@@ -60,10 +60,7 @@ def __len__(self):
60
60
return len (self .part )
61
61
62
62
def valid (self ):
63
- if len (self ) != 3 :
64
- return False
65
-
66
- return True
63
+ return len (self ) == 3
67
64
68
65
69
66
class JWS (JWx ):
@@ -153,7 +150,9 @@ def verify_compact(self, jws=None, keys=None, allow_none=False, sigalg=None):
153
150
"""
154
151
return self .verify_compact_verbose (jws , keys , allow_none , sigalg )["msg" ]
155
152
156
- def verify_compact_verbose (self , jws = None , keys = None , allow_none = False , sigalg = None ):
153
+ def verify_compact_verbose (
154
+ self , jws = None , keys = None , allow_none = False , sigalg = None
155
+ ):
157
156
"""
158
157
Verify a JWT signature and return dict with validation results
159
158
@@ -193,15 +192,21 @@ def verify_compact_verbose(self, jws=None, keys=None, allow_none=False, sigalg=N
193
192
if isinstance (self ["alg" ], list ):
194
193
if _alg not in self ["alg" ]:
195
194
raise SignerAlgError (
196
- "Wrong signing algorithm, expected {} got {}" .format (self ["alg" ], _alg )
195
+ "Wrong signing algorithm, expected {} got {}" .format (
196
+ self ["alg" ], _alg
197
+ )
197
198
)
198
199
elif _alg != self ["alg" ]:
199
200
raise SignerAlgError (
200
- "Wrong signing algorithm, expected {} got {}" .format (self ["alg" ], _alg )
201
+ "Wrong signing algorithm, expected {} got {}" .format (
202
+ self ["alg" ], _alg
203
+ )
201
204
)
202
205
203
206
if sigalg and sigalg != _alg :
204
- raise SignerAlgError ("Expected {} got {}" .format (sigalg , jwt .headers ["alg" ]))
207
+ raise SignerAlgError (
208
+ "Expected {} got {}" .format (sigalg , jwt .headers ["alg" ])
209
+ )
205
210
206
211
self ["alg" ] = _alg
207
212
@@ -211,7 +216,9 @@ def verify_compact_verbose(self, jws=None, keys=None, allow_none=False, sigalg=N
211
216
if "kid" in self :
212
217
raise NoSuitableSigningKeys ("No key with kid: {}" .format (self ["kid" ]))
213
218
elif "kid" in self .jwt .headers :
214
- raise NoSuitableSigningKeys ("No key with kid: {}" .format (self .jwt .headers ["kid" ]))
219
+ raise NoSuitableSigningKeys (
220
+ "No key with kid: {}" .format (self .jwt .headers ["kid" ])
221
+ )
215
222
else :
216
223
raise NoSuitableSigningKeys (f"No key for algorithm: { _alg } " )
217
224
@@ -335,7 +342,9 @@ def verify_json(self, jws, keys=None, allow_none=False, at_least_one=False):
335
342
_tmp = self .verify_compact (token , keys , allow_none )
336
343
except NoSuitableSigningKeys :
337
344
if at_least_one is True :
338
- logger .warning (f"Could not verify signature with headers: { all_headers } " )
345
+ logger .warning (
346
+ f"Could not verify signature with headers: { all_headers } "
347
+ )
339
348
continue
340
349
else :
341
350
raise
@@ -382,11 +391,10 @@ def _is_json_serialized_jws(self, json_jws):
382
391
"""
383
392
json_ser_keys = {"payload" , "signatures" }
384
393
flattened_json_ser_keys = {"payload" , "signature" }
385
- if not json_ser_keys .issubset (json_jws .keys ()) and not flattened_json_ser_keys .issubset (
386
- json_jws .keys ()
387
- ):
388
- return False
389
- return True
394
+ return not (
395
+ not json_ser_keys .issubset (json_jws .keys ())
396
+ and not flattened_json_ser_keys .issubset (json_jws .keys ())
397
+ )
390
398
391
399
def _is_compact_jws (self , jws ):
392
400
"""
0 commit comments