Skip to content

Commit b381a13

Browse files
committed
Fix flake8 warnings
Signed-off-by: Ivan Kanakarakis <[email protected]>
1 parent 3592af1 commit b381a13

32 files changed

+88
-130
lines changed

src/saml2/__init__.py

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -636,8 +636,8 @@ def set_prefixes(self, elem, prefix_map):
636636

637637
# fixup all elements in the tree
638638
memo = {}
639-
for elem in elem.iter():
640-
self.fixup_element_prefixes(elem, uri_map, memo)
639+
for element in elem.iter():
640+
self.fixup_element_prefixes(element, uri_map, memo)
641641

642642
def fixup_element_prefixes(self, elem, uri_map, memo):
643643
def fixup(name):
@@ -739,18 +739,15 @@ def set_text(self, val, base64encode=False):
739739

740740
# print("set_text: %s" % (val,))
741741
if isinstance(val, bool):
742-
if val:
743-
setattr(self, "text", "true")
744-
else:
745-
setattr(self, "text", "false")
742+
self.text = "true" if val else "false"
746743
elif isinstance(val, int):
747-
setattr(self, "text", "%d" % val)
744+
self.text = str(val)
748745
elif isinstance(val, six.string_types):
749-
setattr(self, "text", val)
746+
self.text = val
750747
elif val is None:
751748
pass
752749
else:
753-
raise ValueError("Type shouldn't be '%s'" % (val,))
750+
raise ValueError("Type shouldn't be '%s'" % val)
754751

755752
return self
756753

src/saml2/authn_context/__init__.py

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
1+
from saml2 import extension_elements_to_elements
2+
from saml2.authn_context import ippword
3+
from saml2.authn_context import mobiletwofactor
4+
from saml2.authn_context import ppt
5+
from saml2.authn_context import pword
6+
from saml2.authn_context import sslcert
17
from saml2.saml import AuthnContext
28
from saml2.saml import AuthnContextClassRef
39
from saml2.samlp import RequestedAuthnContext
410

511

6-
__author__ = "rolandh"
7-
8-
from saml2 import extension_elements_to_elements
9-
10-
1112
UNSPECIFIED = "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified"
1213

1314
INTERNETPROTOCOLPASSWORD = "urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocolPassword"
@@ -22,13 +23,6 @@
2223
AL3 = "http://idmanagement.gov/icam/2009/12/saml_2.0_profile/assurancelevel3"
2324
AL4 = "http://idmanagement.gov/icam/2009/12/saml_2.0_profile/assurancelevel4"
2425

25-
from saml2.authn_context import ippword
26-
from saml2.authn_context import mobiletwofactor
27-
from saml2.authn_context import ppt
28-
from saml2.authn_context import pword
29-
from saml2.authn_context import sslcert
30-
31-
3226
CMP_TYPE = ["exact", "minimum", "maximum", "better"]
3327

3428

src/saml2/cert.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ def create_certificate(
122122
key_file = "%s.key" % cn
123123
try:
124124
remove(cert_file)
125-
except:
125+
except Exception:
126126
pass
127127
try:
128128
remove(key_file)
129-
except:
129+
except Exception:
130130
pass
131131
c_f = join(cert_dir, cert_file)
132132
k_f = join(cert_dir, key_file)
@@ -146,7 +146,7 @@ def create_certificate(
146146
cert.get_subject().C = cert_info["country_code"]
147147
cert.get_subject().ST = cert_info["state"]
148148
cert.get_subject().L = cert_info["city"]
149-
cert.get_subject().O = cert_info["organization"]
149+
cert.get_subject().O = cert_info["organization"] # noqa: E741
150150
cert.get_subject().OU = cert_info["organization_unit"]
151151
cert.get_subject().CN = cn
152152
if not request:
@@ -333,7 +333,7 @@ def verify(self, signing_cert_str, cert_str):
333333
crypto.verify(ca_cert, cert_crypto.signature, cert_crypto.tbs_certificate_bytes, cert_algorithm)
334334
return True, "Signed certificate is valid and correctly signed by CA certificate."
335335
except crypto.Error as e:
336-
return False, "Certificate is incorrectly signed."
336+
return False, "Certificate is incorrectly signed: %s" % str(e)
337337
except Exception as e:
338338
return False, "Certificate is not valid for an unknown reason. %s" % str(e)
339339

src/saml2/client_base.py

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,6 @@
5454
from saml2.samlp import NameIDMappingRequest
5555
from saml2.samlp import RequestedAuthnContext
5656
from saml2.soap import make_soap_enveloped_saml_thingy
57-
from saml2.xmldsig import DIGEST_ALLOWED_ALG
58-
from saml2.xmldsig import SIG_ALLOWED_ALG
5957

6058

6159
logger = logging.getLogger(__name__)
@@ -445,7 +443,7 @@ def create_authn_request(
445443
args.update(_args)
446444
args.pop("id", None)
447445

448-
client_crt = kwargs.get("client_crt")
446+
# client_crt = kwargs.get("client_crt")
449447
nsprefix = kwargs.get("nsprefix")
450448

451449
msg = self._message(
@@ -797,12 +795,12 @@ def parse_authn_request_response(self, xmlstr, binding, outstanding=None, outsta
797795
try:
798796
resp = self._parse_response(xmlstr, AuthnResponse, "assertion_consumer_service", binding, **kwargs)
799797
except StatusError as err:
800-
logger.error("SAML status error: %s", err)
798+
logger.error("SAML status error: %s", str(err))
801799
raise
802800
except UnravelError:
803801
return None
804802
except Exception as err:
805-
logger.error("XML parse error: %s", err)
803+
logger.error("XML parse error: %s", str(err))
806804
raise
807805

808806
if not isinstance(resp, AuthnResponse):

src/saml2/cryptography/asymmetric.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def key_verify(rsakey, signature, message, digest):
2626

2727
try:
2828
rsakey.verify(signature, message, padding, digest)
29-
except Exception as e:
29+
except Exception:
3030
return False
3131
else:
3232
return True

src/saml2/ecp.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,4 +200,4 @@ def ecp_response(self):
200200

201201
soap_envelope = soapenv.Envelope(header=header, body=body)
202202

203-
return "%s" % soap_envelope
203+
return str(soap_envelope)

src/saml2/ecp_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ def operation(self, url, idp_entity_id, op, **opargs):
298298

299299
opargs["headers"] = self.add_paos_headers(opargs["headers"])
300300
response = self.send(sp_url, op, **opargs)
301-
logger.debug("[Op] SP response: %s" % response)
301+
logger.debug("[Op] SP response", extra={"response": response})
302302
print(response.text)
303303

304304
if response.status_code != 200:

src/saml2/entity.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ def reload_metadata(self, metadata_conf):
215215
try:
216216
self.metadata.reload(metadata_conf)
217217
except Exception as ex:
218-
logger.error("Loading metadata failed", exc_info=ex)
218+
logger.error("Loading metadata failed; reason: %s" % str(ex))
219219
return False
220220

221221
self.sourceid = self.metadata.construct_source_id()
@@ -884,7 +884,7 @@ def _response(
884884
if encrypt_assertion_self_contained:
885885
try:
886886
assertion_tag = response.assertion._to_element_tree().tag
887-
except:
887+
except Exception:
888888
assertion_tag = response.assertion[0]._to_element_tree().tag
889889
response = pre_encrypt_assertion(response)
890890
response = response.get_xml_string_with_self_contained_assertion_within_encrypted_assertion(
@@ -995,7 +995,7 @@ def _parse_request(
995995
:return: A request instance
996996
"""
997997

998-
_log_info = logger.info
998+
# _log_info = logger.info
999999
_log_debug = logger.debug
10001000

10011001
# The addresses I should receive messages like this on
@@ -1430,7 +1430,7 @@ def _parse_response(
14301430
try:
14311431
response = response_cls(self.sec, **kwargs)
14321432
except Exception as exc:
1433-
logger.info("%s", exc)
1433+
logger.info(str(exc))
14341434
raise
14351435

14361436
xmlstr = self.unravel(xmlstr, binding, response_cls.msgtype)
@@ -1449,7 +1449,7 @@ def _parse_response(
14491449
response = response.loads(xmlstr, False, origxml=xmlstr)
14501450
except SigverError as err:
14511451
if require_response_signature:
1452-
logger.error("Signature Error: %s", err)
1452+
logger.error("Signature Error: %s", str(err))
14531453
raise
14541454
else:
14551455
# The response is not signed but a signature is not required
@@ -1501,7 +1501,7 @@ def _parse_response(
15011501
response.verify(keys)
15021502
except SignatureError as err:
15031503
if require_signature:
1504-
logger.error("Signature Error: %s", err)
1504+
logger.error("Signature Error: %s", str(err))
15051505
raise
15061506
else:
15071507
response.require_signature = require_signature

src/saml2/httpbase.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,13 @@
55
import time
66

77
import requests
8-
import six
98
from six.moves import http_cookiejar
109
from six.moves.http_cookies import SimpleCookie
1110
from six.moves.urllib.parse import urlencode
1211
from six.moves.urllib.parse import urlparse
1312

1413
from saml2 import SAMLError
1514
from saml2 import class_name
16-
from saml2.pack import http_post_message
1715
from saml2.pack import make_soap_enveloped_saml_thingy
1816
from saml2.time_util import utc_now
1917

@@ -321,7 +319,7 @@ def send_using_soap(self, request, destination, headers=None, sign=False):
321319
args["headers"] = dict(args["headers"])
322320
response = self.send(**args)
323321
except Exception as exc:
324-
logger.info("HTTPClient exception: %s", exc)
322+
logger.info("HTTPClient exception: %s", str(exc))
325323
raise
326324

327325
if response.status_code == 200:

src/saml2/httputil.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,7 @@ class HttpParameters(object):
167167
signature = None
168168
sigalg = None
169169
# Relaystate and SAML message are stored elsewhere
170+
170171
def __init__(self, dict):
171172
try:
172173
self.signature = dict["Signature"][0]

0 commit comments

Comments
 (0)