@@ -39,6 +39,9 @@ def patched_make_cvat_cloud_storage_params(bucket_info: BucketAccessInfo) -> dic
3939 bucket_info .host_url = str (
4040 URL (original_host_url ).copy_with (host = Config .development_config .cvat_local_host )
4141 )
42+ logger .info (
43+ f"DEV: Changed { original_host_url } to { bucket_info .host_url } for CVAT storage"
44+ )
4245 try :
4346 return original_make_cvat_cloud_storage_params (bucket_info )
4447 finally :
@@ -57,7 +60,9 @@ def prepare_signed_message(
5760 digest = hashlib .sha256 (
5861 (escrow_address + ":" .join (map (str , (chain_id , message , body )))).encode ()
5962 ).hexdigest ()
60- return None , f"{ OracleWebhookTypes .recording_oracle } :{ digest } "
63+ signature = f"{ OracleWebhookTypes .recording_oracle } :{ digest } "
64+ logger .info (f"DEV: Generated patched signature { signature } " )
65+ return None , signature
6166
6267 src .utils .webhooks .prepare_signed_message = prepare_signed_message
6368
@@ -71,8 +76,9 @@ def prepare_signed_message(
7176 def get_local_escrow (chain_id : int , escrow_address : str ) -> EscrowData :
7277 possible_manifest_name = escrow_address .split (":" )[0 ]
7378 local_manifests = minio_client .list_files (bucket = "manifests" )
74- logger .info (f"Local manifests: { local_manifests } " )
79+ logger .info (f"DEV: Local manifests: { local_manifests } " )
7580 if possible_manifest_name in local_manifests :
81+ logger .info (f"DEV: Using local manifest { escrow_address } " )
7682 return EscrowData (
7783 chain_id = ChainId (chain_id ),
7884 id = "test" ,
@@ -104,7 +110,8 @@ async def lenient_validate_oracle_webhook_signature(request, signature, webhook)
104110 from src .validators .signature import validate_oracle_webhook_signature
105111
106112 try :
107- return OracleWebhookTypes (signature .split (":" )[0 ])
113+ parsed_type = OracleWebhookTypes (signature .split (":" )[0 ])
114+ logger .info (f"DEV: Recovered { parsed_type } from the signature { signature } " )
108115 except (ValueError , TypeError ):
109116 return await validate_oracle_webhook_signature (request , signature , webhook )
110117
@@ -113,9 +120,22 @@ async def lenient_validate_oracle_webhook_signature(request, signature, webhook)
113120 src .endpoints .webhook .validate_oracle_webhook_signature = (
114121 lenient_validate_oracle_webhook_signature
115122 )
116- import logging
117123
118- logging .warning ("Local development patches applied." )
124+ import src .endpoints .authentication
125+
126+ original_decode_token = src .endpoints .authentication .TokenAuthenticator ._decode_token
127+
128+ def decode_plain_json_token (self , token ) -> dict [str , Any ]:
129+ """
130+ Allows Authentication: Bearer {"wallet_address": "...", "email": "..."}
131+ """
132+ try :
133+ decoded = json .loads (token )
134+ logger .info (f"DEV: Decoded plain JSON auth token: { decoded } " )
135+ except (ValueError , TypeError ):
136+ return original_decode_token (self , token )
137+
138+ src .endpoints .authentication .TokenAuthenticator ._decode_token = decode_plain_json_token
119139
120140 from tests .api .test_exchange_api import generate_ecdsa_keys
121141
@@ -134,20 +154,7 @@ async def lenient_validate_oracle_webhook_signature(request, signature, webhook)
134154
135155 Config .human_app_config .jwt_public_key = public_key
136156
137- import src .endpoints .authentication
138-
139- original_decode_token = src .endpoints .authentication .TokenAuthenticator ._decode_token
140-
141- def decode_plain_json_token (self , token ) -> dict [str , Any ]:
142- """
143- Allows Authentication: Bearer {"wallet_address": "...", "email": "..."}
144- """
145- try :
146- return json .loads (token )
147- except (ValueError , TypeError ):
148- return original_decode_token (self , token )
149-
150- src .endpoints .authentication .TokenAuthenticator ._decode_token = decode_plain_json_token
157+ logger .warning ("DEV: Local development patches applied." )
151158
152159
153160if __name__ == "__main__" :
0 commit comments