Hello community,

here is the log from the commit of package python-keystoneclient for 
openSUSE:Leap:15.2:SLE-workarounds checked in at 2020-06-08 12:54:43
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2:SLE-workarounds/python-keystoneclient 
(Old)
 and      
/work/SRC/openSUSE:Leap:15.2:SLE-workarounds/.python-keystoneclient.new.3606 
(New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-keystoneclient"

Mon Jun  8 12:54:43 2020 rev:1 rq: version:3.17.0

Changes:
--------
New Changes file:

--- /dev/null   2020-05-28 02:28:09.919761697 +0200
+++ 
/work/SRC/openSUSE:Leap:15.2:SLE-workarounds/.python-keystoneclient.new.3606/python-keystoneclient.changes
  2020-06-08 12:54:44.518332430 +0200
@@ -0,0 +1,2910 @@
+-------------------------------------------------------------------
+Tue Jun  2 04:05:59 UTC 2020 - cloud-de...@suse.de
+
+- Switch to stable/rocky spec template as 3.15.0 is broken
+- added 0001-Make-tests-pass-in-2020.patch
+- added 0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
+  This is needed in order to make the unit tests work with
+  request-mock 1.7.0 since we can't downgrade it
+- update to version 3.17.0
+  - Update links in README
+  - Override find function in project
+  - add lower-constraints job
+  - Fix python3 test compat
+  - fix tox python3 overrides
+  - Add support for registered limits
+  - Remove PyPI downloads
+  - Updated from global requirements
+  - fix a typo in docstring
+  - Update reno for stable/queens
+  - Trivial: Update pypi url to new url
+  - Add support for project-specific limits
+
+-------------------------------------------------------------------
+Fri Feb 23 13:06:51 UTC 2018 - tbecht...@suse.com
+
+- Switch to stable/queens spec template
+
+-------------------------------------------------------------------
+Mon Feb 12 09:58:03 UTC 2018 - cloud-de...@suse.de
+
+- update to version 3.15.0 (bsc#1078607)
+  - Create doc/requirements.txt
+  - Add system role functionality
+  - Add CRUD support for application credentials
+  - Updated from global requirements
+  - Add project tags to keystoneclient
+
+-------------------------------------------------------------------
+Mon Jan 15 11:41:39 UTC 2018 - cloud-de...@suse.de
+
+- update to version 3.14.0
+  - Remove functional tests for v2.0 API
+  - Use generic user for both zuul v2 and v3
+  - Update reno for stable/pike
+  - Remove use of positional decorator
+  - Remove setting of version/release from releasenotes
+  - Adds bandit nosec flag to hashlib.sha1
+  - Handle UTC+00:00 in datetime strings
+  - Imported Translations from Zanata
+  - Avoid tox_install.sh for constraints support
+  - Updated from global requirements
+
+-------------------------------------------------------------------
+Mon Aug  7 09:16:53 UTC 2017 - cloud-de...@suse.de
+
+- update to version 3.13.0
+  - Update URLs in documents according to document migration
+  - Change locations of docs for intersphinx
+  - Moved release note to the correct path
+  - Use https for *.openstack.org references
+  - Bring back intersphinx reference to keystoneauth
+  - Switch from oslosphinx to openstackdocstheme
+  - Fix html_last_updated_fmt for Python3
+  - Add support for endpoint group CRUD
+  - Remove unused log
+  - Add support for endpoint group filtering
+  - Add support for specifying role ids when creating trust
+  - Fix 12 warnings when building keystoneclient docs
+  - Replace six.iteritems() with .items()
+  - Remove log translations in python-keystoneclient
+  - Update reno for stable/ocata
+  - Fix boto version strip regex
+  - Remove pbr warnerrors in favor of sphinx check
+  - Updated from global requirements
+  - Fix failing PY2 and PY3 gate jobs
+  - Stop using oslotest.mockpatch
+
+-------------------------------------------------------------------
+Fri Feb 10 15:48:05 UTC 2017 - cloud-de...@suse.de
+
+- update to version 3.10.0:
+  - remove hacking checks from keystoneclient
+  - Refactor test_domain_configs
+  - Support domain-specific configuration management
+  - Do not add last_request_id
+  - Only log application/json in session to start
+  - re-work inference rule bindings
+  - standardize release note page ordering
+  - Enable release notes translation
+  - Replace 'assertFalse(a in b)' with 'assertNotIn(a, b)'
+  - Remove deprecated 'data' credential argument
+  - Deprecate the generic client
+  - Use AUTH_INTERFACE object from keystoneauth
+  - X-Serivce-Token should be hashed in the log
+  - [doc] remove auth plugin docs
+  - Update reno for stable/newton
+  - Remove references to Python 3.4
+  - Add Constraints support
+  - Updated coverage configuration file
+  - Do not log binary data during request
+  - Show team and repo badges on README
+  - Prevent MemoryError when logging response bodies
+  - TrivialFix: Using assertIsNone() instead of assertEqual(None)
+  - Fix typo in httpclient.py
+  - Fix some spelling mistaks in base.py & auth.py
+  - Minor docstring fix in mappings.py
+  - Use exceptions from Keystoneauth
+  - Enable code coverage report in console output
+  - Increase readability of 'find()' method and small improvements
+  - Removes unnecessary utf-8 encoding
+  - Pass allow_expired to token validate
+  - Use assertIsNone(...) instead of assertEqual(None, ...)
+  - Refactor test_credentials
+  - Remove redundant variable declaration
+  - Fix missing service_catalog parameter in Client object
+  - Remove revocation event code
+  - Use fixtures from keystoneauth
+  - Fix non-ascii attributes
+  - skip failing functional test
+  - Fix Failing tests with openssl >= 1.1.0
+  - Refactor test_projects
+  - Remove unauthenticated functions
+  - Fix response body being omitted in debug mode incorrectly
+  - Allow Multiple Filters of the Same Key
+  - Import module instead of object
+  - Fix typo in access.py
+  - Correct output for Implied Roles
+  - Revert "Add auth functional tests"
+  - TrivialFix: Fixed typo in some files
+  - Updated from global requirements
+
+-------------------------------------------------------------------
+Wed Aug 31 13:15:31 UTC 2016 - tbecht...@suse.com
+
+update to version 3.5.0
+  * Add policy functional tests
+  * Follow up patch for Improve docs for v3 roles
+  * Improve docs for v3 roles
+  * Follow up patch for Improve docs for v3 domains
+  * Add project functional tests
+  * Fix no content return type doc
+  * Improve docs for v3 auth
+  * Follow up patch for Add ec2 functional tests
+  * Reuse Domain and Project resouce definitions
+  * Follow up patch for Improve docs for v3 ec2
+  * Do not send user ids as payload
+  * Add auth functional tests
+  * Improve docs for v3 endpoints
+  * Follow up patch for Improve docs for v3 services
+  * Add Python 3.5 classifier
+  * Add role functional tests
+  * Add endpoint functional tests
+  * Use assertEqual() instead of assertDictEqual()
+  * Correct test_implied_roles
+  * Add service functional tests
+  * Improve docs for v3 policies
+  * Move other-requirements.txt to bindep.txt
+  * Follow up patch for Improve docs for v3 policies
+  * Improve docs for v3 ec2
+  * Remove unused LOG
+  * Remove print in tests.functional.v3.test_implied_roles
+  * Add region functional tests
+  * Use the adapter instead of the client in tests
+  * Add ec2 functional tests
+  * Add credential functional tests
+  * Improve implied-role functional tests
+  * Improve docs for v3 tokens
+  * Improve docs for v3 credentials
+  * Improve docs for v3 regions
+  * Fix other-requirements.txt for deb based distros
+  * Add __ne__ built-in function
+  * Updated from global requirements
+  * Improve docs for v3 services
+
+-------------------------------------------------------------------
+Mon Jul 11 14:09:27 UTC 2016 - tbecht...@suse.com
+
+- update to 3.2.0:
+  * Updated from global requirements
+  * Update other-requirements.txt for Xenial
+  * Update README to comply with Identity V3
+  * List system dependencies for running common tests
+  * Follow up patch for Improve docs for v3 projects
+  * Improve docs for v3 projects
+  * Add group functional tests
+  * Improve docs for v3 groups
+  * Follow up patch for add domain functional tests
+  * Add domain functional tests
+  * Improve docs for v3 domains
+  * Use /v3/auth/projects and /v3/auth/domains
+  * Handle EmptyCatalog exception in list federated projects
+  * PEP257: Ignore D203 because it was deprecated
+  * import warnings in doc/source/conf.py
+  * Remove unused iso8601 requirement
+  * map fixtures to keystoneauth
+  * Update the home-page with developer documentation
+  * Add users functional tests
++++ 2713 more lines (skipped)
++++ between /dev/null
++++ and 
/work/SRC/openSUSE:Leap:15.2:SLE-workarounds/.python-keystoneclient.new.3606/python-keystoneclient.changes

New:
----
  0001-Make-tests-pass-in-2020.patch
  0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
  _service
  python-keystoneclient-3.17.0.tar.gz
  python-keystoneclient.changes
  python-keystoneclient.spec

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-keystoneclient.spec ++++++
#
# spec file for package python-keystoneclient
#
# Copyright (c) 2020 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via https://bugs.opensuse.org/
#


Name:           python-keystoneclient
Version:        3.17.0
Release:        0
Summary:        Client library for OpenStack Identity API
License:        Apache-2.0
Group:          Development/Languages/Python
URL:            https://launchpad.net/python-keystoneclient
Source0:        
https://files.pythonhosted.org/packages/source/p/python-keystoneclient/python-keystoneclient-3.17.0.tar.gz
Patch1:         0001-Make-tests-pass-in-2020.patch
Patch2:         0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch
BuildRequires:  openssl
BuildRequires:  openstack-macros
BuildRequires:  python-devel
BuildRequires:  python2-debtcollector
BuildRequires:  python2-keystoneauth1
BuildRequires:  python2-lxml
BuildRequires:  python2-mock
BuildRequires:  python2-oslo.config
BuildRequires:  python2-oslo.i18n
BuildRequires:  python2-oslo.serialization
BuildRequires:  python2-oslo.utils
BuildRequires:  python2-oslotest
BuildRequires:  python2-pbr
BuildRequires:  python2-requests-mock
BuildRequires:  python2-six >= 1.10.0
BuildRequires:  python2-testrepository
BuildRequires:  python2-testresources
BuildRequires:  python2-testscenarios
BuildRequires:  python3-debtcollector
BuildRequires:  python3-devel
BuildRequires:  python3-keystoneauth1
BuildRequires:  python3-lxml
BuildRequires:  python3-mock
BuildRequires:  python3-oslo.config
BuildRequires:  python3-oslo.i18n
BuildRequires:  python3-oslo.serialization
BuildRequires:  python3-oslo.utils
BuildRequires:  python3-oslotest
BuildRequires:  python3-pbr
BuildRequires:  python3-requests-mock
BuildRequires:  python3-six >= 1.10.0
BuildRequires:  python3-testrepository
BuildRequires:  python3-testresources
BuildRequires:  python3-testscenarios
Requires:       python-debtcollector
Requires:       python-keystoneauth1
Requires:       python-oslo.config
Requires:       python-oslo.i18n
Requires:       python-oslo.serialization
Requires:       python-oslo.utils
Requires:       python-requests >= 2.14.2
Requires:       python-six >= 1.10.0
Requires:       python-stevedore
BuildArch:      noarch
%python_subpackages

%description
Client library for interacting with Openstack Identity API.

%package -n python-keystoneclient-doc
Summary:        Documentation for OpenStack Identity API Client
Group:          Documentation/HTML
BuildRequires:  python-Sphinx
BuildRequires:  python-openstackdocstheme

%description -n python-keystoneclient-doc
Documentation for the client library for interacting with Openstack
Identity API.

%prep
%autosetup -p1 -n python-keystoneclient-3.17.0
%py_req_cleanup
# disable intersphinx - no network access during build
echo "intersphinx_mapping = {}" >> doc/source/conf.py
sed -i 's/^warning-is-error.*/warning-is-error = 0/g' setup.cfg

%build
%{python_build}

# Build HTML docs and man page
%{__python2} setup.py build_sphinx

%install
%{python_install}

# Delete tests
rm -fr %{buildroot}%{python2_sitelib}/tests

# Fix hidden-file-or-dir warnings
rm -fr html/.doctrees html/.buildinfo

%check
%{python_expand rm -rf .testrepository
$python setup.py testr
}

%files %{python_files}
%doc README.rst
%license LICENSE
%{python2_sitelib}/keystoneclient
%{python2_sitelib}/*.egg-info

%files -n python-keystoneclient-doc
%doc doc/build/html
%license LICENSE

%changelog
++++++ 0001-Make-tests-pass-in-2020.patch ++++++
>From b8ab3e95b5dca13f7133d86903df0bbe43ac786e Mon Sep 17 00:00:00 2001
From: "Bernhard M. Wiedemann" <bwiedem...@suse.de>
Date: Thu, 28 Feb 2019 14:06:22 +0100
Subject: [PATCH] Make tests pass in 2020

Without this patch, build failed after 2019-12-31 with
Traceback (most recent call last):
  File "keystoneclient/tests/unit/v3/test_auth.py", line 226, in 
test_authenticate_success_password_unscoped
    self.assertRequestBodyIs(json=self.TEST_REQUEST_BODY)
  File "keystoneclient/tests/unit/utils.py", line 72, in assertRequestBodyIs
    self.assertEqual(json, val)

NOTE: in addition to the orginal backport, this patch also fix bandit
complains. The literal 'sha256' is the default hash algorithm, not a sensitive
password. Marking it as false positive so bandit can stop chirping.

Change-Id: I0e44d9896c5970f0ca07438c372aec826aeb5c77
(cherry picked from commit acc21ff06154e16de16583fe6994207d689ed054)
---
 keystoneclient/common/cms.py                  |  2 +-
 .../tests/unit/auth/test_identity_v2.py       |  2 +-
 .../tests/unit/auth/test_identity_v3.py       |  2 +-
 keystoneclient/tests/unit/client_fixtures.py  | 28 +++++++++----------
 keystoneclient/tests/unit/test_discovery.py   |  4 +--
 keystoneclient/tests/unit/v2_0/test_auth.py   |  4 +--
 keystoneclient/tests/unit/v3/test_auth.py     |  2 +-
 7 files changed, 22 insertions(+), 22 deletions(-)

diff --git a/keystoneclient/common/cms.py b/keystoneclient/common/cms.py
index 9c3e0bd..601d9c9 100644
--- a/keystoneclient/common/cms.py
+++ b/keystoneclient/common/cms.py
@@ -38,7 +38,7 @@ PKI_ASN1_PREFIX = 'MII'
 PKIZ_PREFIX = 'PKIZ_'
 PKIZ_CMS_FORM = 'DER'
 PKI_ASN1_FORM = 'PEM'
-DEFAULT_TOKEN_DIGEST_ALGORITHM = 'sha256'
+DEFAULT_TOKEN_DIGEST_ALGORITHM = 'sha256'  # nosec
 
 
 # The openssl cms command exits with these status codes.
diff --git a/keystoneclient/tests/unit/auth/test_identity_v2.py 
b/keystoneclient/tests/unit/auth/test_identity_v2.py
index 8ef87c4..a180135 100644
--- a/keystoneclient/tests/unit/auth/test_identity_v2.py
+++ b/keystoneclient/tests/unit/auth/test_identity_v2.py
@@ -84,7 +84,7 @@ class V2IdentityPlugin(utils.TestCase):
         self.TEST_RESPONSE_DICT = {
             "access": {
                 "token": {
-                    "expires": "2020-01-01T00:00:10.000123Z",
+                    "expires": "2999-01-01T00:00:10.000123Z",
                     "id": self.TEST_TOKEN,
                     "tenant": {
                         "id": self.TEST_TENANT_ID
diff --git a/keystoneclient/tests/unit/auth/test_identity_v3.py 
b/keystoneclient/tests/unit/auth/test_identity_v3.py
index 534e997..776551b 100644
--- a/keystoneclient/tests/unit/auth/test_identity_v3.py
+++ b/keystoneclient/tests/unit/auth/test_identity_v3.py
@@ -129,7 +129,7 @@ class V3IdentityPlugin(utils.TestCase):
                     "password"
                 ],
 
-                "expires_at": "2020-01-01T00:00:10.000123Z",
+                "expires_at": "2999-01-01T00:00:10.000123Z",
                 "project": {
                     "domain": {
                         "id": self.TEST_DOMAIN_ID,
diff --git a/keystoneclient/tests/unit/client_fixtures.py 
b/keystoneclient/tests/unit/client_fixtures.py
index 6da259c..cc07726 100644
--- a/keystoneclient/tests/unit/client_fixtures.py
+++ b/keystoneclient/tests/unit/client_fixtures.py
@@ -399,7 +399,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': self.UUID_TOKEN_DEFAULT,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                         'tenant': {
                             'id': 'tenant_id1',
                             'name': 'tenant_name1',
@@ -420,7 +420,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': self.VALID_DIABLO_TOKEN,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                         'tenantId': 'tenant_id1',
                     },
                     'user': {
@@ -437,7 +437,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': self.UUID_TOKEN_UNSCOPED,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                     },
                     'user': {
                         'id': 'user_id1',
@@ -453,7 +453,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': 'valid-token',
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                         'tenant': {
                             'id': 'tenant_id1',
                             'name': 'tenant_name1',
@@ -474,7 +474,7 @@ class Examples(fixtures.Fixture):
                     'token': {
                         'bind': {'kerberos': self.KERBEROS_BIND},
                         'id': self.UUID_TOKEN_BIND,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                         'tenant': {
                             'id': 'tenant_id1',
                             'name': 'tenant_name1',
@@ -496,7 +496,7 @@ class Examples(fixtures.Fixture):
                     'token': {
                         'bind': {'FOO': 'BAR'},
                         'id': self.UUID_TOKEN_UNKNOWN_BIND,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                         'tenant': {
                             'id': 'tenant_id1',
                             'name': 'tenant_name1',
@@ -515,7 +515,7 @@ class Examples(fixtures.Fixture):
             },
             self.v3_UUID_TOKEN_DEFAULT: {
                 'token': {
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'methods': ['password'],
                     'user': {
                         'id': 'user_id1',
@@ -542,7 +542,7 @@ class Examples(fixtures.Fixture):
             },
             self.v3_UUID_TOKEN_UNSCOPED: {
                 'token': {
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'methods': ['password'],
                     'user': {
                         'id': 'user_id1',
@@ -556,7 +556,7 @@ class Examples(fixtures.Fixture):
             },
             self.v3_UUID_TOKEN_DOMAIN_SCOPED: {
                 'token': {
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'methods': ['password'],
                     'user': {
                         'id': 'user_id1',
@@ -581,7 +581,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': self.SIGNED_TOKEN_SCOPED_KEY,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                     },
                     'user': {
                         'id': 'user_id1',
@@ -599,7 +599,7 @@ class Examples(fixtures.Fixture):
                 'access': {
                     'token': {
                         'id': self.SIGNED_TOKEN_UNSCOPED_KEY,
-                        'expires': '2020-01-01T00:00:10.000123Z',
+                        'expires': '2999-01-01T00:00:10.000123Z',
                     },
                     'user': {
                         'id': 'user_id1',
@@ -613,7 +613,7 @@ class Examples(fixtures.Fixture):
             },
             self.SIGNED_v3_TOKEN_SCOPED_KEY: {
                 'token': {
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'methods': ['password'],
                     'user': {
                         'id': 'user_id1',
@@ -642,7 +642,7 @@ class Examples(fixtures.Fixture):
                 'token': {
                     'bind': {'kerberos': self.KERBEROS_BIND},
                     'methods': ['password'],
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'user': {
                         'id': 'user_id1',
                         'name': 'user_name1',
@@ -669,7 +669,7 @@ class Examples(fixtures.Fixture):
             self.v3_UUID_TOKEN_UNKNOWN_BIND: {
                 'token': {
                     'bind': {'FOO': 'BAR'},
-                    'expires_at': '2020-01-01T00:00:10.000123Z',
+                    'expires_at': '2999-01-01T00:00:10.000123Z',
                     'methods': ['password'],
                     'user': {
                         'id': 'user_id1',
diff --git a/keystoneclient/tests/unit/test_discovery.py 
b/keystoneclient/tests/unit/test_discovery.py
index f9d5dbf..6f85ea9 100644
--- a/keystoneclient/tests/unit/test_discovery.py
+++ b/keystoneclient/tests/unit/test_discovery.py
@@ -87,7 +87,7 @@ V2_VERSION.updated_str = UPDATED
 V2_AUTH_RESPONSE = jsonutils.dumps({
     "access": {
         "token": {
-            "expires": "2020-01-01T00:00:10.000123Z",
+            "expires": "2999-01-01T00:00:10.000123Z",
             "id": 'fakeToken',
             "tenant": {
                 "id": '1'
@@ -113,7 +113,7 @@ V3_AUTH_RESPONSE = jsonutils.dumps({
             "password"
         ],
 
-        "expires_at": "2020-01-01T00:00:10.000123Z",
+        "expires_at": "2999-01-01T00:00:10.000123Z",
         "project": {
             "domain": {
                 "id": '1',
diff --git a/keystoneclient/tests/unit/v2_0/test_auth.py 
b/keystoneclient/tests/unit/v2_0/test_auth.py
index 64f2ea0..b733524 100644
--- a/keystoneclient/tests/unit/v2_0/test_auth.py
+++ b/keystoneclient/tests/unit/v2_0/test_auth.py
@@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
         self.TEST_RESPONSE_DICT = {
             "access": {
                 "token": {
-                    "expires": "2020-01-01T00:00:10.000123Z",
+                    "expires": "2999-01-01T00:00:10.000123Z",
                     "id": self.TEST_TOKEN,
                     "tenant": {
                         "id": self.TEST_TENANT_ID
@@ -61,7 +61,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
 
         # Build a new response
         TEST_TOKEN = "abcdef"
-        resp_b['access']['token']['expires'] = '2020-01-01T00:00:10.000123Z'
+        resp_b['access']['token']['expires'] = '2999-01-01T00:00:10.000123Z'
         resp_b['access']['token']['id'] = TEST_TOKEN
 
         # return expired first, and then the new response
diff --git a/keystoneclient/tests/unit/v3/test_auth.py 
b/keystoneclient/tests/unit/v3/test_auth.py
index 6549080..9f87977 100644
--- a/keystoneclient/tests/unit/v3/test_auth.py
+++ b/keystoneclient/tests/unit/v3/test_auth.py
@@ -28,7 +28,7 @@ class AuthenticateAgainstKeystoneTests(utils.TestCase):
                     "password"
                 ],
 
-                "expires_at": "2020-01-01T00:00:10.000123Z",
+                "expires_at": "2999-01-01T00:00:10.000123Z",
                 "project": {
                     "domain": {
                         "id": self.TEST_DOMAIN_ID,
-- 
2.25.1

++++++ 0001-Make-unit-tests-work-with-requests-mock-1.7.0.patch ++++++
>From a87672f493ca3493d16bbb9991b60a47d0ca9716 Mon Sep 17 00:00:00 2001
From: Guang Yee <guang....@suse.com>
Date: Mon, 1 Jun 2020 22:29:59 -0700
Subject: [PATCH] Make unit tests work with requests-mock 1.7.0

Change-Id: Icdb8cef0a5d51065f8f10f5094f0c70a0212393d
---
 keystoneclient/tests/unit/test_session.py            | 12 ++++++++++--
 .../tests/unit/v3/test_role_assignments.py           |  2 +-
 2 files changed, 11 insertions(+), 3 deletions(-)

diff --git a/keystoneclient/tests/unit/test_session.py 
b/keystoneclient/tests/unit/test_session.py
index e0d9b28..023e8c0 100644
--- a/keystoneclient/tests/unit/test_session.py
+++ b/keystoneclient/tests/unit/test_session.py
@@ -828,7 +828,11 @@ class SessionAuthTests(utils.TestCase):
         self.assertIn(list(response.keys())[0], output)
         self.assertIn(list(response.values())[0], output)
 
-        self.assertNotIn(self.TEST_URL, self.logger.output)
+        # FIXME(gyee): this check will not work with requests-mock 1.7.0 so
+        # disabling it for now.
+        # see https://github.com/jamielennox/requests-mock/blob/1.7.0/
+        #     requests_mock/adapter.py#L252
+        #self.assertNotIn(self.TEST_URL, self.logger.output)
         self.assertNotIn(list(response.keys())[0], self.logger.output)
         self.assertNotIn(list(response.values())[0], self.logger.output)
 
@@ -1026,7 +1030,11 @@ class AdapterTest(utils.TestCase):
         self.assertIn(list(response.keys())[0], output)
         self.assertIn(list(response.values())[0], output)
 
-        self.assertNotIn(self.TEST_URL, self.logger.output)
+        # FIXME(gyee): this check will not work with requests-mock 1.7.0 so
+        # disabling it for now.
+        # see https://github.com/jamielennox/requests-mock/blob/1.7.0/
+        #     requests_mock/adapter.py#L252
+        #self.assertNotIn(self.TEST_URL, self.logger.output)
         self.assertNotIn(list(response.keys())[0], self.logger.output)
         self.assertNotIn(list(response.values())[0], self.logger.output)
 
diff --git a/keystoneclient/tests/unit/v3/test_role_assignments.py 
b/keystoneclient/tests/unit/v3/test_role_assignments.py
index 45dd13d..39b4b23 100644
--- a/keystoneclient/tests/unit/v3/test_role_assignments.py
+++ b/keystoneclient/tests/unit/v3/test_role_assignments.py
@@ -265,7 +265,7 @@ class RoleAssignmentsTests(utils.ClientTestCase, 
utils.CrudTests):
         ref_list = self.TEST_ALL_RESPONSE_LIST
         self.stub_entity('GET',
                          [self.collection_key,
-                          '?include_names'],
+                          '?include_names=True'],
                          entity=ref_list)
 
         returned_list = self.manager.list(include_names=True)
-- 
2.17.1

++++++ _service ++++++
<services>
  <service mode="disabled" name="renderspec">
    <param 
name="input-template">https://opendev.org/openstack/rpm-packaging/raw/branch/stable/rocky/openstack/python-keystoneclient/python-keystoneclient.spec.j2</param>
    <param name="output-name">python-keystoneclient.spec</param>
    <param 
name="requirements">https://opendev.org/openstack/requirements/raw/branch/master/requirements.txt</param>
    <param name="changelog-email">cloud-de...@suse.de</param>
    <param name="changelog-provider">gh,openstack,python-keystoneclient</param>
  </service>
  <service mode="disabled" name="download_files">
  </service>
  <service name="format_spec_file" mode="disabled"/>
</services>

Reply via email to