OXIESEC PANEL
- Current Dir:
/
/
snap
/
certbot
/
4737
/
lib
/
python3.12
/
site-packages
/
acme
/
_internal
/
tests
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
06/12/2025 06:19:48 PM
rwxr-xr-x
📄
__init__.py
17 bytes
06/12/2025 06:19:38 PM
rw-r--r--
📁
__pycache__
-
06/12/2025 06:19:48 PM
rwxr-xr-x
📄
challenges_test.py
18.51 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
client_test.py
46.09 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
crypto_util_test.py
11.8 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
errors_test.py
2.66 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
fields_test.py
1.68 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
jose_test.py
1.78 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
jws_test.py
2.08 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
messages_test.py
19.89 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
standalone_test.py
9.81 KB
06/12/2025 06:19:38 PM
rw-r--r--
📄
test_util.py
2.54 KB
06/12/2025 06:19:38 PM
rw-r--r--
📁
testdata
-
06/12/2025 06:19:48 PM
rwxr-xr-x
📄
util_test.py
380 bytes
06/12/2025 06:19:38 PM
rw-r--r--
Editing: jws_test.py
Close
"""Tests for acme.jws.""" import sys import unittest import josepy as jose import pytest from acme._internal.tests import test_util KEY = jose.JWKRSA.load(test_util.load_vector('rsa512_key.pem')) class HeaderTest(unittest.TestCase): """Tests for acme.jws.Header.""" good_nonce = jose.encode_b64jose(b'foo') wrong_nonce = u'F' # Following just makes sure wrong_nonce is wrong try: jose.b64decode(wrong_nonce) except (ValueError, TypeError): assert True else: pytest.fail("Exception from jose.b64decode wasn't raised") # pragma: no cover def test_nonce_decoder(self): from acme.jws import Header nonce_field = Header._fields['nonce'] with pytest.raises(jose.DeserializationError): nonce_field.decode(self.wrong_nonce) assert b'foo' == nonce_field.decode(self.good_nonce) class JWSTest(unittest.TestCase): """Tests for acme.jws.JWS.""" def setUp(self): self.privkey = KEY self.pubkey = self.privkey.public_key() self.nonce = jose.b64encode(b'Nonce') self.url = 'hi' self.kid = 'baaaaa' def test_kid_serialize(self): from acme.jws import JWS jws = JWS.sign(payload=b'foo', key=self.privkey, alg=jose.RS256, nonce=self.nonce, url=self.url, kid=self.kid) assert jws.signature.combined.nonce == self.nonce assert jws.signature.combined.url == self.url assert jws.signature.combined.kid == self.kid assert jws.signature.combined.jwk is None # TODO: check that nonce is in protected header assert jws == JWS.from_json(jws.to_json()) def test_jwk_serialize(self): from acme.jws import JWS jws = JWS.sign(payload=b'foo', key=self.privkey, alg=jose.RS256, nonce=self.nonce, url=self.url) assert jws.signature.combined.kid is None assert jws.signature.combined.jwk == self.pubkey if __name__ == '__main__': sys.exit(pytest.main(sys.argv[1:] + [__file__])) # pragma: no cover