diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index 0f33c79..18edd38 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -16,6 +16,14 @@ repos: pass_filenames: false language: system stages: [push] + - id: black + name: black + description: "Black: The uncompromising Python code formatter" + entry: poetry run black + args: ["--diff"] + language: system + require_serial: true + types_or: [python, pyi] - id: reuse name: reuse entry: poetry run reuse diff --git a/.reuse/dep5 b/.reuse/dep5 index e36f7f3..950cd3c 100644 --- a/.reuse/dep5 +++ b/.reuse/dep5 @@ -3,6 +3,6 @@ Upstream-Name: PySSB Upstream-Contact: Pedro Ferreira Source: https://github.com/pferreir/pyssb -Files: AUTHORS README.rst poetry.lock .gitignore .pre-commit-config.yaml setup.cfg +Files: AUTHORS README.rst poetry.lock .gitignore .pre-commit-config.yaml Copyright: 2023 Gergely Polonkai License: CC0-1.0 diff --git a/examples/test_client.py b/examples/test_client.py index 754eccd..fac62be 100644 --- a/examples/test_client.py +++ b/examples/test_client.py @@ -39,76 +39,86 @@ import base64 api = MuxRPCAPI() -@api.define('createHistoryStream') +@api.define("createHistoryStream") def create_history_stream(connection, msg): - print('create_history_stream', msg) + print("create_history_stream", msg) # msg = PSMessage(PSMessageType.JSON, True, stream=True, end_err=True, req=-req) # connection.write(msg) -@api.define('blobs.createWants') +@api.define("blobs.createWants") def create_wants(connection, msg): - print('create_wants', msg) + print("create_wants", msg) async def test_client(): - async for msg in api.call('createHistoryStream', [{ - 'id': "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", - 'seq': 1, - 'live': False, - 'keys': False - }], 'source'): - print('> RESPONSE:', msg) + async for msg in api.call( + "createHistoryStream", + [ + { + "id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", + "seq": 1, + "live": False, + "keys": False, + } + ], + "source", + ): + print("> RESPONSE:", msg) try: - print('> RESPONSE:', await api.call('whoami', [], 'sync')) + print("> RESPONSE:", await api.call("whoami", [], "sync")) except MuxRPCAPIException as e: print(e) - handler = api.call('gossip.ping', [], 'duplex') - handler.send(struct.pack('l', int(time.time() * 1000)), msg_type=PSMessageType.BUFFER) + handler = api.call("gossip.ping", [], "duplex") + handler.send(struct.pack("l", int(time.time() * 1000)), msg_type=PSMessageType.BUFFER) + async for msg in handler: - print('> RESPONSE:', msg) + print("> RESPONSE:", msg) handler.send(True, end=True) break - img_data = b'' - async for msg in api.call('blobs.get', ['&kqZ52sDcJSHOx7m4Ww80kK1KIZ65gpGnqwZlfaIVWWM=.sha256'], 'source'): - if msg.type.name == 'BUFFER': + img_data = b"" + async for msg in api.call("blobs.get", ["&kqZ52sDcJSHOx7m4Ww80kK1KIZ65gpGnqwZlfaIVWWM=.sha256"], "source"): + if msg.type.name == "BUFFER": img_data += msg.data - if msg.type.name == 'JSON' and msg.data == b'true': - assert (base64.b64encode(hashlib.sha256(img_data).digest()) == - b'kqZ52sDcJSHOx7m4Ww80kK1KIZ65gpGnqwZlfaIVWWM=') - with open('./ub1k.jpg', 'wb') as f: + if msg.type.name == "JSON" and msg.data == b"true": + assert ( + base64.b64encode(hashlib.sha256(img_data).digest()) == b"kqZ52sDcJSHOx7m4Ww80kK1KIZ65gpGnqwZlfaIVWWM=" + ) + + with open("./ub1k.jpg", "wb") as f: f.write(img_data) async def main(): - client = SHSClient('127.0.0.1', 8008, keypair, bytes(keypair.verify_key)) + client = SHSClient("127.0.0.1", 8008, keypair, bytes(keypair.verify_key)) packet_stream = PacketStream(client) await client.open() api.add_connection(packet_stream) await gather(ensure_future(api), test_client()) -if __name__ == '__main__': +if __name__ == "__main__": # create console handler and set level to debug ch = logging.StreamHandler() ch.setLevel(logging.INFO) # create formatter - formatter = ColoredFormatter('%(log_color)s%(levelname)s%(reset)s:%(bold_white)s%(name)s%(reset)s - ' - '%(cyan)s%(message)s%(reset)s') + formatter = ColoredFormatter( + "%(log_color)s%(levelname)s%(reset)s:%(bold_white)s%(name)s%(reset)s - %(cyan)s%(message)s%(reset)s" + ) # add formatter to ch ch.setFormatter(formatter) # add ch to logger - logger = logging.getLogger('packet_stream') + logger = logging.getLogger("packet_stream") logger.setLevel(logging.INFO) logger.addHandler(ch) - keypair = load_ssb_secret()['keypair'] + keypair = load_ssb_secret()["keypair"] loop = get_event_loop() loop.run_until_complete(main()) diff --git a/examples/test_server.py b/examples/test_server.py index 41c814a..8150f6b 100644 --- a/examples/test_server.py +++ b/examples/test_server.py @@ -37,31 +37,32 @@ async def on_connect(conn): packet_stream = PacketStream(conn) api.add_connection(packet_stream) - print('connect', conn) + print("connect", conn) async for msg in packet_stream: print(msg) async def main(): - server = SHSServer('127.0.0.1', 8008, load_ssb_secret()['keypair']) + server = SHSServer("127.0.0.1", 8008, load_ssb_secret()["keypair"]) server.on_connect(on_connect) await server.listen() -if __name__ == '__main__': +if __name__ == "__main__": # create console handler and set level to debug ch = logging.StreamHandler() ch.setLevel(logging.DEBUG) # create formatter - formatter = ColoredFormatter('%(log_color)s%(levelname)s%(reset)s:%(bold_white)s%(name)s%(reset)s - ' - '%(cyan)s%(message)s%(reset)s') + formatter = ColoredFormatter( + "%(log_color)s%(levelname)s%(reset)s:%(bold_white)s%(name)s%(reset)s - " "%(cyan)s%(message)s%(reset)s" + ) # add formatter to ch ch.setFormatter(formatter) # add ch to logger - logger = logging.getLogger('packet_stream') + logger = logging.getLogger("packet_stream") logger.setLevel(logging.DEBUG) logger.addHandler(ch) diff --git a/poetry.lock b/poetry.lock index 55122de..47ca8af 100644 --- a/poetry.lock +++ b/poetry.lock @@ -1,4 +1,4 @@ -# This file is automatically @generated by Poetry 1.6.1 and should not be changed by hand. +# This file is automatically @generated by Poetry 1.7.0 and should not be changed by hand. [[package]] name = "alabaster" @@ -53,6 +53,48 @@ setuptools = {version = "*", markers = "python_version >= \"3.12\""} [package.extras] dev = ["freezegun (>=1.0,<2.0)", "pytest (>=6.0)", "pytest-cov"] +[[package]] +name = "black" +version = "23.11.0" +description = "The uncompromising code formatter." +optional = false +python-versions = ">=3.8" +files = [ + {file = "black-23.11.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:dbea0bb8575c6b6303cc65017b46351dc5953eea5c0a59d7b7e3a2d2f433a911"}, + {file = "black-23.11.0-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:412f56bab20ac85927f3a959230331de5614aecda1ede14b373083f62ec24e6f"}, + {file = "black-23.11.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:d136ef5b418c81660ad847efe0e55c58c8208b77a57a28a503a5f345ccf01394"}, + {file = "black-23.11.0-cp310-cp310-win_amd64.whl", hash = "sha256:6c1cac07e64433f646a9a838cdc00c9768b3c362805afc3fce341af0e6a9ae9f"}, + {file = "black-23.11.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:cf57719e581cfd48c4efe28543fea3d139c6b6f1238b3f0102a9c73992cbb479"}, + {file = "black-23.11.0-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:698c1e0d5c43354ec5d6f4d914d0d553a9ada56c85415700b81dc90125aac244"}, + {file = "black-23.11.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:760415ccc20f9e8747084169110ef75d545f3b0932ee21368f63ac0fee86b221"}, + {file = "black-23.11.0-cp311-cp311-win_amd64.whl", hash = "sha256:58e5f4d08a205b11800332920e285bd25e1a75c54953e05502052738fe16b3b5"}, + {file = "black-23.11.0-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:45aa1d4675964946e53ab81aeec7a37613c1cb71647b5394779e6efb79d6d187"}, + {file = "black-23.11.0-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:4c44b7211a3a0570cc097e81135faa5f261264f4dfaa22bd5ee2875a4e773bd6"}, + {file = "black-23.11.0-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2a9acad1451632021ee0d146c8765782a0c3846e0e0ea46659d7c4f89d9b212b"}, + {file = "black-23.11.0-cp38-cp38-win_amd64.whl", hash = "sha256:fc7f6a44d52747e65a02558e1d807c82df1d66ffa80a601862040a43ec2e3142"}, + {file = "black-23.11.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:7f622b6822f02bfaf2a5cd31fdb7cd86fcf33dab6ced5185c35f5db98260b055"}, + {file = "black-23.11.0-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:250d7e60f323fcfc8ea6c800d5eba12f7967400eb6c2d21ae85ad31c204fb1f4"}, + {file = "black-23.11.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:5133f5507007ba08d8b7b263c7aa0f931af5ba88a29beacc4b2dc23fcefe9c06"}, + {file = "black-23.11.0-cp39-cp39-win_amd64.whl", hash = "sha256:421f3e44aa67138ab1b9bfbc22ee3780b22fa5b291e4db8ab7eee95200726b07"}, + {file = "black-23.11.0-py3-none-any.whl", hash = "sha256:54caaa703227c6e0c87b76326d0862184729a69b73d3b7305b6288e1d830067e"}, + {file = "black-23.11.0.tar.gz", hash = "sha256:4c68855825ff432d197229846f971bc4d6666ce90492e5b02013bcaca4d9ab05"}, +] + +[package.dependencies] +click = ">=8.0.0" +mypy-extensions = ">=0.4.3" +packaging = ">=22.0" +pathspec = ">=0.9.0" +platformdirs = ">=2" +tomli = {version = ">=1.1.0", markers = "python_version < \"3.11\""} +typing-extensions = {version = ">=4.0.1", markers = "python_version < \"3.11\""} + +[package.extras] +colorama = ["colorama (>=0.4.3)"] +d = ["aiohttp (>=3.7.4)"] +jupyter = ["ipython (>=7.8.0)", "tokenize-rt (>=3.2.0)"] +uvloop = ["uvloop (>=0.15.2)"] + [[package]] name = "certifi" version = "2023.7.22" @@ -244,6 +286,20 @@ toml = "*" [package.extras] test = ["mock"] +[[package]] +name = "click" +version = "8.1.7" +description = "Composable command line interface toolkit" +optional = false +python-versions = ">=3.7" +files = [ + {file = "click-8.1.7-py3-none-any.whl", hash = "sha256:ae74fb96c20a0277a1d615f1e4d73c8414f5a98db8b799a7931d1582f3390c28"}, + {file = "click-8.1.7.tar.gz", hash = "sha256:ca9853ad459e787e2192211578cc907e7594e294c7ccc834310722b41b9ca6de"}, +] + +[package.dependencies] +colorama = {version = "*", markers = "platform_system == \"Windows\""} + [[package]] name = "colorama" version = "0.4.6" @@ -554,6 +610,17 @@ files = [ {file = "MarkupSafe-2.1.3.tar.gz", hash = "sha256:af598ed32d6ae86f1b747b82783958b1a4ab8f617b06fe68795c7f026abbdcad"}, ] +[[package]] +name = "mypy-extensions" +version = "1.0.0" +description = "Type system extensions for programs checked with the mypy type checker." +optional = false +python-versions = ">=3.5" +files = [ + {file = "mypy_extensions-1.0.0-py3-none-any.whl", hash = "sha256:4392f6c0eb8a5668a69e23d168ffa70f0be9ccfd32b5cc2d26a34ae5b844552d"}, + {file = "mypy_extensions-1.0.0.tar.gz", hash = "sha256:75dbf8955dc00442a438fc4d0666508a9a97b6bd41aa2f0ffe9d2f2725af0782"}, +] + [[package]] name = "packaging" version = "23.2" @@ -565,6 +632,17 @@ files = [ {file = "packaging-23.2.tar.gz", hash = "sha256:048fb0e9405036518eaaf48a55953c750c11e1a1b68e0dd1a9d62ed0c092cfc5"}, ] +[[package]] +name = "pathspec" +version = "0.11.2" +description = "Utility library for gitignore style pattern matching of file paths." +optional = false +python-versions = ">=3.7" +files = [ + {file = "pathspec-0.11.2-py3-none-any.whl", hash = "sha256:1d6ed233af05e679efb96b1851550ea95bbb64b7c490b0f5aa52996c11e92a20"}, + {file = "pathspec-0.11.2.tar.gz", hash = "sha256:e0d8d0ac2f12da61956eb2306b69f9469b42f4deb0f3cb6ed47b9cce9996ced3"}, +] + [[package]] name = "pep257" version = "0.7.0" @@ -576,6 +654,21 @@ files = [ {file = "pep257-0.7.0.tar.gz", hash = "sha256:f3d67547f5617a9cfeb4b8097ed94a954888315defaf6e9b518ff1719363bf03"}, ] +[[package]] +name = "platformdirs" +version = "4.0.0" +description = "A small Python package for determining appropriate platform-specific dirs, e.g. a \"user data dir\"." +optional = false +python-versions = ">=3.7" +files = [ + {file = "platformdirs-4.0.0-py3-none-any.whl", hash = "sha256:118c954d7e949b35437270383a3f2531e99dd93cf7ce4dc8340d3356d30f173b"}, + {file = "platformdirs-4.0.0.tar.gz", hash = "sha256:cb633b2bcf10c51af60beb0ab06d2f1d69064b43abf4c185ca6b28865f3f9731"}, +] + +[package.extras] +docs = ["furo (>=2023.7.26)", "proselint (>=0.13)", "sphinx (>=7.1.1)", "sphinx-autodoc-typehints (>=1.24)"] +test = ["appdirs (==1.4.4)", "covdefaults (>=2.3)", "pytest (>=7.4)", "pytest-cov (>=4.1)", "pytest-mock (>=3.11.1)"] + [[package]] name = "pluggy" version = "1.3.0" @@ -1091,6 +1184,17 @@ files = [ {file = "tomlkit-0.12.1.tar.gz", hash = "sha256:38e1ff8edb991273ec9f6181244a6a391ac30e9f5098e7535640ea6be97a7c86"}, ] +[[package]] +name = "typing-extensions" +version = "4.8.0" +description = "Backported and Experimental Type Hints for Python 3.8+" +optional = false +python-versions = ">=3.8" +files = [ + {file = "typing_extensions-4.8.0-py3-none-any.whl", hash = "sha256:8f92fc8806f9a6b641eaa5318da32b44d401efaac0f6678c9bc448ba3605faa0"}, + {file = "typing_extensions-4.8.0.tar.gz", hash = "sha256:df8e4339e9cb77357558cbdbceca33c303714cf861d1eef15e1070055ae8b7ef"}, +] + [[package]] name = "urllib3" version = "2.0.7" @@ -1137,4 +1241,4 @@ testing = ["big-O", "jaraco.functools", "jaraco.itertools", "more-itertools", "p [metadata] lock-version = "2.0" python-versions = "^3.9" -content-hash = "d61fa17ada60d932d45c104bf4d45b79411c743d3eb129f65751c8d57c4bea15" +content-hash = "68f8505b0bc199dbcf9d3ea4ae37ee43f36128d05427ea99bd3a09fb201bcd72" diff --git a/pyproject.toml b/pyproject.toml index ec7229c..e65c003 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -19,7 +19,9 @@ simplejson = "3.16.0" colorlog = "^6.7.0" [tool.poetry.group.dev.dependencies] +black = "^23.10.1" check-manifest = "^0.39" +commitizen = "^3.12.0" coverage = "^7.3.2" isort = "^4.3.20" pep257 = "^0.7.0" @@ -27,11 +29,13 @@ pytest = "^7.4.3" pytest-asyncio = "^0.21.1" pytest-cov = "^4.1.0" pytest-mock = "^3.12.0" -commitizen = "^3.12.0" [tool.poetry.group.docs.dependencies] Sphinx = "^2.1.1" +[tool.black] +line-length = 120 + [tool.coverage.run] branch = true diff --git a/setup.cfg b/setup.cfg deleted file mode 100644 index aa079ec..0000000 --- a/setup.cfg +++ /dev/null @@ -1,2 +0,0 @@ -[flake8] -max-line-length=120 diff --git a/ssb/feed/__init__.py b/ssb/feed/__init__.py index 32fd558..f09dad4 100644 --- a/ssb/feed/__init__.py +++ b/ssb/feed/__init__.py @@ -22,4 +22,4 @@ from .models import Feed, LocalFeed, Message, LocalMessage, NoPrivateKeyException -__all__ = ('Feed', 'LocalFeed', 'Message', 'LocalMessage', 'NoPrivateKeyException') +__all__ = ("Feed", "LocalFeed", "Message", "LocalMessage", "NoPrivateKeyException") diff --git a/ssb/feed/models.py b/ssb/feed/models.py index 48a57fe..097b516 100644 --- a/ssb/feed/models.py +++ b/ssb/feed/models.py @@ -30,7 +30,7 @@ from simplejson import dumps, loads from ssb.util import tag -OrderedMsg = namedtuple('OrderedMsg', ('previous', 'author', 'sequence', 'timestamp', 'hash', 'content')) +OrderedMsg = namedtuple("OrderedMsg", ("previous", "author", "sequence", "timestamp", "hash", "content")) class NoPrivateKeyException(Exception): @@ -52,10 +52,10 @@ class Feed(object): @property def id(self): - return tag(self.public_key).decode('ascii') + return tag(self.public_key).decode("ascii") def sign(self, msg): - raise NoPrivateKeyException('Cannot use remote identity to sign (no private key!)') + raise NoPrivateKeyException("Cannot use remote identity to sign (no private key!)") class LocalFeed(Feed): @@ -90,24 +90,26 @@ class Message(object): @classmethod def parse(cls, data, feed): obj = loads(data, object_pairs_hook=OrderedDict) - msg = cls(feed, obj['content'], timestamp=obj['timestamp']) + msg = cls(feed, obj["content"], timestamp=obj["timestamp"]) return msg def serialize(self, add_signature=True): - return dumps(self.to_dict(add_signature=add_signature), indent=2).encode('utf-8') + return dumps(self.to_dict(add_signature=add_signature), indent=2).encode("utf-8") def to_dict(self, add_signature=True): - obj = to_ordered({ - 'previous': self.previous.key if self.previous else None, - 'author': self.feed.id, - 'sequence': self.sequence, - 'timestamp': self.timestamp, - 'hash': 'sha256', - 'content': self.content - }) + obj = to_ordered( + { + "previous": self.previous.key if self.previous else None, + "author": self.feed.id, + "sequence": self.sequence, + "timestamp": self.timestamp, + "hash": "sha256", + "content": self.content, + } + ) if add_signature: - obj['signature'] = self.signature + obj["signature"] = self.signature return obj def verify(self, signature): @@ -116,11 +118,11 @@ class Message(object): @property def hash(self): hash = sha256(self.serialize()).digest() - return b64encode(hash).decode('ascii') + '.sha256' + return b64encode(hash).decode("ascii") + ".sha256" @property def key(self): - return '%' + self.hash + return "%" + self.hash class LocalMessage(Message): @@ -144,4 +146,4 @@ class LocalMessage(Message): def _sign(self): # ensure ordering of keys and indentation of 2 characters, like ssb-keys data = self.serialize(add_signature=False) - return (b64encode(bytes(self.feed.sign(data))) + b'.sig.ed25519').decode('ascii') + return (b64encode(bytes(self.feed.sign(data))) + b".sig.ed25519").decode("ascii") diff --git a/ssb/muxrpc.py b/ssb/muxrpc.py index 7e78519..02cca31 100644 --- a/ssb/muxrpc.py +++ b/ssb/muxrpc.py @@ -34,8 +34,8 @@ class MuxRPCAPIException(Exception): class MuxRPCHandler(object): def check_message(self, msg): body = msg.body - if isinstance(body, dict) and 'name' in body and body['name'] == 'Error': - raise MuxRPCAPIException(body['message']) + if isinstance(body, dict) and "name" in body and body["name"] == "Error": + raise MuxRPCAPIException(body["message"]) class MuxRPCRequestHandler(MuxRPCHandler): @@ -43,7 +43,7 @@ class MuxRPCRequestHandler(MuxRPCHandler): self.ps_handler = ps_handler def __await__(self): - msg = (yield from self.ps_handler.__await__()) + msg = yield from self.ps_handler.__await__() self.check_message(msg) return msg @@ -63,7 +63,6 @@ class MuxRPCSourceHandler(MuxRPCHandler): class MuxRPCSinkHandlerMixin(object): - def send(self, msg, msg_type=PSMessageType.JSON, end=False): self.connection.send(msg, stream=True, msg_type=msg_type, req=self.req, end_err=end) @@ -82,13 +81,13 @@ class MuxRPCSinkHandler(MuxRPCHandler, MuxRPCSinkHandlerMixin): def _get_appropriate_api_handler(type_, connection, ps_handler, req): - if type_ in {'sync', 'async'}: + if type_ in {"sync", "async"}: return MuxRPCRequestHandler(ps_handler) - elif type_ == 'source': + elif type_ == "source": return MuxRPCSourceHandler(ps_handler) - elif type_ == 'sink': + elif type_ == "sink": return MuxRPCSinkHandler(connection, req) - elif type_ == 'duplex': + elif type_ == "duplex": return MuxRPCDuplexHandler(ps_handler, connection, req) @@ -96,14 +95,14 @@ class MuxRPCRequest(object): @classmethod def from_message(cls, message): body = message.body - return cls('.'.join(body['name']), body['args']) + return cls(".".join(body["name"]), body["args"]) def __init__(self, name, args): self.name = name self.args = args def __repr__(self): - return ''.format(self) + return "".format(self) class MuxRPCMessage(object): @@ -115,7 +114,7 @@ class MuxRPCMessage(object): self.body = body def __repr__(self): - return ''.format(self) + return "".format(self) class MuxRPCAPI(object): @@ -128,7 +127,7 @@ class MuxRPCAPI(object): body = req_message.body if req_message is None: return - if isinstance(body, dict) and body.get('name'): + if isinstance(body, dict) and body.get("name"): self.process(self.connection, MuxRPCRequest.from_message(req_message)) def add_connection(self, connection): @@ -141,22 +140,23 @@ class MuxRPCAPI(object): @wraps(f) def _f(*args, **kwargs): return f(*args, **kwargs) + return f + return _handle def process(self, connection, request): handler = self.handlers.get(request.name) if not handler: - raise MuxRPCAPIException('Method {} not found!'.format(request.name)) + raise MuxRPCAPIException("Method {} not found!".format(request.name)) handler(connection, request) - def call(self, name, args, type_='sync'): + def call(self, name, args, type_="sync"): if not self.connection.is_connected: - raise Exception('not connected') + raise Exception("not connected") old_counter = self.connection.req_counter - ps_handler = self.connection.send({ - 'name': name.split('.'), - 'args': args, - 'type': type_ - }, stream=type_ in {'sink', 'source', 'duplex'}) + ps_handler = self.connection.send( + {"name": name.split("."), "args": args, "type": type_}, + stream=type_ in {"sink", "source", "duplex"}, + ) return _get_appropriate_api_handler(type_, self.connection, ps_handler, old_counter) diff --git a/ssb/packet_stream.py b/ssb/packet_stream.py index 634eb51..bb18504 100644 --- a/ssb/packet_stream.py +++ b/ssb/packet_stream.py @@ -33,7 +33,7 @@ from async_generator import async_generator, yield_ from secret_handshake import SHSClient, SHSServer -logger = logging.getLogger('packet_stream') +logger = logging.getLogger("packet_stream") class PSMessageType(Enum): @@ -85,13 +85,12 @@ class PSRequestHandler(object): class PSMessage(object): - @classmethod def from_header_body(cls, flags, req, body): type_ = PSMessageType(flags & 0x03) if type_ == PSMessageType.TEXT: - body = body.decode('utf-8') + body = body.decode("utf-8") elif type_ == PSMessageType.JSON: body = simplejson.loads(body) @@ -100,9 +99,9 @@ class PSMessage(object): @property def data(self): if self.type == PSMessageType.TEXT: - return self.body.encode('utf-8') + return self.body.encode("utf-8") elif self.type == PSMessageType.JSON: - return simplejson.dumps(self.body).encode('utf-8') + return simplejson.dumps(self.body).encode("utf-8") return self.body def __init__(self, type_, body, stream, end_err, req=None): @@ -114,12 +113,16 @@ class PSMessage(object): def __repr__(self): if self.type == PSMessageType.BUFFER: - body = '{} bytes'.format(len(self.body)) + body = "{} bytes".format(len(self.body)) else: body = self.body - return ''.format(self.type.name, body, - '' if self.req is None else ' [{}]'.format(self.req), - '~' if self.stream else '', '!' if self.end_err else '') + return "".format( + self.type.name, + body, + "" if self.req is None else " [{}]".format(self.req), + "~" if self.stream else "", + "!" if self.end_err else "", + ) class PacketStream(object): @@ -147,27 +150,27 @@ class PacketStream(object): async def __await__(self): async for data in self: - logger.info('RECV: %r', data) + logger.info("RECV: %r", data) if data is None: return async def _read(self): try: header = await self.connection.read() - if not header or header == b'\x00' * 9: + if not header or header == b"\x00" * 9: return - flags, length, req = struct.unpack('>BIi', header) + flags, length, req = struct.unpack(">BIi", header) n_packets = ceil(length / 4096) - body = b'' + body = b"" for n in range(n_packets): body += await self.connection.read() - logger.debug('READ %s %s', header, len(body)) + logger.debug("READ %s %s", header, len(body)) return PSMessage.from_header_body(flags, req, body) except StopAsyncIteration: - logger.debug('DISCONNECT') + logger.debug("DISCONNECT") self.connection.disconnect() return None @@ -179,21 +182,25 @@ class PacketStream(object): if msg.req < 0: t, handler = self._event_map[-msg.req] await handler.process(msg) - logger.info('RESPONSE [%d]: %r', -msg.req, msg) + logger.info("RESPONSE [%d]: %r", -msg.req, msg) if msg.end_err: await handler.stop() del self._event_map[-msg.req] - logger.info('RESPONSE [%d]: EOS', -msg.req) + logger.info("RESPONSE [%d]: EOS", -msg.req) return msg def _write(self, msg): - logger.info('SEND [%d]: %r', msg.req, msg) - header = struct.pack('>BIi', (int(msg.stream) << 3) | (int(msg.end_err) << 2) | msg.type.value, len(msg.data), - msg.req) + logger.info("SEND [%d]: %r", msg.req, msg) + header = struct.pack( + ">BIi", + (int(msg.stream) << 3) | (int(msg.end_err) << 2) | msg.type.value, + len(msg.data), + msg.req, + ) self.connection.write(header) self.connection.write(msg.data) - logger.debug('WRITE HDR: %s', header) - logger.debug('WRITE DATA: %s', msg.data) + logger.debug("WRITE HDR: %s", header) + logger.debug("WRITE DATA: %s", msg.data) def send(self, data, msg_type=PSMessageType.JSON, stream=False, end_err=False, req=None): update_counter = False diff --git a/ssb/util.py b/ssb/util.py index 36f7a69..281d248 100644 --- a/ssb/util.py +++ b/ssb/util.py @@ -33,19 +33,16 @@ class ConfigException(Exception): def tag(key): """Create tag from publick key.""" - return b'@' + b64encode(bytes(key)) + b'.ed25519' + return b"@" + b64encode(bytes(key)) + b".ed25519" def load_ssb_secret(): """Load SSB keys from ~/.ssb""" - with open(os.path.expanduser('~/.ssb/secret')) as f: + with open(os.path.expanduser("~/.ssb/secret")) as f: config = yaml.load(f, Loader=yaml.SafeLoader) - if config['curve'] != 'ed25519': - raise ConfigException('Algorithm not known: ' + config['curve']) + if config["curve"] != "ed25519": + raise ConfigException("Algorithm not known: " + config["curve"]) - server_prv_key = b64decode(config['private'][:-8]) - return { - 'keypair': SigningKey(server_prv_key[:32]), - 'id': config['id'] - } + server_prv_key = b64decode(config["private"][:-8]) + return {"keypair": SigningKey(server_prv_key[:32]), "id": config["id"]} diff --git a/tests/test_feed.py b/tests/test_feed.py index 1afef77..146c12a 100644 --- a/tests/test_feed.py +++ b/tests/test_feed.py @@ -47,115 +47,167 @@ SERIALIZED_M1 = b"""{ @pytest.fixture() def local_feed(): - secret = b64decode('Mz2qkNOP2K6upnqibWrR+z8pVUI1ReA1MLc7QMtF2qQ=') + secret = b64decode("Mz2qkNOP2K6upnqibWrR+z8pVUI1ReA1MLc7QMtF2qQ=") return LocalFeed(SigningKey(secret)) @pytest.fixture() def remote_feed(): - public = b64decode('I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=') + public = b64decode("I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=") return Feed(VerifyKey(public)) def test_local_feed(): - secret = b64decode('Mz2qkNOP2K6upnqibWrR+z8pVUI1ReA1MLc7QMtF2qQ=') + secret = b64decode("Mz2qkNOP2K6upnqibWrR+z8pVUI1ReA1MLc7QMtF2qQ=") feed = LocalFeed(SigningKey(secret)) assert bytes(feed.private_key) == secret - assert bytes(feed.public_key) == b64decode('I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=') - assert feed.id == '@I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=.ed25519' + assert bytes(feed.public_key) == b64decode("I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=") + assert feed.id == "@I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=.ed25519" def test_remote_feed(): - public = b64decode('I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=') + public = b64decode("I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=") feed = Feed(VerifyKey(public)) assert bytes(feed.public_key) == public - assert feed.id == '@I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=.ed25519' + assert feed.id == "@I/4cyN/jPBbDsikbHzAEvmaYlaJK33lW3UhWjNXjyrU=.ed25519" - m1 = Message(feed, OrderedDict([ - ('type', 'about'), - ('about', feed.id), - ('name', 'neo'), - ('description', 'The Chosen One') - ]), 'foo', timestamp=1495706260190) + m1 = Message( + feed, + OrderedDict( + [ + ("type", "about"), + ("about", feed.id), + ("name", "neo"), + ("description", "The Chosen One"), + ] + ), + "foo", + timestamp=1495706260190, + ) with pytest.raises(NoPrivateKeyException): feed.sign(m1) def test_local_message(local_feed): - m1 = LocalMessage(local_feed, OrderedDict([ - ('type', 'about'), - ('about', local_feed.id), - ('name', 'neo'), - ('description', 'The Chosen One') - ]), timestamp=1495706260190) + m1 = LocalMessage( + local_feed, + OrderedDict( + [ + ("type", "about"), + ("about", local_feed.id), + ("name", "neo"), + ("description", "The Chosen One"), + ] + ), + timestamp=1495706260190, + ) assert m1.timestamp == 1495706260190 assert m1.previous is None assert m1.sequence == 1 - assert m1.signature == \ - 'lPsQ9P10OgeyH6u0unFgiI2wV/RQ7Q2x2ebxnXYCzsJ055TBMXphRADTKhOMS2EkUxXQ9k3amj5fnWPudGxwBQ==.sig.ed25519' - assert m1.key == '%xRDqws/TrQmOd4aEwZ32jdLhP873ZKjIgHlggPR0eoo=.sha256' + assert ( + m1.signature + == "lPsQ9P10OgeyH6u0unFgiI2wV/RQ7Q2x2ebxnXYCzsJ055TBMXphRADTKhOMS2EkUxXQ9k3amj5fnWPudGxwBQ==.sig.ed25519" + ) + assert m1.key == "%xRDqws/TrQmOd4aEwZ32jdLhP873ZKjIgHlggPR0eoo=.sha256" - m2 = LocalMessage(local_feed, OrderedDict([ - ('type', 'about'), - ('about', local_feed.id), - ('name', 'morpheus'), - ('description', 'Dude with big jaw') - ]), previous=m1, timestamp=1495706447426) + m2 = LocalMessage( + local_feed, + OrderedDict( + [ + ("type", "about"), + ("about", local_feed.id), + ("name", "morpheus"), + ("description", "Dude with big jaw"), + ] + ), + previous=m1, + timestamp=1495706447426, + ) assert m2.timestamp == 1495706447426 assert m2.previous is m1 assert m2.sequence == 2 - assert m2.signature == \ - '3SY85LX6/ppOfP4SbfwZbKfd6DccbLRiB13pwpzbSK0nU52OEJxOqcJ2Uensr6RkrWztWLIq90sNOn1zRAoOAw==.sig.ed25519' - assert m2.key == '%nx13uks5GUwuKJC49PfYGMS/1pgGTtwwdWT7kbVaroM=.sha256' + assert ( + m2.signature + == "3SY85LX6/ppOfP4SbfwZbKfd6DccbLRiB13pwpzbSK0nU52OEJxOqcJ2Uensr6RkrWztWLIq90sNOn1zRAoOAw==.sig.ed25519" + ) + assert m2.key == "%nx13uks5GUwuKJC49PfYGMS/1pgGTtwwdWT7kbVaroM=.sha256" def test_remote_message(remote_feed): - signature = 'lPsQ9P10OgeyH6u0unFgiI2wV/RQ7Q2x2ebxnXYCzsJ055TBMXphRADTKhOMS2EkUxXQ9k3amj5fnWPudGxwBQ==.sig.ed25519' - m1 = Message(remote_feed, OrderedDict([ - ('type', 'about'), - ('about', remote_feed.id), - ('name', 'neo'), - ('description', 'The Chosen One') - ]), signature, timestamp=1495706260190) + signature = "lPsQ9P10OgeyH6u0unFgiI2wV/RQ7Q2x2ebxnXYCzsJ055TBMXphRADTKhOMS2EkUxXQ9k3amj5fnWPudGxwBQ==.sig.ed25519" + m1 = Message( + remote_feed, + OrderedDict( + [ + ("type", "about"), + ("about", remote_feed.id), + ("name", "neo"), + ("description", "The Chosen One"), + ] + ), + signature, + timestamp=1495706260190, + ) assert m1.timestamp == 1495706260190 assert m1.previous is None assert m1.sequence == 1 assert m1.signature == signature - assert m1.key == '%xRDqws/TrQmOd4aEwZ32jdLhP873ZKjIgHlggPR0eoo=.sha256' + assert m1.key == "%xRDqws/TrQmOd4aEwZ32jdLhP873ZKjIgHlggPR0eoo=.sha256" - signature = '3SY85LX6/ppOfP4SbfwZbKfd6DccbLRiB13pwpzbSK0nU52OEJxOqcJ2Uensr6RkrWztWLIq90sNOn1zRAoOAw==.sig.ed25519' - m2 = Message(remote_feed, OrderedDict([ - ('type', 'about'), - ('about', remote_feed.id), - ('name', 'morpheus'), - ('description', 'Dude with big jaw') - ]), signature, previous=m1, timestamp=1495706447426) + signature = "3SY85LX6/ppOfP4SbfwZbKfd6DccbLRiB13pwpzbSK0nU52OEJxOqcJ2Uensr6RkrWztWLIq90sNOn1zRAoOAw==.sig.ed25519" + m2 = Message( + remote_feed, + OrderedDict( + [ + ("type", "about"), + ("about", remote_feed.id), + ("name", "morpheus"), + ("description", "Dude with big jaw"), + ] + ), + signature, + previous=m1, + timestamp=1495706447426, + ) assert m2.timestamp == 1495706447426 assert m2.previous is m1 assert m2.sequence == 2 assert m2.signature == signature m2.verify(signature) - assert m2.key == '%nx13uks5GUwuKJC49PfYGMS/1pgGTtwwdWT7kbVaroM=.sha256' + assert m2.key == "%nx13uks5GUwuKJC49PfYGMS/1pgGTtwwdWT7kbVaroM=.sha256" def test_remote_no_signature(remote_feed): with pytest.raises(ValueError): - Message(remote_feed, OrderedDict([ - ('type', 'about'), - ('about', remote_feed.id), - ('name', 'neo'), - ('description', 'The Chosen One') - ]), None, timestamp=1495706260190) + Message( + remote_feed, + OrderedDict( + [ + ("type", "about"), + ("about", remote_feed.id), + ("name", "neo"), + ("description", "The Chosen One"), + ] + ), + None, + timestamp=1495706260190, + ) def test_serialize(local_feed): - m1 = LocalMessage(local_feed, OrderedDict([ - ('type', 'about'), - ('about', local_feed.id), - ('name', 'neo'), - ('description', 'The Chosen One') - ]), timestamp=1495706260190) + m1 = LocalMessage( + local_feed, + OrderedDict( + [ + ("type", "about"), + ("about", local_feed.id), + ("name", "neo"), + ("description", "The Chosen One"), + ] + ), + timestamp=1495706260190, + ) assert m1.serialize() == SERIALIZED_M1 @@ -163,9 +215,9 @@ def test_serialize(local_feed): def test_parse(local_feed): m1 = LocalMessage.parse(SERIALIZED_M1, local_feed) assert m1.content == { - 'type': 'about', - 'about': local_feed.id, - 'name': 'neo', - 'description': 'The Chosen One' + "type": "about", + "about": local_feed.id, + "name": "neo", + "description": "The Chosen One", } assert m1.timestamp == 1495706260190 diff --git a/tests/test_packet_stream.py b/tests/test_packet_stream.py index eb1dc04..f6bdbdd 100644 --- a/tests/test_packet_stream.py +++ b/tests/test_packet_stream.py @@ -36,20 +36,25 @@ async def _collect_messages(generator): results.append(msg) return results -MSG_BODY_1 = (b'{"previous":"%KTGP6W8vF80McRAZHYDWuKOD0KlNyKSq6Gb42iuV7Iw=.sha256","author":"@1+Iwm79DKvVBqYKFkhT6fWRbA' - b'VvNNVH4F2BSxwhYmx8=.ed25519","sequence":116,"timestamp":1496696699331,"hash":"sha256","content":{"type"' - b':"post","channel":"crypto","text":"Does anybody know any good resources (e.g. books) to learn cryptogra' - b'phy? I\'m not speaking of basic concepts (e.g. what\'s a private key) but the actual mathematics behind' - b' the whole thing.\\nI have a copy of the \\"Handbook of Applied Cryptography\\" on my bookshelf but I f' - b'ound it too long/hard to follow. Are there any better alternatives?","mentions":[]},"signature":"hqKePb' - b'bTXWxEi1njDnOWFsL0M0AoNoWyBFgNE6KXj//DThepaZSy9vRbygDHX5uNmCdyOrsQrwZsZhmUYKwtDQ==.sig.ed25519"}') -MSG_BODY_2 = (b'{"previous":"%iQRhPyqmNLpGaO1Tpm1I22jqnUEwRwkCTDbwAGtM+lY=.sha256","author":"@1+Iwm79DKvVBqYKFkhT6fWRbA' - b'VvNNVH4F2BSxwhYmx8=.ed25519","sequence":103,"timestamp":1496674211806,"hash":"sha256","content":{"type"' - b':"post","channel":"git-ssb","text":"Is it only me or `git.scuttlebot.io` is timing out?\\n\\nE.g. try a' - b'ccessing %vZCTqraoqKBKNZeATErXEtnoEr+wnT3p8tT+vL+29I4=.sha256","mentions":[{"link":"%vZCTqraoqKBKNZeATE' - b'rXEtnoEr+wnT3p8tT+vL+29I4=.sha256"}]},"signature":"+i4U0HUGDDEyNoNr2NIROPnT3WQj3RuTaIhY5koWW8f0vwr4tZsY' - b'mAkqqMwFWfP+eBIbc7DZ835er6r6h9CwAg==.sig.ed25519"}') +MSG_BODY_1 = ( + b'{"previous":"%KTGP6W8vF80McRAZHYDWuKOD0KlNyKSq6Gb42iuV7Iw=.sha256","author":"@1+Iwm79DKvVBqYKFkhT6fWRbA' + b'VvNNVH4F2BSxwhYmx8=.ed25519","sequence":116,"timestamp":1496696699331,"hash":"sha256","content":{"type"' + b':"post","channel":"crypto","text":"Does anybody know any good resources (e.g. books) to learn cryptogra' + b"phy? I'm not speaking of basic concepts (e.g. what's a private key) but the actual mathematics behind" + b' the whole thing.\\nI have a copy of the \\"Handbook of Applied Cryptography\\" on my bookshelf but I f' + b'ound it too long/hard to follow. Are there any better alternatives?","mentions":[]},"signature":"hqKePb' + b'bTXWxEi1njDnOWFsL0M0AoNoWyBFgNE6KXj//DThepaZSy9vRbygDHX5uNmCdyOrsQrwZsZhmUYKwtDQ==.sig.ed25519"}' +) + +MSG_BODY_2 = ( + b'{"previous":"%iQRhPyqmNLpGaO1Tpm1I22jqnUEwRwkCTDbwAGtM+lY=.sha256","author":"@1+Iwm79DKvVBqYKFkhT6fWRbA' + b'VvNNVH4F2BSxwhYmx8=.ed25519","sequence":103,"timestamp":1496674211806,"hash":"sha256","content":{"type"' + b':"post","channel":"git-ssb","text":"Is it only me or `git.scuttlebot.io` is timing out?\\n\\nE.g. try a' + b'ccessing %vZCTqraoqKBKNZeATErXEtnoEr+wnT3p8tT+vL+29I4=.sha256","mentions":[{"link":"%vZCTqraoqKBKNZeATE' + b'rXEtnoEr+wnT3p8tT+vL+29I4=.sha256"}]},"signature":"+i4U0HUGDDEyNoNr2NIROPnT3WQj3RuTaIhY5koWW8f0vwr4tZsY' + b'mAkqqMwFWfP+eBIbc7DZ835er6r6h9CwAg==.sig.ed25519"}' +) class MockSHSSocket(SHSDuplexStream): @@ -129,26 +134,28 @@ async def test_message_decoding(ps_client): assert ps.is_connected - ps_client.feed([ - b'\n\x00\x00\x00\x9a\x00\x00\x04\xfb', - b'{"name":["createHistoryStream"],"args":[{"id":"@omgyp7Pnrw+Qm0I6T6Fh5VvnKmodMXwnxTIesW2DgMg=.ed25519",' - b'"seq":10,"live":true,"keys":false}],"type":"source"}' - ]) + ps_client.feed( + [ + b"\n\x00\x00\x00\x9a\x00\x00\x04\xfb", + b'{"name":["createHistoryStream"],"args":[{"id":"@omgyp7Pnrw+Qm0I6T6Fh5VvnKmodMXwnxTIesW2DgMg=.ed25519",' + b'"seq":10,"live":true,"keys":false}],"type":"source"}', + ] + ) - messages = (await _collect_messages(ps)) + messages = await _collect_messages(ps) assert len(messages) == 1 assert messages[0].type == PSMessageType.JSON assert messages[0].body == { - 'name': ['createHistoryStream'], - 'args': [ + "name": ["createHistoryStream"], + "args": [ { - 'id': '@omgyp7Pnrw+Qm0I6T6Fh5VvnKmodMXwnxTIesW2DgMg=.ed25519', - 'seq': 10, - 'live': True, - 'keys': False + "id": "@omgyp7Pnrw+Qm0I6T6Fh5VvnKmodMXwnxTIesW2DgMg=.ed25519", + "seq": 10, + "live": True, + "keys": False, } ], - 'type': 'source' + "type": "source", } @@ -160,26 +167,36 @@ async def test_message_encoding(ps_client): assert ps.is_connected - ps.send({ - 'name': ['createHistoryStream'], - 'args': [{ - 'id': "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", - 'seq': 1, - 'live': False, - 'keys': False - }], - 'type': 'source' - }, stream=True) + ps.send( + { + "name": ["createHistoryStream"], + "args": [ + { + "id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", + "seq": 1, + "live": False, + "keys": False, + } + ], + "type": "source", + }, + stream=True, + ) header, body = list(ps_client.get_output()) - assert header == b'\x0a\x00\x00\x00\xa6\x00\x00\x00\x01' - assert json.loads(body.decode('utf-8')) == { + assert header == b"\x0a\x00\x00\x00\xa6\x00\x00\x00\x01" + assert json.loads(body.decode("utf-8")) == { "name": ["createHistoryStream"], "args": [ - {"id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", "seq": 1, "live": False, "keys": False} + { + "id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", + "seq": 1, + "live": False, + "keys": False, + } ], - "type": "source" + "type": "source", } @@ -188,56 +205,72 @@ async def test_message_stream(ps_client, mocker): await ps_client.connect() ps = PacketStream(ps_client) - mocker.patch.object(ps, 'register_handler', wraps=ps.register_handler) + mocker.patch.object(ps, "register_handler", wraps=ps.register_handler) assert ps.is_connected - ps.send({ - 'name': ['createHistoryStream'], - 'args': [{ - 'id': "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", - 'seq': 1, - 'live': False, - 'keys': False - }], - 'type': 'source' - }, stream=True) + ps.send( + { + "name": ["createHistoryStream"], + "args": [ + { + "id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", + "seq": 1, + "live": False, + "keys": False, + } + ], + "type": "source", + }, + stream=True, + ) assert ps.req_counter == 2 assert ps.register_handler.call_count == 1 handler = list(ps._event_map.values())[0][1] mock_process = mocker.AsyncMock() - mocker.patch.object(handler, 'process', mock_process) + mocker.patch.object(handler, "process", mock_process) - ps_client.feed([b'\n\x00\x00\x02\xc5\xff\xff\xff\xff', MSG_BODY_1]) + ps_client.feed([b"\n\x00\x00\x02\xc5\xff\xff\xff\xff", MSG_BODY_1]) msg = await ps.read() assert mock_process.await_count == 1 # responses have negative req assert msg.req == -1 - assert msg.body['previous'] == '%KTGP6W8vF80McRAZHYDWuKOD0KlNyKSq6Gb42iuV7Iw=.sha256' + assert msg.body["previous"] == "%KTGP6W8vF80McRAZHYDWuKOD0KlNyKSq6Gb42iuV7Iw=.sha256" assert ps.req_counter == 2 - stream_handler = ps.send({ - 'name': ['createHistoryStream'], - 'args': [{ - 'id': "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", - 'seq': 1, - 'live': False, - 'keys': False - }], - 'type': 'source' - }, stream=True) + stream_handler = ps.send( + { + "name": ["createHistoryStream"], + "args": [ + { + "id": "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519", + "seq": 1, + "live": False, + "keys": False, + } + ], + "type": "source", + }, + stream=True, + ) assert ps.req_counter == 3 assert ps.register_handler.call_count == 2 handler = list(ps._event_map.values())[1][1] - mock_process = mocker.patch.object(handler, 'process', wraps=handler.process) - ps_client.feed([b'\n\x00\x00\x02\xc5\xff\xff\xff\xfe', MSG_BODY_1, - b'\x0e\x00\x00\x023\xff\xff\xff\xfe', MSG_BODY_2]) + mock_process = mocker.patch.object(handler, "process", wraps=handler.process) + ps_client.feed( + [ + b"\n\x00\x00\x02\xc5\xff\xff\xff\xfe", + MSG_BODY_1, + b"\x0e\x00\x00\x023\xff\xff\xff\xfe", + MSG_BODY_2, + ] + ) # execute both message polling and response handling loops collected, handled = await gather(_collect_messages(ps), _collect_messages(stream_handler)) @@ -258,29 +291,30 @@ async def test_message_request(ps_server, mocker): ps = PacketStream(ps_server) - mocker.patch.object(ps, 'register_handler', wraps=ps.register_handler) + mocker.patch.object(ps, "register_handler", wraps=ps.register_handler) - ps.send({ - 'name': ['whoami'], - 'args': [] - }) + ps.send({"name": ["whoami"], "args": []}) header, body = list(ps_server.get_output()) - assert header == b'\x02\x00\x00\x00 \x00\x00\x00\x01' - assert json.loads(body.decode('utf-8')) == {"name": ["whoami"], "args": []} + assert header == b"\x02\x00\x00\x00 \x00\x00\x00\x01" + assert json.loads(body.decode("utf-8")) == {"name": ["whoami"], "args": []} assert ps.req_counter == 2 assert ps.register_handler.call_count == 1 handler = list(ps._event_map.values())[0][1] mock_process = mocker.AsyncMock() - mocker.patch.object(handler, 'process', mock_process) - ps_server.feed([b'\x02\x00\x00\x00>\xff\xff\xff\xff', - b'{"id":"@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519"}']) + mocker.patch.object(handler, "process", mock_process) + ps_server.feed( + [ + b"\x02\x00\x00\x00>\xff\xff\xff\xff", + b'{"id":"@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519"}', + ] + ) msg = await ps.read() assert mock_process.await_count == 1 # responses have negative req assert msg.req == -1 - assert msg.body['id'] == '@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519' + assert msg.body["id"] == "@1+Iwm79DKvVBqYKFkhT6fWRbAVvNNVH4F2BSxwhYmx8=.ed25519" assert ps.req_counter == 2 diff --git a/tests/test_util.py b/tests/test_util.py index fe660d6..f45d4d7 100644 --- a/tests/test_util.py +++ b/tests/test_util.py @@ -38,21 +38,21 @@ CONFIG_FILE = """ } """ -CONFIG_FILE_INVALID = CONFIG_FILE.replace('ed25519', 'foo') +CONFIG_FILE_INVALID = CONFIG_FILE.replace("ed25519", "foo") def test_load_secret(): - with patch('ssb.util.open', mock_open(read_data=CONFIG_FILE), create=True): + with patch("ssb.util.open", mock_open(read_data=CONFIG_FILE), create=True): secret = load_ssb_secret() priv_key = b'\xfd\xba\x83\x04\x8f\xef\x18\xb0\xf9\xab-\xc6\xc4\xcb \x1cX\x18"\xba\xd8\xd3\xc2_O5\x1a\t\x84\xfa\xc7A' - assert secret['id'] == '@rsYpBIcXsxjQAf0JNes+MHqT2DL+EfopWKAp4rGeEPQ=.ed25519' - assert bytes(secret['keypair']) == priv_key - assert bytes(secret['keypair'].verify_key) == b64decode('rsYpBIcXsxjQAf0JNes+MHqT2DL+EfopWKAp4rGeEPQ=') + assert secret["id"] == "@rsYpBIcXsxjQAf0JNes+MHqT2DL+EfopWKAp4rGeEPQ=.ed25519" + assert bytes(secret["keypair"]) == priv_key + assert bytes(secret["keypair"].verify_key) == b64decode("rsYpBIcXsxjQAf0JNes+MHqT2DL+EfopWKAp4rGeEPQ=") def test_load_exception(): with pytest.raises(ConfigException): - with patch('ssb.util.open', mock_open(read_data=CONFIG_FILE_INVALID), create=True): + with patch("ssb.util.open", mock_open(read_data=CONFIG_FILE_INVALID), create=True): load_ssb_secret()