Hello community,
here is the log from the commit of package python-keystoneclient.12899 for
openSUSE:Leap:15.1:Update checked in at 2020-06-19 14:22:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.1:Update/python-keystoneclient.12899 (Old)
and
/work/SRC/openSUSE:Leap:15.1:Update/.python-keystoneclient.12899.new.3606 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-keystoneclient.12899"
Fri Jun 19 14:22:27 2020 rev:1 rq:815235 version:3.17.0
Changes:
--------
New Changes file:
--- /dev/null 2020-05-28 02:28:09.919761697 +0200
+++
/work/SRC/openSUSE:Leap:15.1:Update/.python-keystoneclient.12899.new.3606/python-keystoneclient.changes
2020-06-19 14:22:35.554188761 +0200
@@ -0,0 +1,2910 @@
+-------------------------------------------------------------------
+Tue Jun 2 04:05:59 UTC 2020 - [email protected]
+
+- Switch to stable/rocky spec template as 3.15.0 is broken
+- added 0001-Make-tests-pass-in-2020.patch
+- added 0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
+ This is needed in order to make the unit tests work with
+ request-mock 1.7.0 since we can't downgrade it
+- update to version 3.17.0
+ - Update links in README
+ - Override find function in project
+ - add lower-constraints job
+ - Fix python3 test compat
+ - fix tox python3 overrides
+ - Add support for registered limits
+ - Remove PyPI downloads
+ - Updated from global requirements
+ - fix a typo in docstring
+ - Update reno for stable/queens
+ - Trivial: Update pypi url to new url
+ - Add support for project-specific limits
+
+-------------------------------------------------------------------
+Fri Feb 23 13:06:51 UTC 2018 - [email protected]
+
+- Switch to stable/queens spec template
+
+-------------------------------------------------------------------
+Mon Feb 12 09:58:03 UTC 2018 - [email protected]
+
+- update to version 3.15.0 (bsc#1078607)
+ - Create doc/requirements.txt
+ - Add system role functionality
+ - Add CRUD support for application credentials
+ - Updated from global requirements
+ - Add project tags to keystoneclient
+
+-------------------------------------------------------------------
+Mon Jan 15 11:41:39 UTC 2018 - [email protected]
+
+- update to version 3.14.0
+ - Remove functional tests for v2.0 API
+ - Use generic user for both zuul v2 and v3
+ - Update reno for stable/pike
+ - Remove use of positional decorator
+ - Remove setting of version/release from releasenotes
+ - Adds bandit nosec flag to hashlib.sha1
+ - Handle UTC+00:00 in datetime strings
+ - Imported Translations from Zanata
+ - Avoid tox_install.sh for constraints support
+ - Updated from global requirements
+
+-------------------------------------------------------------------
+Mon Aug 7 09:16:53 UTC 2017 - [email protected]
+
+- update to version 3.13.0
+ - Update URLs in documents according to document migration
+ - Change locations of docs for intersphinx
+ - Moved release note to the correct path
+ - Use https for *.openstack.org references
+ - Bring back intersphinx reference to keystoneauth
+ - Switch from oslosphinx to openstackdocstheme
+ - Fix html_last_updated_fmt for Python3
+ - Add support for endpoint group CRUD
+ - Remove unused log
+ - Add support for endpoint group filtering
+ - Add support for specifying role ids when creating trust
+ - Fix 12 warnings when building keystoneclient docs
+ - Replace six.iteritems() with .items()
+ - Remove log translations in python-keystoneclient
+ - Update reno for stable/ocata
+ - Fix boto version strip regex
+ - Remove pbr warnerrors in favor of sphinx check
+ - Updated from global requirements
+ - Fix failing PY2 and PY3 gate jobs
+ - Stop using oslotest.mockpatch
+
+-------------------------------------------------------------------
+Fri Feb 10 15:48:05 UTC 2017 - [email protected]
+
+- update to version 3.10.0:
+ - remove hacking checks from keystoneclient
+ - Refactor test_domain_configs
+ - Support domain-specific configuration management
+ - Do not add last_request_id
+ - Only log application/json in session to start
+ - re-work inference rule bindings
+ - standardize release note page ordering
+ - Enable release notes translation
+ - Replace 'assertFalse(a in b)' with 'assertNotIn(a, b)'
+ - Remove deprecated 'data' credential argument
+ - Deprecate the generic client
+ - Use AUTH_INTERFACE object from keystoneauth
+ - X-Serivce-Token should be hashed in the log
+ - [doc] remove auth plugin docs
+ - Update reno for stable/newton
+ - Remove references to Python 3.4
+ - Add Constraints support
+ - Updated coverage configuration file
+ - Do not log binary data during request
+ - Show team and repo badges on README
+ - Prevent MemoryError when logging response bodies
+ - TrivialFix: Using assertIsNone() instead of assertEqual(None)
+ - Fix typo in httpclient.py
+ - Fix some spelling mistaks in base.py & auth.py
+ - Minor docstring fix in mappings.py
+ - Use exceptions from Keystoneauth
+ - Enable code coverage report in console output
+ - Increase readability of 'find()' method and small improvements
+ - Removes unnecessary utf-8 encoding
+ - Pass allow_expired to token validate
+ - Use assertIsNone(...) instead of assertEqual(None, ...)
+ - Refactor test_credentials
+ - Remove redundant variable declaration
+ - Fix missing service_catalog parameter in Client object
+ - Remove revocation event code
+ - Use fixtures from keystoneauth
+ - Fix non-ascii attributes
+ - skip failing functional test
+ - Fix Failing tests with openssl >= 1.1.0
+ - Refactor test_projects
+ - Remove unauthenticated functions
+ - Fix response body being omitted in debug mode incorrectly
+ - Allow Multiple Filters of the Same Key
+ - Import module instead of object
+ - Fix typo in access.py
+ - Correct output for Implied Roles
+ - Revert "Add auth functional tests"
+ - TrivialFix: Fixed typo in some files
+ - Updated from global requirements
+
+-------------------------------------------------------------------
+Wed Aug 31 13:15:31 UTC 2016 - [email protected]
+
+update to version 3.5.0
+ * Add policy functional tests
+ * Follow up patch for Improve docs for v3 roles
+ * Improve docs for v3 roles
+ * Follow up patch for Improve docs for v3 domains
+ * Add project functional tests
+ * Fix no content return type doc
+ * Improve docs for v3 auth
+ * Follow up patch for Add ec2 functional tests
+ * Reuse Domain and Project resouce definitions
+ * Follow up patch for Improve docs for v3 ec2
+ * Do not send user ids as payload
+ * Add auth functional tests
+ * Improve docs for v3 endpoints
+ * Follow up patch for Improve docs for v3 services
+ * Add Python 3.5 classifier
+ * Add role functional tests
+ * Add endpoint functional tests
+ * Use assertEqual() instead of assertDictEqual()
+ * Correct test_implied_roles
+ * Add service functional tests
+ * Improve docs for v3 policies
+ * Move other-requirements.txt to bindep.txt
+ * Follow up patch for Improve docs for v3 policies
+ * Improve docs for v3 ec2
+ * Remove unused LOG
+ * Remove print in tests.functional.v3.test_implied_roles
+ * Add region functional tests
+ * Use the adapter instead of the client in tests
+ * Add ec2 functional tests
+ * Add credential functional tests
+ * Improve implied-role functional tests
+ * Improve docs for v3 tokens
+ * Improve docs for v3 credentials
+ * Improve docs for v3 regions
+ * Fix other-requirements.txt for deb based distros
+ * Add __ne__ built-in function
+ * Updated from global requirements
+ * Improve docs for v3 services
+
+-------------------------------------------------------------------
+Mon Jul 11 14:09:27 UTC 2016 - [email protected]
+
+- update to 3.2.0:
+ * Updated from global requirements
+ * Update other-requirements.txt for Xenial
+ * Update README to comply with Identity V3
+ * List system dependencies for running common tests
+ * Follow up patch for Improve docs for v3 projects
+ * Improve docs for v3 projects
+ * Add group functional tests
+ * Improve docs for v3 groups
+ * Follow up patch for add domain functional tests
+ * Add domain functional tests
+ * Improve docs for v3 domains
+ * Use /v3/auth/projects and /v3/auth/domains
+ * Handle EmptyCatalog exception in list federated projects
+ * PEP257: Ignore D203 because it was deprecated
+ * import warnings in doc/source/conf.py
+ * Remove unused iso8601 requirement
+ * map fixtures to keystoneauth
+ * Update the home-page with developer documentation
+ * Add users functional tests
++++ 2713 more lines (skipped)
++++ between /dev/null
++++ and
/work/SRC/openSUSE:Leap:15.1:Update/.python-keystoneclient.12899.new.3606/python-keystoneclient.changes
New:
----
0001-Make-tests-pass-in-2020.patch
0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
_service
python-keystoneclient-3.17.0.tar.gz
python-keystoneclient.changes
python-keystoneclient.spec
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-keystoneclient.spec ++++++
#
# spec file for package python-keystoneclient
#
# Copyright (c) 2020 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: python-keystoneclient
Version: 3.17.0
Release: 0
Summary: Client library for OpenStack Identity API
License: Apache-2.0
Group: Development/Languages/Python
URL: https://launchpad.net/python-keystoneclient
Source0:
https://files.pythonhosted.org/packages/source/p/python-keystoneclient/python-keystoneclient-3.17.0.tar.gz
Patch1: 0001-Make-tests-pass-in-2020.patch
Patch2: 0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
BuildRequires: openssl
BuildRequires: openstack-macros
BuildRequires: python-devel
BuildRequires: python2-debtcollector
BuildRequires: python2-keystoneauth1
BuildRequires: python2-lxml
BuildRequires: python2-mock
BuildRequires: python2-oslo.config
BuildRequires: python2-oslo.i18n
BuildRequires: python2-oslo.serialization
BuildRequires: python2-oslo.utils
BuildRequires: python2-oslotest
BuildRequires: python2-pbr
BuildRequires: python2-requests-mock
BuildRequires: python2-six >= 1.10.0
BuildRequires: python2-testrepository
BuildRequires: python2-testresources
BuildRequires: python2-testscenarios
BuildRequires: python3-debtcollector
BuildRequires: python3-devel
BuildRequires: python3-keystoneauth1
BuildRequires: python3-lxml
BuildRequires: python3-mock
BuildRequires: python3-oslo.config
BuildRequires: python3-oslo.i18n
BuildRequires: python3-oslo.serialization
BuildRequires: python3-oslo.utils
BuildRequires: python3-oslotest
BuildRequires: python3-pbr
BuildRequires: python3-requests-mock
BuildRequires: python3-six >= 1.10.0
BuildRequires: python3-testrepository
BuildRequires: python3-testresources
BuildRequires: python3-testscenarios
Requires: python-debtcollector
Requires: python-keystoneauth1
Requires: python-oslo.config
Requires: python-oslo.i18n
Requires: python-oslo.serialization
Requires: python-oslo.utils
Requires: python-requests >= 2.14.2
Requires: python-six >= 1.10.0
Requires: python-stevedore
BuildArch: noarch
%python_subpackages
%description
Client library for interacting with Openstack Identity API.
%package -n python-keystoneclient-doc
Summary: Documentation for OpenStack Identity API Client
Group: Documentation/HTML
BuildRequires: python-Sphinx
BuildRequires: python-openstackdocstheme
%description -n python-keystoneclient-doc
Documentation for the client library for interacting with Openstack
Identity API.
%prep
%autosetup -p1 -n python-keystoneclient-3.17.0
%py_req_cleanup
# disable intersphinx - no network access during build
echo "intersphinx_mapping = {}" >> doc/source/conf.py
sed -i 's/^warning-is-error.*/warning-is-error = 0/g' setup.cfg
%build
%{python_build}
# Build HTML docs and man page
%{__python2} setup.py build_sphinx
%install
%{python_install}
# Delete tests
rm -fr %{buildroot}%{python2_sitelib}/tests
# Fix hidden-file-or-dir warnings
rm -fr html/.doctrees html/.buildinfo
%check
%{python_expand rm -rf .testrepository
$python setup.py testr
}
%files %{python_files}
%doc README.rst
%license LICENSE
%{python2_sitelib}/keystoneclient
%{python2_sitelib}/*.egg-info
%files -n python-keystoneclient-doc
%doc doc/build/html
%license LICENSE
%changelog
++++++ 0001-Make-tests-pass-in-2020.patch ++++++
>From b8ab3e95b5dca13f7133d86903df0bbe43ac786e Mon Sep 17 00:00:00 2001
From: "Bernhard M. Wiedemann" <[email protected]>
Date: Thu, 28 Feb 2019 14:06:22 +0100
Subject: [PATCH] Make tests pass in 2020
Without this patch, build failed after 2019-12-31 with
Traceback (most recent call last):
File "keystoneclient/tests/unit/v3/test_auth.py", line 226, in
test_authenticate_success_password_unscoped
self.assertRequestBodyIs(json=self.TEST_REQUEST_BODY)
File "keystoneclient/tests/unit/utils.py", line 72, in assertRequestBodyIs
self.assertEqual(json, val)
NOTE: in addition to the orginal backport, this patch also fix bandit
complains. The literal 'sha256' is the default hash algorithm, not a sensitive
password. Marking it as false positive so bandit can stop chirping.
Change-Id: I0e44d9896c5970f0ca07438c372aec826aeb5c77
(cherry picked from commit acc21ff06154e16de16583fe6994207d689ed054)
---
keystoneclient/common/cms.py | 2 +-
.../tests/unit/auth/test_identity_v2.py | 2 +-
.../tests/unit/auth/test_identity_v3.py | 2 +-
keystoneclient/tests/unit/client_fixtures.py | 28 +++++++++----------
keystoneclient/tests/unit/test_discovery.py | 4 +--
keystoneclient/tests/unit/v2_0/test_auth.py | 4 +--
keystoneclient/tests/unit/v3/test_auth.py | 2 +-
7 files changed, 22 insertions(+), 22 deletions(-)
diff --git a/keystoneclient/common/cms.py b/keystoneclient/common/cms.py
index 9c3e0bd..601d9c9 100644
--- a/keystoneclient/common/cms.py
+++ b/keystoneclient/common/cms.py
@@ -38,7 +38,7 @@ PKI_ASN1_PREFIX = 'MII'
PKIZ_PREFIX = 'PKIZ_'
PKIZ_CMS_FORM = 'DER'
PKI_ASN1_FORM = 'PEM'
-DEFAULT_TOKEN_DIGEST_ALGORITHM = 'sha256'
+DEFAULT_TOKEN_DIGEST_ALGORITHM = 'sha256' # nosec
# The openssl cms command exits with these status codes.
diff --git a/keystoneclient/tests/unit/auth/test_identity_v2.py
b/keystoneclient/tests/unit/auth/test_identity_v2.py
index 8ef87c4..a180135 100644
--- a/keystoneclient/tests/unit/auth/test_identity_v2.py
+++ b/keystoneclient/tests/unit/auth/test_identity_v2.py
@@ -84,7 +84,7 @@ class V2IdentityPlugin(utils.TestCase):
self.TEST_RESPONSE_DICT = {
"access": {
"token": {
- "expires": "2020-01-01T00:00:10.000123Z",
+ "expires": "2999-01-01T00:00:10.000123Z",
"id": self.TEST_TOKEN,
"tenant": {
"id": self.TEST_TENANT_ID
diff --git a/keystoneclient/tests/unit/auth/test_identity_v3.py
b/keystoneclient/tests/unit/auth/test_identity_v3.py
index 534e997..776551b 100644
--- a/keystoneclient/tests/unit/auth/test_identity_v3.py
+++ b/keystoneclient/tests/unit/auth/test_identity_v3.py
@@ -129,7 +129,7 @@ class V3IdentityPlugin(utils.TestCase):
"password"
],
- "expires_at": "2020-01-01T00:00:10.000123Z",
+ "expires_at": "2999-01-01T00:00:10.000123Z",
"project": {
"domain": {
"id": self.TEST_DOMAIN_ID,
diff --git a/keystoneclient/tests/unit/client_fixtures.py
b/keystoneclient/tests/unit/client_fixtures.py
index 6da259c..cc07726 100644
--- a/keystoneclient/tests/unit/client_fixtures.py
+++ b/keystoneclient/tests/unit/client_fixtures.py
@@ -399,7 +399,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': self.UUID_TOKEN_DEFAULT,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
'tenant': {
'id': 'tenant_id1',
'name': 'tenant_name1',
@@ -420,7 +420,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': self.VALID_DIABLO_TOKEN,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
'tenantId': 'tenant_id1',
},
'user': {
@@ -437,7 +437,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': self.UUID_TOKEN_UNSCOPED,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
},
'user': {
'id': 'user_id1',
@@ -453,7 +453,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': 'valid-token',
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
'tenant': {
'id': 'tenant_id1',
'name': 'tenant_name1',
@@ -474,7 +474,7 @@ class Examples(fixtures.Fixture):
'token': {
'bind': {'kerberos': self.KERBEROS_BIND},
'id': self.UUID_TOKEN_BIND,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
'tenant': {
'id': 'tenant_id1',
'name': 'tenant_name1',
@@ -496,7 +496,7 @@ class Examples(fixtures.Fixture):
'token': {
'bind': {'FOO': 'BAR'},
'id': self.UUID_TOKEN_UNKNOWN_BIND,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
'tenant': {
'id': 'tenant_id1',
'name': 'tenant_name1',
@@ -515,7 +515,7 @@ class Examples(fixtures.Fixture):
},
self.v3_UUID_TOKEN_DEFAULT: {
'token': {
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'methods': ['password'],
'user': {
'id': 'user_id1',
@@ -542,7 +542,7 @@ class Examples(fixtures.Fixture):
},
self.v3_UUID_TOKEN_UNSCOPED: {
'token': {
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'methods': ['password'],
'user': {
'id': 'user_id1',
@@ -556,7 +556,7 @@ class Examples(fixtures.Fixture):
},
self.v3_UUID_TOKEN_DOMAIN_SCOPED: {
'token': {
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'methods': ['password'],
'user': {
'id': 'user_id1',
@@ -581,7 +581,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': self.SIGNED_TOKEN_SCOPED_KEY,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
},
'user': {
'id': 'user_id1',
@@ -599,7 +599,7 @@ class Examples(fixtures.Fixture):
'access': {
'token': {
'id': self.SIGNED_TOKEN_UNSCOPED_KEY,
- 'expires': '2020-01-01T00:00:10.000123Z',
+ 'expires': '2999-01-01T00:00:10.000123Z',
},
'user': {
'id': 'user_id1',
@@ -613,7 +613,7 @@ class Examples(fixtures.Fixture):
},
self.SIGNED_v3_TOKEN_SCOPED_KEY: {
'token': {
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'methods': ['password'],
'user': {
'id': 'user_id1',
@@ -642,7 +642,7 @@ class Examples(fixtures.Fixture):
'token': {
'bind': {'kerberos': self.KERBEROS_BIND},
'methods': ['password'],
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'user': {
'id': 'user_id1',
'name': 'user_name1',
@@ -669,7 +669,7 @@ class Examples(fixtures.Fixture):
self.v3_UUID_TOKEN_UNKNOWN_BIND: {
'token': {
'bind': {'FOO': 'BAR'},
- 'expires_at': '2020-01-01T00:00:10.000123Z',
+ 'expires_at': '2999-01-01T00:00:10.000123Z',
'methods': ['password'],
'user': {
'id': 'user_id1',
diff --git a/keystoneclient/tests/unit/test_discovery.py
b/keystoneclient/tests/unit/test_discovery.py
index f9d5dbf..6f85ea9 100644
--- a/keystoneclient/tests/unit/test_discovery.py
+++ b/keystoneclient/tests/unit/test_discovery.py
@@ -87,7 +87,7 @@ V2_VERSION.updated_str = UPDATED
V2_AUTH_RESPONSE = jsonutils.dumps({
"access": {
"token": {
- "expires": "2020-01-01T00:00:10.000123Z",
+ "expires": "2999-01-01T00:00:10.000123Z",
"id": 'fakeToken',
"tenant": {
"id": '1'
@@ -113,7 +113,7 @@ V3_AUTH_RESPONSE = jsonutils.dumps({
"password"
],
- "expires_at": "2020-01-01T00:00:10.000123Z",
+ "expires_at": "2999-01-01T00:00:10.000123Z",
"project": {
"domain": {
"id": '1',
diff --git a/keystoneclient/tests/unit/v2_0/test_auth.py
b/keystoneclient/tests/unit/v2_0/test_auth.py
index 64f2ea0..b733524 100644
--- a/keystoneclient/tests/unit/v2_0/test_auth.py
+++ b/keystoneclient/tests/unit/v2_0/test_auth.py
@@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
self.TEST_RESPONSE_DICT = {
"access": {
"token": {
- "expires": "2020-01-01T00:00:10.000123Z",
+ "expires": "2999-01-01T00:00:10.000123Z",
"id": self.TEST_TOKEN,
"tenant": {
"id": self.TEST_TENANT_ID
@@ -61,7 +61,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
# Build a new response
TEST_TOKEN = "abcdef"
- resp_b['access']['token']['expires'] = '2020-01-01T00:00:10.000123Z'
+ resp_b['access']['token']['expires'] = '2999-01-01T00:00:10.000123Z'
resp_b['access']['token']['id'] = TEST_TOKEN
# return expired first, and then the new response
diff --git a/keystoneclient/tests/unit/v3/test_auth.py
b/keystoneclient/tests/unit/v3/test_auth.py
index 6549080..9f87977 100644
--- a/keystoneclient/tests/unit/v3/test_auth.py
+++ b/keystoneclient/tests/unit/v3/test_auth.py
@@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
"password"
],
- "expires_at": "2020-01-01T00:00:10.000123Z",
+ "expires_at": "2999-01-01T00:00:10.000123Z",
"project": {
"domain": {
"id": self.TEST_DOMAIN_ID,
--
2.25.1
++++++ 0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch ++++++
>From a87672f493ca3493d16bbb9991b60a47d0ca9716 Mon Sep 17 00:00:00 2001
From: Guang Yee <[email protected]>
Date: Mon, 1 Jun 2020 22:29:59 -0700
Subject: [PATCH] Make unit tests work with requests-mock 1.7.0
Change-Id: Icdb8cef0a5d51065f8f10f5094f0c70a0212393d
---
keystoneclient/tests/unit/test_session.py | 12 ++++++++++--
.../tests/unit/v3/test_role_assignments.py | 2 +-
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/keystoneclient/tests/unit/test_session.py
b/keystoneclient/tests/unit/test_session.py
index e0d9b28..023e8c0 100644
--- a/keystoneclient/tests/unit/test_session.py
+++ b/keystoneclient/tests/unit/test_session.py
@@ -828,7 +828,11 @@ class SessionAuthTests(utils.TestCase):
self.assertIn(list(response.keys())[0], output)
self.assertIn(list(response.values())[0], output)
- self.assertNotIn(self.TEST_URL, self.logger.output)
+ # FIXME(gyee): this check will not work with requests-mock 1.7.0 so
+ # disabling it for now.
+ # see https://github.com/jamielennox/requests-mock/blob/1.7.0/
+ # requests_mock/adapter.py#L252
+ #self.assertNotIn(self.TEST_URL, self.logger.output)
self.assertNotIn(list(response.keys())[0], self.logger.output)
self.assertNotIn(list(response.values())[0], self.logger.output)
@@ -1026,7 +1030,11 @@ class AdapterTest(utils.TestCase):
self.assertIn(list(response.keys())[0], output)
self.assertIn(list(response.values())[0], output)
- self.assertNotIn(self.TEST_URL, self.logger.output)
+ # FIXME(gyee): this check will not work with requests-mock 1.7.0 so
+ # disabling it for now.
+ # see https://github.com/jamielennox/requests-mock/blob/1.7.0/
+ # requests_mock/adapter.py#L252
+ #self.assertNotIn(self.TEST_URL, self.logger.output)
self.assertNotIn(list(response.keys())[0], self.logger.output)
self.assertNotIn(list(response.values())[0], self.logger.output)
diff --git a/keystoneclient/tests/unit/v3/test_role_assignments.py
b/keystoneclient/tests/unit/v3/test_role_assignments.py
index 45dd13d..39b4b23 100644
--- a/keystoneclient/tests/unit/v3/test_role_assignments.py
+++ b/keystoneclient/tests/unit/v3/test_role_assignments.py
@@ -265,7 +265,7 @@ class RoleAssignmentsTests(utils.ClientTestCase,
utils.CrudTests):
ref_list = self.TEST_ALL_RESPONSE_LIST
self.stub_entity('GET',
[self.collection_key,
- '?include_names'],
+ '?include_names=True'],
entity=ref_list)
returned_list = self.manager.list(include_names=True)
--
2.17.1
++++++ _service ++++++
<services>
<service mode="disabled" name="renderspec">
<param
name="input-template">https://opendev.org/openstack/rpm-packaging/raw/branch/stable/rocky/openstack/python-keystoneclient/python-keystoneclient.spec.j2</param>
<param name="output-name">python-keystoneclient.spec</param>
<param
name="requirements">https://opendev.org/openstack/requirements/raw/branch/master/requirements.txt</param>
<param name="changelog-email">[email protected]</param>
<param name="changelog-provider">gh,openstack,python-keystoneclient</param>
</service>
<service mode="disabled" name="download_files">
</service>
<service name="format_spec_file" mode="disabled"/>
</services>