Skip to content

Commit b416319

Browse files
committed
Make fetching identity scope optional
1 parent 667eed7 commit b416319

File tree

4 files changed

+5
-15
lines changed

4 files changed

+5
-15
lines changed

tests/test_bidstream_client.py

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,6 @@ def decrypt_and_assert_success(self, token, token_version, scope):
8686
self._assert_success(decrypted, token_version, scope)
8787

8888
def setUp(self):
89-
self._key_collection = create_key_collection(IdentityScope.UID2)
9089
self._client = BidstreamClient(self._CONST_BASE_URL, self._CONST_API_KEY, client_secret)
9190

9291
def test_smoke_test(self): # SmokeTest
@@ -203,10 +202,10 @@ def test_empty_keys(self): # EmptyKeyContainer
203202
self.assertEqual(result.status, DecryptionStatus.NOT_INITIALIZED)
204203

205204
def test_master_key_expired(self): #ExpiredKeyContainer
206-
master_key_expired = EncryptionKey(master_key_id, -1, created=now, activates=now - dt.timedelta(hours=2), expires=now - dt.timedelta(hours=1), secret=master_secret,
207-
keyset_id=99999)
208-
site_key_expired = EncryptionKey(site_key_id, site_id, created=now, activates=now - dt.timedelta(hours=2), expires=now - dt.timedelta(hours=1), secret=site_secret,
209-
keyset_id=99999)
205+
master_key_expired = EncryptionKey(master_key_id, -1, created=now, activates=now - dt.timedelta(hours=2),
206+
expires=now - dt.timedelta(hours=1), secret=master_secret, keyset_id=99999)
207+
site_key_expired = EncryptionKey(site_key_id, site_id, created=now, activates=now - dt.timedelta(hours=2),
208+
expires=now - dt.timedelta(hours=1), secret=site_secret, keyset_id=99999)
210209

211210
refresh_response = self._client._refresh_json(create_bidstream_response_json(
212211
[master_key_expired, site_key_expired], IdentityScope.UID2))

tests/test_sharing_client.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,6 @@ class TestSharingClient(unittest.TestCase):
6262
_CONST_API_KEY = 'api_key'
6363

6464
def setUp(self):
65-
self._key_collection = create_key_collection(IdentityScope.UID2)
6665
self._client = SharingClient(self._CONST_BASE_URL, self._CONST_API_KEY, client_secret)
6766

6867
def _assert_success(self, decryption_response, token_version, scope):

tests/test_utils.py

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ def key_set_to_json_for_sharing(keys):
8383
def key_set_to_json_for_sharing_with_header(default_keyset, caller_site_id, keys):
8484
return """{{
8585
"body": {{
86-
"identity_scope": "UID2",
8786
"caller_site_id": {0},
8887
"master_keyset_id": 1,
8988
"token_expiry_seconds": 86400,
@@ -111,18 +110,11 @@ def format_key(key: EncryptionKey):
111110
base64.b64encode(key.secret).decode("utf-8"))
112111

113112

114-
115113
def create_default_key_collection(key_set):
116114
return EncryptionKeysCollection(key_set, IdentityScope.UID2, 9000, 1,
117115
99999, 2)
118116

119117

120-
def create_key_collection(identity_scope):
121-
key_set = [master_key, site_key]
122-
return EncryptionKeysCollection(key_set, identity_scope, site_id, 1,
123-
99999, 86400)
124-
125-
126118
def generate_uid_token(identity_scope, version, raw_uid=example_uid, created_at=None, expires_at=None):
127119
return UID2TokenGenerator.generate_uid_token(raw_uid, master_key, site_id, site_key,
128120
identity_scope, version, created_at, expires_at)

uid2_client/refresh_keys_util.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def _make_dt(timestamp):
1515
def _parse_keys_json(resp_body):
1616
keys = []
1717
identity_scope = IdentityScope.UID2
18-
if resp_body["identity_scope"] == "EUID":
18+
if resp_body.get("identity_scope") == "EUID":
1919
identity_scope = IdentityScope.EUID
2020
for key in resp_body["keys"]:
2121
keyset_id = key.get("keyset_id")

0 commit comments

Comments
 (0)