Skip to content

Commit bf9abd2

Browse files
committed
Merge pull request #1 from matrix-org/deleteunusedstuff
Delete unused method
2 parents ae466d9 + 4368623 commit bf9abd2

2 files changed

Lines changed: 10 additions & 38 deletions

File tree

signedjson/key.py

Lines changed: 4 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -73,25 +73,11 @@ def is_signing_algorithm_supported(key_id):
7373
return False
7474

7575

76-
def decode_verify_key_base64(algorithm, version, key_base64):
77-
"""Decode a base64 encoded verify key
78-
Args:
79-
algorithm (str): The algorithm the key is for (currently "ed25519").
80-
version (str): Identifies this key out of the keys for this entity.
81-
key_base64 (str): Base64 encoded bytes of the key.
82-
Returns:
83-
A VerifyKey object.
84-
"""
85-
key_id = "%s:%s" % (algorithm, version)
86-
key_bytes = decode_base64(key_base64)
87-
return decode_verify_key_bytes(key_id, key_bytes)
88-
89-
9076
def decode_verify_key_bytes(key_id, key_bytes):
91-
"""Decode a base64 encoded verify key
77+
"""Decode a raw verify key
9278
Args:
9379
key_id (str): Identifies this key out of the keys for this entity.
94-
key_base64 (str): Base64 encoded bytes of the key.
80+
key_bytes (str): Raw bytes of the key.
9581
Returns:
9682
A VerifyKey object.
9783
"""
@@ -130,7 +116,8 @@ def read_old_signing_keys(stream):
130116
keys = []
131117
for line in stream:
132118
algorithm, version, expired, key_base64 = line.split()
133-
key = decode_verify_key_base64(algorithm, version, key_base64)
119+
key_name = "%s:%s" % (algorithm, version,)
120+
key = decode_verify_key_bytes(key_name, decode_base64(key_base64))
134121
key.expired = int(expired)
135122
keys.append(key)
136123
return keys

tests/test_key.py

Lines changed: 6 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
generate_signing_key,
66
get_verify_key,
77
decode_signing_key_base64,
8+
decode_verify_key_bytes,
89
encode_signing_key_base64,
910
is_signing_algorithm_supported,
1011
encode_verify_key_base64,
11-
decode_verify_key_base64,
1212
read_signing_keys,
1313
read_old_signing_keys,
1414
write_signing_keys
@@ -42,33 +42,14 @@ def test_decode_invalid_base64(self):
4242
with self.assertRaises(Exception):
4343
decode_signing_key_base64("ed25519", self.version, "not base 64")
4444

45-
def test_decode_invalid_algorithm(self):
45+
def test_decode_signing_invalid_algorithm(self):
4646
with self.assertRaises(Exception):
4747
decode_signing_key_base64("not a valid alg", self.version, "")
4848

4949
def test_decode_invalid_key(self):
5050
with self.assertRaises(Exception):
5151
decode_signing_key_base64("ed25519", self.version, "")
5252

53-
def test_decode_verify_key(self):
54-
decoded_key = decode_verify_key_base64(
55-
"ed25519", self.version, self.verify_key_base64
56-
)
57-
self.assertEquals(decoded_key.alg, "ed25519")
58-
self.assertEquals(decoded_key.version, self.version)
59-
60-
def test_decode_verify_key_invalid_base64(self):
61-
with self.assertRaises(Exception):
62-
decode_verify_key_base64("ed25519", self.version, "not base 64")
63-
64-
def test_decode_verify_key_invalid_algorithm(self):
65-
with self.assertRaises(Exception):
66-
decode_verify_key_base64("not a valid alg", self.version, "")
67-
68-
def test_decode_verify_key_invalid_key(self):
69-
with self.assertRaises(Exception):
70-
decode_verify_key_base64("ed25519", self.version, "")
71-
7253
def test_read_keys(self):
7354
stream = ["ed25519 %s %s" % (self.version, self.key_base64)]
7455
keys = read_signing_keys(stream)
@@ -79,6 +60,10 @@ def test_read_old_keys(self):
7960
keys = read_old_signing_keys(stream)
8061
self.assertEquals(len(keys), 1)
8162

63+
def test_decode_verify_invalid_algorithm(self):
64+
with self.assertRaises(Exception):
65+
decode_verify_key_bytes("not a valid alg", self.verify_key)
66+
8267
def test_write_signing_keys(self):
8368
class MockStream(object):
8469
def write(self, data):

0 commit comments

Comments
 (0)