def test_it_allows_binary_strings(self): message = b"\x80\xFF" token = fernet.generate(self.secret, message) verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(True) verifier.message |should| equal_to(message)
def test_it_allows_binary_strings(self): message = b"\x80\xFF" token = fernet.generate(self.secret, message) verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(True) verifier.message | should | equal_to(message)
def test_it_fails_with_a_bad_secret(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.bad_secret, token) verifier.valid() |should| be(False) with self.assertRaises(fernet.Token.InvalidToken): verifier.message()
def test_it_fails_with_a_bad_secret(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.bad_secret, token) verifier.valid() | should | be(False) with self.assertRaises(fernet.Token.InvalidToken): verifier.message()
def test_it_can_ignore_ttl_enforcement_via_global_config(self): fernet.Configuration.enforce_ttl = False token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token, now=long(time.time()) + 9999) verifier.valid() | should | be(True)
def encrypt(value): if key is None: return value if CRYPTO_FERNET == True: f = Fernet(key) token = f.encrypt(bytes(value)) else: token = fernet.generate(key, value) return token
def test_it_allows_overriding_enforce_ttl_on_a_verifier(self): fernet.Configuration.enforce_ttl = True fernet.Configuration.ttl = 0 token = fernet.generate(self.secret, 'password1') verifier = fernet.verifier(self.secret, token) verifier.enforce_ttl = False verifier.valid() | should | be(True) verifier.message | should | equal_to('password1')
def test_it_allows_overriding_enforce_ttl_on_a_verifier(self): fernet.Configuration.enforce_ttl = True fernet.Configuration.ttl = 0 token = fernet.generate(self.secret, 'password1') verifier = fernet.verifier(self.secret, token) verifier.enforce_ttl = False verifier.valid() |should| be(True) verifier.message |should| equal_to('password1')
def inner(message): return fernet.generate(key, func(message))
def test_it_can_verify_tokens_it_generates(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(True) verifier.message | should | equal_to('*****@*****.**')
def test_it_can_ignore_ttl_enforcement_via_global_config(self): fernet.Configuration.enforce_ttl = False token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token, now=long(time.time()) + 9999) verifier.valid() |should| be(True)
def test_it_does_not_send_the_message_in_plain_text(self): token = fernet.generate(self.secret, 'password1') base64.urlsafe_b64decode(token) |should_not| contain('password1')
def test_it_fails_if_the_token_is_too_old(self): token = fernet.generate(self.secret, '*****@*****.**', now = (long(time.time()) - 61)) verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(False)
def test_it_fails_if_the_token_is_too_old(self): token = fernet.generate(self.secret, '*****@*****.**', now=(long(time.time()) - 61)) verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(False)
def test_it_can_verify_tokens_it_generates(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(True) verifier.message |should| equal_to('*****@*****.**')
def db_value(self, value): if not self.key: raise EncryptedField.KeyIsUndefined() return fernet.generate(self.key, value)
def test_it_does_not_send_the_message_in_plain_text(self): token = fernet.generate(self.secret, 'password1') base64.urlsafe_b64decode(token) | should_not | contain('password1')