• Home
  • Raw
  • Download

Lines Matching full:credentials

25 from google.auth.compute_engine import credentials
48 credentials = None variable in TestCredentials
52 self.credentials = credentials.Credentials()
55 assert not self.credentials.valid
57 assert not self.credentials.expired
59 assert self.credentials.requires_scopes
61 assert self.credentials.service_account_email == "default"
63 assert not self.credentials._quota_project_id
84 # Refresh credentials
85 self.credentials.refresh(None)
87 # Check that the credentials have the token and proper expiration
88 assert self.credentials.token == "token"
89 assert self.credentials.expiry == (utcnow() + datetime.timedelta(seconds=500))
92 assert self.credentials.service_account_email == "service-account@example.com"
93 assert self.credentials._scopes == ["one", "two"]
95 # Check that the credentials are valid (have a token and are not
97 assert self.credentials.valid
118 # Refresh credentials
120 self.credentials = self.credentials.with_scopes(scopes)
121 self.credentials.refresh(None)
123 # Check that the credentials have the token and proper expiration
124 assert self.credentials.token == "token"
125 assert self.credentials.expiry == (utcnow() + datetime.timedelta(seconds=500))
128 assert self.credentials.service_account_email == "service-account@example.com"
129 assert self.credentials._scopes == scopes
131 # Check that the credentials are valid (have a token and are not
133 assert self.credentials.valid
143 self.credentials.refresh(None)
162 # Credentials should start as invalid
163 assert not self.credentials.valid
167 self.credentials.before_request(request, "GET", "http://example.com?a=1#3", {})
172 # Credentials should now be valid.
173 assert self.credentials.valid
176 quota_project_creds = self.credentials.with_quota_project("project-foo")
181 assert self.credentials._scopes is None
184 self.credentials = self.credentials.with_scopes(scopes)
186 assert self.credentials._scopes == scopes
190 credentials = None variable in TestIDTokenCredentials
199 self.credentials = credentials.IDTokenCredentials(
203 assert not self.credentials.valid
205 assert not self.credentials.expired
207 assert self.credentials.service_account_email == "service-account@example.com"
209 assert self.credentials.signer
210 assert self.credentials.signer_email == "service-account@example.com"
212 assert not self.credentials._quota_project_id
227 self.credentials = credentials.IDTokenCredentials(
232 token = self.credentials._make_authorization_grant_assertion()
238 # Check that the credentials have the token and proper expiration
257 self.credentials = credentials.IDTokenCredentials(
264 token = self.credentials._make_authorization_grant_assertion()
270 # Check that the credentials have the token and proper expiration
292 self.credentials = credentials.IDTokenCredentials(
299 token = self.credentials._make_authorization_grant_assertion()
305 # Check that the credentials have the token and proper expiration
318 self.credentials = credentials.IDTokenCredentials(
324 assert self.credentials._token_uri == credentials._DEFAULT_TOKEN_URI
326 self.credentials = credentials.IDTokenCredentials(
333 assert self.credentials._token_uri == "https://example.com/token"
348 self.credentials = credentials.IDTokenCredentials(
351 self.credentials = self.credentials.with_target_audience("https://actually.not")
354 token = self.credentials._make_authorization_grant_assertion()
360 # Check that the credentials have the token and proper expiration
370 assert isinstance(self.credentials._signer._request, transport.Request)
374 """ Test that it is possible to refresh credentials
381 # mock information about credentials
395 # mock token for credentials
435 self.credentials = credentials.IDTokenCredentials(
441 self.credentials = self.credentials.with_target_audience("https://actually.not")
443 self.credentials.refresh(requests.Request())
445 assert self.credentials.token is not None
460 self.credentials = credentials.IDTokenCredentials(
463 self.credentials = self.credentials.with_quota_project("project-foo")
465 assert self.credentials._quota_project_id == "project-foo"
468 token = self.credentials._make_authorization_grant_assertion()
474 # Check that the credentials have the token and proper expiration
484 assert isinstance(self.credentials._signer._request, transport.Request)
488 """ Test that it is possible to refresh credentials
495 # mock information about credentials
509 # mock token for credentials
549 self.credentials = credentials.IDTokenCredentials(
555 self.credentials = self.credentials.with_quota_project("project-foo")
557 self.credentials.refresh(requests.Request())
559 assert self.credentials.token is not None
560 assert self.credentials._quota_project_id == "project-foo"
579 self.credentials = credentials.IDTokenCredentials(
583 # Refresh credentials
584 self.credentials.refresh(None)
586 # Check that the credentials have the token and proper expiration
587 assert self.credentials.token == "idtoken"
588 assert self.credentials.expiry == (datetime.datetime.utcfromtimestamp(3600))
591 assert self.credentials.service_account_email == "service-account@example.com"
593 # Check that the credentials are valid (have a token and are not
595 assert self.credentials.valid
615 self.credentials = credentials.IDTokenCredentials(
620 self.credentials.refresh(request)
641 self.credentials = credentials.IDTokenCredentials(
645 # Credentials should start as invalid
646 assert not self.credentials.valid
650 self.credentials.before_request(request, "GET", "http://example.com?a=1#3", {})
655 # Credentials should now be valid.
656 assert self.credentials.valid
672 self.credentials = credentials.IDTokenCredentials(
677 signature = self.credentials.sign_bytes(b"some bytes")
690 cred = credentials.IDTokenCredentials(
711 cred = credentials.IDTokenCredentials(
728 cred = credentials.IDTokenCredentials(
747 cred = credentials.IDTokenCredentials(
762 cred = credentials.IDTokenCredentials(
772 credentials.IDTokenCredentials(
779 credentials.IDTokenCredentials(
786 credentials.IDTokenCredentials(
793 credentials.IDTokenCredentials(