code stringlengths 3 6.57k |
|---|
kwargs.pop("max_page_size", None) |
DeletedKey._from_deleted_key_item(x) |
list_properties_of_keys(self, **kwargs) |
kwargs.pop("max_page_size", None) |
KeyProperties._from_key_item(x) |
list_properties_of_key_versions(self, name, **kwargs) |
kwargs.pop("max_page_size", None) |
KeyProperties._from_key_item(x) |
purge_deleted_key(self, name, **kwargs) |
key_client.purge_deleted_key("key-name") |
self._client.purge_deleted_key(vault_base_url=self.vault_url, key_name=name, error_map=_error_map, **kwargs) |
begin_recover_deleted_key(self, name, **kwargs) |
kwargs.pop("_polling_interval", None) |
partial(self.get_key, name=name, **kwargs) |
KeyVaultOperationPoller(polling_method) |
update_key_properties(self, name, version=None, **kwargs) |
properties (not its cryptographic material) |
kwargs.pop("enabled", None) |
kwargs.pop("not_before", None) |
kwargs.pop("expires_on", None) |
self._models.KeyAttributes(enabled=enabled, not_before=not_before, expires=expires_on) |
kwargs.pop("key_operations", None) |
kwargs.pop("tags", None) |
KeyVaultKey._from_key_bundle(bundle) |
backup_key(self, name, **kwargs) |
self._client.backup_key(self.vault_url, name, error_map=_error_map, **kwargs) |
restore_key_backup(self, backup, **kwargs) |
self._models.KeyRestoreParameters(key_bundle_backup=backup) |
KeyVaultKey._from_key_bundle(bundle) |
import_key(self, name, key, **kwargs) |
kwargs.pop("enabled", None) |
kwargs.pop("not_before", None) |
kwargs.pop("expires_on", None) |
self._models.KeyAttributes(enabled=enabled, not_before=not_before, expires=expires_on) |
key._to_generated_model() |
kwargs.pop("hardware_protected", None) |
kwargs.pop("tags", None) |
KeyVaultKey._from_key_bundle(bundle) |
pytest.fixture(scope="module") |
principal() |
str(uuid.uuid4() |
test_interface() |
verifyObject(IAuthenticationPolicy, JWTCookieAuthenticationPolicy("secret") |
test_cookie(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret") |
policy.create_token(principal) |
policy.remember(dummy_request, token) |
pop() |
len(cookie) |
len(cookie) |
test_cookie_name(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", cookie_name="auth") |
policy.create_token(principal) |
policy.remember(dummy_request, token) |
pop() |
cookie.split("=", 1) |
test_secure_cookie() |
JWTCookieAuthenticationPolicy("secret", https_only=True) |
Request.blank("/") |
policy.create_token(str(uuid.uuid4() |
policy.remember(dummy_request, token) |
pop() |
test_insecure_cookie(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", https_only=False) |
policy.create_token(principal) |
policy.remember(dummy_request, token) |
pop() |
test_cookie_decode(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", https_only=False) |
policy.create_token(principal) |
policy.remember(dummy_request, token) |
pop() |
cookie.split("=", 1) |
value.split(";", 1) |
policy.get_claims(dummy_request) |
test_invalid_cookie_reissue(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", https_only=False, reissue_time=10) |
policy.remember(dummy_request, token) |
pop() |
cookie.split("=", 1) |
value.split(";", 1) |
policy.get_claims(dummy_request) |
test_cookie_max_age(principal) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", cookie_name="auth", expiration=100) |
policy.remember(dummy_request, principal) |
pop() |
cookie.split("=", 1) |
value.split(";", 1) |
test_expired_token(principal, freezer) |
Request.blank("/") |
JWTCookieAuthenticationPolicy("secret", cookie_name="auth", expiration=1) |
policy.create_token(principal) |
policy.remember(dummy_request, token) |
pop() |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.