Skip to content

Commit 7bce03c

Browse files
committed
Formatted code
Signed-off-by: Anastasiia <sivirina99@mail.ru>
1 parent 82c3e8c commit 7bce03c

9 files changed

Lines changed: 107 additions & 83 deletions

File tree

aries_cloudagent/protocols/present_proof/dif/pres_exch_handler.py

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1248,13 +1248,15 @@ async def create_vp(
12481248
if req.nested_req:
12491249
for nested_req in req.nested_req:
12501250
res = await self.apply_requirements(
1251-
req=nested_req, credentials=credentials, records_filter=records_filter
1251+
req=nested_req,
1252+
credentials=credentials,
1253+
records_filter=records_filter
12521254
)
12531255
result.append(res)
12541256
else:
12551257
res = await self.apply_requirements(
1256-
req=req, credentials=credentials, records_filter=records_filter
1257-
)
1258+
req=req, credentials=credentials, records_filter=records_filter
1259+
)
12581260
result.append(res)
12591261

12601262
result_vp = []
@@ -1286,7 +1288,9 @@ async def create_vp(
12861288
applicable_creds=applicable_creds
12871289
)
12881290
if not issuer_id and len(filtered_creds_list) == 0:
1289-
vp = await create_presentation(credentials=applicable_creds_list)
1291+
vp = await create_presentation(
1292+
credentials=applicable_creds_list
1293+
)
12901294
vp["presentation_submission"] = submission_property.serialize()
12911295
if self.proof_type is BbsBlsSignature2020.signature_type:
12921296
vp["@context"].append(SECURITY_CONTEXT_BBS_URL)
@@ -1396,19 +1400,21 @@ async def verify_received_pres(
13961400
input_descriptors = pd.input_descriptors
13971401
if isinstance(pres, Sequence):
13981402
for pr in pres:
1399-
descriptor_map_list = pr["presentation_submission"].get("descriptor_map")
1403+
descriptor_map_list = pr["presentation_submission"].get(
1404+
"descriptor_map"
1405+
)
14001406
await self.__verify_desc_map_list(
1401-
descriptor_map_list,
1402-
pr,
1403-
input_descriptors)
1407+
descriptor_map_list, pr, input_descriptors
1408+
)
14041409
else:
14051410
descriptor_map_list = pres["presentation_submission"].get("descriptor_map")
14061411
await self.__verify_desc_map_list(
1407-
descriptor_map_list,
1408-
pres,
1409-
input_descriptors)
1412+
descriptor_map_list, pres, input_descriptors
1413+
)
14101414

1411-
async def __verify_desc_map_list(self, descriptor_map_list, pres, input_descriptors):
1415+
async def __verify_desc_map_list(
1416+
self, descriptor_map_list, pres, input_descriptors
1417+
):
14121418
inp_desc_id_contraint_map = {}
14131419
inp_desc_id_schema_one_of_filter = set()
14141420
inp_desc_id_schemas_map = {}

aries_cloudagent/protocols/present_proof/dif/tests/test_pres_exch_handler.py

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,9 @@ async def test_load_cred_json_a(self, setup_tuple, profile):
108108
if isinstance(tmp_vp, Sequence):
109109
cred_count_list = []
110110
for tmp_vp_single in tmp_vp:
111-
cred_count_list.append(len(tmp_vp_single.get("verifiableCredential")))
111+
cred_count_list.append(
112+
len(tmp_vp_single.get("verifiableCredential"))
113+
)
112114

113115
assert min(cred_count_list) == tmp_pd[1]
114116
else:
@@ -133,7 +135,9 @@ async def test_load_cred_json_b(self, setup_tuple, profile):
133135
if isinstance(tmp_vp, Sequence):
134136
cred_count_list = []
135137
for tmp_vp_single in tmp_vp:
136-
cred_count_list.append(len(tmp_vp_single.get("verifiableCredential")))
138+
cred_count_list.append(
139+
len(tmp_vp_single.get("verifiableCredential"))
140+
)
137141

138142
assert min(cred_count_list) == tmp_pd[1]
139143
else:
@@ -2397,7 +2401,7 @@ async def test_create_vp_no_issuer_with_bbs_suite(self, profile, setup_tuple):
23972401
pd=pd_list[0][0],
23982402
challenge="3fa85f64-5717-4562-b3fc-2c963f66afa7",
23992403
)
2400-
#2 sub_reqs, vp is a sequence
2404+
# 2 sub_reqs, vp is a sequence
24012405
for vp_single in vp:
24022406
assert vp_single["test"] == "1"
24032407
assert SECURITY_CONTEXT_BBS_URL in vp_single["@context"]

aries_cloudagent/protocols/present_proof/v2_0/formats/dif/handler.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -474,7 +474,7 @@ async def verify_pres(self, pres_ex_record: V20PresExRecord) -> V20PresExRecord:
474474
challenge = pres_request["options"].get("challenge", str(uuid4()))
475475
if not challenge:
476476
challenge = str(uuid4())
477-
if(isinstance(dif_proof, Sequence)):
477+
if isinstance(dif_proof, Sequence):
478478
for proof in dif_proof:
479479
pres_ver_result = await verify_presentation(
480480
presentation=proof,

aries_cloudagent/protocols/present_proof/v2_0/formats/dif/tests/test_handler.py

Lines changed: 54 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@
152152
"rule": "pick",
153153
"min": 1,
154154
"from": "B",
155-
}
155+
},
156156
],
157157
"input_descriptors": [
158158
{
@@ -198,7 +198,7 @@
198198
}
199199
],
200200
},
201-
}
201+
},
202202
],
203203
},
204204
}
@@ -283,56 +283,58 @@
283283
},
284284
}
285285

286-
DIF_PRES_SEQUENCE = [DIF_PRES,
287-
{
288-
"@context": ["https://www.w3.org/2018/credentials/v1"],
289-
"type": ["VerifiablePresentation"],
290-
"verifiableCredential": [
291-
{
292-
"@context": [
293-
"https://www.w3.org/2018/credentials/v1",
294-
"https://w3id.org/citizenship/v1",
295-
"https://w3id.org/security/bbs/v1",
296-
],
297-
"id": "https://issuer.oidp.uscis.gov/credentials/83627465",
298-
"type": ["PermanentResidentCard", "VerifiableCredential"],
299-
"credentialSubject": {
300-
"id": "did:example:b34ca6cd37bbf23",
301-
"type": ["Person", "PermanentResident"],
302-
"givenName": "JOHN",
303-
},
304-
"issuanceDate": "2010-01-01T19:53:24Z",
305-
"issuer": "did:key:zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v",
306-
"proof": {
307-
"type": "BbsBlsSignatureProof2020",
308-
"nonce": "3AuruhJQrXtEgiagiJ+FwVf2S0SnzUDJvnO61YecQsJ7ImR1mPcoVjJJ0HOhfkFpoYI=",
309-
"proofValue": "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",
310-
"verificationMethod": "did:key:zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v#zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v",
311-
"proofPurpose": "assertionMethod",
312-
"created": "2021-05-05T15:22:30.523465",
313-
},
314-
}
315-
],
316-
"presentation_submission": {
317-
"id": "a5fcfe44-2c30-497d-af02-98e539da9a0f",
318-
"definition_id": "32f54163-7166-48f1-93d8-ff217bdb0653",
319-
"descriptor_map": [
320-
{
321-
"id": "citizenship_input_2",
322-
"format": "ldp_vp",
323-
"path": "$.verifiableCredential[0]",
286+
DIF_PRES_SEQUENCE = [
287+
DIF_PRES,
288+
{
289+
"@context": ["https://www.w3.org/2018/credentials/v1"],
290+
"type": ["VerifiablePresentation"],
291+
"verifiableCredential": [
292+
{
293+
"@context": [
294+
"https://www.w3.org/2018/credentials/v1",
295+
"https://w3id.org/citizenship/v1",
296+
"https://w3id.org/security/bbs/v1",
297+
],
298+
"id": "https://issuer.oidp.uscis.gov/credentials/83627465",
299+
"type": ["PermanentResidentCard", "VerifiableCredential"],
300+
"credentialSubject": {
301+
"id": "did:example:b34ca6cd37bbf23",
302+
"type": ["Person", "PermanentResident"],
303+
"givenName": "JOHN",
304+
},
305+
"issuanceDate": "2010-01-01T19:53:24Z",
306+
"issuer": "did:key:zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v",
307+
"proof": {
308+
"type": "BbsBlsSignatureProof2020",
309+
"nonce": "3AuruhJQrXtEgiagiJ+FwVf2S0SnzUDJvnO61YecQsJ7ImR1mPcoVjJJ0HOhfkFpoYI=",
310+
"proofValue": "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",
311+
"verificationMethod": "did:key:zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v#zUC74bgefTdc43KS1psXgXf4jLaHyaj2qCQqQTXrtmSYGf1PxiJhrH6LGpaBMyj6tqAKmjGyMaS4RfNo2an77vT1HfzJUNPk4H7TCuJvSp4vet4Cu67kn2JSegoQNFSA1tbwU8v",
312+
"proofPurpose": "assertionMethod",
313+
"created": "2021-05-05T15:22:30.523465",
314+
},
324315
}
325316
],
317+
"presentation_submission": {
318+
"id": "a5fcfe44-2c30-497d-af02-98e539da9a0f",
319+
"definition_id": "32f54163-7166-48f1-93d8-ff217bdb0653",
320+
"descriptor_map": [
321+
{
322+
"id": "citizenship_input_2",
323+
"format": "ldp_vp",
324+
"path": "$.verifiableCredential[0]",
325+
}
326+
],
327+
},
328+
"proof": {
329+
"type": "Ed25519Signature2018",
330+
"verificationMethod": "did:sov:4QxzWk3ajdnEA37NdNU5Kt#key-1",
331+
"created": "2021-05-05T15:23:03.023971",
332+
"proofPurpose": "authentication",
333+
"challenge": "40429d49-5e8f-4ffc-baf8-e332412f1247",
334+
"jws": "eyJhbGciOiAiRWREU0EiLCAiYjY0IjogZmFsc2UsICJjcml0IjogWyJiNjQiXX0..2uBYmg7muE9ZPVeAGo_ibVfLkCjf2hGshr2o5i8pAwFyNBM-kDHXofuq1MzJgb19wzb01VIu91hY_ajjt9KFAA",
335+
},
326336
},
327-
"proof": {
328-
"type": "Ed25519Signature2018",
329-
"verificationMethod": "did:sov:4QxzWk3ajdnEA37NdNU5Kt#key-1",
330-
"created": "2021-05-05T15:23:03.023971",
331-
"proofPurpose": "authentication",
332-
"challenge": "40429d49-5e8f-4ffc-baf8-e332412f1247",
333-
"jws": "eyJhbGciOiAiRWREU0EiLCAiYjY0IjogZmFsc2UsICJjcml0IjogWyJiNjQiXX0..2uBYmg7muE9ZPVeAGo_ibVfLkCjf2hGshr2o5i8pAwFyNBM-kDHXofuq1MzJgb19wzb01VIu91hY_ajjt9KFAA",
334-
},
335-
}]
337+
]
336338

337339

338340
TEST_CRED = {
@@ -1130,7 +1132,9 @@ async def test_verify_pres_sequence(self):
11301132
format_=ATTACHMENT_FORMAT[PRES_20][V20PresFormat.Format.DIF.api],
11311133
)
11321134
],
1133-
presentations_attach=[AttachDecorator.data_json(DIF_PRES_SEQUENCE, ident="dif")],
1135+
presentations_attach=[
1136+
AttachDecorator.data_json(DIF_PRES_SEQUENCE, ident="dif")
1137+
],
11341138
)
11351139
dif_pres_request = V20PresRequest(
11361140
formats=[

aries_cloudagent/protocols/present_proof/v2_0/manager.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -393,7 +393,7 @@ async def verify_pres(self, pres_ex_record: V20PresExRecord):
393393
).verify_pres(
394394
pres_ex_record,
395395
)
396-
if pres_ex_record.verified == 'false':
396+
if pres_ex_record.verified == "false":
397397
break
398398

399399
pres_ex_record.state = V20PresExRecord.STATE_DONE

aries_cloudagent/protocols/present_proof/v2_0/messages/pres.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ def get_attach_by_id(attach_id):
118118
atch = get_attach_by_id(fmt.attach_id)
119119
pres_format = V20PresFormat.Format.get(fmt.format)
120120
if pres_format:
121-
if(isinstance(atch.content, Sequence)):
121+
if isinstance(atch.content, Sequence):
122122
for el in atch.content:
123123
pres_format.validate_fields(PRES_20, el)
124124
else:

aries_cloudagent/protocols/present_proof/v2_0/messages/tests/test_pres.py

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1828,7 +1828,7 @@ def test_init_type(self):
18281828
assert len(PRES.formats) == len(PRES.presentations_attach)
18291829
assert PRES.attachment(V20PresFormat.Format.INDY) == INDY_PROOF
18301830
assert PRES._type == DIDCommPrefix.qualify_current(PRES_20)
1831-
1831+
18321832
assert PRES_DIF.presentations_attach[0].content == DIF_PROOF
18331833
assert len(PRES_DIF.formats) == len(PRES.presentations_attach)
18341834
assert PRES_DIF.attachment(V20PresFormat.Format.DIF) == DIF_PROOF
@@ -1891,4 +1891,3 @@ def test_serde_dif(self):
18911891
pres_dict = PRES_DIF.serialize()
18921892
pres_obj = V20Pres.deserialize(pres_dict)
18931893
assert type(pres_obj) == V20Pres
1894-

aries_cloudagent/protocols/present_proof/v2_0/tests/test_manager.py

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -825,11 +825,11 @@ async def test_create_pres_indy_and_dif(self):
825825
format_=ATTACHMENT_FORMAT[PRES_20_REQUEST][
826826
V20PresFormat.Format.DIF.api
827827
],
828-
)
828+
),
829829
],
830830
request_presentations_attach=[
831831
AttachDecorator.data_base64(INDY_PROOF_REQ_NAME, ident="indy"),
832-
AttachDecorator.data_json(DIF_PRES_REQ, ident="dif")
832+
AttachDecorator.data_json(DIF_PRES_REQ, ident="dif"),
833833
],
834834

835835
)
@@ -854,7 +854,10 @@ async def test_create_pres_indy_and_dif(self):
854854
return_value=mock_attach_decorator_indy
855855
)
856856

857-
mock_create_pres.return_value = (PRES_20, AttachDecorator.data_json(DIF_PRES, ident="dif"))
857+
mock_create_pres.return_value = (
858+
PRES_20,
859+
AttachDecorator.data_json(DIF_PRES, ident="dif")
860+
)
858861

859862
req_creds = await indy_proof_req_preview2indy_requested_creds(
860863
INDY_PROOF_REQ_NAME, preview=None, holder=self.holder
@@ -2144,12 +2147,12 @@ async def test_verify_pres_indy_and_dif(self):
21442147
format_=ATTACHMENT_FORMAT[PRES_20_REQUEST][
21452148
V20PresFormat.Format.DIF.api
21462149
],
2147-
)
2150+
),
21482151
],
21492152
will_confirm=True,
21502153
request_presentations_attach=[
21512154
AttachDecorator.data_base64(INDY_PROOF_REQ_NAME, ident="indy"),
2152-
AttachDecorator.data_json(DIF_PRES_REQ, ident="dif")
2155+
AttachDecorator.data_json(DIF_PRES_REQ, ident="dif"),
21532156
],
21542157
)
21552158
pres = V20Pres(
@@ -2161,19 +2164,21 @@ async def test_verify_pres_indy_and_dif(self):
21612164
V20PresFormat(
21622165
attach_id="dif",
21632166
format_=ATTACHMENT_FORMAT[PRES_20][V20PresFormat.Format.DIF.api],
2164-
)
2167+
),
21652168
],
21662169
presentations_attach=[
21672170
AttachDecorator.data_base64(INDY_PROOF, ident="indy"),
2168-
AttachDecorator.data_json(DIF_PRES, ident="dif")
2171+
AttachDecorator.data_json(DIF_PRES, ident="dif"),
21692172
],
21702173
)
21712174
px_rec_in = V20PresExRecord(
21722175
pres_request=pres_request,
21732176
pres=pres,
21742177
)
21752178

2176-
self.profile.context.injector.bind_instance(DocumentLoader, custom_document_loader)
2179+
self.profile.context.injector.bind_instance(
2180+
DocumentLoader, custom_document_loader
2181+
)
21772182
self.profile.context.injector.bind_instance(
21782183
BaseMultitenantManager,
21792184
async_mock.MagicMock(MultitenantManager, autospec=True),
@@ -2209,7 +2214,7 @@ async def test_verify_pres_indy_and_dif(self):
22092214
px_rec_out = await self.manager.verify_pres(px_rec_in)
22102215
save_ex.assert_called_once()
22112216
assert px_rec_out.state == (V20PresExRecord.STATE_DONE)
2212-
assert px_rec_out.verified == 'false'
2217+
assert px_rec_out.verified == "false"
22132218

22142219
async def test_send_pres_ack(self):
22152220
px_rec = V20PresExRecord()

demo/runners/agent_container.py

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -494,9 +494,13 @@ async def handle_present_proof_v2_0(self, message):
494494
input_descriptor_schema_uri.append(element["uri"])
495495

496496
for record in records:
497-
if self.check_input_descriptor_record_id(input_descriptor_schema_uri, record):
497+
if self.check_input_descriptor_record_id(
498+
input_descriptor_schema_uri, record
499+
):
498500
record_id = record["record_id"]
499-
dif_request["dif"]["record_ids"][input_descriptor["id"]] = [
501+
dif_request["dif"]["record_ids"][
502+
input_descriptor["id"]
503+
] = [
500504
record_id,
501505
]
502506
break
@@ -626,15 +630,17 @@ async def create_schema_and_cred_def(
626630
)
627631
return cred_def_id
628632

629-
def check_input_descriptor_record_id(self, input_descriptor_schema_uri, record) -> bool:
633+
def check_input_descriptor_record_id(
634+
self, input_descriptor_schema_uri, record
635+
) -> bool:
630636
result = False
631637
for uri in input_descriptor_schema_uri:
632638
for record_type in record["type"]:
633639
if record_type in uri:
634640
result = True
635641
break
636642
result = False
637-
643+
638644
return result
639645

640646

0 commit comments

Comments
 (0)