Skip to content

Commit cf9384d

Browse files
author
David Robertson
committed
Run black
1 parent 1717f34 commit cf9384d

7 files changed

Lines changed: 62 additions & 50 deletions

File tree

pyproject.toml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,3 +40,6 @@ multi_line_output = 3
4040
include_trailing_comma = true
4141
combine_as_imports = true
4242
known_first_party = ["signedjson", "tests"]
43+
44+
[tool.black]
45+
# Placeholder for now.

signedjson/key.py

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ def decode_verify_key_bytes(key_id, key_bytes):
125125
A VerifyKey object.
126126
"""
127127
if key_id.startswith(NACL_ED25519 + ":"):
128-
version = key_id[len(NACL_ED25519) + 1:]
128+
version = key_id[len(NACL_ED25519) + 1 :]
129129
key = nacl.signing.VerifyKey(key_bytes)
130130
key.version = version
131131
key.alg = NACL_ED25519
@@ -176,4 +176,11 @@ def write_signing_keys(stream, keys):
176176
"""
177177
for key in keys:
178178
key_base64 = encode_signing_key_base64(key)
179-
stream.write("%s %s %s\n" % (key.alg, key.version, key_base64,))
179+
stream.write(
180+
"%s %s %s\n"
181+
% (
182+
key.alg,
183+
key.version,
184+
key_base64,
185+
)
186+
)

signedjson/sign.py

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,9 @@ def sign_json(json_object, signature_name, signing_key):
6161
return json_object
6262

6363

64-
def signature_ids(json_object, signature_name,
65-
supported_algorithms=SUPPORTED_ALGORITHMS):
64+
def signature_ids(
65+
json_object, signature_name, supported_algorithms=SUPPORTED_ALGORITHMS
66+
):
6667
# type: (JsonDict, str, Iterable[str]) -> List[str]
6768
"""Does the JSON object have a signature for the given name?
6869
Args:
@@ -75,13 +76,13 @@ def signature_ids(json_object, signature_name,
7576
"""
7677
key_ids = json_object.get("signatures", {}).get(signature_name, {}).keys()
7778
return list(
78-
key_id for key_id in key_ids
79-
if key_id.split(":")[0] in supported_algorithms
79+
key_id for key_id in key_ids if key_id.split(":")[0] in supported_algorithms
8080
)
8181

8282

8383
class SignatureVerifyException(Exception):
8484
"""A signature could not be verified"""
85+
8586
pass
8687

8788

@@ -131,7 +132,10 @@ def verify_signed_json(json_object, signature_name, verify_key):
131132
verify_key.verify(message, signature)
132133
except Exception as e:
133134
raise SignatureVerifyException(
134-
"Unable to verify signature for %s: %s %s" % (
135-
signature_name, type(e), e,
135+
"Unable to verify signature for %s: %s %s"
136+
% (
137+
signature_name,
138+
type(e),
139+
e,
136140
)
137141
)

signedjson/types.py

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,28 +26,31 @@
2626

2727
class BaseKey(Protocol):
2828
"""Common base type for VerifyKey and SigningKey"""
29+
2930
version = "" # type: str
3031
alg = "" # type: str
3132

3233
def encode(self):
3334
# type: () -> bytes
34-
pass # pragma: nocover
35+
pass # pragma: nocover
3536

3637

3738
class VerifyKey(BaseKey):
3839
"""The public part of a key pair, for use with verify_signed_json"""
40+
3941
def verify(self, message, signature):
4042
# type: (bytes, bytes) -> bytes
41-
pass # pragma: nocover
43+
pass # pragma: nocover
4244

4345

4446
class SigningKey(BaseKey):
4547
"""The private part of a key pair, for use with sign_json"""
48+
4649
def sign(self, message):
4750
# type: (bytes) -> nacl.signing.SignedMessage
48-
pass # pragma: nocover
51+
pass # pragma: nocover
4952

5053
@property
5154
def verify_key(self):
5255
# type: () -> nacl.signing.VerifyKey
53-
pass # pragma: nocover
56+
pass # pragma: nocover

tests/test_key.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ class GenerateTestCase(unittest.TestCase):
1919
def test_generate_key(self):
2020
my_version = "my_version"
2121
my_key = generate_signing_key(my_version)
22-
self.assertEqual(my_key.alg, 'ed25519')
22+
self.assertEqual(my_key.alg, "ed25519")
2323
self.assertEqual(my_key.version, my_version)
2424

2525

@@ -35,7 +35,7 @@ def test_decode(self):
3535
decoded_key = decode_signing_key_base64(
3636
"ed25519", self.version, self.key_base64
3737
)
38-
self.assertEqual(decoded_key.alg, 'ed25519')
38+
self.assertEqual(decoded_key.alg, "ed25519")
3939
self.assertEqual(decoded_key.version, self.version)
4040

4141
def test_decode_invalid_base64(self):
@@ -54,7 +54,7 @@ def test_decode_verify_key(self):
5454
decoded_key = decode_verify_key_base64(
5555
"ed25519", self.version, self.verify_key_base64
5656
)
57-
self.assertEqual(decoded_key.alg, 'ed25519')
57+
self.assertEqual(decoded_key.alg, "ed25519")
5858
self.assertEqual(decoded_key.version, self.version)
5959

6060
def test_decode_verify_key_invalid_base64(self):

tests/test_known_key.py

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -21,18 +21,16 @@
2121

2222
from signedjson.sign import sign_json
2323

24-
SIGNING_KEY_SEED = decode_base64(
25-
"YJDBA9Xnr2sVqXD9Vj7XVUnmFZcZrlw8Md7kMW+3XA1"
26-
)
24+
SIGNING_KEY_SEED = decode_base64("YJDBA9Xnr2sVqXD9Vj7XVUnmFZcZrlw8Md7kMW+3XA1")
2725

2826
KEY_ALG = "ed25519"
2927
KEY_VER = 1
3028
KEY_NAME = "%s:%d" % (KEY_ALG, KEY_VER)
3129

3230

3331
class KnownKeyTestCase(unittest.TestCase):
34-
""" An entirely deterministic test using a given signing key seed, so that
35-
other implementations can compare that they get the same result. """
32+
"""An entirely deterministic test using a given signing key seed, so that
33+
other implementations can compare that they get the same result."""
3634

3735
def setUp(self):
3836
self.signing_key = nacl.signing.SigningKey(SIGNING_KEY_SEED)
@@ -43,26 +41,26 @@ def test_sign_minimal(self):
4341
self.assertEqual(
4442
sign_json({}, "domain", self.signing_key),
4543
{
46-
'signatures': {
47-
'domain': {
44+
"signatures": {
45+
"domain": {
4846
KEY_NAME: "K8280/U9SSy9IVtjBuVeLr+HpOB4BQFWbg+UZaADMt"
4947
"TdGYI7Geitb76LTrr5QV/7Xg4ahLwYGYZzuHGZKM5ZAQ"
5048
},
5149
}
52-
}
50+
},
5351
)
5452

5553
def test_sign_with_data(self):
5654
self.assertEqual(
57-
sign_json({'one': 1, 'two': "Two"}, "domain", self.signing_key),
55+
sign_json({"one": 1, "two": "Two"}, "domain", self.signing_key),
5856
{
59-
'one': 1,
60-
'two': "Two",
61-
'signatures': {
62-
'domain': {
57+
"one": 1,
58+
"two": "Two",
59+
"signatures": {
60+
"domain": {
6361
KEY_NAME: "KqmLSbO39/Bzb0QIYE82zqLwsA+PDzYIpIRA2sRQ4s"
6462
"L53+sN6/fpNSoqE7BP7vBZhG6kYdD13EIMJpvhJI+6Bw"
6563
},
66-
}
67-
}
64+
},
65+
},
6866
)

tests/test_sign.py

Lines changed: 17 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -28,48 +28,45 @@
2828

2929
class JsonSignTestCase(unittest.TestCase):
3030
def setUp(self):
31-
self.message = {'foo': 'bar', 'unsigned': {}}
31+
self.message = {"foo": "bar", "unsigned": {}}
3232
self.sigkey = MockSigningKey()
33-
self.assertEqual(self.sigkey.alg, 'mock')
34-
self.signed = sign_json(self.message, 'Alice', self.sigkey)
33+
self.assertEqual(self.sigkey.alg, "mock")
34+
self.signed = sign_json(self.message, "Alice", self.sigkey)
3535
self.verkey = MockVerifyKey()
3636

3737
def test_sign_and_verify(self):
38-
self.assertIn('signatures', self.signed)
39-
self.assertIn('Alice', self.signed['signatures'])
40-
self.assertIn('mock:test', self.signed['signatures']['Alice'])
38+
self.assertIn("signatures", self.signed)
39+
self.assertIn("Alice", self.signed["signatures"])
40+
self.assertIn("mock:test", self.signed["signatures"]["Alice"])
4141
self.assertEqual(
42-
self.signed['signatures']['Alice']['mock:test'],
43-
encode_base64(b'x_______')
42+
self.signed["signatures"]["Alice"]["mock:test"], encode_base64(b"x_______")
4443
)
4544
self.assertEqual(self.sigkey.signed_bytes, b'{"foo":"bar"}')
46-
verify_signed_json(self.signed, 'Alice', self.verkey)
45+
verify_signed_json(self.signed, "Alice", self.verkey)
4746

4847
def test_signature_ids(self):
49-
key_ids = signature_ids(
50-
self.signed, 'Alice', supported_algorithms=['mock']
51-
)
52-
self.assertListEqual(key_ids, ['mock:test'])
48+
key_ids = signature_ids(self.signed, "Alice", supported_algorithms=["mock"])
49+
self.assertListEqual(key_ids, ["mock:test"])
5350

5451
def test_verify_fail(self):
55-
self.signed['signatures']['Alice']['mock:test'] = encode_base64(
56-
b'not a signature'
52+
self.signed["signatures"]["Alice"]["mock:test"] = encode_base64(
53+
b"not a signature"
5754
)
5855
with self.assertRaises(SignatureVerifyException):
59-
verify_signed_json(self.signed, 'Alice', self.verkey)
56+
verify_signed_json(self.signed, "Alice", self.verkey)
6057

6158
def test_verify_fail_no_signatures(self):
6259
with self.assertRaises(SignatureVerifyException):
63-
verify_signed_json({}, 'Alice', self.verkey)
60+
verify_signed_json({}, "Alice", self.verkey)
6461

6562
def test_verify_fail_no_signature_for_alice(self):
6663
with self.assertRaises(SignatureVerifyException):
67-
verify_signed_json({'signatures': {}}, 'Alice', self.verkey)
64+
verify_signed_json({"signatures": {}}, "Alice", self.verkey)
6865

6966
def test_verify_fail_not_base64(self):
70-
invalid = {'signatures': {'Alice': {'mock:test': 'not base64'}}}
67+
invalid = {"signatures": {"Alice": {"mock:test": "not base64"}}}
7168
with self.assertRaises(SignatureVerifyException):
72-
verify_signed_json(invalid, 'Alice', self.verkey)
69+
verify_signed_json(invalid, "Alice", self.verkey)
7370

7471

7572
class MockSigningKey(object):

0 commit comments

Comments
 (0)