本文整理汇总了Python中requests_kerberos.DISABLED属性的典型用法代码示例。如果您正苦于以下问题:Python requests_kerberos.DISABLED属性的具体用法?Python requests_kerberos.DISABLED怎么用?Python requests_kerberos.DISABLED使用的例子?那么恭喜您, 这里精选的属性代码示例或许可以为您提供帮助。您也可以进一步了解该属性所在类requests_kerberos
的用法示例。
在下文中一共展示了requests_kerberos.DISABLED属性的7个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。
示例1: _create_kerberos_session
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def _create_kerberos_session(self, timeout, kerberos_options=None):
verify = self._options["verify"]
if kerberos_options is None:
kerberos_options = {}
from requests_kerberos import DISABLED
from requests_kerberos import HTTPKerberosAuth
from requests_kerberos import OPTIONAL
if kerberos_options.get("mutual_authentication", "OPTIONAL") == "OPTIONAL":
mutual_authentication = OPTIONAL
elif kerberos_options.get("mutual_authentication") == "DISABLED":
mutual_authentication = DISABLED
else:
raise ValueError(
"Unknown value for mutual_authentication: %s"
% kerberos_options["mutual_authentication"]
)
self._session = ResilientSession(timeout=timeout)
self._session.verify = verify
self._session.auth = HTTPKerberosAuth(
mutual_authentication=mutual_authentication
)
示例2: _download
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def _download(url, temp):
"""Downloads the image."""
_LOGGER.debug('Downloading tar file from %r to %r.', url, temp)
krb_auth = requests_kerberos.HTTPKerberosAuth(
mutual_authentication=requests_kerberos.DISABLED,
# kerberos 1.2.5 doesn't accept None principal. Remove this once fixed.
principal=''
)
request = requests.get(url, stream=True, auth=krb_auth)
shutil.copyfileobj(request.raw, temp)
示例3: _create_requests_session
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def _create_requests_session(self):
"""
Creates a Requests Session and authenticates to base API URL with HTTP Basic Auth or Kerberos Auth.
We're using a Session to persist cookies across all requests made from the Session instance.
:return s: Requests Session.
"""
s = requests.Session()
# Kerberos Auth
if self.auth == 'kerberos':
self.principal = ticket._get_kerberos_principal()
s.auth = HTTPKerberosAuth(mutual_authentication=DISABLED)
s.verify = False
# HTTP Basic Auth
if isinstance(self.auth, tuple):
username, password = self.auth
self.principal = username
s.params.update({'user': username, 'pass': password})
# Try to authenticate to auth_url.
try:
r = s.get(self.auth_url)
logger.debug("Create requests session: status code: {0}".format(r.status_code))
r.raise_for_status()
# Special case for RT. A 200 status code is still returned if authentication failed. Have to check r.text.
if '200' not in r.text:
raise requests.RequestException
logger.info("Successfully authenticated to {0}".format(self.ticketing_tool))
return s
except requests.RequestException as e:
logger.error("Error authenticating to {0}".format(self.auth_url))
s.close()
示例4: _create_requests_session
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def _create_requests_session(self):
"""
Creates a Requests Session and authenticates to base API URL with kerberos-requests.
We're using a Session to persist cookies across all requests made from the Session instance.
:return s: Requests Session.
"""
# TODO: Support other authentication methods.
# Set up authentication for requests session.
s = requests.Session()
if self.auth == 'kerberos':
self.principal = _get_kerberos_principal()
s.auth = HTTPKerberosAuth(mutual_authentication=DISABLED)
s.verify = self.verify
if isinstance(self.auth, tuple):
s.auth = self.auth
s.verify = self.verify
# Try to authenticate to auth_url.
try:
r = s.get(self.auth_url)
logger.debug("Create requests session: status code: {0}".format(r.status_code))
r.raise_for_status()
logger.info("Successfully authenticated to {0}".format(self.ticketing_tool))
return s
except requests.RequestException as e:
logger.error("Error authenticating to {0}".format(self.auth_url))
logger.error(e)
s.close()
示例5: _krb_auth
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def _krb_auth():
"""Returns kerberos auth object."""
auth_principle = None
if os.name == 'posix':
# kerberos 1.2.5 doesn't accept None principal. Remove this once fixed.
auth_principle = ''
return requests_kerberos.HTTPKerberosAuth(
mutual_authentication=requests_kerberos.DISABLED,
principal=auth_principle,
service=restclientopts.AUTH_PRINCIPAL
)
示例6: create_kerberos_auth
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def create_kerberos_auth(config):
global requests_kerberos
if requests_kerberos is None:
import requests_kerberos
KERBEROS_STRATEGIES['required'] = requests_kerberos.REQUIRED
KERBEROS_STRATEGIES['optional'] = requests_kerberos.OPTIONAL
KERBEROS_STRATEGIES['disabled'] = requests_kerberos.DISABLED
# For convenience
if config['kerberos_auth'] is None or is_affirmative(config['kerberos_auth']):
config['kerberos_auth'] = 'required'
if config['kerberos_auth'] not in KERBEROS_STRATEGIES:
raise ConfigurationError(
'Invalid Kerberos strategy `{}`, must be one of: {}'.format(
config['kerberos_auth'], ' | '.join(KERBEROS_STRATEGIES)
)
)
return requests_kerberos.HTTPKerberosAuth(
mutual_authentication=KERBEROS_STRATEGIES[config['kerberos_auth']],
delegate=is_affirmative(config['kerberos_delegate']),
force_preemptive=is_affirmative(config['kerberos_force_initiate']),
hostname_override=config['kerberos_hostname'],
principal=config['kerberos_principal'],
)
示例7: test_config_kerberos
# 需要导入模块: import requests_kerberos [as 别名]
# 或者: from requests_kerberos import DISABLED [as 别名]
def test_config_kerberos(self):
instance = {'auth_type': 'kerberos', 'kerberos_auth': 'required'}
init_config = {}
# Trigger lazy import
http = RequestsWrapper(instance, init_config)
assert isinstance(http.options['auth'], requests_kerberos.HTTPKerberosAuth)
with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m:
RequestsWrapper(instance, init_config)
m.assert_called_once_with(
mutual_authentication=requests_kerberos.REQUIRED,
delegate=False,
force_preemptive=False,
hostname_override=None,
principal=None,
)
with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m:
RequestsWrapper({'auth_type': 'kerberos', 'kerberos_auth': 'optional'}, init_config)
m.assert_called_once_with(
mutual_authentication=requests_kerberos.OPTIONAL,
delegate=False,
force_preemptive=False,
hostname_override=None,
principal=None,
)
with mock.patch('datadog_checks.base.utils.http.requests_kerberos.HTTPKerberosAuth') as m:
RequestsWrapper({'auth_type': 'kerberos', 'kerberos_auth': 'disabled'}, init_config)
m.assert_called_once_with(
mutual_authentication=requests_kerberos.DISABLED,
delegate=False,
force_preemptive=False,
hostname_override=None,
principal=None,
)