Merge lp:~zulcss/keystone/oauth-refresh into lp:~ubuntu-server-dev/keystone/havana

Proposed by Chuck Short
Status: Merged
Approved by: Adam Gandelman
Approved revision: 230
Merged at revision: 230
Proposed branch: lp:~zulcss/keystone/oauth-refresh
Merge into: lp:~ubuntu-server-dev/keystone/havana
Diff against target: 157 lines (+48/-33)
2 files modified
debian/changelog (+1/-0)
debian/patches/disable-oauth2.patch (+47/-33)
To merge this branch: bzr merge lp:~zulcss/keystone/oauth-refresh
Reviewer Review Type Date Requested Status
Ubuntu Server Developers Pending
Review via email: mp+187239@code.launchpad.net

Description of the change

- Refreshed oauth patch.

To post a comment you must log in.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1=== modified file 'debian/changelog'
2--- debian/changelog 2013-09-20 18:06:14 +0000
3+++ debian/changelog 2013-09-24 13:46:00 +0000
4@@ -9,6 +9,7 @@
5 and python-setuptools as a build dependency.
6 - Dropped python-swift, python-unittest as a build dependency
7 - Bumped versioned depends for python-keystoneclient.
8+ * debian/patches/disable-oauth2.patch: Refreshed
9
10 -- Chuck Short <zulcss@ubuntu.com> Fri, 20 Sep 2013 13:15:21 -0400
11
12
13=== modified file 'debian/patches/disable-oauth2.patch'
14--- debian/patches/disable-oauth2.patch 2013-09-12 19:24:29 +0000
15+++ debian/patches/disable-oauth2.patch 2013-09-24 13:46:00 +0000
16@@ -2,10 +2,10 @@
17 Author: Chuck Short <zulcss@ubuntu.com>
18 Fowarded: No
19 diff --git a/etc/keystone.conf.sample b/etc/keystone.conf.sample
20-index f86311e..1680fd9 100644
21+index d7e1c44..4d1adc1 100644
22 --- a/etc/keystone.conf.sample
23 +++ b/etc/keystone.conf.sample
24-@@ -228,6 +228,7 @@
25+@@ -284,6 +284,7 @@
26 # cache_time =
27
28 [oauth1]
29@@ -47,7 +47,7 @@
30
31
32 diff --git a/keystone/tests/test_v3_oauth1.py b/keystone/tests/test_v3_oauth1.py
33-index bb2e00c..25d2d5a 100644
34+index fb9a55e..52857b2 100644
35 --- a/keystone/tests/test_v3_oauth1.py
36 +++ b/keystone/tests/test_v3_oauth1.py
37 @@ -19,6 +19,8 @@ import os
38@@ -59,7 +59,19 @@
39 from keystone.common import cms
40 from keystone.common.sql import migration
41 from keystone import config
42-@@ -54,11 +56,14 @@ class OAuth1Tests(test_v3.RestfulTestCase):
43+@@ -43,7 +45,10 @@ class OAuth1Tests(test_v3.RestfulTestCase):
44+ self.EXTENSION_NAME)
45+ package = importutils.import_module(package_name)
46+ self.repo_path = os.path.abspath(os.path.dirname(package.__file__))
47+- migration.db_version_control(version=None, repo_path=self.repo_path)
48++ try:
49++ migration.db_version_control(version=None, repo_path=self.repo_path)
50++ except:
51++ raise nose.exc.SkipTest('Skipped by Ubuntu')
52+ migration.db_sync(version=None, repo_path=self.repo_path)
53+
54+ def setUp(self):
55+@@ -54,11 +59,14 @@ class OAuth1Tests(test_v3.RestfulTestCase):
56 self.controller = controllers.OAuthControllerV3()
57
58 def _create_single_consumer(self):
59@@ -79,7 +91,7 @@
60
61 def _oauth_request(self, consumer, token=None, **kw):
62 return oauth1.Request.from_consumer_and_token(consumer=consumer,
63-@@ -214,7 +219,10 @@ class OAuthFlowTests(OAuth1Tests):
64+@@ -214,7 +222,10 @@ class OAuthFlowTests(OAuth1Tests):
65 consumer = self._create_single_consumer()
66 consumer_id = consumer.get('id')
67 consumer_secret = consumer.get('secret')
68@@ -91,7 +103,7 @@
69 self.assertIsNotNone(self.consumer.key)
70
71 url, headers = self._create_request_token(self.consumer,
72-@@ -442,7 +450,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
73+@@ -442,7 +453,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
74 def test_bad_consumer_secret(self):
75 consumer = self._create_single_consumer()
76 consumer_id = consumer.get('id')
77@@ -103,7 +115,7 @@
78 url, headers = self._create_request_token(consumer,
79 self.project_id)
80 self.post(url, headers=headers, expected_status=500)
81-@@ -451,7 +462,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
82+@@ -451,7 +465,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
83 consumer = self._create_single_consumer()
84 consumer_id = consumer.get('id')
85 consumer_secret = consumer.get('secret')
86@@ -115,31 +127,31 @@
87 url, headers = self._create_request_token(consumer,
88 self.project_id)
89 self.post(url, headers=headers)
90-@@ -463,7 +477,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
91- consumer = self._create_single_consumer()
92- consumer_id = consumer.get('id')
93- consumer_secret = consumer.get('secret')
94-- consumer = oauth1.Consumer(consumer_id, consumer_secret)
95-+ try:
96-+ consumer = oauth1.Consumer(consumer_id, consumer_secret)
97-+ except:
98-+ raise nose.exc.SkipTest('Skipped by Ubuntu')
99-
100- url, headers = self._create_request_token(consumer,
101- self.project_id)
102-@@ -488,7 +505,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
103- consumer = self._create_single_consumer()
104- consumer_id = consumer.get('id')
105- consumer_secret = consumer.get('secret')
106-- consumer = oauth1.Consumer(consumer_id, consumer_secret)
107-+ try:
108-+ consumer = oauth1.Consumer(consumer_id, consumer_secret)
109-+ except:
110-+ raise nose.exc.SkipTest('Skipped by Ubuntu')
111-
112- url, headers = self._create_request_token(consumer,
113- self.project_id)
114-@@ -510,7 +530,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
115+@@ -463,7 +480,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
116+ consumer = self._create_single_consumer()
117+ consumer_id = consumer.get('id')
118+ consumer_secret = consumer.get('secret')
119+- consumer = oauth1.Consumer(consumer_id, consumer_secret)
120++ try:
121++ consumer = oauth1.Consumer(consumer_id, consumer_secret)
122++ except:
123++ raise nose.exc.SkipTest('Skipped by Ubuntu')
124+
125+ url, headers = self._create_request_token(consumer,
126+ self.project_id)
127+@@ -488,7 +508,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
128+ consumer = self._create_single_consumer()
129+ consumer_id = consumer.get('id')
130+ consumer_secret = consumer.get('secret')
131+- consumer = oauth1.Consumer(consumer_id, consumer_secret)
132++ try:
133++ consumer = oauth1.Consumer(consumer_id, consumer_secret)
134++ except:
135++ raise nose.exc.SkipTest('Skipped by Ubuntu')
136+
137+ url, headers = self._create_request_token(consumer,
138+ self.project_id)
139+@@ -510,7 +533,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
140 consumer = self._create_single_consumer()
141 consumer_id = consumer.get('id')
142 consumer_secret = consumer.get('secret')
143@@ -151,7 +163,7 @@
144 self.assertIsNotNone(self.consumer.key)
145
146 url, headers = self._create_request_token(self.consumer,
147-@@ -531,7 +554,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
148+@@ -531,7 +557,10 @@ class MaliciousOAuth1Tests(OAuth1Tests):
149 consumer = self._create_single_consumer()
150 consumer_id = consumer.get('id')
151 consumer_secret = consumer.get('secret')
152@@ -173,4 +185,6 @@
153 Babel>=0.9.6
154 -oauth2
155 dogpile.cache>=0.5.0
156+--
157+1.8.3.2
158

Subscribers

People subscribed via source and target branches