@@ -336,7 +336,7 @@ def signed_instance_factory(instance, seccont, elements_to_sign=None):
336
336
return instance
337
337
338
338
339
- def make_temp (content , suffix = "" , decode = True , delete = True ):
339
+ def make_temp (content , suffix = "" , decode = True ):
340
340
"""
341
341
Create a temporary file with the given content.
342
342
@@ -356,7 +356,7 @@ def make_temp(content, suffix="", decode=True, delete=True):
356
356
content .encode ("utf-8" ) if not isinstance (content , six .binary_type ) else content
357
357
)
358
358
content_raw = base64 .b64decode (content_encoded ) if decode else content_encoded
359
- delete_tmpfiles = delete
359
+ delete_tmpfiles = get_environ_delete_tmpfiles ()
360
360
ntf = NamedTemporaryFile (suffix = suffix , delete = delete_tmpfiles )
361
361
ntf .write (content_raw )
362
362
ntf .seek (0 )
@@ -693,7 +693,6 @@ def __init__(self, xmlsec_binary, **kwargs):
693
693
CryptoBackend .__init__ (self , ** kwargs )
694
694
assert (isinstance (xmlsec_binary , six .string_types ))
695
695
self .xmlsec = xmlsec_binary
696
- self ._xmlsec_delete_tmpfiles = get_environ_delete_tmpfiles ()
697
696
698
697
try :
699
698
self .non_xml_crypto = RSACrypto (kwargs ['rsa_key' ])
@@ -825,7 +824,7 @@ def sign_statement(self, statement, node_name, key_file, node_id, id_attr):
825
824
if isinstance (statement , SamlBase ):
826
825
statement = str (statement )
827
826
828
- tmp = make_temp (statement , suffix = ".xml" , decode = False , delete = self . _xmlsec_delete_tmpfiles )
827
+ tmp = make_temp (statement , suffix = ".xml" , decode = False )
829
828
830
829
com_list = [
831
830
self .xmlsec ,
@@ -866,7 +865,7 @@ def validate_signature(self, signedtext, cert_file, cert_type, node_name, node_i
866
865
if not isinstance (signedtext , six .binary_type ):
867
866
signedtext = signedtext .encode ('utf-8' )
868
867
869
- tmp = make_temp (signedtext , suffix = ".xml" , decode = False , delete = self . _xmlsec_delete_tmpfiles )
868
+ tmp = make_temp (signedtext , suffix = ".xml" , decode = False )
870
869
871
870
com_list = [
872
871
self .xmlsec ,
@@ -895,7 +894,7 @@ def _run_xmlsec(self, com_list, extra_args):
895
894
key-value parameters
896
895
:result: Whatever xmlsec wrote to an --output temporary file
897
896
"""
898
- with NamedTemporaryFile (suffix = '.xml' , delete = self . _xmlsec_delete_tmpfiles ) as ntf :
897
+ with NamedTemporaryFile (suffix = '.xml' ) as ntf :
899
898
com_list .extend (['--output' , ntf .name ])
900
899
com_list += extra_args
901
900
@@ -1305,8 +1304,6 @@ def __init__(
1305
1304
self .template = template
1306
1305
1307
1306
self .encrypt_key_type = encrypt_key_type
1308
- # keep certificate files to debug xmlsec invocations
1309
- self ._xmlsec_delete_tmpfiles = get_environ_delete_tmpfiles ()
1310
1307
1311
1308
def correctly_signed (self , xml , must = False ):
1312
1309
logger .debug ('verify correct signature' )
@@ -1453,7 +1450,7 @@ def _check_signature(self, decoded_xml, item, node_name=NODE_NAME, origdoc=None,
1453
1450
for cert in _certs :
1454
1451
if isinstance (cert , six .string_types ):
1455
1452
content = pem_format (cert )
1456
- tmp = make_temp (content , suffix = ".pem" , decode = False , delete = self . _xmlsec_delete_tmpfiles )
1453
+ tmp = make_temp (content , suffix = ".pem" , decode = False )
1457
1454
certs .append (tmp )
1458
1455
else :
1459
1456
certs .append (cert )
@@ -1463,7 +1460,7 @@ def _check_signature(self, decoded_xml, item, node_name=NODE_NAME, origdoc=None,
1463
1460
if not certs and not self .only_use_keys_in_metadata :
1464
1461
logger .debug ('==== Certs from instance ====' )
1465
1462
certs = [
1466
- make_temp (content = pem_format (cert ), suffix = ".pem" , decode = False , delete = self . _xmlsec_delete_tmpfiles )
1463
+ make_temp (content = pem_format (cert ), suffix = ".pem" , decode = False )
1467
1464
for cert in cert_from_instance (item )
1468
1465
]
1469
1466
else :
0 commit comments