code
stringlengths
3
6.57k
kwargs.pop("max_page_size", None)
DeletedKey._from_deleted_key_item(x)
list_properties_of_keys(self, **kwargs)
kwargs.pop("max_page_size", None)
KeyProperties._from_key_item(x)
list_properties_of_key_versions(self, name, **kwargs)
kwargs.pop("max_page_size", None)
KeyProperties._from_key_item(x)
purge_deleted_key(self, name, **kwargs)
key_client.purge_deleted_key("key-name")
self._client.purge_deleted_key(vault_base_url=self.vault_url, key_name=name, error_map=_error_map, **kwargs)
begin_recover_deleted_key(self, name, **kwargs)
kwargs.pop("_polling_interval", None)
partial(self.get_key, name=name, **kwargs)
KeyVaultOperationPoller(polling_method)
update_key_properties(self, name, version=None, **kwargs)
properties (not its cryptographic material)
kwargs.pop("enabled", None)
kwargs.pop("not_before", None)
kwargs.pop("expires_on", None)
self._models.KeyAttributes(enabled=enabled, not_before=not_before, expires=expires_on)
kwargs.pop("key_operations", None)
kwargs.pop("tags", None)
KeyVaultKey._from_key_bundle(bundle)
backup_key(self, name, **kwargs)
self._client.backup_key(self.vault_url, name, error_map=_error_map, **kwargs)
restore_key_backup(self, backup, **kwargs)
self._models.KeyRestoreParameters(key_bundle_backup=backup)
KeyVaultKey._from_key_bundle(bundle)
import_key(self, name, key, **kwargs)
kwargs.pop("enabled", None)
kwargs.pop("not_before", None)
kwargs.pop("expires_on", None)
self._models.KeyAttributes(enabled=enabled, not_before=not_before, expires=expires_on)
key._to_generated_model()
kwargs.pop("hardware_protected", None)
kwargs.pop("tags", None)
KeyVaultKey._from_key_bundle(bundle)
pytest.fixture(scope="module")
principal()
str(uuid.uuid4()
test_interface()
verifyObject(IAuthenticationPolicy, JWTCookieAuthenticationPolicy("secret")
test_cookie(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret")
policy.create_token(principal)
policy.remember(dummy_request, token)
pop()
len(cookie)
len(cookie)
test_cookie_name(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", cookie_name="auth")
policy.create_token(principal)
policy.remember(dummy_request, token)
pop()
cookie.split("=", 1)
test_secure_cookie()
JWTCookieAuthenticationPolicy("secret", https_only=True)
Request.blank("/")
policy.create_token(str(uuid.uuid4()
policy.remember(dummy_request, token)
pop()
test_insecure_cookie(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", https_only=False)
policy.create_token(principal)
policy.remember(dummy_request, token)
pop()
test_cookie_decode(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", https_only=False)
policy.create_token(principal)
policy.remember(dummy_request, token)
pop()
cookie.split("=", 1)
value.split(";", 1)
policy.get_claims(dummy_request)
test_invalid_cookie_reissue(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", https_only=False, reissue_time=10)
policy.remember(dummy_request, token)
pop()
cookie.split("=", 1)
value.split(";", 1)
policy.get_claims(dummy_request)
test_cookie_max_age(principal)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", cookie_name="auth", expiration=100)
policy.remember(dummy_request, principal)
pop()
cookie.split("=", 1)
value.split(";", 1)
test_expired_token(principal, freezer)
Request.blank("/")
JWTCookieAuthenticationPolicy("secret", cookie_name="auth", expiration=1)
policy.create_token(principal)
policy.remember(dummy_request, token)
pop()