@@ -121,19 +121,19 @@ def setUp(self):
121
121
self .name = gssnames .Name (SERVICE_PRINCIPAL ,
122
122
gb .NameType .kerberos_principal )
123
123
124
- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
124
+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
125
125
usage = 'both' )
126
126
def test_acquire_by_init (self , str_name , kwargs ):
127
- creds = gsscreds .Credentials (desired_name = self .name , ** kwargs )
127
+ creds = gsscreds .Credentials (name = self .name , ** kwargs )
128
128
129
129
creds .lifetime .should_be_an_integer ()
130
130
131
131
del creds
132
132
133
- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
133
+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
134
134
usage = 'both' )
135
135
def test_acquire_by_method (self , str_name , kwargs ):
136
- cred_resp = gsscreds .Credentials .acquire (desired_name = self .name ,
136
+ cred_resp = gsscreds .Credentials .acquire (name = self .name ,
137
137
** kwargs )
138
138
139
139
cred_resp .shouldnt_be_none ()
@@ -177,7 +177,7 @@ def test_store_acquire(self):
177
177
store_res .usage .should_be ('initiate' )
178
178
store_res .mech_types .should_include (gb .MechType .kerberos )
179
179
180
- reacquired_creds = gsscreds .Credentials (desired_name = deleg_creds .name ,
180
+ reacquired_creds = gsscreds .Credentials (name = deleg_creds .name ,
181
181
usage = 'initiate' )
182
182
reacquired_creds .shouldnt_be_none ()
183
183
@@ -192,7 +192,7 @@ def test_store_into_acquire_from(self):
192
192
self .realm .extract_keytab (princ_name , KT )
193
193
self .realm .kinit (princ_name , None , ['-k' , '-t' , KT ])
194
194
195
- initial_creds = gsscreds .Credentials (desired_name = None ,
195
+ initial_creds = gsscreds .Credentials (name = None ,
196
196
usage = 'initiate' )
197
197
198
198
store_res = initial_creds .store (store , overwrite = True )
@@ -202,19 +202,19 @@ def test_store_into_acquire_from(self):
202
202
store_res .usage .should_be ('initiate' )
203
203
204
204
name = gssnames .Name (princ_name )
205
- retrieved_creds = gsscreds .Credentials (desired_name = name , store = store )
205
+ retrieved_creds = gsscreds .Credentials (name = name , store = store )
206
206
207
207
retrieved_creds .shouldnt_be_none ()
208
208
209
209
def test_create_from_other (self ):
210
- raw_creds = gb .acquire_cred (None , cred_usage = 'accept' ).creds
210
+ raw_creds = gb .acquire_cred (None , usage = 'accept' ).creds
211
211
212
212
high_level_creds = gsscreds .Credentials (raw_creds )
213
213
high_level_creds .usage .should_be ('accept' )
214
214
215
215
@true_false_perms ('name' , 'lifetime' , 'usage' , 'mechs' )
216
216
def test_inquire (self , str_name , kwargs ):
217
- creds = gsscreds .Credentials (desired_name = self .name )
217
+ creds = gsscreds .Credentials (name = self .name )
218
218
resp = creds .inquire (** kwargs )
219
219
220
220
if kwargs ['name' ]:
@@ -240,7 +240,7 @@ def test_inquire(self, str_name, kwargs):
240
240
241
241
@true_false_perms ('name' , 'init_lifetime' , 'accept_lifetime' , 'usage' )
242
242
def test_inquire_by_mech (self , str_name , kwargs ):
243
- creds = gsscreds .Credentials (desired_name = self .name )
243
+ creds = gsscreds .Credentials (name = self .name )
244
244
resp = creds .inquire_by_mech (mech = gb .MechType .kerberos , ** kwargs )
245
245
246
246
if kwargs ['name' ]:
@@ -283,7 +283,7 @@ def test_store_into_add_from(self):
283
283
self .realm .extract_keytab (princ_name , KT )
284
284
self .realm .kinit (princ_name , None , ['-k' , '-t' , KT ])
285
285
286
- initial_creds = gsscreds .Credentials (desired_name = None ,
286
+ initial_creds = gsscreds .Credentials (name = None ,
287
287
usage = 'initiate' )
288
288
289
289
store_res = initial_creds .store (store , overwrite = True )
@@ -302,13 +302,13 @@ def test_store_into_add_from(self):
302
302
303
303
@_extension_test ('cred_imp_ext' , 'credentials import-export' )
304
304
def test_export (self ):
305
- creds = gsscreds .Credentials (desired_name = self .name )
305
+ creds = gsscreds .Credentials (name = self .name )
306
306
token = creds .export ()
307
307
token .should_be (bytes )
308
308
309
309
@_extension_test ('cred_imp_ext' , 'credentials import-export' )
310
310
def test_import_by_init (self ):
311
- creds = gsscreds .Credentials (desired_name = self .name )
311
+ creds = gsscreds .Credentials (name = self .name )
312
312
token = creds .export ()
313
313
imported_creds = gsscreds .Credentials (token = token )
314
314
@@ -317,14 +317,14 @@ def test_import_by_init(self):
317
317
318
318
@_extension_test ('cred_imp_ext' , 'credentials import-export' )
319
319
def test_pickle_unpickle (self ):
320
- creds = gsscreds .Credentials (desired_name = self .name )
320
+ creds = gsscreds .Credentials (name = self .name )
321
321
pickled_creds = pickle .dumps (creds )
322
322
unpickled_creds = pickle .loads (pickled_creds )
323
323
324
324
unpickled_creds .lifetime .should_be (creds .lifetime )
325
325
unpickled_creds .name .should_be (creds .name )
326
326
327
- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
327
+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
328
328
usage = 'initiate' )
329
329
@_extension_test ('s4u' , 'S4U' )
330
330
def test_impersonate (self , str_name , kwargs ):
@@ -336,7 +336,7 @@ def test_impersonate(self, str_name, kwargs):
336
336
del client_ctx_resp # free everything but the token
337
337
338
338
server_name = self .name
339
- server_creds = gsscreds .Credentials (desired_name = server_name ,
339
+ server_creds = gsscreds .Credentials (name = server_name ,
340
340
usage = 'both' )
341
341
server_ctx_resp = gb .accept_sec_context (client_token ,
342
342
acceptor_cred = server_creds )
@@ -461,14 +461,14 @@ def setUp(self):
461
461
super (SecurityContextTestCase , self ).setUp ()
462
462
gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = False
463
463
self .client_name = gssnames .Name (self .USER_PRINC )
464
- self .client_creds = gsscreds .Credentials (desired_name = None ,
464
+ self .client_creds = gsscreds .Credentials (name = None ,
465
465
usage = 'initiate' )
466
466
467
467
self .target_name = gssnames .Name (TARGET_SERVICE_NAME ,
468
468
gb .NameType .hostbased_service )
469
469
470
470
self .server_name = gssnames .Name (SERVICE_PRINCIPAL )
471
- self .server_creds = gsscreds .Credentials (desired_name = self .server_name ,
471
+ self .server_creds = gsscreds .Credentials (name = self .server_name ,
472
472
usage = 'accept' )
473
473
474
474
def _create_client_ctx (self , ** kwargs ):
@@ -483,7 +483,7 @@ def test_create_from_other(self):
483
483
high_level_ctx = gssctx .SecurityContext (raw_client_ctx )
484
484
high_level_ctx .target_name .should_be (self .target_name )
485
485
486
- @exist_perms (desired_lifetime = 30 , flags = [],
486
+ @exist_perms (lifetime = 30 , flags = [],
487
487
mech_type = gb .MechType .kerberos ,
488
488
channel_bindings = None )
489
489
def test_create_new_init (self , str_name , kwargs ):
@@ -506,7 +506,7 @@ def create_sec_context():
506
506
create_sec_context .should_raise (TypeError )
507
507
508
508
def _create_completed_contexts (self ):
509
- client_ctx = self ._create_client_ctx (desired_lifetime = 400 )
509
+ client_ctx = self ._create_client_ctx (lifetime = 400 )
510
510
511
511
client_token = client_ctx .step ()
512
512
client_token .should_be_a (bytes )
@@ -542,7 +542,7 @@ def test_channel_bindings(self):
542
542
initiator_address = b'127.0.0.1' ,
543
543
acceptor_address_type = gb .AddressType .ip ,
544
544
acceptor_address = b'127.0.0.1' )
545
- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
545
+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
546
546
channel_bindings = bdgs )
547
547
548
548
client_token = client_ctx .step ()
@@ -561,7 +561,7 @@ def test_bad_channel_bindings_raises_error(self):
561
561
initiator_address = b'127.0.0.1' ,
562
562
acceptor_address_type = gb .AddressType .ip ,
563
563
acceptor_address = b'127.0.0.1' )
564
- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
564
+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
565
565
channel_bindings = bdgs )
566
566
567
567
client_token = client_ctx .step ()
@@ -659,7 +659,7 @@ def test_verify_signature_raise(self):
659
659
def test_defer_step_error_on_method (self ):
660
660
gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = True
661
661
bdgs = gb .ChannelBindings (application_data = b'abcxyz' )
662
- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
662
+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
663
663
channel_bindings = bdgs )
664
664
665
665
client_token = client_ctx .step ()
@@ -674,7 +674,7 @@ def test_defer_step_error_on_method(self):
674
674
def test_defer_step_error_on_complete_property_access (self ):
675
675
gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = True
676
676
bdgs = gb .ChannelBindings (application_data = b'abcxyz' )
677
- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
677
+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
678
678
channel_bindings = bdgs )
679
679
680
680
client_token = client_ctx .step ()
0 commit comments