Example #1
0
    def _maintain_token_expiration(self):
        """Token expiration should be maintained after re-auth & validation."""
        timeutils.set_time_override()

        r = self.controller.authenticate(
            {}, auth={"passwordCredentials": {"username": self.user_foo["name"], "password": self.user_foo["password"]}}
        )
        unscoped_token_id = r["access"]["token"]["id"]
        original_expiration = r["access"]["token"]["expires"]

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=unscoped_token_id)
        self.assertEqual(original_expiration, r["access"]["token"]["expires"])

        timeutils.advance_time_seconds(1)

        r = self.controller.authenticate(
            {}, auth={"token": {"id": unscoped_token_id}, "tenantId": self.tenant_bar["id"]}
        )
        scoped_token_id = r["access"]["token"]["id"]
        self.assertEqual(original_expiration, r["access"]["token"]["expires"])

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=scoped_token_id)
        self.assertEqual(original_expiration, r["access"]["token"]["expires"])
Example #2
0
    def test_token_expiry_maintained(self):
        timeutils.set_time_override()
        foo_client = self.get_client(self.user_foo)

        orig_token = foo_client.service_catalog.catalog["token"]
        timeutils.advance_time_seconds(1)
        reauthenticated_token = foo_client.tokens.authenticate(token=foo_client.auth_token)

        self.assertCloseEnoughForGovernmentWork(
            timeutils.parse_isotime(orig_token["expires"]), timeutils.parse_isotime(reauthenticated_token.expires)
        )
Example #3
0
    def test_token_expiry_maintained(self):
        timeutils.set_time_override()
        foo_client = self.get_client(self.user_foo)

        orig_token = foo_client.service_catalog.catalog['token']
        timeutils.advance_time_seconds(1)
        reauthenticated_token = foo_client.tokens.authenticate(
            token=foo_client.auth_token)

        self.assertCloseEnoughForGovernmentWork(
            timeutils.parse_isotime(orig_token['expires']),
            timeutils.parse_isotime(reauthenticated_token.expires))
Example #4
0
    def _maintain_token_expiration(self):
        """Token expiration should be maintained after re-auth & validation."""
        timeutils.set_time_override()

        r = self.controller.authenticate({},
                                         auth={
                                             'passwordCredentials': {
                                                 'username':
                                                 self.user_foo['name'],
                                                 'password':
                                                 self.user_foo['password']
                                             }
                                         })
        unscoped_token_id = r['access']['token']['id']
        original_expiration = r['access']['token']['expires']

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(dict(is_admin=True,
                                                query_string={}),
                                           token_id=unscoped_token_id)
        self.assertEqual(original_expiration, r['access']['token']['expires'])

        timeutils.advance_time_seconds(1)

        r = self.controller.authenticate({},
                                         auth={
                                             'token': {
                                                 'id': unscoped_token_id,
                                             },
                                             'tenantId': self.tenant_bar['id'],
                                         })
        scoped_token_id = r['access']['token']['id']
        self.assertEqual(original_expiration, r['access']['token']['expires'])

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(dict(is_admin=True,
                                                query_string={}),
                                           token_id=scoped_token_id)
        self.assertEqual(original_expiration, r['access']['token']['expires'])
Example #5
0
    def _maintain_token_expiration(self):
        """Token expiration should be maintained after re-auth & validation."""
        timeutils.set_time_override()

        r = self.controller.authenticate(
            {},
            auth={
                'passwordCredentials': {
                    'username': self.user_foo['name'],
                    'password': self.user_foo['password']
                }
            })
        unscoped_token_id = r['access']['token']['id']
        original_expiration = r['access']['token']['expires']

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(
            dict(is_admin=True, query_string={}),
            token_id=unscoped_token_id)
        self.assertEqual(original_expiration, r['access']['token']['expires'])

        timeutils.advance_time_seconds(1)

        r = self.controller.authenticate(
            {},
            auth={
                'token': {
                    'id': unscoped_token_id,
                },
                'tenantId': self.tenant_bar['id'],
            })
        scoped_token_id = r['access']['token']['id']
        self.assertEqual(original_expiration, r['access']['token']['expires'])

        timeutils.advance_time_seconds(1)

        r = self.controller.validate_token(
            dict(is_admin=True, query_string={}),
            token_id=scoped_token_id)
        self.assertEqual(original_expiration, r['access']['token']['expires'])