mirror of
https://code.eliotberriot.com/funkwhale/funkwhale.git
synced 2025-10-06 04:19:56 +02:00
Blacked the code
This commit is contained in:
parent
b6fc0051fa
commit
62ca3bd736
279 changed files with 8861 additions and 9527 deletions
|
@ -8,36 +8,31 @@ from funkwhale_api.federation import keys
|
|||
|
||||
|
||||
def test_can_sign_and_verify_request(nodb_factories):
|
||||
private, public = nodb_factories['federation.KeyPair']()
|
||||
auth = nodb_factories['federation.SignatureAuth'](key=private)
|
||||
request = nodb_factories['federation.SignedRequest'](
|
||||
auth=auth
|
||||
)
|
||||
private, public = nodb_factories["federation.KeyPair"]()
|
||||
auth = nodb_factories["federation.SignatureAuth"](key=private)
|
||||
request = nodb_factories["federation.SignedRequest"](auth=auth)
|
||||
prepared_request = request.prepare()
|
||||
assert 'date' in prepared_request.headers
|
||||
assert 'signature' in prepared_request.headers
|
||||
assert signing.verify(
|
||||
prepared_request, public) is None
|
||||
assert "date" in prepared_request.headers
|
||||
assert "signature" in prepared_request.headers
|
||||
assert signing.verify(prepared_request, public) is None
|
||||
|
||||
|
||||
def test_can_sign_and_verify_request_digest(nodb_factories):
|
||||
private, public = nodb_factories['federation.KeyPair']()
|
||||
auth = nodb_factories['federation.SignatureAuth'](key=private)
|
||||
request = nodb_factories['federation.SignedRequest'](
|
||||
auth=auth,
|
||||
method='post',
|
||||
data=b'hello=world'
|
||||
private, public = nodb_factories["federation.KeyPair"]()
|
||||
auth = nodb_factories["federation.SignatureAuth"](key=private)
|
||||
request = nodb_factories["federation.SignedRequest"](
|
||||
auth=auth, method="post", data=b"hello=world"
|
||||
)
|
||||
prepared_request = request.prepare()
|
||||
assert 'date' in prepared_request.headers
|
||||
assert 'digest' in prepared_request.headers
|
||||
assert 'signature' in prepared_request.headers
|
||||
assert "date" in prepared_request.headers
|
||||
assert "digest" in prepared_request.headers
|
||||
assert "signature" in prepared_request.headers
|
||||
assert signing.verify(prepared_request, public) is None
|
||||
|
||||
|
||||
def test_verify_fails_with_wrong_key(nodb_factories):
|
||||
wrong_private, wrong_public = nodb_factories['federation.KeyPair']()
|
||||
request = nodb_factories['federation.SignedRequest']()
|
||||
wrong_private, wrong_public = nodb_factories["federation.KeyPair"]()
|
||||
request = nodb_factories["federation.SignedRequest"]()
|
||||
prepared_request = request.prepare()
|
||||
|
||||
with pytest.raises(cryptography.exceptions.InvalidSignature):
|
||||
|
@ -46,18 +41,15 @@ def test_verify_fails_with_wrong_key(nodb_factories):
|
|||
|
||||
def test_can_verify_django_request(factories, fake_request):
|
||||
private_key, public_key = keys.get_key_pair()
|
||||
signed_request = factories['federation.SignedRequest'](
|
||||
auth__key=private_key,
|
||||
auth__headers=[
|
||||
'date',
|
||||
]
|
||||
signed_request = factories["federation.SignedRequest"](
|
||||
auth__key=private_key, auth__headers=["date"]
|
||||
)
|
||||
prepared = signed_request.prepare()
|
||||
django_request = fake_request.get(
|
||||
'/',
|
||||
"/",
|
||||
**{
|
||||
'HTTP_DATE': prepared.headers['date'],
|
||||
'HTTP_SIGNATURE': prepared.headers['signature'],
|
||||
"HTTP_DATE": prepared.headers["date"],
|
||||
"HTTP_SIGNATURE": prepared.headers["signature"],
|
||||
}
|
||||
)
|
||||
assert signing.verify_django(django_request, public_key) is None
|
||||
|
@ -65,22 +57,19 @@ def test_can_verify_django_request(factories, fake_request):
|
|||
|
||||
def test_can_verify_django_request_digest(factories, fake_request):
|
||||
private_key, public_key = keys.get_key_pair()
|
||||
signed_request = factories['federation.SignedRequest'](
|
||||
signed_request = factories["federation.SignedRequest"](
|
||||
auth__key=private_key,
|
||||
method='post',
|
||||
data=b'hello=world',
|
||||
auth__headers=[
|
||||
'date',
|
||||
'digest',
|
||||
]
|
||||
method="post",
|
||||
data=b"hello=world",
|
||||
auth__headers=["date", "digest"],
|
||||
)
|
||||
prepared = signed_request.prepare()
|
||||
django_request = fake_request.post(
|
||||
'/',
|
||||
"/",
|
||||
**{
|
||||
'HTTP_DATE': prepared.headers['date'],
|
||||
'HTTP_DIGEST': prepared.headers['digest'],
|
||||
'HTTP_SIGNATURE': prepared.headers['signature'],
|
||||
"HTTP_DATE": prepared.headers["date"],
|
||||
"HTTP_DIGEST": prepared.headers["digest"],
|
||||
"HTTP_SIGNATURE": prepared.headers["signature"],
|
||||
}
|
||||
)
|
||||
|
||||
|
@ -89,22 +78,19 @@ def test_can_verify_django_request_digest(factories, fake_request):
|
|||
|
||||
def test_can_verify_django_request_digest_failure(factories, fake_request):
|
||||
private_key, public_key = keys.get_key_pair()
|
||||
signed_request = factories['federation.SignedRequest'](
|
||||
signed_request = factories["federation.SignedRequest"](
|
||||
auth__key=private_key,
|
||||
method='post',
|
||||
data=b'hello=world',
|
||||
auth__headers=[
|
||||
'date',
|
||||
'digest',
|
||||
]
|
||||
method="post",
|
||||
data=b"hello=world",
|
||||
auth__headers=["date", "digest"],
|
||||
)
|
||||
prepared = signed_request.prepare()
|
||||
django_request = fake_request.post(
|
||||
'/',
|
||||
"/",
|
||||
**{
|
||||
'HTTP_DATE': prepared.headers['date'],
|
||||
'HTTP_DIGEST': prepared.headers['digest'] + 'noop',
|
||||
'HTTP_SIGNATURE': prepared.headers['signature'],
|
||||
"HTTP_DATE": prepared.headers["date"],
|
||||
"HTTP_DIGEST": prepared.headers["digest"] + "noop",
|
||||
"HTTP_SIGNATURE": prepared.headers["signature"],
|
||||
}
|
||||
)
|
||||
|
||||
|
@ -114,19 +100,12 @@ def test_can_verify_django_request_digest_failure(factories, fake_request):
|
|||
|
||||
def test_can_verify_django_request_failure(factories, fake_request):
|
||||
private_key, public_key = keys.get_key_pair()
|
||||
signed_request = factories['federation.SignedRequest'](
|
||||
auth__key=private_key,
|
||||
auth__headers=[
|
||||
'date',
|
||||
]
|
||||
signed_request = factories["federation.SignedRequest"](
|
||||
auth__key=private_key, auth__headers=["date"]
|
||||
)
|
||||
prepared = signed_request.prepare()
|
||||
django_request = fake_request.get(
|
||||
'/',
|
||||
**{
|
||||
'HTTP_DATE': 'Wrong',
|
||||
'HTTP_SIGNATURE': prepared.headers['signature'],
|
||||
}
|
||||
"/", **{"HTTP_DATE": "Wrong", "HTTP_SIGNATURE": prepared.headers["signature"]}
|
||||
)
|
||||
with pytest.raises(cryptography.exceptions.InvalidSignature):
|
||||
signing.verify_django(django_request, public_key)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue