Skip to content

Commit 94ab2d8

Browse files
Lightspark Engjklein24
authored andcommitted
Project import generated by Copybara.
GitOrigin-RevId: 40bfe2dadc0ee36b7b6466e23f1b0be04b3ea50d
1 parent dcd6237 commit 94ab2d8

3 files changed

Lines changed: 7 additions & 6 deletions

File tree

lightspark/lightspark_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -481,7 +481,7 @@ def pay_uma_invoice(
481481
self.get_signing_key(node_id),
482482
)
483483
return OutgoingPayment_from_json(
484-
self._requester, json["pay_invoice"]["payment"]
484+
self._requester, json["pay_uma_invoice"]["payment"]
485485
)
486486

487487
def send_payment(

uma/__tests__/test_uma.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@
77
from unittest.mock import patch
88

99
import pytest
10-
from cryptography.exceptions import InvalidSignature
1110
from cryptography.hazmat.primitives import serialization
1211
from cryptography.hazmat.primitives.asymmetric.ec import SECP256K1, generate_private_key
1312
from ecies import PrivateKey, decrypt
1413
from uma.currency import Currency
14+
from uma.exceptions import InvalidSignatureException
1515
from uma.kyc_status import KycStatus
1616
from uma.payer_data import PayerDataOptions
1717
from uma.public_key_cache import InMemoryPublicKeyCache, PubkeyResponse
@@ -116,7 +116,7 @@ def test_pay_request_create_and_parse() -> None:
116116
pay_request.payer_data.compliance.signature = ( # pyre-ignore: [16]
117117
secrets.token_hex()
118118
)
119-
with pytest.raises(InvalidSignature):
119+
with pytest.raises(InvalidSignatureException):
120120
verify_pay_request_signature(pay_request, sender_signing_public_key_bytes)
121121

122122
# verify encryption
@@ -191,7 +191,7 @@ def test_lnurlp_request_url_create_and_parse() -> None:
191191

192192
# test invalid signature
193193
request.signature = secrets.token_hex()
194-
with pytest.raises(InvalidSignature):
194+
with pytest.raises(InvalidSignatureException):
195195
verify_uma_lnurlp_query_signature(request, sender_signing_public_key_bytes)
196196

197197

@@ -341,7 +341,7 @@ def test_lnurlp_response_create_and_parse() -> None:
341341

342342
# test invalid signature
343343
result_response.compliance.signature = secrets.token_hex()
344-
with pytest.raises(InvalidSignature):
344+
with pytest.raises(InvalidSignatureException):
345345
verify_uma_lnurlp_response_signature(
346346
result_response, receiver_signing_public_key_bytes
347347
)

uma/uma.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
from urllib.parse import parse_qs, urlparse
66

77
import requests
8+
from cryptography.exceptions import InvalidSignature
89
from cryptography.hazmat.primitives import hashes, serialization
910
from cryptography.hazmat.primitives.asymmetric.ec import ECDSA
1011
from ecies import encrypt
@@ -105,7 +106,7 @@ def _verify_signature(payload: bytes, signature: str, signing_pubkey: bytes) ->
105106
data=payload,
106107
signature_algorithm=ECDSA(hashes.SHA256()),
107108
)
108-
except ValueError as ex:
109+
except (ValueError, InvalidSignature) as ex:
109110
raise InvalidSignatureException() from ex
110111

111112

0 commit comments

Comments
 (0)