Skip to content

Commit d29aac6

Browse files
committed
Change line length from 88 to 120
Signed-off-by: Ivan Kanakarakis <[email protected]>
1 parent a9c783c commit d29aac6

File tree

125 files changed

+2413
-4786
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

125 files changed

+2413
-4786
lines changed

example/idp2/idp.py

Lines changed: 20 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -115,9 +115,7 @@ def unpack_redirect(self):
115115

116116
def unpack_post(self):
117117
post_data = get_post(self.environ)
118-
_dict = parse_qs(
119-
post_data if isinstance(post_data, str) else post_data.decode("utf-8")
120-
)
118+
_dict = parse_qs(post_data if isinstance(post_data, str) else post_data.decode("utf-8"))
121119
logger.debug("unpack_post:: %s", _dict)
122120
try:
123121
return dict([(k, v[0]) for k, v in _dict.items()])
@@ -161,9 +159,7 @@ def operation(self, saml_msg, binding):
161159
kwargs = {}
162160

163161
try:
164-
kwargs["encrypt_cert"] = encrypt_cert_from_item(
165-
saml_msg["req_info"].message
166-
)
162+
kwargs["encrypt_cert"] = encrypt_cert_from_item(saml_msg["req_info"].message)
167163
except KeyError:
168164
pass
169165

@@ -356,10 +352,7 @@ def do(self, query, binding_in, relay_state="", encrypt_cert=None, **kwargs):
356352
resp_args["authn"] = metod
357353

358354
_resp = IDP.create_authn_response(
359-
identity,
360-
userid=self.user,
361-
encrypt_cert_assertion=encrypt_cert,
362-
**resp_args
355+
identity, userid=self.user, encrypt_cert_assertion=encrypt_cert, **resp_args
363356
)
364357
except Exception as excp:
365358
logging.error(exception_trace(excp))
@@ -368,21 +361,12 @@ def do(self, query, binding_in, relay_state="", encrypt_cert=None, **kwargs):
368361

369362
logger.info("AuthNResponse: %s", _resp)
370363
if self.op_type == "ecp":
371-
kwargs = {
372-
"soap_headers": [
373-
ecp.Response(assertion_consumer_service_url=self.destination)
374-
]
375-
}
364+
kwargs = {"soap_headers": [ecp.Response(assertion_consumer_service_url=self.destination)]}
376365
else:
377366
kwargs = {}
378367

379368
http_args = IDP.apply_binding(
380-
self.binding_out,
381-
"%s" % _resp,
382-
self.destination,
383-
relay_state,
384-
response=True,
385-
**kwargs
369+
self.binding_out, "%s" % _resp, self.destination, relay_state, response=True, **kwargs
386370
)
387371

388372
logger.debug("HTTPargs: %s", http_args)
@@ -409,9 +393,7 @@ def redirect(self):
409393
del IDP.ticket[_key]
410394
except KeyError:
411395
try:
412-
self.req_info = IDP.parse_authn_request(
413-
saml_msg["SAMLRequest"], BINDING_HTTP_REDIRECT
414-
)
396+
self.req_info = IDP.parse_authn_request(saml_msg["SAMLRequest"], BINDING_HTTP_REDIRECT)
415397
except KeyError:
416398
resp = BadRequest("Message signature verification failure")
417399
return resp(self.environ, self.start_response)
@@ -462,9 +444,7 @@ def post(self):
462444
self.req_info = saml_msg["req_info"]
463445
del IDP.ticket[_key]
464446
except KeyError:
465-
self.req_info = IDP.parse_authn_request(
466-
saml_msg["SAMLRequest"], BINDING_HTTP_POST
467-
)
447+
self.req_info = IDP.parse_authn_request(saml_msg["SAMLRequest"], BINDING_HTTP_POST)
468448
_req = self.req_info.message
469449
if self.user:
470450
if _req.force_authn is not None and _req.force_authn.lower() == "true":
@@ -505,9 +485,7 @@ def ecp(self):
505485
if is_equal(PASSWD[user], passwd):
506486
resp = Unauthorized()
507487
self.user = user
508-
self.environ["idp.authn"] = AUTHN_BROKER.get_authn_by_accr(
509-
PASSWORD
510-
)
488+
self.environ["idp.authn"] = AUTHN_BROKER.get_authn_by_accr(PASSWORD)
511489
except ValueError:
512490
resp = Unauthorized()
513491
else:
@@ -530,9 +508,7 @@ def ecp(self):
530508
# -----------------------------------------------------------------------------
531509

532510

533-
def do_authentication(
534-
environ, start_response, authn_context, key, redirect_uri, headers=None
535-
):
511+
def do_authentication(environ, start_response, authn_context, key, redirect_uri, headers=None):
536512
"""
537513
Display the login form
538514
"""
@@ -560,9 +536,7 @@ def do_authentication(
560536
}
561537

562538

563-
def username_password_authn(
564-
environ, start_response, reference, key, redirect_uri, headers=None
565-
):
539+
def username_password_authn(environ, start_response, reference, key, redirect_uri, headers=None):
566540
"""
567541
Display the login form
568542
"""
@@ -681,15 +655,11 @@ def do(self, request, binding, relay_state="", encrypt_cert=None, **kwargs):
681655
destination = ""
682656
response = False
683657
else:
684-
binding, destination = IDP.pick_binding(
685-
"single_logout_service", [binding], "spsso", req_info
686-
)
658+
binding, destination = IDP.pick_binding("single_logout_service", [binding], "spsso", req_info)
687659
response = True
688660

689661
try:
690-
hinfo = IDP.apply_binding(
691-
binding, "%s" % resp, destination, relay_state, response=response
692-
)
662+
hinfo = IDP.apply_binding(binding, "%s" % resp, destination, relay_state, response=response)
693663
except Exception as exc:
694664
logger.error("ServiceError: %s", exc)
695665
resp = ServiceError("%s" % exc)
@@ -735,9 +705,7 @@ def do(self, query, binding, relay_state="", encrypt_cert=None):
735705
_resp = IDP.create_manage_name_id_response(request)
736706

737707
# It's using SOAP binding
738-
hinfo = IDP.apply_binding(
739-
BINDING_SOAP, "%s" % _resp, "", relay_state, response=True
740-
)
708+
hinfo = IDP.apply_binding(BINDING_SOAP, "%s" % _resp, "", relay_state, response=True)
741709

742710
resp = Response(hinfo["data"], headers=hinfo["headers"])
743711
return resp(self.environ, self.start_response)
@@ -803,9 +771,7 @@ def do(self, request, binding, relay_state="", encrypt_cert=None):
803771
_req = IDP.parse_authn_query(request, binding)
804772
_query = _req.message
805773

806-
msg = IDP.create_authn_query_response(
807-
_query.subject, _query.requested_authn_context, _query.session_index
808-
)
774+
msg = IDP.create_authn_query_response(_query.subject, _query.requested_authn_context, _query.session_index)
809775

810776
logger.debug("response: %s", msg)
811777
hinfo = IDP.apply_binding(BINDING_SOAP, "%s" % msg, "", "", response=True)
@@ -858,9 +824,7 @@ def do(self, query, binding, relay_state="", encrypt_cert=None):
858824
request = req.message
859825
# Do the necessary stuff
860826
try:
861-
name_id = IDP.ident.handle_name_id_mapping_request(
862-
request.name_id, request.name_id_policy
863-
)
827+
name_id = IDP.ident.handle_name_id_mapping_request(request.name_id, request.name_id_policy)
864828
except Unknown:
865829
resp = BadRequest("Unknown entity")
866830
return resp(self.environ, self.start_response)
@@ -1095,33 +1059,25 @@ def application(environ, start_response):
10951059

10961060
if __name__ == "__main__":
10971061
parser = argparse.ArgumentParser()
1098-
parser.add_argument(
1099-
"-p", dest="path", help="Path to configuration file.", default="./idp_conf.py"
1100-
)
1062+
parser.add_argument("-p", dest="path", help="Path to configuration file.", default="./idp_conf.py")
11011063
parser.add_argument(
11021064
"-v",
11031065
dest="valid",
11041066
help="How long, in days, the metadata is valid from " "the time of creation",
11051067
)
11061068
parser.add_argument("-c", dest="cert", help="certificate")
11071069
parser.add_argument("-i", dest="id", help="The ID of the entities descriptor")
1108-
parser.add_argument(
1109-
"-k", dest="keyfile", help="A file with a key to sign the metadata with"
1110-
)
1070+
parser.add_argument("-k", dest="keyfile", help="A file with a key to sign the metadata with")
11111071
parser.add_argument("-n", dest="name")
1112-
parser.add_argument(
1113-
"-s", dest="sign", action="store_true", help="sign the metadata"
1114-
)
1072+
parser.add_argument("-s", dest="sign", action="store_true", help="sign the metadata")
11151073
parser.add_argument("-m", dest="mako_root", default="./")
11161074
parser.add_argument(dest="config")
11171075
args = parser.parse_args()
11181076

11191077
CONFIG = importlib.import_module(args.config)
11201078

11211079
AUTHN_BROKER = AuthnBroker()
1122-
AUTHN_BROKER.add(
1123-
authn_context_class_ref(PASSWORD), username_password_authn, 10, CONFIG.BASE
1124-
)
1080+
AUTHN_BROKER.add(authn_context_class_ref(PASSWORD), username_password_authn, 10, CONFIG.BASE)
11251081
AUTHN_BROKER.add(authn_context_class_ref(UNSPECIFIED), "", 0, CONFIG.BASE)
11261082

11271083
IDP = server.Server(args.config, cache=Cache())
@@ -1157,9 +1113,7 @@ def application(environ, start_response):
11571113
https = "using HTTPS"
11581114
# SRV.ssl_adapter = ssl_pyopenssl.pyOpenSSLAdapter(
11591115
# config.SERVER_CERT, config.SERVER_KEY, config.CERT_CHAIN)
1160-
SRV.ssl_adapter = BuiltinSSLAdapter(
1161-
CONFIG.SERVER_CERT, CONFIG.SERVER_KEY, CONFIG.CERT_CHAIN
1162-
)
1116+
SRV.ssl_adapter = BuiltinSSLAdapter(CONFIG.SERVER_CERT, CONFIG.SERVER_KEY, CONFIG.CERT_CHAIN)
11631117

11641118
logger.info("Server starting")
11651119
print("IDP listening on %s:%s%s" % (HOST, PORT, _https))

example/idp2/idp_uwsgi.py

Lines changed: 12 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -321,31 +321,20 @@ def do(self, query, binding_in, relay_state="", encrypt_cert=None):
321321
else:
322322
resp_args["authn"] = metod
323323

324-
_resp = IDP.create_authn_response(
325-
identity, userid=self.user, encrypt_cert=encrypt_cert, **resp_args
326-
)
324+
_resp = IDP.create_authn_response(identity, userid=self.user, encrypt_cert=encrypt_cert, **resp_args)
327325
except Exception as excp:
328326
logging.error(exception_trace(excp))
329327
resp = ServiceError("Exception: %s" % (excp,))
330328
return resp(self.environ, self.start_response)
331329

332330
logger.info("AuthNResponse: %s", _resp)
333331
if self.op_type == "ecp":
334-
kwargs = {
335-
"soap_headers": [
336-
ecp.Response(assertion_consumer_service_url=self.destination)
337-
]
338-
}
332+
kwargs = {"soap_headers": [ecp.Response(assertion_consumer_service_url=self.destination)]}
339333
else:
340334
kwargs = {}
341335

342336
http_args = IDP.apply_binding(
343-
self.binding_out,
344-
"%s" % _resp,
345-
self.destination,
346-
relay_state,
347-
response=True,
348-
**kwargs
337+
self.binding_out, "%s" % _resp, self.destination, relay_state, response=True, **kwargs
349338
)
350339

351340
logger.debug("HTTPargs: %s", http_args)
@@ -371,9 +360,7 @@ def redirect(self):
371360
del IDP.ticket[_key]
372361
except KeyError:
373362
try:
374-
self.req_info = IDP.parse_authn_request(
375-
saml_msg["SAMLRequest"], BINDING_HTTP_REDIRECT
376-
)
363+
self.req_info = IDP.parse_authn_request(saml_msg["SAMLRequest"], BINDING_HTTP_REDIRECT)
377364
except KeyError:
378365
resp = BadRequest("Message signature verification failure")
379366
return resp(self.environ, self.start_response)
@@ -413,9 +400,7 @@ def post(self):
413400
"""
414401
logger.info("--- In SSO POST ---")
415402
saml_msg = self.unpack_either()
416-
self.req_info = IDP.parse_authn_request(
417-
saml_msg["SAMLRequest"], BINDING_HTTP_POST
418-
)
403+
self.req_info = IDP.parse_authn_request(saml_msg["SAMLRequest"], BINDING_HTTP_POST)
419404
_req = self.req_info.message
420405
if self.user:
421406
if _req.force_authn:
@@ -454,9 +439,7 @@ def ecp(self):
454439
if is_equal(PASSWD[user], passwd):
455440
resp = Unauthorized()
456441
self.user = user
457-
self.environ["idp.authn"] = AUTHN_BROKER.get_authn_by_accr(
458-
PASSWORD
459-
)
442+
self.environ["idp.authn"] = AUTHN_BROKER.get_authn_by_accr(PASSWORD)
460443
except ValueError:
461444
resp = Unauthorized()
462445
else:
@@ -650,9 +633,7 @@ def do(self, query, binding, relay_state="", encrypt_cert=None):
650633
_resp = IDP.create_manage_name_id_response(request)
651634

652635
# It's using SOAP binding
653-
hinfo = IDP.apply_binding(
654-
BINDING_SOAP, "%s" % _resp, "", relay_state, response=True
655-
)
636+
hinfo = IDP.apply_binding(BINDING_SOAP, "%s" % _resp, "", relay_state, response=True)
656637

657638
resp = Response(hinfo["data"], headers=hinfo["headers"])
658639
return resp(self.environ, self.start_response)
@@ -718,9 +699,7 @@ def do(self, request, binding, relay_state="", encrypt_cert=None):
718699
_req = IDP.parse_authn_query(request, binding)
719700
_query = _req.message
720701

721-
msg = IDP.create_authn_query_response(
722-
_query.subject, _query.requested_authn_context, _query.session_index
723-
)
702+
msg = IDP.create_authn_query_response(_query.subject, _query.requested_authn_context, _query.session_index)
724703

725704
logger.debug("response: %s", msg)
726705
hinfo = IDP.apply_binding(BINDING_SOAP, "%s" % msg, "", "", response=True)
@@ -773,9 +752,7 @@ def do(self, query, binding, relay_state="", encrypt_cert=None):
773752
request = req.message
774753
# Do the necessary stuff
775754
try:
776-
name_id = IDP.ident.handle_name_id_mapping_request(
777-
request.name_id, request.name_id_policy
778-
)
755+
name_id = IDP.ident.handle_name_id_mapping_request(request.name_id, request.name_id_policy)
779756
except Unknown:
780757
resp = BadRequest("Unknown entity")
781758
return resp(self.environ, self.start_response)
@@ -1012,9 +989,7 @@ def application(environ, start_response):
1012989
10,
1013990
"http://%s" % socket.gethostname(),
1014991
)
1015-
AUTHN_BROKER.add(
1016-
authn_context_class_ref(UNSPECIFIED), "", 0, "http://%s" % socket.gethostname()
1017-
)
992+
AUTHN_BROKER.add(authn_context_class_ref(UNSPECIFIED), "", 0, "http://%s" % socket.gethostname())
1018993
CONFIG = importlib.import_module(args.config)
1019994
IDP = server.Server(args.config, cache=Cache())
1020995
IDP.ticket = {}
@@ -1033,13 +1008,9 @@ def application(environ, start_response):
10331008
)
10341009
parser.add_argument("-c", dest="cert", help="certificate")
10351010
parser.add_argument("-i", dest="id", help="The ID of the entities descriptor")
1036-
parser.add_argument(
1037-
"-k", dest="keyfile", help="A file with a key to sign the metadata with"
1038-
)
1011+
parser.add_argument("-k", dest="keyfile", help="A file with a key to sign the metadata with")
10391012
parser.add_argument("-n", dest="name")
1040-
parser.add_argument(
1041-
"-s", dest="sign", action="store_true", help="sign the metadata"
1042-
)
1013+
parser.add_argument("-s", dest="sign", action="store_true", help="sign the metadata")
10431014
parser.add_argument("-m", dest="mako_root", default="./")
10441015
parser.add_argument(dest="config")
10451016
args = parser.parse_args()

0 commit comments

Comments
 (0)