Skip to content

Commit d1ec0ab

Browse files
committed
more lint and fix format (respect black/isort)
1 parent 579380d commit d1ec0ab

File tree

12 files changed

+27
-49
lines changed

12 files changed

+27
-49
lines changed

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ repos:
1212
rev: v0.6.3
1313
hooks:
1414
- id: ruff
15-
- id: ruff-format
15+
#- id: ruff-format

pyproject.toml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,9 @@ pytest-ruff = "^0.3.2"
6161
requires = ["poetry-core>=1.0.0"]
6262
build-backend = "poetry.core.masonry.api"
6363

64+
[tool.ruff]
65+
line-length = 100
66+
6467
[tool.ruff.lint]
6568
select = [
6669
# pycodestyle
@@ -78,3 +81,9 @@ select = [
7881
]
7982
ignore = ["E501", "I001", "SIM102"]
8083
exclude = ["examples/*"]
84+
85+
[tool.ruff.lint.isort]
86+
force-sort-within-sections = false
87+
combine-as-imports = true
88+
split-on-trailing-comma = false
89+
known-first-party = ["cryptojwt"]

src/cryptojwt/jwe/jwe.py

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -171,11 +171,7 @@ def decrypt(self, token=None, keys=None, alg=None, cek=None):
171171
elif _alg.startswith("ECDH-ES"):
172172
decrypter = JWE_EC(**self._dict)
173173

174-
_key = (
175-
keys[0].private_key()
176-
if isinstance(keys[0], AsymmetricKey)
177-
else keys[0].key
178-
)
174+
_key = keys[0].private_key() if isinstance(keys[0], AsymmetricKey) else keys[0].key
179175

180176
cek = decrypter.dec_setup(_jwe, key=_key)
181177
else:

src/cryptojwt/jwk/__init__.py

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -236,11 +236,7 @@ def __eq__(self, other):
236236
if set(self.__dict__.keys()) != set(other.__dict__.keys()):
237237
return False
238238

239-
for key in self.public_members:
240-
if getattr(other, key) != getattr(self, key):
241-
return False
242-
243-
return True
239+
return all(getattr(other, key) == getattr(self, key) for key in self.public_members)
244240

245241
def keys(self):
246242
return list(self.to_dict().keys())

src/cryptojwt/jwk/asym.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def __init__(
1919
k="",
2020
pub_key=None,
2121
priv_key=None,
22-
**kwargs
22+
**kwargs,
2323
):
2424
JWK.__init__(self, kty, alg, use, kid, x5c, x5t, x5u, **kwargs)
2525
self.k = k

src/cryptojwt/jwk/rsa.py

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,7 @@ def __init__(
254254
dq="",
255255
di="",
256256
qi="",
257-
**kwargs
257+
**kwargs,
258258
):
259259
AsymmetricKey.__init__(self, kty, alg, use, kid, x5c, x5t, x5u, **kwargs)
260260
self.n = n
@@ -322,10 +322,7 @@ def deserialize(self):
322322
_cert_chain.append(der_cert(base64.b64decode(der_data)))
323323

324324
if self.x5t: # verify the cert thumbprint
325-
if isinstance(self.x5t, bytes):
326-
_x5t = self.x5t
327-
else:
328-
_x5t = self.x5t.encode("ascii")
325+
_x5t = self.x5t if isinstance(self.x5t, bytes) else self.x5t.encode("ascii")
329326
if _x5t != x5t_calculation(self.x5c[0]):
330327
raise DeSerializationNotPossible(
331328
"The thumbprint 'x5t' does not match the certificate."

src/cryptojwt/jws/jws.py

Lines changed: 6 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -150,9 +150,7 @@ def verify_compact(self, jws=None, keys=None, allow_none=False, sigalg=None):
150150
"""
151151
return self.verify_compact_verbose(jws, keys, allow_none, sigalg)["msg"]
152152

153-
def verify_compact_verbose(
154-
self, jws=None, keys=None, allow_none=False, sigalg=None
155-
):
153+
def verify_compact_verbose(self, jws=None, keys=None, allow_none=False, sigalg=None):
156154
"""
157155
Verify a JWT signature and return dict with validation results
158156
@@ -192,21 +190,15 @@ def verify_compact_verbose(
192190
if isinstance(self["alg"], list):
193191
if _alg not in self["alg"]:
194192
raise SignerAlgError(
195-
"Wrong signing algorithm, expected {} got {}".format(
196-
self["alg"], _alg
197-
)
193+
"Wrong signing algorithm, expected {} got {}".format(self["alg"], _alg)
198194
)
199195
elif _alg != self["alg"]:
200196
raise SignerAlgError(
201-
"Wrong signing algorithm, expected {} got {}".format(
202-
self["alg"], _alg
203-
)
197+
"Wrong signing algorithm, expected {} got {}".format(self["alg"], _alg)
204198
)
205199

206200
if sigalg and sigalg != _alg:
207-
raise SignerAlgError(
208-
"Expected {} got {}".format(sigalg, jwt.headers["alg"])
209-
)
201+
raise SignerAlgError("Expected {} got {}".format(sigalg, jwt.headers["alg"]))
210202

211203
self["alg"] = _alg
212204

@@ -216,9 +208,7 @@ def verify_compact_verbose(
216208
if "kid" in self:
217209
raise NoSuitableSigningKeys("No key with kid: {}".format(self["kid"]))
218210
elif "kid" in self.jwt.headers:
219-
raise NoSuitableSigningKeys(
220-
"No key with kid: {}".format(self.jwt.headers["kid"])
221-
)
211+
raise NoSuitableSigningKeys("No key with kid: {}".format(self.jwt.headers["kid"]))
222212
else:
223213
raise NoSuitableSigningKeys(f"No key for algorithm: {_alg}")
224214

@@ -342,9 +332,7 @@ def verify_json(self, jws, keys=None, allow_none=False, at_least_one=False):
342332
_tmp = self.verify_compact(token, keys, allow_none)
343333
except NoSuitableSigningKeys:
344334
if at_least_one is True:
345-
logger.warning(
346-
f"Could not verify signature with headers: {all_headers}"
347-
)
335+
logger.warning(f"Could not verify signature with headers: {all_headers}")
348336
continue
349337
else:
350338
raise

src/cryptojwt/key_issuer.py

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -286,10 +286,7 @@ def get(self, key_use, key_type="", kid=None, alg="", **kwargs):
286286

287287
if not key_type:
288288
if alg:
289-
if use == "sig":
290-
key_type = jws_alg2keytype(alg)
291-
else:
292-
key_type = jwe_alg2keytype(alg)
289+
key_type = jws_alg2keytype(alg) if use == "sig" else jwe_alg2keytype(alg)
293290

294291
lst = []
295292
for bundle in self._bundles:

src/cryptojwt/key_jar.py

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -233,10 +233,7 @@ def keys_by_alg_and_usage(self, issuer_id, alg, usage):
233233
:param usage: What the key should be used for
234234
:return: A possibly empty list of keys
235235
"""
236-
if usage in ["sig", "ver"]:
237-
ktype = jws_alg2keytype(alg)
238-
else:
239-
ktype = jwe_alg2keytype(alg)
236+
ktype = jws_alg2keytype(alg) if usage in ["sig", "ver"] else jwe_alg2keytype(alg)
240237

241238
return self.get(usage, ktype, issuer_id)
242239

src/cryptojwt/tools/keyconv.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
#!/usr/bin/env python3
22

33
"""Convert JWK from/to PEM and other formats"""
4+
45
import argparse
56
import json
67
from binascii import hexlify

0 commit comments

Comments
 (0)