Skip to content

Commit

Permalink
Improve PyJWKSet error accuracy (#786)
Browse files Browse the repository at this point in the history
* refacto(TestPyJWKSet): crypto_required decorator at the class level

* refacto(TestPyJWKSet): add test to validate the constructor behaviour

* fix(PyJWKSet): improve error accuracy

Co-authored-by: JulianMaurin <julian.maurin@backmarket.com>
  • Loading branch information
JulianMaurin and JulianMaurin committed Aug 1, 2022
1 parent 98a5c1d commit 435e826
Show file tree
Hide file tree
Showing 2 changed files with 18 additions and 9 deletions.
12 changes: 7 additions & 5 deletions jwt/api_jwk.py
@@ -1,3 +1,5 @@
from __future__ import annotations

import json

from .algorithms import get_default_algorithms
Expand Down Expand Up @@ -74,15 +76,15 @@ def public_key_use(self):


class PyJWKSet:
def __init__(self, keys):
def __init__(self, keys: list[dict]) -> None:
self.keys = []

if not keys or not isinstance(keys, list):
raise PyJWKSetError("Invalid JWK Set value")

if len(keys) == 0:
if not keys:
raise PyJWKSetError("The JWK Set did not contain any keys")

if not isinstance(keys, list):
raise PyJWKSetError("Invalid JWK Set value")

for key in keys:
try:
self.keys.append(PyJWK(key))
Expand Down
15 changes: 11 additions & 4 deletions tests/test_api_jwk.py
Expand Up @@ -208,8 +208,8 @@ def test_from_dict_should_throw_exception_if_arg_is_invalid(self):
PyJWK.from_dict(v)


@crypto_required
class TestPyJWKSet:
@crypto_required
def test_should_load_keys_from_jwk_data_dict(self):
algo = RSAAlgorithm(RSAAlgorithm.SHA256)

Expand All @@ -231,7 +231,6 @@ def test_should_load_keys_from_jwk_data_dict(self):
assert jwk.key_id == "keyid-abc123"
assert jwk.public_key_use == "sig"

@crypto_required
def test_should_load_keys_from_jwk_data_json_string(self):
algo = RSAAlgorithm(RSAAlgorithm.SHA256)

Expand All @@ -253,7 +252,6 @@ def test_should_load_keys_from_jwk_data_json_string(self):
assert jwk.key_id == "keyid-abc123"
assert jwk.public_key_use == "sig"

@crypto_required
def test_keyset_should_index_by_kid(self):
algo = RSAAlgorithm(RSAAlgorithm.SHA256)

Expand All @@ -276,7 +274,6 @@ def test_keyset_should_index_by_kid(self):
with pytest.raises(KeyError):
_ = jwk_set["this-kid-does-not-exist"]

@crypto_required
def test_keyset_with_unknown_alg(self):
# first keyset with unusable key and usable key
with open(key_path("jwk_keyset_with_unknown_alg.json")) as keyfile:
Expand All @@ -293,3 +290,13 @@ def test_keyset_with_unknown_alg(self):
assert len(jwks.get("keys")) == 1
with pytest.raises(PyJWKSetError):
_ = PyJWKSet.from_json(jwks_text)

def test_invalid_keys_list(self):
with pytest.raises(PyJWKSetError) as err:
PyJWKSet(keys="string")
assert str(err.value) == "Invalid JWK Set value"

def test_empty_keys_list(self):
with pytest.raises(PyJWKSetError) as err:
PyJWKSet(keys=[])
assert str(err.value) == "The JWK Set did not contain any keys"

0 comments on commit 435e826

Please sign in to comment.