Lines Matching full:credentials

325     credentials = None  variable in TestCredentials
329 self.credentials = jwt.Credentials(
340 credentials = jwt.Credentials.from_service_account_info(
344 assert credentials._signer.key_id == info["private_key_id"]
345 assert credentials._issuer == info["client_email"]
346 assert credentials._subject == info["client_email"]
347 assert credentials._audience == self.AUDIENCE
352 credentials = jwt.Credentials.from_service_account_info(
359 assert credentials._signer.key_id == info["private_key_id"]
360 assert credentials._issuer == info["client_email"]
361 assert credentials._subject == self.SUBJECT
362 assert credentials._audience == self.AUDIENCE
363 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
368 credentials = jwt.Credentials.from_service_account_file(
372 assert credentials._signer.key_id == info["private_key_id"]
373 assert credentials._issuer == info["client_email"]
374 assert credentials._subject == info["client_email"]
375 assert credentials._audience == self.AUDIENCE
380 credentials = jwt.Credentials.from_service_account_file(
387 assert credentials._signer.key_id == info["private_key_id"]
388 assert credentials._issuer == info["client_email"]
389 assert credentials._subject == self.SUBJECT
390 assert credentials._audience == self.AUDIENCE
391 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
394 jwt_from_signing = self.credentials.from_signing_credentials(
395 self.credentials, audience=mock.sentinel.new_audience
397 jwt_from_info = jwt.Credentials.from_service_account_info(
401 assert isinstance(jwt_from_signing, jwt.Credentials)
408 assert not self.credentials.valid
410 assert not self.credentials.expired
414 new_credentials = self.credentials.with_claims(audience=new_audience)
416 assert new_credentials._signer == self.credentials._signer
417 assert new_credentials._issuer == self.credentials._issuer
418 assert new_credentials._subject == self.credentials._subject
420 assert new_credentials._additional_claims == self.credentials._additional_claims
421 assert new_credentials._quota_project_id == self.credentials._quota_project_id
424 cred = jwt.Credentials.from_service_account_info(
438 new_credentials = self.credentials.with_quota_project(quota_project_id)
439 assert new_credentials._signer == self.credentials._signer
440 assert new_credentials._issuer == self.credentials._issuer
441 assert new_credentials._subject == self.credentials._subject
442 assert new_credentials._audience == self.credentials._audience
443 assert new_credentials._additional_claims == self.credentials._additional_claims
448 signature = self.credentials.sign_bytes(to_sign)
452 assert isinstance(self.credentials.signer, crypt.RSASigner)
455 assert self.credentials.signer_email == SERVICE_ACCOUNT_INFO["client_email"]
463 self.credentials.refresh(None)
464 assert self.credentials.valid
465 assert not self.credentials.expired
468 assert not self.credentials.expired
470 self.credentials.refresh(None)
471 assert not self.credentials.expired
475 now.return_value = self.credentials.expiry + one_day
476 assert self.credentials.expired
481 self.credentials.refresh(None)
482 self.credentials.before_request(
490 assert token.encode("utf-8") == self.credentials.token
496 assert not self.credentials.valid
497 self.credentials.before_request(None, "GET", "http://example.com?a=1#3", {})
498 assert self.credentials.valid
505 credentials = None variable in TestOnDemandCredentials
509 self.credentials = jwt.OnDemandCredentials(
520 credentials = jwt.OnDemandCredentials.from_service_account_info(info)
522 assert credentials._signer.key_id == info["private_key_id"]
523 assert credentials._issuer == info["client_email"]
524 assert credentials._subject == info["client_email"]
529 credentials = jwt.OnDemandCredentials.from_service_account_info(
533 assert credentials._signer.key_id == info["private_key_id"]
534 assert credentials._issuer == info["client_email"]
535 assert credentials._subject == self.SUBJECT
536 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
541 credentials = jwt.OnDemandCredentials.from_service_account_file(
545 assert credentials._signer.key_id == info["private_key_id"]
546 assert credentials._issuer == info["client_email"]
547 assert credentials._subject == info["client_email"]
552 credentials = jwt.OnDemandCredentials.from_service_account_file(
558 assert credentials._signer.key_id == info["private_key_id"]
559 assert credentials._issuer == info["client_email"]
560 assert credentials._subject == self.SUBJECT
561 assert credentials._additional_claims == self.ADDITIONAL_CLAIMS
564 jwt_from_signing = self.credentials.from_signing_credentials(self.credentials)
575 # Credentials are *always* valid.
576 assert self.credentials.valid
577 # Credentials *never* expire.
578 assert not self.credentials.expired
582 new_credentials = self.credentials.with_claims(additional_claims=new_claims)
584 assert new_credentials._signer == self.credentials._signer
585 assert new_credentials._issuer == self.credentials._issuer
586 assert new_credentials._subject == self.credentials._subject
591 new_credentials = self.credentials.with_quota_project(quota_project_id)
593 assert new_credentials._signer == self.credentials._signer
594 assert new_credentials._issuer == self.credentials._issuer
595 assert new_credentials._subject == self.credentials._subject
596 assert new_credentials._additional_claims == self.credentials._additional_claims
601 signature = self.credentials.sign_bytes(to_sign)
605 assert isinstance(self.credentials.signer, crypt.RSASigner)
608 assert self.credentials.signer_email == SERVICE_ACCOUNT_INFO["client_email"]
617 self.credentials.refresh(None)
622 self.credentials.before_request(
632 self.credentials.before_request(None, "GET", "http://example.com?b=2", headers)
639 self.credentials._cache["audience"] = (
644 token = self.credentials._get_jwt_for_audience("audience")