Skip to content

Commit 0f70a24

Browse files
committed
Normalize 'creds' argument name
Previously, a couple methods used 'cred' instead of 'creds' as argument names. Now, all methods use 'creds' (including 'acceptor_cred' becoming 'acceptor_creds')
1 parent 1654aba commit 0f70a24

File tree

3 files changed

+21
-21
lines changed

3 files changed

+21
-21
lines changed

gssapi/raw/sec_contexts.pyx

+9-9
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ cdef class SecurityContext:
109109

110110

111111
# TODO(directxman12): figure out whether GSS_C_NO_NAME can be passed in here
112-
def init_sec_context(Name target_name not None, Creds cred=None,
112+
def init_sec_context(Name target_name not None, Creds creds=None,
113113
SecurityContext context=None,
114114
OID mech=None,
115115
flags=None, lifetime=None,
@@ -128,7 +128,7 @@ def init_sec_context(Name target_name not None, Creds cred=None,
128128
129129
Args:
130130
target_name (Name): the target for the security context
131-
cred (Creds): the credentials to use to initiate the context,
131+
creds (Creds): the credentials to use to initiate the context,
132132
or None to use the default credentials
133133
context (SecurityContext): the security context to update, or
134134
None to create a new context
@@ -181,8 +181,8 @@ def init_sec_context(Name target_name not None, Creds cred=None,
181181
output_context = SecurityContext()
182182

183183
cdef gss_cred_id_t act_cred
184-
if cred is not None:
185-
act_cred = cred.raw_creds
184+
if creds is not None:
185+
act_cred = creds.raw_creds
186186
else:
187187
act_cred = GSS_C_NO_CREDENTIAL
188188

@@ -228,7 +228,7 @@ def init_sec_context(Name target_name not None, Creds cred=None,
228228
raise GSSError(maj_stat, min_stat, token=output_token)
229229

230230

231-
def accept_sec_context(input_token not None, Creds acceptor_cred=None,
231+
def accept_sec_context(input_token not None, Creds acceptor_creds=None,
232232
SecurityContext context=None,
233233
ChannelBindings channel_bindings=None):
234234
"""
@@ -244,8 +244,8 @@ def accept_sec_context(input_token not None, Creds acceptor_cred=None,
244244
245245
Args:
246246
input_token (bytes): the token sent by the context initiator
247-
acceptor_cred (Creds): the credentials to be used to accept the context
248-
(or None to use the default credentials)
247+
acceptor_creds (Creds): the credentials to be used to accept the
248+
context (or None to use the default credentials)
249249
context (SecurityContext): the security context to update
250250
(or None to create a new security context object)
251251
channel_bindings (ChannelBindings): The channel bindings (or None for
@@ -277,8 +277,8 @@ def accept_sec_context(input_token not None, Creds acceptor_cred=None,
277277
output_context = SecurityContext()
278278

279279
cdef gss_cred_id_t act_acceptor_cred
280-
if acceptor_cred is None:
281-
act_acceptor_cred = acceptor_cred.raw_creds
280+
if acceptor_creds is None:
281+
act_acceptor_cred = acceptor_creds.raw_creds
282282
else:
283283
act_acceptor_cred = GSS_C_NO_CREDENTIAL
284284

gssapi/tests/test_high_level.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ def test_impersonate(self, str_name, kwargs):
339339
server_creds = gsscreds.Credentials(name=server_name,
340340
usage='both')
341341
server_ctx_resp = gb.accept_sec_context(client_token,
342-
acceptor_cred=server_creds)
342+
acceptor_creds=server_creds)
343343

344344
imp_creds = server_creds.impersonate(server_ctx_resp[1], **kwargs)
345345

gssapi/tests/test_raw.py

+11-11
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ def test_context_time(self):
179179
gb.NameType.kerberos_principal)
180180
server_creds = gb.acquire_cred(server_name)[0]
181181
server_resp = gb.accept_sec_context(client_token1,
182-
acceptor_cred=server_creds)
182+
acceptor_creds=server_creds)
183183
server_tok = server_resp[3]
184184

185185
client_resp2 = gb.init_sec_context(target_name,
@@ -203,7 +203,7 @@ def test_inquire_context(self):
203203
gb.NameType.kerberos_principal)
204204
server_creds = gb.acquire_cred(server_name)[0]
205205
server_resp = gb.accept_sec_context(client_token1,
206-
acceptor_cred=server_creds)
206+
acceptor_creds=server_creds)
207207
server_tok = server_resp[3]
208208

209209
client_resp2 = gb.init_sec_context(target_name,
@@ -253,7 +253,7 @@ def test_add_cred_impersonate_name(self):
253253
gb.NameType.kerberos_principal)
254254
server_creds = gb.acquire_cred(server_name, usage='both')[0]
255255
server_ctx_resp = gb.accept_sec_context(client_token,
256-
acceptor_cred=server_creds)
256+
acceptor_creds=server_creds)
257257

258258
input_creds = gb.Creds()
259259
imp_resp = gb.add_cred_impersonate_name(input_creds,
@@ -285,7 +285,7 @@ def test_acquire_creds_impersonate_name(self):
285285
gb.NameType.kerberos_principal)
286286
server_creds = gb.acquire_cred(server_name, usage='both')[0]
287287
server_ctx_resp = gb.accept_sec_context(client_token,
288-
acceptor_cred=server_creds)
288+
acceptor_creds=server_creds)
289289

290290
imp_resp = gb.acquire_cred_impersonate_name(server_creds,
291291
server_ctx_resp[1])
@@ -315,14 +315,14 @@ def test_store_cred_acquire_cred(self):
315315

316316
client_creds = gb.acquire_cred(None, usage='initiate').creds
317317
client_ctx_resp = gb.init_sec_context(
318-
target_name, cred=client_creds,
318+
target_name, creds=client_creds,
319319
flags=gb.RequirementFlag.delegate_to_peer)
320320

321321
client_token = client_ctx_resp[3]
322322

323323
server_creds = gb.acquire_cred(None, usage='accept').creds
324324
server_ctx_resp = gb.accept_sec_context(client_token,
325-
acceptor_cred=server_creds)
325+
acceptor_creds=server_creds)
326326

327327
deleg_creds = server_ctx_resp.delegated_creds
328328
deleg_creds.shouldnt_be_none()
@@ -380,7 +380,7 @@ def test_add_cred(self):
380380
gb.NameType.kerberos_principal)
381381
server_creds = gb.acquire_cred(server_name, usage='both')[0]
382382
server_ctx_resp = gb.accept_sec_context(client_token,
383-
acceptor_cred=server_creds)
383+
acceptor_creds=server_creds)
384384

385385
input_creds = gb.Creds()
386386
imp_resp = gb.add_cred(input_creds,
@@ -651,7 +651,7 @@ def tearDown(self):
651651

652652
def test_basic_accept_context(self):
653653
server_resp = gb.accept_sec_context(self.client_token,
654-
acceptor_cred=self.server_creds)
654+
acceptor_creds=self.server_creds)
655655
server_resp.shouldnt_be_none()
656656

657657
(self.server_ctx, name, mech_type, out_token,
@@ -697,7 +697,7 @@ def test_channel_bindings(self):
697697
self.server_creds = gb.acquire_cred(self.server_name)[0]
698698

699699
server_resp = gb.accept_sec_context(self.client_token,
700-
acceptor_cred=self.server_creds,
700+
acceptor_creds=self.server_creds,
701701
channel_bindings=bdgs)
702702
server_resp.shouldnt_be_none
703703
self.server_ctx = server_resp.context
@@ -723,7 +723,7 @@ def test_bad_channel_binding_raises_error(self):
723723

724724
bdgs.acceptor_address = b'127.0.1.0'
725725
gb.accept_sec_context.should_raise(gb.GSSError, self.client_token,
726-
acceptor_cred=self.server_creds,
726+
acceptor_creds=self.server_creds,
727727
channel_bindings=bdgs)
728728

729729

@@ -739,7 +739,7 @@ def setUp(self):
739739
gb.NameType.kerberos_principal)
740740
self.server_creds = gb.acquire_cred(self.server_name)[0]
741741
server_resp = gb.accept_sec_context(self.client_token1,
742-
acceptor_cred=self.server_creds)
742+
acceptor_creds=self.server_creds)
743743
self.server_ctx = server_resp[0]
744744
self.server_tok = server_resp[3]
745745

0 commit comments

Comments
 (0)