diff options
| author | Bernhard M. Wiedemann <bwiedemann@suse.de> | 2019-02-28 14:06:22 +0100 |
|---|---|---|
| committer | Guang Yee <guang.yee@suse.com> | 2020-01-08 11:00:59 -0800 |
| commit | abe757aa70b262068f26b2b634b8fff06a8fbfdf (patch) | |
| tree | 87d8f9a2cac9549519906563f8e2dd7f97625217 /keystoneclient/tests/unit/v2_0 | |
| parent | 2aa71240e386c97c73bc2ba771a0f22a4a041de8 (diff) | |
| download | python-keystoneclient-stable/stein.tar.gz | |
Make tests pass in 2020stein-em3.19.1stable/stein
Without this patch, build failed after 2019-12-31 with
Traceback (most recent call last):
File "keystoneclient/tests/unit/v3/test_auth.py", line 226, in test_authenticate_success_password_unscoped
self.assertRequestBodyIs(json=self.TEST_REQUEST_BODY)
File "keystoneclient/tests/unit/utils.py", line 72, in assertRequestBodyIs
self.assertEqual(json, val)
NOTE: in addition to the orginal backport, this patch also fix bandit
complains. The literal 'sha256' is the default hash algorithm, not a sensitive
password. Marking it as false positive so bandit can stop chirping.
Change-Id: I0e44d9896c5970f0ca07438c372aec826aeb5c77
(cherry picked from commit acc21ff06154e16de16583fe6994207d689ed054)
Diffstat (limited to 'keystoneclient/tests/unit/v2_0')
| -rw-r--r-- | keystoneclient/tests/unit/v2_0/test_auth.py | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/keystoneclient/tests/unit/v2_0/test_auth.py b/keystoneclient/tests/unit/v2_0/test_auth.py index 64f2ea0..b733524 100644 --- a/keystoneclient/tests/unit/v2_0/test_auth.py +++ b/keystoneclient/tests/unit/v2_0/test_auth.py @@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase): self.TEST_RESPONSE_DICT = { "access": { "token": { - "expires": "2020-01-01T00:00:10.000123Z", + "expires": "2999-01-01T00:00:10.000123Z", "id": self.TEST_TOKEN, "tenant": { "id": self.TEST_TENANT_ID @@ -61,7 +61,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase): # Build a new response TEST_TOKEN = "abcdef" - resp_b['access']['token']['expires'] = '2020-01-01T00:00:10.000123Z' + resp_b['access']['token']['expires'] = '2999-01-01T00:00:10.000123Z' resp_b['access']['token']['id'] = TEST_TOKEN # return expired first, and then the new response |
