def test_token_expiry_maintained(self): timeutils.set_time_override() foo_client = self.get_client(self.user_foo) orig_token = foo_client.service_catalog.catalog["token"] timeutils.advance_time_seconds(1) reauthenticated_token = foo_client.tokens.authenticate(token=foo_client.auth_token) self.assertCloseEnoughForGovernmentWork( timeutils.parse_isotime(orig_token["expires"]), timeutils.parse_isotime(reauthenticated_token.expires) )
def test_token_expiry_maintained(self): timeutils.set_time_override() foo_client = self.get_client(self.user_foo) orig_token = foo_client.service_catalog.catalog['token'] timeutils.advance_time_seconds(1) reauthenticated_token = foo_client.tokens.authenticate( token=foo_client.auth_token) self.assertCloseEnoughForGovernmentWork( timeutils.parse_isotime(orig_token['expires']), timeutils.parse_isotime(reauthenticated_token.expires))
def _maintain_token_expiration(self): """Token expiration should be maintained after re-auth & validation.""" timeutils.set_time_override() r = self.controller.authenticate( {}, auth={"passwordCredentials": {"username": self.user_foo["name"], "password": self.user_foo["password"]}} ) unscoped_token_id = r["access"]["token"]["id"] original_expiration = r["access"]["token"]["expires"] timeutils.advance_time_seconds(1) r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=unscoped_token_id) self.assertEqual(original_expiration, r["access"]["token"]["expires"]) timeutils.advance_time_seconds(1) r = self.controller.authenticate( {}, auth={"token": {"id": unscoped_token_id}, "tenantId": self.tenant_bar["id"]} ) scoped_token_id = r["access"]["token"]["id"] self.assertEqual(original_expiration, r["access"]["token"]["expires"]) timeutils.advance_time_seconds(1) r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=scoped_token_id) self.assertEqual(original_expiration, r["access"]["token"]["expires"])
def _maintain_token_expiration(self): """Token expiration should be maintained after re-auth & validation.""" timeutils.set_time_override() r = self.controller.authenticate({}, auth={ 'passwordCredentials': { 'username': self.user_foo['name'], 'password': self.user_foo['password'] } }) unscoped_token_id = r['access']['token']['id'] original_expiration = r['access']['token']['expires'] timeutils.advance_time_seconds(1) r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=unscoped_token_id) self.assertEqual(original_expiration, r['access']['token']['expires']) timeutils.advance_time_seconds(1) r = self.controller.authenticate({}, auth={ 'token': { 'id': unscoped_token_id, }, 'tenantId': self.tenant_bar['id'], }) scoped_token_id = r['access']['token']['id'] self.assertEqual(original_expiration, r['access']['token']['expires']) timeutils.advance_time_seconds(1) r = self.controller.validate_token(dict(is_admin=True, query_string={}), token_id=scoped_token_id) self.assertEqual(original_expiration, r['access']['token']['expires'])
def _maintain_token_expiration(self): """Token expiration should be maintained after re-auth & validation.""" timeutils.set_time_override() r = self.controller.authenticate( {}, auth={ 'passwordCredentials': { 'username': self.user_foo['name'], 'password': self.user_foo['password'] } }) unscoped_token_id = r['access']['token']['id'] original_expiration = r['access']['token']['expires'] timeutils.advance_time_seconds(1) r = self.controller.validate_token( dict(is_admin=True, query_string={}), token_id=unscoped_token_id) self.assertEqual(original_expiration, r['access']['token']['expires']) timeutils.advance_time_seconds(1) r = self.controller.authenticate( {}, auth={ 'token': { 'id': unscoped_token_id, }, 'tenantId': self.tenant_bar['id'], }) scoped_token_id = r['access']['token']['id'] self.assertEqual(original_expiration, r['access']['token']['expires']) timeutils.advance_time_seconds(1) r = self.controller.validate_token( dict(is_admin=True, query_string={}), token_id=scoped_token_id) self.assertEqual(original_expiration, r['access']['token']['expires'])