Skip to content

Commit 08a1bf3

Browse files
committed
Fix flake8 warnings
Signed-off-by: Ivan Kanakarakis <[email protected]>
1 parent 88630e9 commit 08a1bf3

32 files changed

+88
-130
lines changed

src/saml2/__init__.py

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -636,8 +636,8 @@ def set_prefixes(self, elem, prefix_map):
636636

637637
# fixup all elements in the tree
638638
memo = {}
639-
for elem in elem.iter():
640-
self.fixup_element_prefixes(elem, uri_map, memo)
639+
for element in elem.iter():
640+
self.fixup_element_prefixes(element, uri_map, memo)
641641

642642
def fixup_element_prefixes(self, elem, uri_map, memo):
643643
def fixup(name):
@@ -739,18 +739,15 @@ def set_text(self, val, base64encode=False):
739739

740740
# print("set_text: %s" % (val,))
741741
if isinstance(val, bool):
742-
if val:
743-
setattr(self, "text", "true")
744-
else:
745-
setattr(self, "text", "false")
742+
self.text = "true" if val else "false"
746743
elif isinstance(val, int):
747-
setattr(self, "text", "%d" % val)
744+
self.text = str(val)
748745
elif isinstance(val, six.string_types):
749-
setattr(self, "text", val)
746+
self.text = val
750747
elif val is None:
751748
pass
752749
else:
753-
raise ValueError("Type shouldn't be '%s'" % (val,))
750+
raise ValueError("Type shouldn't be '%s'" % val)
754751

755752
return self
756753

src/saml2/authn_context/__init__.py

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
1+
from saml2 import extension_elements_to_elements
2+
from saml2.authn_context import ippword
3+
from saml2.authn_context import mobiletwofactor
4+
from saml2.authn_context import ppt
5+
from saml2.authn_context import pword
6+
from saml2.authn_context import sslcert
17
from saml2.saml import AuthnContext
28
from saml2.saml import AuthnContextClassRef
39
from saml2.samlp import RequestedAuthnContext
410

511

6-
__author__ = "rolandh"
7-
8-
from saml2 import extension_elements_to_elements
9-
10-
1112
UNSPECIFIED = "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified"
1213

1314
INTERNETPROTOCOLPASSWORD = "urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocolPassword"
@@ -22,13 +23,6 @@
2223
AL3 = "http://idmanagement.gov/icam/2009/12/saml_2.0_profile/assurancelevel3"
2324
AL4 = "http://idmanagement.gov/icam/2009/12/saml_2.0_profile/assurancelevel4"
2425

25-
from saml2.authn_context import ippword
26-
from saml2.authn_context import mobiletwofactor
27-
from saml2.authn_context import ppt
28-
from saml2.authn_context import pword
29-
from saml2.authn_context import sslcert
30-
31-
3226
CMP_TYPE = ["exact", "minimum", "maximum", "better"]
3327

3428

src/saml2/cert.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ def create_certificate(
122122
key_file = "%s.key" % cn
123123
try:
124124
remove(cert_file)
125-
except:
125+
except Exception:
126126
pass
127127
try:
128128
remove(key_file)
129-
except:
129+
except Exception:
130130
pass
131131
c_f = join(cert_dir, cert_file)
132132
k_f = join(cert_dir, key_file)
@@ -146,7 +146,7 @@ def create_certificate(
146146
cert.get_subject().C = cert_info["country_code"]
147147
cert.get_subject().ST = cert_info["state"]
148148
cert.get_subject().L = cert_info["city"]
149-
cert.get_subject().O = cert_info["organization"]
149+
cert.get_subject().O = cert_info["organization"] # noqa: E741
150150
cert.get_subject().OU = cert_info["organization_unit"]
151151
cert.get_subject().CN = cn
152152
if not request:
@@ -333,7 +333,7 @@ def verify(self, signing_cert_str, cert_str):
333333
crypto.verify(ca_cert, cert_crypto.signature, cert_crypto.tbs_certificate_bytes, cert_algorithm)
334334
return True, "Signed certificate is valid and correctly signed by CA certificate."
335335
except crypto.Error as e:
336-
return False, "Certificate is incorrectly signed."
336+
return False, "Certificate is incorrectly signed: %s" % str(e)
337337
except Exception as e:
338338
return False, "Certificate is not valid for an unknown reason. %s" % str(e)
339339

src/saml2/client_base.py

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,6 @@
5454
from saml2.samlp import NameIDMappingRequest
5555
from saml2.samlp import RequestedAuthnContext
5656
from saml2.soap import make_soap_enveloped_saml_thingy
57-
from saml2.xmldsig import DIGEST_ALLOWED_ALG
58-
from saml2.xmldsig import SIG_ALLOWED_ALG
5957

6058

6159
logger = logging.getLogger(__name__)
@@ -445,7 +443,7 @@ def create_authn_request(
445443
args.update(_args)
446444
args.pop("id", None)
447445

448-
client_crt = kwargs.get("client_crt")
446+
# client_crt = kwargs.get("client_crt")
449447
nsprefix = kwargs.get("nsprefix")
450448

451449
msg = self._message(
@@ -797,12 +795,12 @@ def parse_authn_request_response(self, xmlstr, binding, outstanding=None, outsta
797795
try:
798796
resp = self._parse_response(xmlstr, AuthnResponse, "assertion_consumer_service", binding, **kwargs)
799797
except StatusError as err:
800-
logger.error("SAML status error: %s", err)
798+
logger.error("SAML status error: %s", str(err))
801799
raise
802800
except UnravelError:
803801
return None
804802
except Exception as err:
805-
logger.error("XML parse error: %s", err)
803+
logger.error("XML parse error: %s", str(err))
806804
raise
807805

808806
if not isinstance(resp, AuthnResponse):

src/saml2/cryptography/asymmetric.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def key_verify(rsakey, signature, message, digest):
2626

2727
try:
2828
rsakey.verify(signature, message, padding, digest)
29-
except Exception as e:
29+
except Exception:
3030
return False
3131
else:
3232
return True

src/saml2/ecp.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,4 +200,4 @@ def ecp_response(self):
200200

201201
soap_envelope = soapenv.Envelope(header=header, body=body)
202202

203-
return "%s" % soap_envelope
203+
return str(soap_envelope)

src/saml2/ecp_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ def operation(self, url, idp_entity_id, op, **opargs):
298298

299299
opargs["headers"] = self.add_paos_headers(opargs["headers"])
300300
response = self.send(sp_url, op, **opargs)
301-
logger.debug("[Op] SP response: %s" % response)
301+
logger.debug("[Op] SP response", extra={"response": response})
302302
print(response.text)
303303

304304
if response.status_code != 200:

src/saml2/entity.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ def reload_metadata(self, metadata_conf):
215215
try:
216216
self.metadata.reload(metadata_conf)
217217
except Exception as ex:
218-
logger.error("Loading metadata failed", exc_info=ex)
218+
logger.error("Loading metadata failed; reason: %s" % str(ex))
219219
return False
220220

221221
self.sourceid = self.metadata.construct_source_id()
@@ -884,7 +884,7 @@ def _response(
884884
if encrypt_assertion_self_contained:
885885
try:
886886
assertion_tag = response.assertion._to_element_tree().tag
887-
except:
887+
except Exception:
888888
assertion_tag = response.assertion[0]._to_element_tree().tag
889889
response = pre_encrypt_assertion(response)
890890
response = response.get_xml_string_with_self_contained_assertion_within_encrypted_assertion(
@@ -995,7 +995,7 @@ def _parse_request(
995995
:return: A request instance
996996
"""
997997

998-
_log_info = logger.info
998+
# _log_info = logger.info
999999
_log_debug = logger.debug
10001000

10011001
# The addresses I should receive messages like this on
@@ -1430,7 +1430,7 @@ def _parse_response(
14301430
try:
14311431
response = response_cls(self.sec, **kwargs)
14321432
except Exception as exc:
1433-
logger.info("%s", exc)
1433+
logger.info(str(exc))
14341434
raise
14351435

14361436
xmlstr = self.unravel(xmlstr, binding, response_cls.msgtype)
@@ -1449,7 +1449,7 @@ def _parse_response(
14491449
response = response.loads(xmlstr, False, origxml=xmlstr)
14501450
except SigverError as err:
14511451
if require_response_signature:
1452-
logger.error("Signature Error: %s", err)
1452+
logger.error("Signature Error: %s", str(err))
14531453
raise
14541454
else:
14551455
# The response is not signed but a signature is not required
@@ -1501,7 +1501,7 @@ def _parse_response(
15011501
response.verify(keys)
15021502
except SignatureError as err:
15031503
if require_signature:
1504-
logger.error("Signature Error: %s", err)
1504+
logger.error("Signature Error: %s", str(err))
15051505
raise
15061506
else:
15071507
response.require_signature = require_signature

src/saml2/httpbase.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,13 @@
55
import time
66

77
import requests
8-
import six
98
from six.moves import http_cookiejar
109
from six.moves.http_cookies import SimpleCookie
1110
from six.moves.urllib.parse import urlencode
1211
from six.moves.urllib.parse import urlparse
1312

1413
from saml2 import SAMLError
1514
from saml2 import class_name
16-
from saml2.pack import http_post_message
1715
from saml2.pack import make_soap_enveloped_saml_thingy
1816
from saml2.time_util import utc_now
1917

@@ -321,7 +319,7 @@ def send_using_soap(self, request, destination, headers=None, sign=False):
321319
args["headers"] = dict(args["headers"])
322320
response = self.send(**args)
323321
except Exception as exc:
324-
logger.info("HTTPClient exception: %s", exc)
322+
logger.info("HTTPClient exception: %s", str(exc))
325323
raise
326324

327325
if response.status_code == 200:

src/saml2/httputil.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,7 @@ class HttpParameters(object):
167167
signature = None
168168
sigalg = None
169169
# Relaystate and SAML message are stored elsewhere
170+
170171
def __init__(self, dict):
171172
try:
172173
self.signature = dict["Signature"][0]

src/saml2/ident.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ def decode(txt):
6868
i, val = part.split("=")
6969
try:
7070
setattr(_nid, ATTR[int(i)], unquote(val))
71-
except:
71+
except Exception:
7272
pass
7373
return _nid
7474

@@ -160,7 +160,7 @@ def get_nameid(self, userid, nformat, sp_name_qualifier, name_qualifier):
160160
if nformat == NAMEID_FORMAT_PERSISTENT:
161161
nameid = self.match_local_id(userid, sp_name_qualifier, name_qualifier)
162162
if nameid:
163-
logger.debug("Found existing persistent NameId {nid} for user {uid}".format(nid=nameid, uid=userid))
163+
logger.debug("Found existing persistent NameId %s for user %s" % (nameid, userid))
164164
return nameid
165165

166166
_id = self.create_id(nformat, name_qualifier, sp_name_qualifier)

src/saml2/mdstore.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -738,7 +738,7 @@ def parse_and_check_signature(self, txt):
738738
def try_verify_signature(node_name):
739739
try:
740740
self.security.verify_signature(txt, node_name=node_name, cert_file=self.cert)
741-
except SignatureError as e:
741+
except SignatureError:
742742
return False
743743
else:
744744
return True
@@ -798,7 +798,7 @@ def __init__(self, attrc, loader_callable, cert=None, security=None, **kwargs):
798798

799799
@staticmethod
800800
def get_metadata_loader(func):
801-
if hasattr(func, "__call__"):
801+
if callable(func):
802802
return func
803803

804804
i = func.rfind(".")
@@ -813,7 +813,7 @@ def get_metadata_loader(func):
813813
except AttributeError:
814814
raise RuntimeError('Module "%s" does not define a "%s" metadata loader' % (module, attr))
815815

816-
if not hasattr(metadata_loader, "__call__"):
816+
if not callable(metadata_loader):
817817
raise RuntimeError("Metadata loader %s.%s must be callable" % (module, attr))
818818

819819
return metadata_loader
@@ -957,7 +957,7 @@ def _fetch_metadata(self, item):
957957

958958
_txt = response.content
959959
if not self.parse_and_check_signature(_txt):
960-
error_msg = "Fething {item}: invalid signature".format(item=item, status=response.status_code)
960+
error_msg = "Fething {item}: invalid signature".format(item=item)
961961
logger.info(error_msg)
962962
raise KeyError(error_msg)
963963

@@ -974,7 +974,7 @@ def __getitem__(self, item):
974974
elif not self._is_metadata_fresh(item):
975975
msg = "Metadata for {} have expired; refreshing metadata".format(item)
976976
logger.info(msg)
977-
old_entity = self.entity.pop(item)
977+
_ = self.entity.pop(item)
978978
entity = self._fetch_metadata(item)
979979
else:
980980
entity = self.entity[item]

src/saml2/metadata.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -373,7 +373,7 @@ def _do_nameid_format(cls, conf, typ):
373373
name_id_format = [name_id_format]
374374

375375
formats = [md.NameIDFormat(text=format) for format in name_id_format]
376-
setattr(cls, "name_id_format", formats)
376+
cls.name_id_format = formats
377377

378378

379379
def do_endpoints(conf, endpoints):

src/saml2/mongo_store.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ def _mdb_get_database(uri, **kwargs):
267267
:params database: name as string or (uri, name)
268268
:returns: pymongo database object
269269
"""
270-
if not "tz_aware" in kwargs:
270+
if "tz_aware" not in kwargs:
271271
# default, but not forced
272272
kwargs["tz_aware"] = True
273273

src/saml2/pack.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
try:
1414
import html
15-
except:
15+
except Exception:
1616
import cgi as html
1717

1818
import logging

0 commit comments

Comments
 (0)