@@ -121,19 +121,19 @@ def setUp(self):
121121 self .name = gssnames .Name (SERVICE_PRINCIPAL ,
122122 gb .NameType .kerberos_principal )
123123
124- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
124+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
125125 usage = 'both' )
126126 def test_acquire_by_init (self , str_name , kwargs ):
127- creds = gsscreds .Credentials (desired_name = self .name , ** kwargs )
127+ creds = gsscreds .Credentials (name = self .name , ** kwargs )
128128
129129 creds .lifetime .should_be_an_integer ()
130130
131131 del creds
132132
133- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
133+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
134134 usage = 'both' )
135135 def test_acquire_by_method (self , str_name , kwargs ):
136- cred_resp = gsscreds .Credentials .acquire (desired_name = self .name ,
136+ cred_resp = gsscreds .Credentials .acquire (name = self .name ,
137137 ** kwargs )
138138
139139 cred_resp .shouldnt_be_none ()
@@ -177,7 +177,7 @@ def test_store_acquire(self):
177177 store_res .usage .should_be ('initiate' )
178178 store_res .mech_types .should_include (gb .MechType .kerberos )
179179
180- reacquired_creds = gsscreds .Credentials (desired_name = deleg_creds .name ,
180+ reacquired_creds = gsscreds .Credentials (name = deleg_creds .name ,
181181 usage = 'initiate' )
182182 reacquired_creds .shouldnt_be_none ()
183183
@@ -192,7 +192,7 @@ def test_store_into_acquire_from(self):
192192 self .realm .extract_keytab (princ_name , KT )
193193 self .realm .kinit (princ_name , None , ['-k' , '-t' , KT ])
194194
195- initial_creds = gsscreds .Credentials (desired_name = None ,
195+ initial_creds = gsscreds .Credentials (name = None ,
196196 usage = 'initiate' )
197197
198198 store_res = initial_creds .store (store , overwrite = True )
@@ -202,19 +202,19 @@ def test_store_into_acquire_from(self):
202202 store_res .usage .should_be ('initiate' )
203203
204204 name = gssnames .Name (princ_name )
205- retrieved_creds = gsscreds .Credentials (desired_name = name , store = store )
205+ retrieved_creds = gsscreds .Credentials (name = name , store = store )
206206
207207 retrieved_creds .shouldnt_be_none ()
208208
209209 def test_create_from_other (self ):
210- raw_creds = gb .acquire_cred (None , cred_usage = 'accept' ).creds
210+ raw_creds = gb .acquire_cred (None , usage = 'accept' ).creds
211211
212212 high_level_creds = gsscreds .Credentials (raw_creds )
213213 high_level_creds .usage .should_be ('accept' )
214214
215215 @true_false_perms ('name' , 'lifetime' , 'usage' , 'mechs' )
216216 def test_inquire (self , str_name , kwargs ):
217- creds = gsscreds .Credentials (desired_name = self .name )
217+ creds = gsscreds .Credentials (name = self .name )
218218 resp = creds .inquire (** kwargs )
219219
220220 if kwargs ['name' ]:
@@ -240,7 +240,7 @@ def test_inquire(self, str_name, kwargs):
240240
241241 @true_false_perms ('name' , 'init_lifetime' , 'accept_lifetime' , 'usage' )
242242 def test_inquire_by_mech (self , str_name , kwargs ):
243- creds = gsscreds .Credentials (desired_name = self .name )
243+ creds = gsscreds .Credentials (name = self .name )
244244 resp = creds .inquire_by_mech (mech = gb .MechType .kerberos , ** kwargs )
245245
246246 if kwargs ['name' ]:
@@ -283,7 +283,7 @@ def test_store_into_add_from(self):
283283 self .realm .extract_keytab (princ_name , KT )
284284 self .realm .kinit (princ_name , None , ['-k' , '-t' , KT ])
285285
286- initial_creds = gsscreds .Credentials (desired_name = None ,
286+ initial_creds = gsscreds .Credentials (name = None ,
287287 usage = 'initiate' )
288288
289289 store_res = initial_creds .store (store , overwrite = True )
@@ -302,13 +302,13 @@ def test_store_into_add_from(self):
302302
303303 @_extension_test ('cred_imp_ext' , 'credentials import-export' )
304304 def test_export (self ):
305- creds = gsscreds .Credentials (desired_name = self .name )
305+ creds = gsscreds .Credentials (name = self .name )
306306 token = creds .export ()
307307 token .should_be (bytes )
308308
309309 @_extension_test ('cred_imp_ext' , 'credentials import-export' )
310310 def test_import_by_init (self ):
311- creds = gsscreds .Credentials (desired_name = self .name )
311+ creds = gsscreds .Credentials (name = self .name )
312312 token = creds .export ()
313313 imported_creds = gsscreds .Credentials (token = token )
314314
@@ -317,14 +317,14 @@ def test_import_by_init(self):
317317
318318 @_extension_test ('cred_imp_ext' , 'credentials import-export' )
319319 def test_pickle_unpickle (self ):
320- creds = gsscreds .Credentials (desired_name = self .name )
320+ creds = gsscreds .Credentials (name = self .name )
321321 pickled_creds = pickle .dumps (creds )
322322 unpickled_creds = pickle .loads (pickled_creds )
323323
324324 unpickled_creds .lifetime .should_be (creds .lifetime )
325325 unpickled_creds .name .should_be (creds .name )
326326
327- @exist_perms (lifetime = 30 , desired_mechs = [gb .MechType .kerberos ],
327+ @exist_perms (lifetime = 30 , mechs = [gb .MechType .kerberos ],
328328 usage = 'initiate' )
329329 @_extension_test ('s4u' , 'S4U' )
330330 def test_impersonate (self , str_name , kwargs ):
@@ -336,7 +336,7 @@ def test_impersonate(self, str_name, kwargs):
336336 del client_ctx_resp # free everything but the token
337337
338338 server_name = self .name
339- server_creds = gsscreds .Credentials (desired_name = server_name ,
339+ server_creds = gsscreds .Credentials (name = server_name ,
340340 usage = 'both' )
341341 server_ctx_resp = gb .accept_sec_context (client_token ,
342342 acceptor_cred = server_creds )
@@ -461,14 +461,14 @@ def setUp(self):
461461 super (SecurityContextTestCase , self ).setUp ()
462462 gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = False
463463 self .client_name = gssnames .Name (self .USER_PRINC )
464- self .client_creds = gsscreds .Credentials (desired_name = None ,
464+ self .client_creds = gsscreds .Credentials (name = None ,
465465 usage = 'initiate' )
466466
467467 self .target_name = gssnames .Name (TARGET_SERVICE_NAME ,
468468 gb .NameType .hostbased_service )
469469
470470 self .server_name = gssnames .Name (SERVICE_PRINCIPAL )
471- self .server_creds = gsscreds .Credentials (desired_name = self .server_name ,
471+ self .server_creds = gsscreds .Credentials (name = self .server_name ,
472472 usage = 'accept' )
473473
474474 def _create_client_ctx (self , ** kwargs ):
@@ -483,7 +483,7 @@ def test_create_from_other(self):
483483 high_level_ctx = gssctx .SecurityContext (raw_client_ctx )
484484 high_level_ctx .target_name .should_be (self .target_name )
485485
486- @exist_perms (desired_lifetime = 30 , flags = [],
486+ @exist_perms (lifetime = 30 , flags = [],
487487 mech_type = gb .MechType .kerberos ,
488488 channel_bindings = None )
489489 def test_create_new_init (self , str_name , kwargs ):
@@ -506,7 +506,7 @@ def create_sec_context():
506506 create_sec_context .should_raise (TypeError )
507507
508508 def _create_completed_contexts (self ):
509- client_ctx = self ._create_client_ctx (desired_lifetime = 400 )
509+ client_ctx = self ._create_client_ctx (lifetime = 400 )
510510
511511 client_token = client_ctx .step ()
512512 client_token .should_be_a (bytes )
@@ -542,7 +542,7 @@ def test_channel_bindings(self):
542542 initiator_address = b'127.0.0.1' ,
543543 acceptor_address_type = gb .AddressType .ip ,
544544 acceptor_address = b'127.0.0.1' )
545- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
545+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
546546 channel_bindings = bdgs )
547547
548548 client_token = client_ctx .step ()
@@ -561,7 +561,7 @@ def test_bad_channel_bindings_raises_error(self):
561561 initiator_address = b'127.0.0.1' ,
562562 acceptor_address_type = gb .AddressType .ip ,
563563 acceptor_address = b'127.0.0.1' )
564- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
564+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
565565 channel_bindings = bdgs )
566566
567567 client_token = client_ctx .step ()
@@ -659,7 +659,7 @@ def test_verify_signature_raise(self):
659659 def test_defer_step_error_on_method (self ):
660660 gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = True
661661 bdgs = gb .ChannelBindings (application_data = b'abcxyz' )
662- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
662+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
663663 channel_bindings = bdgs )
664664
665665 client_token = client_ctx .step ()
@@ -674,7 +674,7 @@ def test_defer_step_error_on_method(self):
674674 def test_defer_step_error_on_complete_property_access (self ):
675675 gssctx .SecurityContext .__DEFER_STEP_ERRORS__ = True
676676 bdgs = gb .ChannelBindings (application_data = b'abcxyz' )
677- client_ctx = self ._create_client_ctx (desired_lifetime = 400 ,
677+ client_ctx = self ._create_client_ctx (lifetime = 400 ,
678678 channel_bindings = bdgs )
679679
680680 client_token = client_ctx .step ()
0 commit comments