Skip to content

Commit 2c6ffb7

Browse files
jd-aubsipocz
authored andcommitted
Remove password parameter
1 parent 284a3d2 commit 2c6ffb7

File tree

3 files changed

+26
-61
lines changed

3 files changed

+26
-61
lines changed

astroquery/casda/core.py

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,11 @@ class CasdaClass(QueryWithLogin):
5050
_login_url = conf.login_url
5151
_uws_ns = {'uws': 'http://www.ivoa.net/xml/UWS/v1.0'}
5252

53-
def __init__(self, user=None, password=None):
53+
def __init__(self):
5454
super().__init__()
5555

5656
def _login(self, *, username=None, store_password=False,
57-
reenter_password=False, password=None):
57+
reenter_password=False):
5858
"""
5959
login to non-public data as a known user
6060
@@ -69,8 +69,6 @@ def _login(self, *, username=None, store_password=False,
6969
Asks for the password even if it is already stored in the
7070
keyring. This is the way to overwrite an already stored passwork
7171
on the keyring. Default is False.
72-
password : str, optional
73-
Password for the CASDA archive. If not given, it will obtained either from the keyring or interactively.
7472
"""
7573

7674
if username is None:
@@ -80,14 +78,9 @@ def _login(self, *, username=None, store_password=False,
8078
else:
8179
username = self.USERNAME
8280

83-
if password is None:
84-
# Get password from keyring or prompt
85-
password, password_from_keyring = self._get_password(
86-
"astroquery:casda.csiro.au", username, reenter=reenter_password)
87-
else:
88-
# Bypass the keyring if a password is supplied
89-
password_from_keyring = None
90-
store_password = False
81+
# Get password from keyring or prompt
82+
password, password_from_keyring = self._get_password(
83+
"astroquery:casda.csiro.au", username, reenter=reenter_password)
9184

9285
# Login to CASDA to test credentals
9386
log.info("Authenticating {0} on CASDA ...".format(username))

astroquery/casda/tests/test_casda.py

Lines changed: 17 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -125,37 +125,10 @@ def isclose(value1, value2, abs_tol=1e-09):
125125
return abs(value1 - value2) < abs_tol
126126

127127

128-
def test_login(patch_get):
129-
casda = Casda()
130-
assert casda._authenticated is False
131-
assert casda.USERNAME == ''
132-
133-
casda.login(username=USERNAME, password=PASSWORD)
134-
assert casda._authenticated is True
135-
assert casda.USERNAME == USERNAME
136-
assert casda._auth == (USERNAME, 'password')
137-
138-
139-
def test_login_badpassword(patch_get):
140-
casda = Casda()
141-
assert casda._authenticated is False
142-
assert casda.USERNAME == ''
143-
144-
casda.login(username=USERNAME, password='notthepassword')
145-
assert casda._authenticated is False
146-
assert casda.USERNAME == ''
147-
assert hasattr(casda, '_auth') is False
148-
149-
150-
def test_login_default_user(patch_get):
151-
casda = Casda()
152-
casda.USERNAME = USERNAME
153-
assert casda._authenticated is False
154-
155-
casda.login(password=PASSWORD)
156-
assert casda._authenticated is True
157-
assert casda.USERNAME == USERNAME
158-
assert casda._auth == (USERNAME, 'password')
128+
def fake_login(casda, username, password):
129+
casda.USERNAME = username
130+
casda._auth = (username, password)
131+
casda._authenticated = True
159132

160133

161134
def test_login_no_default_user():
@@ -322,7 +295,7 @@ def test_stage_data_unauthorised(patch_get):
322295
def test_stage_data_empty(patch_get):
323296
table = Table()
324297
casda = Casda()
325-
casda.login(username=USERNAME, password=PASSWORD)
298+
fake_login(casda, USERNAME, PASSWORD)
326299
urls = casda.stage_data(table)
327300
assert urls == []
328301

@@ -347,7 +320,7 @@ def test_stage_data_no_link(patch_get):
347320
access_urls = [prefix + 'cube-240']
348321
table = Table([Column(data=access_urls, name='access_url')])
349322
casda = Casda()
350-
casda.login(username=USERNAME, password=PASSWORD)
323+
fake_login(casda, USERNAME, PASSWORD)
351324
casda.POLL_INTERVAL = 1
352325

353326
with pytest.raises(ValueError) as excinfo:
@@ -361,7 +334,7 @@ def test_stage_data(patch_get):
361334
access_urls = [prefix + 'cube-244']
362335
table = Table([Column(data=access_urls, name='access_url')])
363336
casda = Casda()
364-
casda.login(username=USERNAME, password=PASSWORD)
337+
fake_login(casda, USERNAME, PASSWORD)
365338
casda.POLL_INTERVAL = 1
366339
urls = casda.stage_data(table, verbose=True)
367340
assert urls == ['http://casda.csiro.au/download/web/111-000-111-000/askap_img.fits.checksum',
@@ -378,7 +351,7 @@ def test_cutout(patch_get):
378351
centre = SkyCoord(ra, dec)
379352

380353
casda = Casda()
381-
casda.login(username=USERNAME, password=PASSWORD)
354+
fake_login(casda, USERNAME, PASSWORD)
382355
casda.POLL_INTERVAL = 1
383356
urls = casda.cutout(table, coordinates=centre, radius=radius, verbose=True)
384357
assert urls == ['http://casda.csiro.au/download/web/111-000-111-000/cutout.fits.checksum',
@@ -395,7 +368,7 @@ def test_cutout_no_args(patch_get):
395368
centre = SkyCoord(ra, dec)
396369

397370
casda = Casda()
398-
casda.login(username=USERNAME, password=PASSWORD)
371+
fake_login(casda, USERNAME, PASSWORD)
399372
casda.POLL_INTERVAL = 1
400373
with pytest.raises(ValueError) as excinfo:
401374
casda.cutout(table)
@@ -418,7 +391,7 @@ def test_cutout_unauthorised(patch_get):
418391

419392
def test_cutout_no_table(patch_get):
420393
casda = Casda()
421-
casda.login(username=USERNAME, password=PASSWORD)
394+
fake_login(casda, USERNAME, PASSWORD)
422395

423396
casda.POLL_INTERVAL = 1
424397
result = casda.cutout(None)
@@ -427,7 +400,7 @@ def test_cutout_no_table(patch_get):
427400

428401
def test_args_to_payload_band(patch_get):
429402
casda = Casda()
430-
casda.login(username=USERNAME, password=PASSWORD)
403+
fake_login(casda, USERNAME, PASSWORD)
431404

432405
payload = casda._args_to_payload(band=(0.195*u.m, 0.215*u.m))
433406
assert payload['BAND'] == '0.195 0.215'
@@ -468,7 +441,7 @@ def test_args_to_payload_band(patch_get):
468441

469442
def test_args_to_payload_band_invalid(patch_get):
470443
casda = Casda()
471-
casda.login(username=USERNAME, password=PASSWORD)
444+
fake_login(casda, USERNAME, PASSWORD)
472445

473446
with pytest.raises(ValueError) as excinfo:
474447
casda._args_to_payload(band='foo')
@@ -497,7 +470,7 @@ def test_args_to_payload_band_invalid(patch_get):
497470

498471
def test_args_to_payload_channel(patch_get):
499472
casda = Casda()
500-
casda.login(username=USERNAME, password=PASSWORD)
473+
fake_login(casda, USERNAME, PASSWORD)
501474

502475
payload = casda._args_to_payload(channel=(0, 30))
503476
assert payload['CHANNEL'] == '0 30'
@@ -514,7 +487,7 @@ def test_args_to_payload_channel(patch_get):
514487

515488
def test_args_to_payload_channel_invalid(patch_get):
516489
casda = Casda()
517-
casda.login(username=USERNAME, password=PASSWORD)
490+
fake_login(casda, USERNAME, PASSWORD)
518491

519492
with pytest.raises(ValueError) as excinfo:
520493
casda._args_to_payload(channel='one')
@@ -535,7 +508,7 @@ def test_args_to_payload_channel_invalid(patch_get):
535508

536509
def test_args_to_payload_coordinates(patch_get):
537510
casda = Casda()
538-
casda.login(username=USERNAME, password=PASSWORD)
511+
fake_login(casda, USERNAME, PASSWORD)
539512

540513
cutout_coords = SkyCoord(ra=345.245*u.degree, dec=-32.125*u.degree, frame='icrs')
541514
payload = casda._args_to_payload(coordinates=cutout_coords)
@@ -574,7 +547,7 @@ def test_args_to_payload_coordinates(patch_get):
574547

575548
def test_args_to_payload_combined(patch_get):
576549
casda = Casda()
577-
casda.login(username=USERNAME, password=PASSWORD)
550+
fake_login(casda, USERNAME, PASSWORD)
578551
cutout_coords = SkyCoord(ra=187.5*u.degree, dec=-60.0*u.degree, frame='icrs')
579552
payload = casda._args_to_payload(coordinates=cutout_coords, channel=(17, 23))
580553
assert payload['POS'].startswith('CIRCLE 187')
@@ -593,7 +566,7 @@ def test_download_file(patch_get):
593566
'http://casda.csiro.au/download/web/111-000-111-000/askap_img.fits.checksum',
594567
'https://ingest.pawsey.org.au/casda-prd-as110-01/dc52217/primary_images/RACS-DR1_0000%2B18A.fits?security=stuff']
595568
casda = Casda()
596-
casda.login(username=USERNAME, password=PASSWORD)
569+
fake_login(casda, USERNAME, PASSWORD)
597570

598571
# skip the actual downloading of the file
599572
download_mock = MagicMock()

astroquery/casda/tests/test_casda_remote.py

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -65,16 +65,15 @@ def test_stage_data(self, cached_credentials):
6565
assert str(urls[1]).endswith('image_cube_g300to310.q.fits.checksum')
6666
assert len(urls) == 2
6767

68-
@pytest.mark.skipif(('CASDA_USER' not in os.environ or
69-
'CASDA_PASSWD' not in os.environ),
68+
@pytest.mark.skipif(('CASDA_USER' not in os.environ),
7069
reason='Requires real CASDA user/password (CASDA_USER '
71-
'and CASDA_PASSWD environment variables)')
72-
def test_cutout(self):
70+
'and CASDA_PASSWD environment variables or password in keyring)')
71+
def test_cutout(self, cached_credentials):
7372
prefix = 'https://data.csiro.au/casda_vo_proxy/vo/datalink/links?ID='
7473
access_urls = [prefix + 'cube-44705']
7574
table = Table([Column(data=access_urls, name='access_url')])
7675
casda = Casda()
77-
casda.login(username=os.environ['CASDA_USER'], password=os.environ['CASDA_PASSWD'])
76+
casda.login(username=os.environ['CASDA_USER'])
7877
casda.POLL_INTERVAL = 3
7978
pos = SkyCoord(196.49583333*u.deg, -62.7*u.deg)
8079
urls = casda.cutout(table, coordinates=pos, radius=15*u.arcmin)

0 commit comments

Comments
 (0)