| # Copyright 2016 Google Inc. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| import datetime |
| |
| from google.auth import _helpers |
| from google.auth import credentials |
| |
| |
| class CredentialsImpl(credentials.Credentials): |
| def refresh(self, request): |
| self.token = request |
| |
| |
| def test_credentials_constructor(): |
| credentials = CredentialsImpl() |
| assert not credentials.token |
| assert not credentials.expiry |
| assert not credentials.expired |
| assert not credentials.valid |
| |
| |
| def test_expired_and_valid(): |
| credentials = CredentialsImpl() |
| credentials.token = 'token' |
| |
| assert credentials.valid |
| assert not credentials.expired |
| |
| # Set the expiration to one second more than now plus the clock skew |
| # accomodation. These credentials should be valid. |
| credentials.expiry = ( |
| datetime.datetime.utcnow() + |
| _helpers.CLOCK_SKEW + |
| datetime.timedelta(seconds=1)) |
| |
| assert credentials.valid |
| assert not credentials.expired |
| |
| # Set the credentials expiration to now. Because of the clock skew |
| # accomodation, these credentials should report as expired. |
| credentials.expiry = datetime.datetime.utcnow() |
| |
| assert not credentials.valid |
| assert credentials.expired |
| |
| |
| def test_before_request(): |
| credentials = CredentialsImpl() |
| request = 'token' |
| headers = {} |
| |
| # First call should call refresh, setting the token. |
| credentials.before_request(request, 'http://example.com', 'GET', headers) |
| assert credentials.valid |
| assert credentials.token == 'token' |
| assert headers['authorization'] == 'Bearer token' |
| |
| request = 'token2' |
| headers = {} |
| |
| # Second call shouldn't call refresh. |
| credentials.before_request(request, 'http://example.com', 'GET', headers) |
| assert credentials.valid |
| assert credentials.token == 'token' |
| assert headers['authorization'] == 'Bearer token' |
| |
| |
| class ScopedCredentialsImpl(credentials.Scoped, CredentialsImpl): |
| @property |
| def requires_scopes(self): |
| return super(ScopedCredentialsImpl, self).requires_scopes |
| |
| def with_scopes(self, scopes): |
| raise NotImplementedError |
| |
| |
| def test_scoped_credentials_constructor(): |
| credentials = ScopedCredentialsImpl() |
| assert credentials._scopes is None |
| |
| |
| def test_scoped_credentials_scopes(): |
| credentials = ScopedCredentialsImpl() |
| credentials._scopes = ['one', 'two'] |
| assert credentials.scopes == ['one', 'two'] |
| assert credentials.has_scopes(['one']) |
| assert credentials.has_scopes(['two']) |
| assert credentials.has_scopes(['one', 'two']) |
| assert not credentials.has_scopes(['three']) |
| |
| |
| def test_scoped_credentials_requires_scopes(): |
| credentials = ScopedCredentialsImpl() |
| assert not credentials.requires_scopes |
| |
| |
| class RequiresScopedCredentialsImpl(credentials.Scoped, CredentialsImpl): |
| def __init__(self, scopes=None): |
| super(RequiresScopedCredentialsImpl, self).__init__() |
| self._scopes = scopes |
| |
| @property |
| def requires_scopes(self): |
| return not self.scopes |
| |
| def with_scopes(self, scopes): |
| return RequiresScopedCredentialsImpl(scopes=scopes) |
| |
| |
| def test_create_scoped_if_required_scoped(): |
| unscoped_credentials = RequiresScopedCredentialsImpl() |
| scoped_credentials = credentials.with_scopes_if_required( |
| unscoped_credentials, ['one', 'two']) |
| |
| assert scoped_credentials is not unscoped_credentials |
| assert not scoped_credentials.requires_scopes |
| assert scoped_credentials.has_scopes(['one', 'two']) |
| |
| |
| def test_create_scoped_if_required_not_scopes(): |
| unscoped_credentials = CredentialsImpl() |
| scoped_credentials = credentials.with_scopes_if_required( |
| unscoped_credentials, ['one', 'two']) |
| |
| assert scoped_credentials is unscoped_credentials |