@@ -75,7 +75,7 @@ def payload_must_be_hex(cls, value: bytes) -> bytes:
75
75
"""Convert the payload from hexadecimal to bytes"""
76
76
return bytes_from_hex (value .decode ())
77
77
78
- @model_validator (mode = "after" )
78
+ @model_validator (mode = "after" ) # type: ignore
79
79
def check_expiry (cls , values : SignedPubKeyHeader ) -> SignedPubKeyHeader :
80
80
"""Check that the token has not expired"""
81
81
payload : bytes = values .payload
@@ -87,7 +87,7 @@ def check_expiry(cls, values: SignedPubKeyHeader) -> SignedPubKeyHeader:
87
87
88
88
return values
89
89
90
- @model_validator (mode = "after" )
90
+ @model_validator (mode = "after" ) # type: ignore
91
91
def check_signature (cls , values : SignedPubKeyHeader ) -> SignedPubKeyHeader :
92
92
signature : bytes = values .signature
93
93
payload : bytes = values .payload
@@ -262,7 +262,7 @@ async def authenticate_websocket_message(
262
262
signed_operation = SignedOperation .model_validate (message ["X-SignedOperation" ])
263
263
if signed_operation .content .domain != domain_name :
264
264
logger .debug (
265
- f"Invalid domain '{ signed_pubkey .content .domain } ' != '{ domain_name } '"
265
+ f"Invalid domain '{ signed_operation .content .domain } ' != '{ domain_name } '"
266
266
)
267
267
raise web .HTTPUnauthorized (reason = "Invalid domain" )
268
268
return verify_signed_operation (signed_operation , signed_pubkey )
0 commit comments