Python requests_kerberos.OPTIONAL Examples
The following are 3
code examples of requests_kerberos.OPTIONAL().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
requests_kerberos
, or try the search function
.
Example #1
Source File: client.py From jira with BSD 2-Clause "Simplified" License | 6 votes |
def _create_kerberos_session(self, timeout, kerberos_options=None): verify = self._options["verify"] if kerberos_options is None: kerberos_options = {} from requests_kerberos import DISABLED from requests_kerberos import HTTPKerberosAuth from requests_kerberos import OPTIONAL if kerberos_options.get("mutual_authentication", "OPTIONAL") == "OPTIONAL": mutual_authentication = OPTIONAL elif kerberos_options.get("mutual_authentication") == "DISABLED": mutual_authentication = DISABLED else: raise ValueError( "Unknown value for mutual_authentication: %s" % kerberos_options["mutual_authentication"] ) self._session = ResilientSession(timeout=timeout) self._session.verify = verify self._session.auth = HTTPKerberosAuth( mutual_authentication=mutual_authentication )
Example #2
Source File: http.py From integrations-core with BSD 3-Clause "New" or "Revised" License | 5 votes |
def create_kerberos_auth(config): global requests_kerberos if requests_kerberos is None: import requests_kerberos KERBEROS_STRATEGIES['required'] = requests_kerberos.REQUIRED KERBEROS_STRATEGIES['optional'] = requests_kerberos.OPTIONAL KERBEROS_STRATEGIES['disabled'] = requests_kerberos.DISABLED # For convenience if config['kerberos_auth'] is None or is_affirmative(config['kerberos_auth']): config['kerberos_auth'] = 'required' if config['kerberos_auth'] not in KERBEROS_STRATEGIES: raise ConfigurationError( 'Invalid Kerberos strategy `{}`, must be one of: {}'.format( config['kerberos_auth'], ' | '.join(KERBEROS_STRATEGIES) ) ) return requests_kerberos.HTTPKerberosAuth( mutual_authentication=KERBEROS_STRATEGIES[config['kerberos_auth']], delegate=is_affirmative(config['kerberos_delegate']), force_preemptive=is_affirmative(config['kerberos_force_initiate']), hostname_override=config['kerberos_hostname'], principal=config['kerberos_principal'], )
Example #3
Source File: test_http.py From integrations-core with BSD 3-Clause "New" or "Revised" License | 5 votes |
def test_config_kerberos(self): instance = {'auth_type': 'kerberos', 'kerberos_auth': 'required'} init_config = {} # Trigger lazy import http = RequestsWrapper(instance, init_config) assert isinstance(http.options['auth'], requests_kerberos.HTTPKerberosAuth) with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m: RequestsWrapper(instance, init_config) m.assert_called_once_with( mutual_authentication=requests_kerberos.REQUIRED, delegate=False, force_preemptive=False, hostname_override=None, principal=None, ) with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m: RequestsWrapper({'auth_type': 'kerberos', 'kerberos_auth': 'optional'}, init_config) m.assert_called_once_with( mutual_authentication=requests_kerberos.OPTIONAL, delegate=False, force_preemptive=False, hostname_override=None, principal=None, ) with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m: RequestsWrapper({'auth_type': 'kerberos', 'kerberos_auth': 'disabled'}, init_config) m.assert_called_once_with( mutual_authentication=requests_kerberos.DISABLED, delegate=False, force_preemptive=False, hostname_override=None, principal=None, )