aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/python/google-auth/py3/tests/test_external_account.py
diff options
context:
space:
mode:
authorAlexSm <alex@ydb.tech>2023-12-27 23:31:58 +0100
committerGitHub <noreply@github.com>2023-12-27 23:31:58 +0100
commitd67bfb4b4b7549081543e87a31bc6cb5c46ac973 (patch)
tree8674f2f1570877cb653e7ddcff37ba00288de15a /contrib/python/google-auth/py3/tests/test_external_account.py
parent1f6bef05ed441c3aa2d565ac792b26cded704ac7 (diff)
downloadydb-d67bfb4b4b7549081543e87a31bc6cb5c46ac973.tar.gz
Import libs 4 (#758)
Diffstat (limited to 'contrib/python/google-auth/py3/tests/test_external_account.py')
-rw-r--r--contrib/python/google-auth/py3/tests/test_external_account.py51
1 files changed, 28 insertions, 23 deletions
diff --git a/contrib/python/google-auth/py3/tests/test_external_account.py b/contrib/python/google-auth/py3/tests/test_external_account.py
index 0b165bc70b..5225dcf342 100644
--- a/contrib/python/google-auth/py3/tests/test_external_account.py
+++ b/contrib/python/google-auth/py3/tests/test_external_account.py
@@ -505,6 +505,11 @@ class TestCredentials(object):
credentials = self.make_credentials()
assert credentials.universe_domain == external_account._DEFAULT_UNIVERSE_DOMAIN
+ def test_with_universe_domain(self):
+ credentials = self.make_credentials()
+ new_credentials = credentials.with_universe_domain("dummy_universe.com")
+ assert new_credentials.universe_domain == "dummy_universe.com"
+
def test_info_workforce_pool(self):
credentials = self.make_workforce_pool_credentials(
workforce_pool_user_project=self.WORKFORCE_POOL_USER_PROJECT
@@ -833,7 +838,7 @@ class TestCredentials(object):
"Content-Type": "application/json",
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,
@@ -915,7 +920,7 @@ class TestCredentials(object):
"Content-Type": "application/json",
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,
@@ -1134,7 +1139,7 @@ class TestCredentials(object):
"Content-Type": "application/json",
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,
@@ -1218,7 +1223,7 @@ class TestCredentials(object):
"Content-Type": "application/json",
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,
@@ -1274,7 +1279,7 @@ class TestCredentials(object):
assert headers == {
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_apply_workforce_without_quota_project_id(self):
@@ -1291,7 +1296,7 @@ class TestCredentials(object):
assert headers == {
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_apply_impersonation_without_quota_project_id(self):
@@ -1323,7 +1328,7 @@ class TestCredentials(object):
assert headers == {
"authorization": "Bearer {}".format(impersonation_response["accessToken"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_apply_with_quota_project_id(self):
@@ -1340,7 +1345,7 @@ class TestCredentials(object):
"other": "header-value",
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
"x-goog-user-project": self.QUOTA_PROJECT_ID,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_apply_impersonation_with_quota_project_id(self):
@@ -1375,7 +1380,7 @@ class TestCredentials(object):
"other": "header-value",
"authorization": "Bearer {}".format(impersonation_response["accessToken"]),
"x-goog-user-project": self.QUOTA_PROJECT_ID,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_before_request(self):
@@ -1391,7 +1396,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
# Second call shouldn't call refresh.
@@ -1400,7 +1405,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_before_request_workforce(self):
@@ -1418,7 +1423,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
# Second call shouldn't call refresh.
@@ -1427,7 +1432,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
def test_before_request_impersonation(self):
@@ -1458,7 +1463,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(impersonation_response["accessToken"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
# Second call shouldn't call refresh.
@@ -1467,7 +1472,7 @@ class TestCredentials(object):
assert headers == {
"other": "header-value",
"authorization": "Bearer {}".format(impersonation_response["accessToken"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
@mock.patch("google.auth._helpers.utcnow")
@@ -1495,7 +1500,7 @@ class TestCredentials(object):
# Cached token should be used.
assert headers == {
"authorization": "Bearer token",
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
# Next call should simulate 1 second passed.
@@ -1509,7 +1514,7 @@ class TestCredentials(object):
# New token should be retrieved.
assert headers == {
"authorization": "Bearer {}".format(self.SUCCESS_RESPONSE["access_token"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
@mock.patch("google.auth._helpers.utcnow")
@@ -1552,7 +1557,7 @@ class TestCredentials(object):
# Cached token should be used.
assert headers == {
"authorization": "Bearer token",
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
# Next call should simulate 1 second passed. This will trigger the expiration
@@ -1567,7 +1572,7 @@ class TestCredentials(object):
# New token should be retrieved.
assert headers == {
"authorization": "Bearer {}".format(impersonation_response["accessToken"]),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
@pytest.mark.parametrize(
@@ -1666,7 +1671,7 @@ class TestCredentials(object):
"x-goog-user-project": self.QUOTA_PROJECT_ID,
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,
@@ -1720,7 +1725,7 @@ class TestCredentials(object):
"authorization": "Bearer {}".format(
impersonation_response["accessToken"]
),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
},
)
@@ -1792,7 +1797,7 @@ class TestCredentials(object):
"authorization": "Bearer {}".format(
self.SUCCESS_RESPONSE["access_token"]
),
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
},
)
@@ -1842,7 +1847,7 @@ class TestCredentials(object):
"Content-Type": "application/json",
"authorization": "Bearer {}".format(token_response["access_token"]),
"x-goog-api-client": IMPERSONATE_ACCESS_TOKEN_REQUEST_METRICS_HEADER_VALUE,
- "x-identity-trust-boundary": "0",
+ "x-allowed-locations": "0x0",
}
impersonation_request_data = {
"delegates": None,