9
9
from cryptojwt .key_bundle import keybundle_from_local_file
10
10
from cryptojwt .key_issuer import KeyIssuer
11
11
from cryptojwt .key_issuer import build_keyissuer
12
-
13
- __author__ = 'Roland Hedberg'
14
-
15
12
from cryptojwt .key_issuer import init_key_issuer
16
13
17
- from cryptojwt . key_issuer import rotate_keys
14
+ __author__ = 'Roland Hedberg'
18
15
19
16
BASE_PATH = os .path .abspath (os .path .join (os .path .dirname (__file__ ),
20
17
"test_keys" ))
@@ -392,7 +389,7 @@ def test_remove_after():
392
389
393
390
key_issuer .remove_after = 1
394
391
# rotate_keys = create new keys + make the old as inactive
395
- key_issuer = rotate_keys (KEYDEFS , issuer = key_issuer )
392
+ key_issuer = key_issuer . rotate_keys (KEYDEFS )
396
393
397
394
key_issuer .remove_outdated (time .time () + 3600 )
398
395
@@ -629,25 +626,25 @@ def test_init_key_issuer_update():
629
626
630
627
# keyjar1 should only contain one EC key while keyjar2 should contain 2.
631
628
632
- ec1 = _keyissuer_1 .get ('sig' ,'EC' )
629
+ ec1 = _keyissuer_1 .get ('sig' , 'EC' )
633
630
ec2 = _keyissuer_2 .get ('sig' , 'EC' , '' )
634
631
assert len (ec1 ) == 1
635
632
assert len (ec2 ) == 2
636
633
637
634
# The file on disc should not have changed
638
635
_keyissuer_3 = init_key_issuer (private_path = PRIVATE_FILE )
639
636
640
- assert len (_keyissuer_3 .get ('sig' ,'RSA' )) == 1
641
- assert len (_keyissuer_3 .get ('sig' ,'EC' )) == 1
637
+ assert len (_keyissuer_3 .get ('sig' , 'RSA' )) == 1
638
+ assert len (_keyissuer_3 .get ('sig' , 'EC' )) == 1
642
639
643
640
_keyissuer_4 = init_key_issuer (private_path = PRIVATE_FILE , key_defs = KEYSPEC_2 ,
644
641
public_path = PUBLIC_FILE , read_only = False )
645
642
646
643
# Now it should
647
644
_keyissuer_5 = init_key_issuer (private_path = PRIVATE_FILE )
648
645
649
- assert len (_keyissuer_5 .get ('sig' ,'RSA' )) == 1
650
- assert len (_keyissuer_5 .get ('sig' ,'EC' )) == 2
646
+ assert len (_keyissuer_5 .get ('sig' , 'RSA' )) == 1
647
+ assert len (_keyissuer_5 .get ('sig' , 'EC' )) == 2
651
648
652
649
653
650
OIDC_KEYS = {
@@ -664,8 +661,8 @@ def test_init_key_issuer_create_directories():
664
661
shutil .rmtree ("{}/{}" .format (BASEDIR , _dir ))
665
662
666
663
_keyissuer = init_key_issuer (** OIDC_KEYS )
667
- assert len (_keyissuer .get ('sig' ,'RSA' )) == 1
668
- assert len (_keyissuer .get ('sig' ,'EC' )) == 1
664
+ assert len (_keyissuer .get ('sig' , 'RSA' )) == 1
665
+ assert len (_keyissuer .get ('sig' , 'EC' )) == 1
669
666
670
667
671
668
def test_dump ():
@@ -675,8 +672,8 @@ def test_dump():
675
672
res = issuer .dump ()
676
673
677
674
nkj = KeyIssuer ().load (res )
678
- assert nkj .get ('sig' ,'rsa' , kid = "kriMPdmBvx68skT8-mPAB3BseeA" )
679
- assert nkj .get ('sig' ,'rsa' , kid = 'MnC_VZcATfM5pOYiJHMba9goEKY' )
675
+ assert nkj .get ('sig' , 'rsa' , kid = "kriMPdmBvx68skT8-mPAB3BseeA" )
676
+ assert nkj .get ('sig' , 'rsa' , kid = 'MnC_VZcATfM5pOYiJHMba9goEKY' )
680
677
681
678
682
679
def test_contains ():
0 commit comments