summaryrefslogtreecommitdiff
path: root/keystoneclient/tests/unit/v2_0
diff options
context:
space:
mode:
authorBernhard M. Wiedemann <bwiedemann@suse.de>2019-02-28 14:06:22 +0100
committerGuang Yee <guang.yee@suse.com>2020-01-08 11:00:59 -0800
commitabe757aa70b262068f26b2b634b8fff06a8fbfdf (patch)
tree87d8f9a2cac9549519906563f8e2dd7f97625217 /keystoneclient/tests/unit/v2_0
parent2aa71240e386c97c73bc2ba771a0f22a4a041de8 (diff)
downloadpython-keystoneclient-stable/stein.tar.gz
Make tests pass in 2020stein-em3.19.1stable/stein
Without this patch, build failed after 2019-12-31 with Traceback (most recent call last): File "keystoneclient/tests/unit/v3/test_auth.py", line 226, in test_authenticate_success_password_unscoped self.assertRequestBodyIs(json=self.TEST_REQUEST_BODY) File "keystoneclient/tests/unit/utils.py", line 72, in assertRequestBodyIs self.assertEqual(json, val) NOTE: in addition to the orginal backport, this patch also fix bandit complains. The literal 'sha256' is the default hash algorithm, not a sensitive password. Marking it as false positive so bandit can stop chirping. Change-Id: I0e44d9896c5970f0ca07438c372aec826aeb5c77 (cherry picked from commit acc21ff06154e16de16583fe6994207d689ed054)
Diffstat (limited to 'keystoneclient/tests/unit/v2_0')
-rw-r--r--keystoneclient/tests/unit/v2_0/test_auth.py4
1 files changed, 2 insertions, 2 deletions
diff --git a/keystoneclient/tests/unit/v2_0/test_auth.py b/keystoneclient/tests/unit/v2_0/test_auth.py
index 64f2ea0..b733524 100644
--- a/keystoneclient/tests/unit/v2_0/test_auth.py
+++ b/keystoneclient/tests/unit/v2_0/test_auth.py
@@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
self.TEST_RESPONSE_DICT = {
"access": {
"token": {
- "expires": "2020-01-01T00:00:10.000123Z",
+ "expires": "2999-01-01T00:00:10.000123Z",
"id": self.TEST_TOKEN,
"tenant": {
"id": self.TEST_TENANT_ID
@@ -61,7 +61,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
# Build a new response
TEST_TOKEN = "abcdef"
- resp_b['access']['token']['expires'] = '2020-01-01T00:00:10.000123Z'
+ resp_b['access']['token']['expires'] = '2999-01-01T00:00:10.000123Z'
resp_b['access']['token']['id'] = TEST_TOKEN
# return expired first, and then the new response