Lines Matching full:credentials
37 credentials = None variable in TestCredentials
41 self.credentials = jwt_async.Credentials(
52 credentials = jwt_async.Credentials.from_service_account_info(
56 assert credentials._signer.key_id == info["private_key_id"]
57 assert credentials._issuer == info["client_email"]
58 assert credentials._subject == info["client_email"]
59 assert credentials._audience == self.AUDIENCE
64 credentials = jwt_async.Credentials.from_service_account_info(
71 assert credentials._signer.key_id == info["private_key_id"]
72 assert credentials._issuer == info["client_email"]
73 assert credentials._subject == self.SUBJECT
74 assert credentials._audience == self.AUDIENCE
75 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
80 credentials = jwt_async.Credentials.from_service_account_file(
84 assert credentials._signer.key_id == info["private_key_id"]
85 assert credentials._issuer == info["client_email"]
86 assert credentials._subject == info["client_email"]
87 assert credentials._audience == self.AUDIENCE
92 credentials = jwt_async.Credentials.from_service_account_file(
99 assert credentials._signer.key_id == info["private_key_id"]
100 assert credentials._issuer == info["client_email"]
101 assert credentials._subject == self.SUBJECT
102 assert credentials._audience == self.AUDIENCE
103 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
106 jwt_from_signing = self.credentials.from_signing_credentials(
107 self.credentials, audience=mock.sentinel.new_audience
109 jwt_from_info = jwt_async.Credentials.from_service_account_info(
113 assert isinstance(jwt_from_signing, jwt_async.Credentials)
120 assert not self.credentials.valid
122 assert not self.credentials.expired
126 new_credentials = self.credentials.with_claims(audience=new_audience)
128 assert new_credentials._signer == self.credentials._signer
129 assert new_credentials._issuer == self.credentials._issuer
130 assert new_credentials._subject == self.credentials._subject
132 assert new_credentials._additional_claims == self.credentials._additional_claims
133 assert new_credentials._quota_project_id == self.credentials._quota_project_id
138 new_credentials = self.credentials.with_quota_project(quota_project_id)
139 assert new_credentials._signer == self.credentials._signer
140 assert new_credentials._issuer == self.credentials._issuer
141 assert new_credentials._subject == self.credentials._subject
142 assert new_credentials._audience == self.credentials._audience
143 assert new_credentials._additional_claims == self.credentials._additional_claims
148 signature = self.credentials.sign_bytes(to_sign)
152 assert isinstance(self.credentials.signer, crypt.RSASigner)
156 self.credentials.signer_email
166 self.credentials.refresh(None)
167 assert self.credentials.valid
168 assert not self.credentials.expired
171 assert not self.credentials.expired
173 self.credentials.refresh(None)
174 assert not self.credentials.expired
178 now.return_value = self.credentials.expiry + one_day
179 assert self.credentials.expired
185 self.credentials.refresh(None)
186 await self.credentials.before_request(
194 assert token.encode("utf-8") == self.credentials.token
201 assert not self.credentials.valid
202 await self.credentials.before_request(
205 assert self.credentials.valid
212 credentials = None variable in TestOnDemandCredentials
216 self.credentials = jwt_async.OnDemandCredentials(
227 credentials = jwt_async.OnDemandCredentials.from_service_account_info(info)
229 assert credentials._signer.key_id == info["private_key_id"]
230 assert credentials._issuer == info["client_email"]
231 assert credentials._subject == info["client_email"]
236 credentials = jwt_async.OnDemandCredentials.from_service_account_info(
240 assert credentials._signer.key_id == info["private_key_id"]
241 assert credentials._issuer == info["client_email"]
242 assert credentials._subject == self.SUBJECT
243 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
248 credentials = jwt_async.OnDemandCredentials.from_service_account_file(
252 assert credentials._signer.key_id == info["private_key_id"]
253 assert credentials._issuer == info["client_email"]
254 assert credentials._subject == info["client_email"]
259 credentials = jwt_async.OnDemandCredentials.from_service_account_file(
265 assert credentials._signer.key_id == info["private_key_id"]
266 assert credentials._issuer == info["client_email"]
267 assert credentials._subject == self.SUBJECT
268 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
271 jwt_from_signing = self.credentials.from_signing_credentials(self.credentials)
282 # Credentials are *always* valid.
283 assert self.credentials.valid
284 # Credentials *never* expire.
285 assert not self.credentials.expired
289 new_credentials = self.credentials.with_claims(additional_claims=new_claims)
291 assert new_credentials._signer == self.credentials._signer
292 assert new_credentials._issuer == self.credentials._issuer
293 assert new_credentials._subject == self.credentials._subject
298 new_credentials = self.credentials.with_quota_project(quota_project_id)
300 assert new_credentials._signer == self.credentials._signer
301 assert new_credentials._issuer == self.credentials._issuer
302 assert new_credentials._subject == self.credentials._subject
303 assert new_credentials._additional_claims == self.credentials._additional_claims
308 signature = self.credentials.sign_bytes(to_sign)
312 assert isinstance(self.credentials.signer, crypt.RSASigner)
316 self.credentials.signer_email
327 self.credentials.refresh(None)
332 self.credentials.before_request(
342 self.credentials.before_request(None, "GET", "http://example.com?b=2", headers)
349 self.credentials._cache["audience"] = (
354 token = self.credentials._get_jwt_for_audience("audience")