def test_it_allows_binary_strings(self): message = b"\x80\xFF" token = fernet.generate(self.secret, message) verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(True) verifier.message |should| equal_to(message)
def test_it_allows_binary_strings(self): message = b"\x80\xFF" token = fernet.generate(self.secret, message) verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(True) verifier.message | should | equal_to(message)
def test_it_fails_with_a_bad_secret(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.bad_secret, token) verifier.valid() |should| be(False) with self.assertRaises(fernet.Token.InvalidToken): verifier.message()
def test_it_can_ignore_ttl_enforcement_via_global_config(self): fernet.Configuration.enforce_ttl = False token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token, now=long(time.time()) + 9999) verifier.valid() | should | be(True)
def test_it_fails_with_a_bad_secret(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.bad_secret, token) verifier.valid() | should | be(False) with self.assertRaises(fernet.Token.InvalidToken): verifier.message()
def test_it_allows_overriding_enforce_ttl_on_a_verifier(self): fernet.Configuration.enforce_ttl = True fernet.Configuration.ttl = 0 token = fernet.generate(self.secret, 'password1') verifier = fernet.verifier(self.secret, token) verifier.enforce_ttl = False verifier.valid() |should| be(True) verifier.message |should| equal_to('password1')
def test_it_allows_overriding_enforce_ttl_on_a_verifier(self): fernet.Configuration.enforce_ttl = True fernet.Configuration.ttl = 0 token = fernet.generate(self.secret, 'password1') verifier = fernet.verifier(self.secret, token) verifier.enforce_ttl = False verifier.valid() | should | be(True) verifier.message | should | equal_to('password1')
def decrypt(ciphertext): if key is None: return ciphertext try: value = ciphertext if CRYPTO_FERNET == True: f = Fernet(key) value = f.decrypt(ciphertext) else: verifier = fernet.verifier(key, ciphertext) if verifier.valid() == True: value = verifier.message return value except Exception as e: pass return ciphertext
def test_it_can_ignore_ttl_enforcement_via_global_config(self): fernet.Configuration.enforce_ttl = False token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token, now=long(time.time()) + 9999) verifier.valid() |should| be(True)
def test_it_fails_if_the_token_is_too_old(self): token = fernet.generate(self.secret, '*****@*****.**', now = (long(time.time()) - 61)) verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(False)
def test_it_can_verify_tokens_it_generates(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token) verifier.valid() |should| be(True) verifier.message |should| equal_to('*****@*****.**')
def test_it_fails_if_the_token_is_too_old(self): token = fernet.generate(self.secret, '*****@*****.**', now=(long(time.time()) - 61)) verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(False)
def test_it_can_verify_tokens_it_generates(self): token = fernet.generate(self.secret, '*****@*****.**') verifier = fernet.verifier(self.secret, token) verifier.valid() | should | be(True) verifier.message | should | equal_to('*****@*****.**')
def inner(encoded_message): verifier = fernet.verifier(key, encoded_message) if verifier.valid(): return func(verifier.message) else: raise InvalidToken