all: implement black as code formatter
This commit is contained in:
		| @ -13,8 +13,11 @@ from passbook.providers.saml.base import get_random_id, get_time_string | ||||
| from passbook.providers.saml.utils import nice64 | ||||
| from passbook.providers.saml.views import render_xml | ||||
| from passbook.sources.saml.models import SAMLSource | ||||
| from passbook.sources.saml.utils import (_get_user_from_response, | ||||
|                                          build_full_url, get_entity_id) | ||||
| from passbook.sources.saml.utils import ( | ||||
|     _get_user_from_response, | ||||
|     build_full_url, | ||||
|     get_entity_id, | ||||
| ) | ||||
| from passbook.sources.saml.xml_render import get_authnrequest_xml | ||||
|  | ||||
|  | ||||
| @ -26,26 +29,30 @@ class InitiateView(View): | ||||
|         source: SAMLSource = get_object_or_404(SAMLSource, slug=source) | ||||
|         if not source.enabled: | ||||
|             raise Http404 | ||||
|         sso_destination = request.GET.get('next', None) | ||||
|         request.session['sso_destination'] = sso_destination | ||||
|         sso_destination = request.GET.get("next", None) | ||||
|         request.session["sso_destination"] = sso_destination | ||||
|         parameters = { | ||||
|             'ACS_URL': build_full_url('acs', request, source), | ||||
|             'DESTINATION': source.idp_url, | ||||
|             'AUTHN_REQUEST_ID': get_random_id(), | ||||
|             'ISSUE_INSTANT': get_time_string(), | ||||
|             'ISSUER': get_entity_id(request, source), | ||||
|             "ACS_URL": build_full_url("acs", request, source), | ||||
|             "DESTINATION": source.idp_url, | ||||
|             "AUTHN_REQUEST_ID": get_random_id(), | ||||
|             "ISSUE_INSTANT": get_time_string(), | ||||
|             "ISSUER": get_entity_id(request, source), | ||||
|         } | ||||
|         authn_req = get_authnrequest_xml(parameters, signed=False) | ||||
|         _request = nice64(str.encode(authn_req)) | ||||
|         return render(request, 'saml/sp/login.html', { | ||||
|             'request_url': source.idp_url, | ||||
|             'request': _request, | ||||
|             'token': sso_destination, | ||||
|             'source': source | ||||
|         }) | ||||
|         return render( | ||||
|             request, | ||||
|             "saml/sp/login.html", | ||||
|             { | ||||
|                 "request_url": source.idp_url, | ||||
|                 "request": _request, | ||||
|                 "token": sso_destination, | ||||
|                 "source": source, | ||||
|             }, | ||||
|         ) | ||||
|  | ||||
|  | ||||
| @method_decorator(csrf_exempt, name='dispatch') | ||||
| @method_decorator(csrf_exempt, name="dispatch") | ||||
| class ACSView(View): | ||||
|     """AssertionConsumerService, consume assertion and log user in""" | ||||
|  | ||||
| @ -55,13 +62,13 @@ class ACSView(View): | ||||
|         if not source.enabled: | ||||
|             raise Http404 | ||||
|         # sso_session = request.POST.get('RelayState', None) | ||||
|         data = request.POST.get('SAMLResponse', None) | ||||
|         data = request.POST.get("SAMLResponse", None) | ||||
|         response = base64.b64decode(data) | ||||
|         root = ElementTree.fromstring(response) | ||||
|         user = _get_user_from_response(root) | ||||
|         # attributes = _get_attributes_from_response(root) | ||||
|         login(request, user, backend='django.contrib.auth.backends.ModelBackend') | ||||
|         return redirect(reverse('passbook_core:overview')) | ||||
|         login(request, user, backend="django.contrib.auth.backends.ModelBackend") | ||||
|         return redirect(reverse("passbook_core:overview")) | ||||
|  | ||||
|  | ||||
| class SLOView(View): | ||||
| @ -73,10 +80,14 @@ class SLOView(View): | ||||
|         if not source.enabled: | ||||
|             raise Http404 | ||||
|         logout(request) | ||||
|         return render(request, 'saml/sp/sso_single_logout.html', { | ||||
|             'idp_logout_url': source.idp_logout_url, | ||||
|             'autosubmit': source.auto_logout, | ||||
|         }) | ||||
|         return render( | ||||
|             request, | ||||
|             "saml/sp/sso_single_logout.html", | ||||
|             { | ||||
|                 "idp_logout_url": source.idp_logout_url, | ||||
|                 "autosubmit": source.auto_logout, | ||||
|             }, | ||||
|         ) | ||||
|  | ||||
|  | ||||
| class MetadataView(View): | ||||
| @ -86,8 +97,12 @@ class MetadataView(View): | ||||
|         """Replies with the XML Metadata SPSSODescriptor.""" | ||||
|         source: SAMLSource = get_object_or_404(SAMLSource, slug=source) | ||||
|         entity_id = get_entity_id(request, source) | ||||
|         return render_xml(request, 'saml/sp/xml/spssodescriptor.xml', { | ||||
|             'acs_url': build_full_url('acs', request, source), | ||||
|             'entity_id': entity_id, | ||||
|             'cert_public_key': source.signing_cert, | ||||
|         }) | ||||
|         return render_xml( | ||||
|             request, | ||||
|             "saml/sp/xml/spssodescriptor.xml", | ||||
|             { | ||||
|                 "acs_url": build_full_url("acs", request, source), | ||||
|                 "entity_id": entity_id, | ||||
|                 "cert_public_key": source.signing_cert, | ||||
|             }, | ||||
|         ) | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	 Jens Langhammer
					Jens Langhammer