federation.SignedRequest"]()
prepared_request = request.prepare()
with pytest.raises(cryptography.exceptions.InvalidSignature):
@ -46,18 +41,15 @@ def test_verify_fails_with_wrong_key(nodb_factories):
def test_can_verify_django_request(factories, fake_request):
private_key, public_key = keys.get_key_pair()
signed_request = factories['federation.SignedRequest'](
auth__key=private_key,
auth__headers=[
'date',
]
signed_request = factories["federation.SignedRequest"](
auth__key=private_key, auth__headers=["date"]
)
prepared = signed_request.prepare()
django_request = fake_request.get(
'/',
"/",
**{
'HTTP_DATE': prepared.headers['date'],
'HTTP_SIGNATURE': prepared.headers['signature'],
"HTTP_DATE": prepared.headers["date"],
"HTTP_SIGNATURE": prepared.headers["signature"],
}
)
assert signing.verify_django(django_request, public_key) is None
@ -65,22 +57,19 @@ def test_can_verify_django_request(factories, fake_request):
def test_can_verify_django_request_digest(factories, fake_request):
private_key, public_key = keys.get_key_pair()
signed_request = factories['federation.SignedRequest'](
signed_request = factories["federation.SignedRequest"](
auth__key=private_key,
method='post',
data=b'hello=world',
auth__headers=[
'date',
'digest',
]
method="post",
data=b"hello=world",
auth__headers=["date", "digest"],
)
prepared = signed_request.prepare()
django_request = fake_request.post(
'/',
"/",
**{
'HTTP_DATE': prepared.headers['date'],
'HTTP_DIGEST': prepared.headers['digest'],
'HTTP_SIGNATURE': prepared.headers['signature'],
"HTTP_DATE": prepared.headers["date"],
"HTTP_DIGEST": prepared.headers["digest"],
"HTTP_SIGNATURE": prepared.headers["signature"],
}
)
@ -89,22 +78,19 @@ def test_can_verify_django_request_digest(factories, fake_request):
def test_can_verify_django_request_digest_failure(factories, fake_request):
private_key, public_key = keys.get_key_pair()
signed_request = factories['federation.SignedRequest'](
signed_request = factories["federation.SignedRequest"](
auth__key=private_key,
method='post',
data=b'hello=world',
auth__headers=[
'date',
'digest',
]
method="post",
data=b"hello=world",
auth__headers=["date", "digest"],
)
prepared = signed_request.prepare()
django_request = fake_request.post(
'/',
"/",
**{
'HTTP_DATE': prepared.headers['date'],
'HTTP_DIGEST': prepared.headers['digest'] + 'noop',
'HTTP_SIGNATURE': prepared.headers['signature'],
"HTTP_DATE": prepared.headers["date"],
"HTTP_DIGEST": prepared.headers["digest"] + "noop",
"HTTP_SIGNATURE": prepared.headers["signature"],
}
)
@ -114,19 +100,12 @@ def test_can_verify_django_request_digest_failure(factories, fake_request):
def test_can_verify_django_request_failure(factories, fake_request):
private_key, public_key = keys.get_key_pair()
signed_request = factories['federation.SignedRequest'](
auth__key=private_key,
auth__headers=[
'date',
]
signed_request = factories["federation.SignedRequest"](
auth__key=private_key, auth__headers=["date"]
)
prepared = signed_request.prepare()
django_request = fake_request.get(
'/',
**{
'HTTP_DATE': 'Wrong',
'HTTP_SIGNATURE': prepared.headers['signature'],
}
"/", **{"HTTP_DATE": "Wrong", "HTTP_SIGNATURE": prepared.headers["signature"]}
)
with pytest.raises(cryptography.exceptions.InvalidSignature):
signing.verify_django(django_request, public_key)