mirror of
https://github.com/davidhalter/typeshed.git
synced 2025-12-16 00:37:10 +08:00
@@ -1,11 +0,0 @@
|
||||
jwt.InvalidKeyError
|
||||
jwt.MissingRequiredClaimError.__init__
|
||||
jwt.algorithms.ECAlgorithm
|
||||
jwt.algorithms.Ed25519Algorithm
|
||||
jwt.algorithms.HMACAlgorithm.SHA256
|
||||
jwt.algorithms.HMACAlgorithm.SHA384
|
||||
jwt.algorithms.HMACAlgorithm.SHA512
|
||||
jwt.algorithms.RSAAlgorithm
|
||||
jwt.algorithms.RSAPSSAlgorithm
|
||||
jwt.contrib.algorithms.py_ecdsa
|
||||
jwt.contrib.algorithms.pycrypto
|
||||
@@ -1,3 +0,0 @@
|
||||
version = "1.7"
|
||||
requires = ["types-cryptography"]
|
||||
obsolete_since = "2.0.0"
|
||||
@@ -1,49 +0,0 @@
|
||||
from typing import Any, Dict, Mapping, Optional, Union
|
||||
|
||||
from cryptography.hazmat.primitives.asymmetric import rsa
|
||||
|
||||
from . import algorithms
|
||||
|
||||
def decode(
|
||||
jwt: Union[str, bytes],
|
||||
key: Union[str, bytes, rsa.RSAPublicKey, rsa.RSAPrivateKey] = ...,
|
||||
verify: bool = ...,
|
||||
algorithms: Optional[Any] = ...,
|
||||
options: Optional[Mapping[Any, Any]] = ...,
|
||||
**kwargs: Any,
|
||||
) -> Dict[str, Any]: ...
|
||||
def encode(
|
||||
payload: Mapping[str, Any],
|
||||
key: Union[str, bytes, rsa.RSAPublicKey, rsa.RSAPrivateKey],
|
||||
algorithm: str = ...,
|
||||
headers: Optional[Mapping[str, Any]] = ...,
|
||||
json_encoder: Optional[Any] = ...,
|
||||
) -> bytes: ...
|
||||
def register_algorithm(alg_id: str, alg_obj: algorithms.Algorithm[Any]) -> None: ...
|
||||
def unregister_algorithm(alg_id: str) -> None: ...
|
||||
|
||||
class PyJWTError(Exception): ...
|
||||
class InvalidTokenError(PyJWTError): ...
|
||||
class DecodeError(InvalidTokenError): ...
|
||||
class ExpiredSignatureError(InvalidTokenError): ...
|
||||
class InvalidAudienceError(InvalidTokenError): ...
|
||||
class InvalidIssuerError(InvalidTokenError): ...
|
||||
class InvalidIssuedAtError(InvalidTokenError): ...
|
||||
class ImmatureSignatureError(InvalidTokenError): ...
|
||||
class InvalidKeyError(PyJWTError): ...
|
||||
class InvalidAlgorithmError(InvalidTokenError): ...
|
||||
class MissingRequiredClaimError(InvalidTokenError): ...
|
||||
class InvalidSignatureError(DecodeError): ...
|
||||
|
||||
# Compatibility aliases (deprecated)
|
||||
ExpiredSignature = ExpiredSignatureError
|
||||
InvalidAudience = InvalidAudienceError
|
||||
InvalidIssuer = InvalidIssuerError
|
||||
|
||||
# These aren't actually documented, but the package
|
||||
# exports them in __init__.py, so we should at least
|
||||
# make sure that mypy doesn't raise spurious errors
|
||||
# if they're used.
|
||||
get_unverified_header: Any
|
||||
PyJWT: Any
|
||||
PyJWS: Any
|
||||
@@ -1,93 +0,0 @@
|
||||
from hashlib import _Hash
|
||||
from typing import Any, ClassVar, Dict, Generic, Optional, Set, TypeVar, Union
|
||||
|
||||
from cryptography.hazmat.primitives import hashes
|
||||
from cryptography.hazmat.primitives.asymmetric.ec import (
|
||||
EllipticCurvePrivateKey,
|
||||
EllipticCurvePrivateKeyWithSerialization,
|
||||
EllipticCurvePublicKey,
|
||||
EllipticCurvePublicKeyWithSerialization,
|
||||
)
|
||||
from cryptography.hazmat.primitives.asymmetric.ed25519 import Ed25519PrivateKey, Ed25519PublicKey
|
||||
from cryptography.hazmat.primitives.asymmetric.rsa import RSAPrivateKey, RSAPublicKey
|
||||
from cryptography.hazmat.primitives.asymmetric.utils import Prehashed
|
||||
from cryptography.hazmat.primitives.hashes import HashAlgorithm
|
||||
|
||||
requires_cryptography = Set[str]
|
||||
|
||||
def get_default_algorithms() -> Dict[str, Algorithm[Any]]: ...
|
||||
|
||||
_K = TypeVar("_K")
|
||||
|
||||
class Algorithm(Generic[_K]):
|
||||
def prepare_key(self, key: _K) -> _K: ...
|
||||
def sign(self, msg: bytes, key: _K) -> bytes: ...
|
||||
def verify(self, msg: bytes, key: _K, sig: bytes) -> bool: ...
|
||||
@staticmethod
|
||||
def to_jwk(key_obj: _K) -> str: ...
|
||||
@staticmethod
|
||||
def from_jwk(jwk: str) -> _K: ...
|
||||
|
||||
class NoneAlgorithm(Algorithm[None]):
|
||||
def prepare_key(self, key: Optional[str]) -> None: ...
|
||||
|
||||
class _HashAlg:
|
||||
def __call__(self, arg: Union[bytes, bytearray, memoryview] = ...) -> _Hash: ...
|
||||
|
||||
class HMACAlgorithm(Algorithm[bytes]):
|
||||
SHA256: ClassVar[_HashAlg]
|
||||
SHA384: ClassVar[_HashAlg]
|
||||
SHA512: ClassVar[_HashAlg]
|
||||
hash_alg: _HashAlg
|
||||
def __init__(self, hash_alg: _HashAlg) -> None: ...
|
||||
def prepare_key(self, key: Union[str, bytes]) -> bytes: ...
|
||||
@staticmethod
|
||||
def to_jwk(key_obj: Union[str, bytes]) -> str: ...
|
||||
@staticmethod
|
||||
def from_jwk(jwk: Union[str, bytes]) -> bytes: ...
|
||||
|
||||
# Only defined if cryptography is installed.
|
||||
class RSAAlgorithm(Algorithm[Any]):
|
||||
SHA256: ClassVar[hashes.SHA256]
|
||||
SHA384: ClassVar[hashes.SHA384]
|
||||
SHA512: ClassVar[hashes.SHA512]
|
||||
hash_alg: Union[HashAlgorithm, Prehashed]
|
||||
def __init__(self, hash_alg: Union[HashAlgorithm, Prehashed]) -> None: ...
|
||||
def prepare_key(self, key: Union[bytes, str, RSAPrivateKey, RSAPublicKey]) -> Union[RSAPrivateKey, RSAPublicKey]: ...
|
||||
@staticmethod
|
||||
def to_jwk(key_obj: Any) -> str: ...
|
||||
@staticmethod
|
||||
def from_jwk(jwk: Union[str, bytes, Dict[str, Any]]) -> Union[RSAPrivateKey, RSAPublicKey]: ...
|
||||
def sign(self, msg: bytes, key: RSAPrivateKey) -> bytes: ...
|
||||
def verify(self, msg: bytes, key: RSAPublicKey, sig: bytes) -> bool: ...
|
||||
|
||||
# Only defined if cryptography is installed.
|
||||
class ECAlgorithm(Algorithm[Any]):
|
||||
SHA256: ClassVar[hashes.SHA256]
|
||||
SHA384: ClassVar[hashes.SHA384]
|
||||
SHA512: ClassVar[hashes.SHA512]
|
||||
hash_alg: Union[HashAlgorithm, Prehashed]
|
||||
def __init__(self, hash_alg: Union[HashAlgorithm, Prehashed]) -> None: ...
|
||||
def prepare_key(
|
||||
self, key: Union[bytes, str, EllipticCurvePrivateKey, EllipticCurvePublicKey]
|
||||
) -> Union[EllipticCurvePrivateKey, EllipticCurvePublicKey]: ...
|
||||
@staticmethod
|
||||
def to_jwk(key_obj: Union[EllipticCurvePrivateKeyWithSerialization, EllipticCurvePublicKeyWithSerialization]) -> str: ...
|
||||
@staticmethod
|
||||
def from_jwk(jwk: Union[str, bytes]) -> Union[EllipticCurvePrivateKey, EllipticCurvePublicKey]: ...
|
||||
def sign(self, msg: bytes, key: EllipticCurvePrivateKey) -> bytes: ...
|
||||
def verify(self, msg: bytes, key: EllipticCurvePublicKey, sig: bytes) -> bool: ...
|
||||
|
||||
# Only defined if cryptography is installed. Types should be tightened when
|
||||
# cryptography gets type hints.
|
||||
# See https://github.com/python/typeshed/issues/2542
|
||||
class RSAPSSAlgorithm(RSAAlgorithm):
|
||||
def sign(self, msg: bytes, key: Any) -> bytes: ...
|
||||
def verify(self, msg: bytes, key: Any, sig: bytes) -> bool: ...
|
||||
|
||||
# Only defined if cryptography is installed.
|
||||
class Ed25519Algorithm(Algorithm[Any]):
|
||||
def __init__(self, **kwargs: Any) -> None: ...
|
||||
def prepare_key(self, key: Union[str, bytes, Ed25519PrivateKey, Ed25519PublicKey]) -> Any: ...
|
||||
def sign(self, msg: Union[str, bytes], key: Ed25519PrivateKey) -> bytes: ...
|
||||
def verify(self, msg: Union[str, bytes], key: Ed25519PublicKey, sig: Union[str, bytes]) -> bool: ...
|
||||
@@ -1,10 +0,0 @@
|
||||
import hashlib
|
||||
from typing import Any
|
||||
|
||||
from jwt.algorithms import Algorithm
|
||||
|
||||
class ECAlgorithm(Algorithm[Any]):
|
||||
SHA256: hashlib._Hash
|
||||
SHA384: hashlib._Hash
|
||||
SHA512: hashlib._Hash
|
||||
def __init__(self, hash_alg: hashlib._Hash) -> None: ...
|
||||
@@ -1,10 +0,0 @@
|
||||
import hashlib
|
||||
from typing import Any
|
||||
|
||||
from jwt.algorithms import Algorithm
|
||||
|
||||
class RSAAlgorithm(Algorithm[Any]):
|
||||
SHA256: hashlib._Hash
|
||||
SHA384: hashlib._Hash
|
||||
SHA512: hashlib._Hash
|
||||
def __init__(self, hash_alg: hashlib._Hash) -> None: ...
|
||||
Reference in New Issue
Block a user