id
int32 0
252k
| repo
stringlengths 7
55
| path
stringlengths 4
127
| func_name
stringlengths 1
88
| original_string
stringlengths 75
19.8k
| language
stringclasses 1
value | code
stringlengths 51
19.8k
| code_tokens
sequence | docstring
stringlengths 3
17.3k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 87
242
|
---|---|---|---|---|---|---|---|---|---|---|---|
250,800 | pachyderm/python-pachyderm | src/python_pachyderm/pfs_client.py | PfsClient.get_file | def get_file(self, commit, path, offset_bytes=0, size_bytes=0, extract_value=True):
"""
Returns an iterator of the contents contents of a file at a specific Commit.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path of the file.
* offset_bytes: Optional. specifies a number of bytes that should be
skipped in the beginning of the file.
* size_bytes: Optional. limits the total amount of data returned, note
you will get fewer bytes than size if you pass a value larger than the
size of the file. If size is set to 0 then all of the data will be
returned.
* extract_value: If True, then an ExtractValueIterator will be return,
which will iterate over the bytes of the file. If False, then the
protobuf response iterator will return.
"""
req = proto.GetFileRequest(
file=proto.File(commit=commit_from(commit), path=path),
offset_bytes=offset_bytes,
size_bytes=size_bytes
)
res = self.stub.GetFile(req, metadata=self.metadata)
if extract_value:
return ExtractValueIterator(res)
return res | python | def get_file(self, commit, path, offset_bytes=0, size_bytes=0, extract_value=True):
req = proto.GetFileRequest(
file=proto.File(commit=commit_from(commit), path=path),
offset_bytes=offset_bytes,
size_bytes=size_bytes
)
res = self.stub.GetFile(req, metadata=self.metadata)
if extract_value:
return ExtractValueIterator(res)
return res | [
"def",
"get_file",
"(",
"self",
",",
"commit",
",",
"path",
",",
"offset_bytes",
"=",
"0",
",",
"size_bytes",
"=",
"0",
",",
"extract_value",
"=",
"True",
")",
":",
"req",
"=",
"proto",
".",
"GetFileRequest",
"(",
"file",
"=",
"proto",
".",
"File",
"(",
"commit",
"=",
"commit_from",
"(",
"commit",
")",
",",
"path",
"=",
"path",
")",
",",
"offset_bytes",
"=",
"offset_bytes",
",",
"size_bytes",
"=",
"size_bytes",
")",
"res",
"=",
"self",
".",
"stub",
".",
"GetFile",
"(",
"req",
",",
"metadata",
"=",
"self",
".",
"metadata",
")",
"if",
"extract_value",
":",
"return",
"ExtractValueIterator",
"(",
"res",
")",
"return",
"res"
] | Returns an iterator of the contents contents of a file at a specific Commit.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path of the file.
* offset_bytes: Optional. specifies a number of bytes that should be
skipped in the beginning of the file.
* size_bytes: Optional. limits the total amount of data returned, note
you will get fewer bytes than size if you pass a value larger than the
size of the file. If size is set to 0 then all of the data will be
returned.
* extract_value: If True, then an ExtractValueIterator will be return,
which will iterate over the bytes of the file. If False, then the
protobuf response iterator will return. | [
"Returns",
"an",
"iterator",
"of",
"the",
"contents",
"contents",
"of",
"a",
"file",
"at",
"a",
"specific",
"Commit",
"."
] | 1c58cf91d30e03716a4f45213989e890f7b8a78c | https://github.com/pachyderm/python-pachyderm/blob/1c58cf91d30e03716a4f45213989e890f7b8a78c/src/python_pachyderm/pfs_client.py#L384-L409 |
250,801 | pachyderm/python-pachyderm | src/python_pachyderm/pfs_client.py | PfsClient.get_files | def get_files(self, commit, paths, recursive=False):
"""
Returns the contents of a list of files at a specific Commit as a
dictionary of file paths to data.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* paths: A list of paths to retrieve.
* recursive: If True, will go into each directory in the list
recursively.
"""
filtered_file_infos = []
for path in paths:
fi = self.inspect_file(commit, path)
if fi.file_type == proto.FILE:
filtered_file_infos.append(fi)
else:
filtered_file_infos += self.list_file(commit, path, recursive=recursive)
filtered_paths = [fi.file.path for fi in filtered_file_infos if fi.file_type == proto.FILE]
return {path: b''.join(self.get_file(commit, path)) for path in filtered_paths} | python | def get_files(self, commit, paths, recursive=False):
filtered_file_infos = []
for path in paths:
fi = self.inspect_file(commit, path)
if fi.file_type == proto.FILE:
filtered_file_infos.append(fi)
else:
filtered_file_infos += self.list_file(commit, path, recursive=recursive)
filtered_paths = [fi.file.path for fi in filtered_file_infos if fi.file_type == proto.FILE]
return {path: b''.join(self.get_file(commit, path)) for path in filtered_paths} | [
"def",
"get_files",
"(",
"self",
",",
"commit",
",",
"paths",
",",
"recursive",
"=",
"False",
")",
":",
"filtered_file_infos",
"=",
"[",
"]",
"for",
"path",
"in",
"paths",
":",
"fi",
"=",
"self",
".",
"inspect_file",
"(",
"commit",
",",
"path",
")",
"if",
"fi",
".",
"file_type",
"==",
"proto",
".",
"FILE",
":",
"filtered_file_infos",
".",
"append",
"(",
"fi",
")",
"else",
":",
"filtered_file_infos",
"+=",
"self",
".",
"list_file",
"(",
"commit",
",",
"path",
",",
"recursive",
"=",
"recursive",
")",
"filtered_paths",
"=",
"[",
"fi",
".",
"file",
".",
"path",
"for",
"fi",
"in",
"filtered_file_infos",
"if",
"fi",
".",
"file_type",
"==",
"proto",
".",
"FILE",
"]",
"return",
"{",
"path",
":",
"b''",
".",
"join",
"(",
"self",
".",
"get_file",
"(",
"commit",
",",
"path",
")",
")",
"for",
"path",
"in",
"filtered_paths",
"}"
] | Returns the contents of a list of files at a specific Commit as a
dictionary of file paths to data.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* paths: A list of paths to retrieve.
* recursive: If True, will go into each directory in the list
recursively. | [
"Returns",
"the",
"contents",
"of",
"a",
"list",
"of",
"files",
"at",
"a",
"specific",
"Commit",
"as",
"a",
"dictionary",
"of",
"file",
"paths",
"to",
"data",
"."
] | 1c58cf91d30e03716a4f45213989e890f7b8a78c | https://github.com/pachyderm/python-pachyderm/blob/1c58cf91d30e03716a4f45213989e890f7b8a78c/src/python_pachyderm/pfs_client.py#L411-L432 |
250,802 | pachyderm/python-pachyderm | src/python_pachyderm/pfs_client.py | PfsClient.inspect_file | def inspect_file(self, commit, path):
"""
Returns info about a specific file.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: Path to file.
"""
req = proto.InspectFileRequest(file=proto.File(commit=commit_from(commit), path=path))
res = self.stub.InspectFile(req, metadata=self.metadata)
return res | python | def inspect_file(self, commit, path):
req = proto.InspectFileRequest(file=proto.File(commit=commit_from(commit), path=path))
res = self.stub.InspectFile(req, metadata=self.metadata)
return res | [
"def",
"inspect_file",
"(",
"self",
",",
"commit",
",",
"path",
")",
":",
"req",
"=",
"proto",
".",
"InspectFileRequest",
"(",
"file",
"=",
"proto",
".",
"File",
"(",
"commit",
"=",
"commit_from",
"(",
"commit",
")",
",",
"path",
"=",
"path",
")",
")",
"res",
"=",
"self",
".",
"stub",
".",
"InspectFile",
"(",
"req",
",",
"metadata",
"=",
"self",
".",
"metadata",
")",
"return",
"res"
] | Returns info about a specific file.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: Path to file. | [
"Returns",
"info",
"about",
"a",
"specific",
"file",
"."
] | 1c58cf91d30e03716a4f45213989e890f7b8a78c | https://github.com/pachyderm/python-pachyderm/blob/1c58cf91d30e03716a4f45213989e890f7b8a78c/src/python_pachyderm/pfs_client.py#L434-L444 |
250,803 | pachyderm/python-pachyderm | src/python_pachyderm/pfs_client.py | PfsClient.list_file | def list_file(self, commit, path, recursive=False):
"""
Lists the files in a directory.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path to the directory.
* recursive: If True, continue listing the files for sub-directories.
"""
req = proto.ListFileRequest(
file=proto.File(commit=commit_from(commit), path=path)
)
res = self.stub.ListFile(req, metadata=self.metadata)
file_infos = res.file_info
if recursive:
dirs = [f for f in file_infos if f.file_type == proto.DIR]
files = [f for f in file_infos if f.file_type == proto.FILE]
return sum([self.list_file(commit, d.file.path, recursive) for d in dirs], files)
return list(file_infos) | python | def list_file(self, commit, path, recursive=False):
req = proto.ListFileRequest(
file=proto.File(commit=commit_from(commit), path=path)
)
res = self.stub.ListFile(req, metadata=self.metadata)
file_infos = res.file_info
if recursive:
dirs = [f for f in file_infos if f.file_type == proto.DIR]
files = [f for f in file_infos if f.file_type == proto.FILE]
return sum([self.list_file(commit, d.file.path, recursive) for d in dirs], files)
return list(file_infos) | [
"def",
"list_file",
"(",
"self",
",",
"commit",
",",
"path",
",",
"recursive",
"=",
"False",
")",
":",
"req",
"=",
"proto",
".",
"ListFileRequest",
"(",
"file",
"=",
"proto",
".",
"File",
"(",
"commit",
"=",
"commit_from",
"(",
"commit",
")",
",",
"path",
"=",
"path",
")",
")",
"res",
"=",
"self",
".",
"stub",
".",
"ListFile",
"(",
"req",
",",
"metadata",
"=",
"self",
".",
"metadata",
")",
"file_infos",
"=",
"res",
".",
"file_info",
"if",
"recursive",
":",
"dirs",
"=",
"[",
"f",
"for",
"f",
"in",
"file_infos",
"if",
"f",
".",
"file_type",
"==",
"proto",
".",
"DIR",
"]",
"files",
"=",
"[",
"f",
"for",
"f",
"in",
"file_infos",
"if",
"f",
".",
"file_type",
"==",
"proto",
".",
"FILE",
"]",
"return",
"sum",
"(",
"[",
"self",
".",
"list_file",
"(",
"commit",
",",
"d",
".",
"file",
".",
"path",
",",
"recursive",
")",
"for",
"d",
"in",
"dirs",
"]",
",",
"files",
")",
"return",
"list",
"(",
"file_infos",
")"
] | Lists the files in a directory.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path to the directory.
* recursive: If True, continue listing the files for sub-directories. | [
"Lists",
"the",
"files",
"in",
"a",
"directory",
"."
] | 1c58cf91d30e03716a4f45213989e890f7b8a78c | https://github.com/pachyderm/python-pachyderm/blob/1c58cf91d30e03716a4f45213989e890f7b8a78c/src/python_pachyderm/pfs_client.py#L446-L466 |
250,804 | pachyderm/python-pachyderm | src/python_pachyderm/pfs_client.py | PfsClient.delete_file | def delete_file(self, commit, path):
"""
Deletes a file from a Commit. DeleteFile leaves a tombstone in the
Commit, assuming the file isn't written to later attempting to get the
file from the finished commit will result in not found error. The file
will of course remain intact in the Commit's parent.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path to the file.
"""
req = proto.DeleteFileRequest(file=proto.File(commit=commit_from(commit), path=path))
self.stub.DeleteFile(req, metadata=self.metadata) | python | def delete_file(self, commit, path):
req = proto.DeleteFileRequest(file=proto.File(commit=commit_from(commit), path=path))
self.stub.DeleteFile(req, metadata=self.metadata) | [
"def",
"delete_file",
"(",
"self",
",",
"commit",
",",
"path",
")",
":",
"req",
"=",
"proto",
".",
"DeleteFileRequest",
"(",
"file",
"=",
"proto",
".",
"File",
"(",
"commit",
"=",
"commit_from",
"(",
"commit",
")",
",",
"path",
"=",
"path",
")",
")",
"self",
".",
"stub",
".",
"DeleteFile",
"(",
"req",
",",
"metadata",
"=",
"self",
".",
"metadata",
")"
] | Deletes a file from a Commit. DeleteFile leaves a tombstone in the
Commit, assuming the file isn't written to later attempting to get the
file from the finished commit will result in not found error. The file
will of course remain intact in the Commit's parent.
Params:
* commit: A tuple, string, or Commit object representing the commit.
* path: The path to the file. | [
"Deletes",
"a",
"file",
"from",
"a",
"Commit",
".",
"DeleteFile",
"leaves",
"a",
"tombstone",
"in",
"the",
"Commit",
"assuming",
"the",
"file",
"isn",
"t",
"written",
"to",
"later",
"attempting",
"to",
"get",
"the",
"file",
"from",
"the",
"finished",
"commit",
"will",
"result",
"in",
"not",
"found",
"error",
".",
"The",
"file",
"will",
"of",
"course",
"remain",
"intact",
"in",
"the",
"Commit",
"s",
"parent",
"."
] | 1c58cf91d30e03716a4f45213989e890f7b8a78c | https://github.com/pachyderm/python-pachyderm/blob/1c58cf91d30e03716a4f45213989e890f7b8a78c/src/python_pachyderm/pfs_client.py#L475-L487 |
250,805 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLFrontend.handle_authn_request | def handle_authn_request(self, context, binding_in):
"""
This method is bound to the starting endpoint of the authentication.
:type context: satosa.context.Context
:type binding_in: str
:rtype: satosa.response.Response
:param context: The current context
:param binding_in: The binding type (http post, http redirect, ...)
:return: response
"""
return self._handle_authn_request(context, binding_in, self.idp) | python | def handle_authn_request(self, context, binding_in):
return self._handle_authn_request(context, binding_in, self.idp) | [
"def",
"handle_authn_request",
"(",
"self",
",",
"context",
",",
"binding_in",
")",
":",
"return",
"self",
".",
"_handle_authn_request",
"(",
"context",
",",
"binding_in",
",",
"self",
".",
"idp",
")"
] | This method is bound to the starting endpoint of the authentication.
:type context: satosa.context.Context
:type binding_in: str
:rtype: satosa.response.Response
:param context: The current context
:param binding_in: The binding type (http post, http redirect, ...)
:return: response | [
"This",
"method",
"is",
"bound",
"to",
"the",
"starting",
"endpoint",
"of",
"the",
"authentication",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L90-L102 |
250,806 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLFrontend._create_state_data | def _create_state_data(self, context, resp_args, relay_state):
"""
Returns a dict containing the state needed in the response flow.
:type context: satosa.context.Context
:type resp_args: dict[str, str | saml2.samlp.NameIDPolicy]
:type relay_state: str
:rtype: dict[str, dict[str, str] | str]
:param context: The current context
:param resp_args: Response arguments
:param relay_state: Request relay state
:return: A state as a dict
"""
if "name_id_policy" in resp_args and resp_args["name_id_policy"] is not None:
resp_args["name_id_policy"] = resp_args["name_id_policy"].to_string().decode("utf-8")
return {"resp_args": resp_args, "relay_state": relay_state} | python | def _create_state_data(self, context, resp_args, relay_state):
if "name_id_policy" in resp_args and resp_args["name_id_policy"] is not None:
resp_args["name_id_policy"] = resp_args["name_id_policy"].to_string().decode("utf-8")
return {"resp_args": resp_args, "relay_state": relay_state} | [
"def",
"_create_state_data",
"(",
"self",
",",
"context",
",",
"resp_args",
",",
"relay_state",
")",
":",
"if",
"\"name_id_policy\"",
"in",
"resp_args",
"and",
"resp_args",
"[",
"\"name_id_policy\"",
"]",
"is",
"not",
"None",
":",
"resp_args",
"[",
"\"name_id_policy\"",
"]",
"=",
"resp_args",
"[",
"\"name_id_policy\"",
"]",
".",
"to_string",
"(",
")",
".",
"decode",
"(",
"\"utf-8\"",
")",
"return",
"{",
"\"resp_args\"",
":",
"resp_args",
",",
"\"relay_state\"",
":",
"relay_state",
"}"
] | Returns a dict containing the state needed in the response flow.
:type context: satosa.context.Context
:type resp_args: dict[str, str | saml2.samlp.NameIDPolicy]
:type relay_state: str
:rtype: dict[str, dict[str, str] | str]
:param context: The current context
:param resp_args: Response arguments
:param relay_state: Request relay state
:return: A state as a dict | [
"Returns",
"a",
"dict",
"containing",
"the",
"state",
"needed",
"in",
"the",
"response",
"flow",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L125-L141 |
250,807 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLFrontend._handle_authn_request | def _handle_authn_request(self, context, binding_in, idp):
"""
See doc for handle_authn_request method.
:type context: satosa.context.Context
:type binding_in: str
:type idp: saml.server.Server
:rtype: satosa.response.Response
:param context: The current context
:param binding_in: The pysaml binding type
:param idp: The saml frontend idp server
:return: response
"""
req_info = idp.parse_authn_request(context.request["SAMLRequest"], binding_in)
authn_req = req_info.message
satosa_logging(logger, logging.DEBUG, "%s" % authn_req, context.state)
try:
resp_args = idp.response_args(authn_req)
except SAMLError as e:
satosa_logging(logger, logging.ERROR, "Could not find necessary info about entity: %s" % e, context.state)
return ServiceError("Incorrect request from requester: %s" % e)
requester = resp_args["sp_entity_id"]
context.state[self.name] = self._create_state_data(context, idp.response_args(authn_req),
context.request.get("RelayState"))
subject = authn_req.subject
name_id_value = subject.name_id.text if subject else None
nameid_formats = {
"from_policy": authn_req.name_id_policy and authn_req.name_id_policy.format,
"from_response": subject and subject.name_id and subject.name_id.format,
"from_metadata": (
idp.metadata[requester]
.get("spsso_descriptor", [{}])[0]
.get("name_id_format", [{}])[0]
.get("text")
),
"default": NAMEID_FORMAT_TRANSIENT,
}
name_id_format = (
nameid_formats["from_policy"]
or (
nameid_formats["from_response"] != NAMEID_FORMAT_UNSPECIFIED
and nameid_formats["from_response"]
)
or nameid_formats["from_metadata"]
or nameid_formats["from_response"]
or nameid_formats["default"]
)
requester_name = self._get_sp_display_name(idp, requester)
internal_req = InternalData(
subject_id=name_id_value,
subject_type=name_id_format,
requester=requester,
requester_name=requester_name,
)
idp_policy = idp.config.getattr("policy", "idp")
if idp_policy:
internal_req.attributes = self._get_approved_attributes(
idp, idp_policy, requester, context.state
)
return self.auth_req_callback_func(context, internal_req) | python | def _handle_authn_request(self, context, binding_in, idp):
req_info = idp.parse_authn_request(context.request["SAMLRequest"], binding_in)
authn_req = req_info.message
satosa_logging(logger, logging.DEBUG, "%s" % authn_req, context.state)
try:
resp_args = idp.response_args(authn_req)
except SAMLError as e:
satosa_logging(logger, logging.ERROR, "Could not find necessary info about entity: %s" % e, context.state)
return ServiceError("Incorrect request from requester: %s" % e)
requester = resp_args["sp_entity_id"]
context.state[self.name] = self._create_state_data(context, idp.response_args(authn_req),
context.request.get("RelayState"))
subject = authn_req.subject
name_id_value = subject.name_id.text if subject else None
nameid_formats = {
"from_policy": authn_req.name_id_policy and authn_req.name_id_policy.format,
"from_response": subject and subject.name_id and subject.name_id.format,
"from_metadata": (
idp.metadata[requester]
.get("spsso_descriptor", [{}])[0]
.get("name_id_format", [{}])[0]
.get("text")
),
"default": NAMEID_FORMAT_TRANSIENT,
}
name_id_format = (
nameid_formats["from_policy"]
or (
nameid_formats["from_response"] != NAMEID_FORMAT_UNSPECIFIED
and nameid_formats["from_response"]
)
or nameid_formats["from_metadata"]
or nameid_formats["from_response"]
or nameid_formats["default"]
)
requester_name = self._get_sp_display_name(idp, requester)
internal_req = InternalData(
subject_id=name_id_value,
subject_type=name_id_format,
requester=requester,
requester_name=requester_name,
)
idp_policy = idp.config.getattr("policy", "idp")
if idp_policy:
internal_req.attributes = self._get_approved_attributes(
idp, idp_policy, requester, context.state
)
return self.auth_req_callback_func(context, internal_req) | [
"def",
"_handle_authn_request",
"(",
"self",
",",
"context",
",",
"binding_in",
",",
"idp",
")",
":",
"req_info",
"=",
"idp",
".",
"parse_authn_request",
"(",
"context",
".",
"request",
"[",
"\"SAMLRequest\"",
"]",
",",
"binding_in",
")",
"authn_req",
"=",
"req_info",
".",
"message",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"%s\"",
"%",
"authn_req",
",",
"context",
".",
"state",
")",
"try",
":",
"resp_args",
"=",
"idp",
".",
"response_args",
"(",
"authn_req",
")",
"except",
"SAMLError",
"as",
"e",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"\"Could not find necessary info about entity: %s\"",
"%",
"e",
",",
"context",
".",
"state",
")",
"return",
"ServiceError",
"(",
"\"Incorrect request from requester: %s\"",
"%",
"e",
")",
"requester",
"=",
"resp_args",
"[",
"\"sp_entity_id\"",
"]",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"=",
"self",
".",
"_create_state_data",
"(",
"context",
",",
"idp",
".",
"response_args",
"(",
"authn_req",
")",
",",
"context",
".",
"request",
".",
"get",
"(",
"\"RelayState\"",
")",
")",
"subject",
"=",
"authn_req",
".",
"subject",
"name_id_value",
"=",
"subject",
".",
"name_id",
".",
"text",
"if",
"subject",
"else",
"None",
"nameid_formats",
"=",
"{",
"\"from_policy\"",
":",
"authn_req",
".",
"name_id_policy",
"and",
"authn_req",
".",
"name_id_policy",
".",
"format",
",",
"\"from_response\"",
":",
"subject",
"and",
"subject",
".",
"name_id",
"and",
"subject",
".",
"name_id",
".",
"format",
",",
"\"from_metadata\"",
":",
"(",
"idp",
".",
"metadata",
"[",
"requester",
"]",
".",
"get",
"(",
"\"spsso_descriptor\"",
",",
"[",
"{",
"}",
"]",
")",
"[",
"0",
"]",
".",
"get",
"(",
"\"name_id_format\"",
",",
"[",
"{",
"}",
"]",
")",
"[",
"0",
"]",
".",
"get",
"(",
"\"text\"",
")",
")",
",",
"\"default\"",
":",
"NAMEID_FORMAT_TRANSIENT",
",",
"}",
"name_id_format",
"=",
"(",
"nameid_formats",
"[",
"\"from_policy\"",
"]",
"or",
"(",
"nameid_formats",
"[",
"\"from_response\"",
"]",
"!=",
"NAMEID_FORMAT_UNSPECIFIED",
"and",
"nameid_formats",
"[",
"\"from_response\"",
"]",
")",
"or",
"nameid_formats",
"[",
"\"from_metadata\"",
"]",
"or",
"nameid_formats",
"[",
"\"from_response\"",
"]",
"or",
"nameid_formats",
"[",
"\"default\"",
"]",
")",
"requester_name",
"=",
"self",
".",
"_get_sp_display_name",
"(",
"idp",
",",
"requester",
")",
"internal_req",
"=",
"InternalData",
"(",
"subject_id",
"=",
"name_id_value",
",",
"subject_type",
"=",
"name_id_format",
",",
"requester",
"=",
"requester",
",",
"requester_name",
"=",
"requester_name",
",",
")",
"idp_policy",
"=",
"idp",
".",
"config",
".",
"getattr",
"(",
"\"policy\"",
",",
"\"idp\"",
")",
"if",
"idp_policy",
":",
"internal_req",
".",
"attributes",
"=",
"self",
".",
"_get_approved_attributes",
"(",
"idp",
",",
"idp_policy",
",",
"requester",
",",
"context",
".",
"state",
")",
"return",
"self",
".",
"auth_req_callback_func",
"(",
"context",
",",
"internal_req",
")"
] | See doc for handle_authn_request method.
:type context: satosa.context.Context
:type binding_in: str
:type idp: saml.server.Server
:rtype: satosa.response.Response
:param context: The current context
:param binding_in: The pysaml binding type
:param idp: The saml frontend idp server
:return: response | [
"See",
"doc",
"for",
"handle_authn_request",
"method",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L177-L245 |
250,808 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLFrontend._get_approved_attributes | def _get_approved_attributes(self, idp, idp_policy, sp_entity_id, state):
"""
Returns a list of approved attributes
:type idp: saml.server.Server
:type idp_policy: saml2.assertion.Policy
:type sp_entity_id: str
:type state: satosa.state.State
:rtype: list[str]
:param idp: The saml frontend idp server
:param idp_policy: The idp policy
:param sp_entity_id: The requesting sp entity id
:param state: The current state
:return: A list containing approved attributes
"""
name_format = idp_policy.get_name_form(sp_entity_id)
attrconvs = idp.config.attribute_converters
idp_policy.acs = attrconvs
attribute_filter = []
for aconv in attrconvs:
if aconv.name_format == name_format:
all_attributes = {v: None for v in aconv._fro.values()}
attribute_filter = list(idp_policy.restrict(all_attributes, sp_entity_id, idp.metadata).keys())
break
attribute_filter = self.converter.to_internal_filter(self.attribute_profile, attribute_filter)
satosa_logging(logger, logging.DEBUG, "Filter: %s" % attribute_filter, state)
return attribute_filter | python | def _get_approved_attributes(self, idp, idp_policy, sp_entity_id, state):
name_format = idp_policy.get_name_form(sp_entity_id)
attrconvs = idp.config.attribute_converters
idp_policy.acs = attrconvs
attribute_filter = []
for aconv in attrconvs:
if aconv.name_format == name_format:
all_attributes = {v: None for v in aconv._fro.values()}
attribute_filter = list(idp_policy.restrict(all_attributes, sp_entity_id, idp.metadata).keys())
break
attribute_filter = self.converter.to_internal_filter(self.attribute_profile, attribute_filter)
satosa_logging(logger, logging.DEBUG, "Filter: %s" % attribute_filter, state)
return attribute_filter | [
"def",
"_get_approved_attributes",
"(",
"self",
",",
"idp",
",",
"idp_policy",
",",
"sp_entity_id",
",",
"state",
")",
":",
"name_format",
"=",
"idp_policy",
".",
"get_name_form",
"(",
"sp_entity_id",
")",
"attrconvs",
"=",
"idp",
".",
"config",
".",
"attribute_converters",
"idp_policy",
".",
"acs",
"=",
"attrconvs",
"attribute_filter",
"=",
"[",
"]",
"for",
"aconv",
"in",
"attrconvs",
":",
"if",
"aconv",
".",
"name_format",
"==",
"name_format",
":",
"all_attributes",
"=",
"{",
"v",
":",
"None",
"for",
"v",
"in",
"aconv",
".",
"_fro",
".",
"values",
"(",
")",
"}",
"attribute_filter",
"=",
"list",
"(",
"idp_policy",
".",
"restrict",
"(",
"all_attributes",
",",
"sp_entity_id",
",",
"idp",
".",
"metadata",
")",
".",
"keys",
"(",
")",
")",
"break",
"attribute_filter",
"=",
"self",
".",
"converter",
".",
"to_internal_filter",
"(",
"self",
".",
"attribute_profile",
",",
"attribute_filter",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Filter: %s\"",
"%",
"attribute_filter",
",",
"state",
")",
"return",
"attribute_filter"
] | Returns a list of approved attributes
:type idp: saml.server.Server
:type idp_policy: saml2.assertion.Policy
:type sp_entity_id: str
:type state: satosa.state.State
:rtype: list[str]
:param idp: The saml frontend idp server
:param idp_policy: The idp policy
:param sp_entity_id: The requesting sp entity id
:param state: The current state
:return: A list containing approved attributes | [
"Returns",
"a",
"list",
"of",
"approved",
"attributes"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L247-L274 |
250,809 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLFrontend._build_idp_config_endpoints | def _build_idp_config_endpoints(self, config, providers):
"""
Builds the final frontend module config
:type config: dict[str, Any]
:type providers: list[str]
:rtype: dict[str, Any]
:param config: The module config
:param providers: A list of backend names
:return: The final config
"""
# Add an endpoint to each provider
idp_endpoints = []
for endp_category in self.endpoints:
for func, endpoint in self.endpoints[endp_category].items():
for provider in providers:
_endpoint = "{base}/{provider}/{endpoint}".format(
base=self.base_url, provider=provider, endpoint=endpoint)
idp_endpoints.append((_endpoint, func))
config["service"]["idp"]["endpoints"][endp_category] = idp_endpoints
return config | python | def _build_idp_config_endpoints(self, config, providers):
# Add an endpoint to each provider
idp_endpoints = []
for endp_category in self.endpoints:
for func, endpoint in self.endpoints[endp_category].items():
for provider in providers:
_endpoint = "{base}/{provider}/{endpoint}".format(
base=self.base_url, provider=provider, endpoint=endpoint)
idp_endpoints.append((_endpoint, func))
config["service"]["idp"]["endpoints"][endp_category] = idp_endpoints
return config | [
"def",
"_build_idp_config_endpoints",
"(",
"self",
",",
"config",
",",
"providers",
")",
":",
"# Add an endpoint to each provider",
"idp_endpoints",
"=",
"[",
"]",
"for",
"endp_category",
"in",
"self",
".",
"endpoints",
":",
"for",
"func",
",",
"endpoint",
"in",
"self",
".",
"endpoints",
"[",
"endp_category",
"]",
".",
"items",
"(",
")",
":",
"for",
"provider",
"in",
"providers",
":",
"_endpoint",
"=",
"\"{base}/{provider}/{endpoint}\"",
".",
"format",
"(",
"base",
"=",
"self",
".",
"base_url",
",",
"provider",
"=",
"provider",
",",
"endpoint",
"=",
"endpoint",
")",
"idp_endpoints",
".",
"append",
"(",
"(",
"_endpoint",
",",
"func",
")",
")",
"config",
"[",
"\"service\"",
"]",
"[",
"\"idp\"",
"]",
"[",
"\"endpoints\"",
"]",
"[",
"endp_category",
"]",
"=",
"idp_endpoints",
"return",
"config"
] | Builds the final frontend module config
:type config: dict[str, Any]
:type providers: list[str]
:rtype: dict[str, Any]
:param config: The module config
:param providers: A list of backend names
:return: The final config | [
"Builds",
"the",
"final",
"frontend",
"module",
"config"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L522-L544 |
250,810 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLMirrorFrontend._load_endpoints_to_config | def _load_endpoints_to_config(self, provider, target_entity_id, config=None):
"""
Loads approved endpoints to the config.
:type url_base: str
:type provider: str
:type target_entity_id: str
:rtype: dict[str, Any]
:param url_base: The proxy base url
:param provider: target backend name
:param target_entity_id: frontend target entity id
:return: IDP config with endpoints
"""
idp_conf = copy.deepcopy(config or self.idp_config)
for service, endpoint in self.endpoints.items():
idp_endpoints = []
for binding, path in endpoint.items():
url = "{base}/{provider}/{target_id}/{path}".format(
base=self.base_url, provider=provider,
target_id=target_entity_id, path=path)
idp_endpoints.append((url, binding))
idp_conf["service"]["idp"]["endpoints"][service] = idp_endpoints
return idp_conf | python | def _load_endpoints_to_config(self, provider, target_entity_id, config=None):
idp_conf = copy.deepcopy(config or self.idp_config)
for service, endpoint in self.endpoints.items():
idp_endpoints = []
for binding, path in endpoint.items():
url = "{base}/{provider}/{target_id}/{path}".format(
base=self.base_url, provider=provider,
target_id=target_entity_id, path=path)
idp_endpoints.append((url, binding))
idp_conf["service"]["idp"]["endpoints"][service] = idp_endpoints
return idp_conf | [
"def",
"_load_endpoints_to_config",
"(",
"self",
",",
"provider",
",",
"target_entity_id",
",",
"config",
"=",
"None",
")",
":",
"idp_conf",
"=",
"copy",
".",
"deepcopy",
"(",
"config",
"or",
"self",
".",
"idp_config",
")",
"for",
"service",
",",
"endpoint",
"in",
"self",
".",
"endpoints",
".",
"items",
"(",
")",
":",
"idp_endpoints",
"=",
"[",
"]",
"for",
"binding",
",",
"path",
"in",
"endpoint",
".",
"items",
"(",
")",
":",
"url",
"=",
"\"{base}/{provider}/{target_id}/{path}\"",
".",
"format",
"(",
"base",
"=",
"self",
".",
"base_url",
",",
"provider",
"=",
"provider",
",",
"target_id",
"=",
"target_entity_id",
",",
"path",
"=",
"path",
")",
"idp_endpoints",
".",
"append",
"(",
"(",
"url",
",",
"binding",
")",
")",
"idp_conf",
"[",
"\"service\"",
"]",
"[",
"\"idp\"",
"]",
"[",
"\"endpoints\"",
"]",
"[",
"service",
"]",
"=",
"idp_endpoints",
"return",
"idp_conf"
] | Loads approved endpoints to the config.
:type url_base: str
:type provider: str
:type target_entity_id: str
:rtype: dict[str, Any]
:param url_base: The proxy base url
:param provider: target backend name
:param target_entity_id: frontend target entity id
:return: IDP config with endpoints | [
"Loads",
"approved",
"endpoints",
"to",
"the",
"config",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L564-L587 |
250,811 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLMirrorFrontend._load_idp_dynamic_entity_id | def _load_idp_dynamic_entity_id(self, state):
"""
Loads an idp server with the entity id saved in state
:type state: satosa.state.State
:rtype: saml.server.Server
:param state: The current state
:return: An idp server
"""
# Change the idp entity id dynamically
idp_config_file = copy.deepcopy(self.idp_config)
idp_config_file["entityid"] = "{}/{}".format(self.idp_config["entityid"], state[self.name]["target_entity_id"])
idp_config = IdPConfig().load(idp_config_file, metadata_construction=False)
return Server(config=idp_config) | python | def _load_idp_dynamic_entity_id(self, state):
# Change the idp entity id dynamically
idp_config_file = copy.deepcopy(self.idp_config)
idp_config_file["entityid"] = "{}/{}".format(self.idp_config["entityid"], state[self.name]["target_entity_id"])
idp_config = IdPConfig().load(idp_config_file, metadata_construction=False)
return Server(config=idp_config) | [
"def",
"_load_idp_dynamic_entity_id",
"(",
"self",
",",
"state",
")",
":",
"# Change the idp entity id dynamically",
"idp_config_file",
"=",
"copy",
".",
"deepcopy",
"(",
"self",
".",
"idp_config",
")",
"idp_config_file",
"[",
"\"entityid\"",
"]",
"=",
"\"{}/{}\"",
".",
"format",
"(",
"self",
".",
"idp_config",
"[",
"\"entityid\"",
"]",
",",
"state",
"[",
"self",
".",
"name",
"]",
"[",
"\"target_entity_id\"",
"]",
")",
"idp_config",
"=",
"IdPConfig",
"(",
")",
".",
"load",
"(",
"idp_config_file",
",",
"metadata_construction",
"=",
"False",
")",
"return",
"Server",
"(",
"config",
"=",
"idp_config",
")"
] | Loads an idp server with the entity id saved in state
:type state: satosa.state.State
:rtype: saml.server.Server
:param state: The current state
:return: An idp server | [
"Loads",
"an",
"idp",
"server",
"with",
"the",
"entity",
"id",
"saved",
"in",
"state"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L605-L619 |
250,812 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._get_co_name_from_path | def _get_co_name_from_path(self, context):
"""
The CO name is URL encoded and obtained from the request path
for a request coming into one of the standard binding endpoints.
For example the HTTP-Redirect binding request path will have the
format
{base}/{backend}/{co_name}/sso/redirect
:type context: satosa.context.Context
:rtype: str
:param context:
"""
url_encoded_co_name = context.path.split("/")[1]
co_name = unquote_plus(url_encoded_co_name)
return co_name | python | def _get_co_name_from_path(self, context):
url_encoded_co_name = context.path.split("/")[1]
co_name = unquote_plus(url_encoded_co_name)
return co_name | [
"def",
"_get_co_name_from_path",
"(",
"self",
",",
"context",
")",
":",
"url_encoded_co_name",
"=",
"context",
".",
"path",
".",
"split",
"(",
"\"/\"",
")",
"[",
"1",
"]",
"co_name",
"=",
"unquote_plus",
"(",
"url_encoded_co_name",
")",
"return",
"co_name"
] | The CO name is URL encoded and obtained from the request path
for a request coming into one of the standard binding endpoints.
For example the HTTP-Redirect binding request path will have the
format
{base}/{backend}/{co_name}/sso/redirect
:type context: satosa.context.Context
:rtype: str
:param context: | [
"The",
"CO",
"name",
"is",
"URL",
"encoded",
"and",
"obtained",
"from",
"the",
"request",
"path",
"for",
"a",
"request",
"coming",
"into",
"one",
"of",
"the",
"standard",
"binding",
"endpoints",
".",
"For",
"example",
"the",
"HTTP",
"-",
"Redirect",
"binding",
"request",
"path",
"will",
"have",
"the",
"format"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L750-L768 |
250,813 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._get_co_name | def _get_co_name(self, context):
"""
Obtain the CO name previously saved in the request state, or if not set
use the request path obtained from the current context to determine
the target CO.
:type context: The current context
:rtype: string
:param context: The current context
:return: CO name
"""
try:
co_name = context.state[self.name][self.KEY_CO_NAME]
logger.debug("Found CO {} from state".format(co_name))
except KeyError:
co_name = self._get_co_name_from_path(context)
logger.debug("Found CO {} from request path".format(co_name))
return co_name | python | def _get_co_name(self, context):
try:
co_name = context.state[self.name][self.KEY_CO_NAME]
logger.debug("Found CO {} from state".format(co_name))
except KeyError:
co_name = self._get_co_name_from_path(context)
logger.debug("Found CO {} from request path".format(co_name))
return co_name | [
"def",
"_get_co_name",
"(",
"self",
",",
"context",
")",
":",
"try",
":",
"co_name",
"=",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"[",
"self",
".",
"KEY_CO_NAME",
"]",
"logger",
".",
"debug",
"(",
"\"Found CO {} from state\"",
".",
"format",
"(",
"co_name",
")",
")",
"except",
"KeyError",
":",
"co_name",
"=",
"self",
".",
"_get_co_name_from_path",
"(",
"context",
")",
"logger",
".",
"debug",
"(",
"\"Found CO {} from request path\"",
".",
"format",
"(",
"co_name",
")",
")",
"return",
"co_name"
] | Obtain the CO name previously saved in the request state, or if not set
use the request path obtained from the current context to determine
the target CO.
:type context: The current context
:rtype: string
:param context: The current context
:return: CO name | [
"Obtain",
"the",
"CO",
"name",
"previously",
"saved",
"in",
"the",
"request",
"state",
"or",
"if",
"not",
"set",
"use",
"the",
"request",
"path",
"obtained",
"from",
"the",
"current",
"context",
"to",
"determine",
"the",
"target",
"CO",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L770-L789 |
250,814 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._add_endpoints_to_config | def _add_endpoints_to_config(self, config, co_name, backend_name):
"""
Use the request path from the context to determine the target backend,
then construct mappings from bindings to endpoints for the virtual
IdP for the CO.
The endpoint URLs have the form
{base}/{backend}/{co_name}/{path}
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:type backend_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:param backend_name: The target backend name
:return: config with mappings for CO IdP
"""
for service, endpoint in self.endpoints.items():
idp_endpoints = []
for binding, path in endpoint.items():
url = "{base}/{backend}/{co_name}/{path}".format(
base=self.base_url,
backend=backend_name,
co_name=quote_plus(co_name),
path=path)
mapping = (url, binding)
idp_endpoints.append(mapping)
# Overwrite the IdP config with the CO specific mappings between
# SAML binding and URL endpoints.
config["service"]["idp"]["endpoints"][service] = idp_endpoints
return config | python | def _add_endpoints_to_config(self, config, co_name, backend_name):
for service, endpoint in self.endpoints.items():
idp_endpoints = []
for binding, path in endpoint.items():
url = "{base}/{backend}/{co_name}/{path}".format(
base=self.base_url,
backend=backend_name,
co_name=quote_plus(co_name),
path=path)
mapping = (url, binding)
idp_endpoints.append(mapping)
# Overwrite the IdP config with the CO specific mappings between
# SAML binding and URL endpoints.
config["service"]["idp"]["endpoints"][service] = idp_endpoints
return config | [
"def",
"_add_endpoints_to_config",
"(",
"self",
",",
"config",
",",
"co_name",
",",
"backend_name",
")",
":",
"for",
"service",
",",
"endpoint",
"in",
"self",
".",
"endpoints",
".",
"items",
"(",
")",
":",
"idp_endpoints",
"=",
"[",
"]",
"for",
"binding",
",",
"path",
"in",
"endpoint",
".",
"items",
"(",
")",
":",
"url",
"=",
"\"{base}/{backend}/{co_name}/{path}\"",
".",
"format",
"(",
"base",
"=",
"self",
".",
"base_url",
",",
"backend",
"=",
"backend_name",
",",
"co_name",
"=",
"quote_plus",
"(",
"co_name",
")",
",",
"path",
"=",
"path",
")",
"mapping",
"=",
"(",
"url",
",",
"binding",
")",
"idp_endpoints",
".",
"append",
"(",
"mapping",
")",
"# Overwrite the IdP config with the CO specific mappings between",
"# SAML binding and URL endpoints.",
"config",
"[",
"\"service\"",
"]",
"[",
"\"idp\"",
"]",
"[",
"\"endpoints\"",
"]",
"[",
"service",
"]",
"=",
"idp_endpoints",
"return",
"config"
] | Use the request path from the context to determine the target backend,
then construct mappings from bindings to endpoints for the virtual
IdP for the CO.
The endpoint URLs have the form
{base}/{backend}/{co_name}/{path}
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:type backend_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:param backend_name: The target backend name
:return: config with mappings for CO IdP | [
"Use",
"the",
"request",
"path",
"from",
"the",
"context",
"to",
"determine",
"the",
"target",
"backend",
"then",
"construct",
"mappings",
"from",
"bindings",
"to",
"endpoints",
"for",
"the",
"virtual",
"IdP",
"for",
"the",
"CO",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L791-L828 |
250,815 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._add_entity_id | def _add_entity_id(self, config, co_name):
"""
Use the CO name to construct the entity ID for the virtual IdP
for the CO.
The entity ID has the form
{base_entity_id}/{co_name}
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:return: config with updated entity ID
"""
base_entity_id = config['entityid']
co_entity_id = "{}/{}".format(base_entity_id, quote_plus(co_name))
config['entityid'] = co_entity_id
return config | python | def _add_entity_id(self, config, co_name):
base_entity_id = config['entityid']
co_entity_id = "{}/{}".format(base_entity_id, quote_plus(co_name))
config['entityid'] = co_entity_id
return config | [
"def",
"_add_entity_id",
"(",
"self",
",",
"config",
",",
"co_name",
")",
":",
"base_entity_id",
"=",
"config",
"[",
"'entityid'",
"]",
"co_entity_id",
"=",
"\"{}/{}\"",
".",
"format",
"(",
"base_entity_id",
",",
"quote_plus",
"(",
"co_name",
")",
")",
"config",
"[",
"'entityid'",
"]",
"=",
"co_entity_id",
"return",
"config"
] | Use the CO name to construct the entity ID for the virtual IdP
for the CO.
The entity ID has the form
{base_entity_id}/{co_name}
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:return: config with updated entity ID | [
"Use",
"the",
"CO",
"name",
"to",
"construct",
"the",
"entity",
"ID",
"for",
"the",
"virtual",
"IdP",
"for",
"the",
"CO",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L830-L852 |
250,816 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._overlay_for_saml_metadata | def _overlay_for_saml_metadata(self, config, co_name):
"""
Overlay configuration details like organization and contact person
from the front end configuration onto the IdP configuration to
support SAML metadata generation.
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:return: config with updated details for SAML metadata
"""
for co in self.config[self.KEY_CO]:
if co[self.KEY_ENCODEABLE_NAME] == co_name:
break
key = self.KEY_ORGANIZATION
if key in co:
if key not in config:
config[key] = {}
for org_key in self.KEY_ORGANIZATION_KEYS:
if org_key in co[key]:
config[key][org_key] = co[key][org_key]
key = self.KEY_CONTACT_PERSON
if key in co:
config[key] = co[key]
return config | python | def _overlay_for_saml_metadata(self, config, co_name):
for co in self.config[self.KEY_CO]:
if co[self.KEY_ENCODEABLE_NAME] == co_name:
break
key = self.KEY_ORGANIZATION
if key in co:
if key not in config:
config[key] = {}
for org_key in self.KEY_ORGANIZATION_KEYS:
if org_key in co[key]:
config[key][org_key] = co[key][org_key]
key = self.KEY_CONTACT_PERSON
if key in co:
config[key] = co[key]
return config | [
"def",
"_overlay_for_saml_metadata",
"(",
"self",
",",
"config",
",",
"co_name",
")",
":",
"for",
"co",
"in",
"self",
".",
"config",
"[",
"self",
".",
"KEY_CO",
"]",
":",
"if",
"co",
"[",
"self",
".",
"KEY_ENCODEABLE_NAME",
"]",
"==",
"co_name",
":",
"break",
"key",
"=",
"self",
".",
"KEY_ORGANIZATION",
"if",
"key",
"in",
"co",
":",
"if",
"key",
"not",
"in",
"config",
":",
"config",
"[",
"key",
"]",
"=",
"{",
"}",
"for",
"org_key",
"in",
"self",
".",
"KEY_ORGANIZATION_KEYS",
":",
"if",
"org_key",
"in",
"co",
"[",
"key",
"]",
":",
"config",
"[",
"key",
"]",
"[",
"org_key",
"]",
"=",
"co",
"[",
"key",
"]",
"[",
"org_key",
"]",
"key",
"=",
"self",
".",
"KEY_CONTACT_PERSON",
"if",
"key",
"in",
"co",
":",
"config",
"[",
"key",
"]",
"=",
"co",
"[",
"key",
"]",
"return",
"config"
] | Overlay configuration details like organization and contact person
from the front end configuration onto the IdP configuration to
support SAML metadata generation.
:type config: satosa.satosa_config.SATOSAConfig
:type co_name: str
:rtype: satosa.satosa_config.SATOSAConfig
:param config: satosa proxy config
:param co_name: CO name
:return: config with updated details for SAML metadata | [
"Overlay",
"configuration",
"details",
"like",
"organization",
"and",
"contact",
"person",
"from",
"the",
"front",
"end",
"configuration",
"onto",
"the",
"IdP",
"configuration",
"to",
"support",
"SAML",
"metadata",
"generation",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L854-L885 |
250,817 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._co_names_from_config | def _co_names_from_config(self):
"""
Parse the configuration for the names of the COs for which to
construct virtual IdPs.
:rtype: [str]
:return: list of CO names
"""
co_names = [co[self.KEY_ENCODEABLE_NAME] for
co in self.config[self.KEY_CO]]
return co_names | python | def _co_names_from_config(self):
co_names = [co[self.KEY_ENCODEABLE_NAME] for
co in self.config[self.KEY_CO]]
return co_names | [
"def",
"_co_names_from_config",
"(",
"self",
")",
":",
"co_names",
"=",
"[",
"co",
"[",
"self",
".",
"KEY_ENCODEABLE_NAME",
"]",
"for",
"co",
"in",
"self",
".",
"config",
"[",
"self",
".",
"KEY_CO",
"]",
"]",
"return",
"co_names"
] | Parse the configuration for the names of the COs for which to
construct virtual IdPs.
:rtype: [str]
:return: list of CO names | [
"Parse",
"the",
"configuration",
"for",
"the",
"names",
"of",
"the",
"COs",
"for",
"which",
"to",
"construct",
"virtual",
"IdPs",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L887-L899 |
250,818 | IdentityPython/SATOSA | src/satosa/frontends/saml2.py | SAMLVirtualCoFrontend._create_co_virtual_idp | def _create_co_virtual_idp(self, context):
"""
Create a virtual IdP to represent the CO.
:type context: The current context
:rtype: saml.server.Server
:param context:
:return: An idp server
"""
co_name = self._get_co_name(context)
context.decorate(self.KEY_CO_NAME, co_name)
# Verify that we are configured for this CO. If the CO was not
# configured most likely the endpoint used was not registered and
# SATOSA core code threw an exception before getting here, but we
# include this check in case later the regex used to register the
# endpoints is relaxed.
co_names = self._co_names_from_config()
if co_name not in co_names:
msg = "CO {} not in configured list of COs {}".format(co_name,
co_names)
satosa_logging(logger, logging.WARN, msg, context.state)
raise SATOSAError(msg)
# Make a copy of the general IdP config that we will then overwrite
# with mappings between SAML bindings and CO specific URL endpoints,
# and the entityID for the CO virtual IdP.
backend_name = context.target_backend
idp_config = copy.deepcopy(self.idp_config)
idp_config = self._add_endpoints_to_config(idp_config,
co_name,
backend_name)
idp_config = self._add_entity_id(idp_config, co_name)
# Use the overwritten IdP config to generate a pysaml2 config object
# and from it a server object.
pysaml2_idp_config = IdPConfig().load(idp_config,
metadata_construction=False)
server = Server(config=pysaml2_idp_config)
return server | python | def _create_co_virtual_idp(self, context):
co_name = self._get_co_name(context)
context.decorate(self.KEY_CO_NAME, co_name)
# Verify that we are configured for this CO. If the CO was not
# configured most likely the endpoint used was not registered and
# SATOSA core code threw an exception before getting here, but we
# include this check in case later the regex used to register the
# endpoints is relaxed.
co_names = self._co_names_from_config()
if co_name not in co_names:
msg = "CO {} not in configured list of COs {}".format(co_name,
co_names)
satosa_logging(logger, logging.WARN, msg, context.state)
raise SATOSAError(msg)
# Make a copy of the general IdP config that we will then overwrite
# with mappings between SAML bindings and CO specific URL endpoints,
# and the entityID for the CO virtual IdP.
backend_name = context.target_backend
idp_config = copy.deepcopy(self.idp_config)
idp_config = self._add_endpoints_to_config(idp_config,
co_name,
backend_name)
idp_config = self._add_entity_id(idp_config, co_name)
# Use the overwritten IdP config to generate a pysaml2 config object
# and from it a server object.
pysaml2_idp_config = IdPConfig().load(idp_config,
metadata_construction=False)
server = Server(config=pysaml2_idp_config)
return server | [
"def",
"_create_co_virtual_idp",
"(",
"self",
",",
"context",
")",
":",
"co_name",
"=",
"self",
".",
"_get_co_name",
"(",
"context",
")",
"context",
".",
"decorate",
"(",
"self",
".",
"KEY_CO_NAME",
",",
"co_name",
")",
"# Verify that we are configured for this CO. If the CO was not",
"# configured most likely the endpoint used was not registered and",
"# SATOSA core code threw an exception before getting here, but we",
"# include this check in case later the regex used to register the",
"# endpoints is relaxed.",
"co_names",
"=",
"self",
".",
"_co_names_from_config",
"(",
")",
"if",
"co_name",
"not",
"in",
"co_names",
":",
"msg",
"=",
"\"CO {} not in configured list of COs {}\"",
".",
"format",
"(",
"co_name",
",",
"co_names",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"WARN",
",",
"msg",
",",
"context",
".",
"state",
")",
"raise",
"SATOSAError",
"(",
"msg",
")",
"# Make a copy of the general IdP config that we will then overwrite",
"# with mappings between SAML bindings and CO specific URL endpoints,",
"# and the entityID for the CO virtual IdP.",
"backend_name",
"=",
"context",
".",
"target_backend",
"idp_config",
"=",
"copy",
".",
"deepcopy",
"(",
"self",
".",
"idp_config",
")",
"idp_config",
"=",
"self",
".",
"_add_endpoints_to_config",
"(",
"idp_config",
",",
"co_name",
",",
"backend_name",
")",
"idp_config",
"=",
"self",
".",
"_add_entity_id",
"(",
"idp_config",
",",
"co_name",
")",
"# Use the overwritten IdP config to generate a pysaml2 config object",
"# and from it a server object.",
"pysaml2_idp_config",
"=",
"IdPConfig",
"(",
")",
".",
"load",
"(",
"idp_config",
",",
"metadata_construction",
"=",
"False",
")",
"server",
"=",
"Server",
"(",
"config",
"=",
"pysaml2_idp_config",
")",
"return",
"server"
] | Create a virtual IdP to represent the CO.
:type context: The current context
:rtype: saml.server.Server
:param context:
:return: An idp server | [
"Create",
"a",
"virtual",
"IdP",
"to",
"represent",
"the",
"CO",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/frontends/saml2.py#L901-L943 |
250,819 | IdentityPython/SATOSA | src/satosa/backends/oauth.py | _OAuthBackend._authn_response | def _authn_response(self, context):
"""
Handles the authentication response from the AS.
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The context in SATOSA
:return: A SATOSA response. This method is only responsible to call the callback function
which generates the Response object.
"""
state_data = context.state[self.name]
aresp = self.consumer.parse_response(AuthorizationResponse, info=json.dumps(context.request))
self._verify_state(aresp, state_data, context.state)
rargs = {"code": aresp["code"], "redirect_uri": self.redirect_url,
"state": state_data["state"]}
atresp = self.consumer.do_access_token_request(request_args=rargs, state=aresp["state"])
if "verify_accesstoken_state" not in self.config or self.config["verify_accesstoken_state"]:
self._verify_state(atresp, state_data, context.state)
user_info = self.user_information(atresp["access_token"])
internal_response = InternalData(auth_info=self.auth_info(context.request))
internal_response.attributes = self.converter.to_internal(self.external_type, user_info)
internal_response.subject_id = user_info[self.user_id_attr]
del context.state[self.name]
return self.auth_callback_func(context, internal_response) | python | def _authn_response(self, context):
state_data = context.state[self.name]
aresp = self.consumer.parse_response(AuthorizationResponse, info=json.dumps(context.request))
self._verify_state(aresp, state_data, context.state)
rargs = {"code": aresp["code"], "redirect_uri": self.redirect_url,
"state": state_data["state"]}
atresp = self.consumer.do_access_token_request(request_args=rargs, state=aresp["state"])
if "verify_accesstoken_state" not in self.config or self.config["verify_accesstoken_state"]:
self._verify_state(atresp, state_data, context.state)
user_info = self.user_information(atresp["access_token"])
internal_response = InternalData(auth_info=self.auth_info(context.request))
internal_response.attributes = self.converter.to_internal(self.external_type, user_info)
internal_response.subject_id = user_info[self.user_id_attr]
del context.state[self.name]
return self.auth_callback_func(context, internal_response) | [
"def",
"_authn_response",
"(",
"self",
",",
"context",
")",
":",
"state_data",
"=",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"aresp",
"=",
"self",
".",
"consumer",
".",
"parse_response",
"(",
"AuthorizationResponse",
",",
"info",
"=",
"json",
".",
"dumps",
"(",
"context",
".",
"request",
")",
")",
"self",
".",
"_verify_state",
"(",
"aresp",
",",
"state_data",
",",
"context",
".",
"state",
")",
"rargs",
"=",
"{",
"\"code\"",
":",
"aresp",
"[",
"\"code\"",
"]",
",",
"\"redirect_uri\"",
":",
"self",
".",
"redirect_url",
",",
"\"state\"",
":",
"state_data",
"[",
"\"state\"",
"]",
"}",
"atresp",
"=",
"self",
".",
"consumer",
".",
"do_access_token_request",
"(",
"request_args",
"=",
"rargs",
",",
"state",
"=",
"aresp",
"[",
"\"state\"",
"]",
")",
"if",
"\"verify_accesstoken_state\"",
"not",
"in",
"self",
".",
"config",
"or",
"self",
".",
"config",
"[",
"\"verify_accesstoken_state\"",
"]",
":",
"self",
".",
"_verify_state",
"(",
"atresp",
",",
"state_data",
",",
"context",
".",
"state",
")",
"user_info",
"=",
"self",
".",
"user_information",
"(",
"atresp",
"[",
"\"access_token\"",
"]",
")",
"internal_response",
"=",
"InternalData",
"(",
"auth_info",
"=",
"self",
".",
"auth_info",
"(",
"context",
".",
"request",
")",
")",
"internal_response",
".",
"attributes",
"=",
"self",
".",
"converter",
".",
"to_internal",
"(",
"self",
".",
"external_type",
",",
"user_info",
")",
"internal_response",
".",
"subject_id",
"=",
"user_info",
"[",
"self",
".",
"user_id_attr",
"]",
"del",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"return",
"self",
".",
"auth_callback_func",
"(",
"context",
",",
"internal_response",
")"
] | Handles the authentication response from the AS.
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The context in SATOSA
:return: A SATOSA response. This method is only responsible to call the callback function
which generates the Response object. | [
"Handles",
"the",
"authentication",
"response",
"from",
"the",
"AS",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/backends/oauth.py#L117-L143 |
250,820 | IdentityPython/SATOSA | src/satosa/util.py | hash_data | def hash_data(salt, value, hash_alg=None):
"""
Hashes a value together with a salt with the given hash algorithm.
:type salt: str
:type hash_alg: str
:type value: str
:param salt: hash salt
:param hash_alg: the hash algorithm to use (default: SHA512)
:param value: value to hash together with the salt
:return: hashed value
"""
hash_alg = hash_alg or 'sha512'
hasher = hashlib.new(hash_alg)
hasher.update(value.encode('utf-8'))
hasher.update(salt.encode('utf-8'))
value_hashed = hasher.hexdigest()
return value_hashed | python | def hash_data(salt, value, hash_alg=None):
hash_alg = hash_alg or 'sha512'
hasher = hashlib.new(hash_alg)
hasher.update(value.encode('utf-8'))
hasher.update(salt.encode('utf-8'))
value_hashed = hasher.hexdigest()
return value_hashed | [
"def",
"hash_data",
"(",
"salt",
",",
"value",
",",
"hash_alg",
"=",
"None",
")",
":",
"hash_alg",
"=",
"hash_alg",
"or",
"'sha512'",
"hasher",
"=",
"hashlib",
".",
"new",
"(",
"hash_alg",
")",
"hasher",
".",
"update",
"(",
"value",
".",
"encode",
"(",
"'utf-8'",
")",
")",
"hasher",
".",
"update",
"(",
"salt",
".",
"encode",
"(",
"'utf-8'",
")",
")",
"value_hashed",
"=",
"hasher",
".",
"hexdigest",
"(",
")",
"return",
"value_hashed"
] | Hashes a value together with a salt with the given hash algorithm.
:type salt: str
:type hash_alg: str
:type value: str
:param salt: hash salt
:param hash_alg: the hash algorithm to use (default: SHA512)
:param value: value to hash together with the salt
:return: hashed value | [
"Hashes",
"a",
"value",
"together",
"with",
"a",
"salt",
"with",
"the",
"given",
"hash",
"algorithm",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/util.py#L15-L32 |
250,821 | IdentityPython/SATOSA | src/satosa/micro_services/ldap_attribute_store.py | LdapAttributeStore._construct_filter_value | def _construct_filter_value(self, candidate, data):
"""
Construct and return a LDAP directory search filter value from the
candidate identifier.
Argument 'canidate' is a dictionary with one required key and
two optional keys:
key required value
--------------- -------- ---------------------------------
attribute_names Y list of identifier names
name_id_format N NameID format (string)
add_scope N "issuer_entityid" or other string
Argument 'data' is that object passed into the microservice
method process().
If the attribute_names list consists of more than one identifier
name then the values of the identifiers will be concatenated together
to create the filter value.
If one of the identifier names in the attribute_names is the string
'name_id' then the NameID value with format name_id_format
will be concatenated to the filter value.
If the add_scope key is present with value 'issuer_entityid' then the
entityID for the IdP will be concatenated to "scope" the value. If the
string is any other value it will be directly concatenated.
"""
context = self.context
attributes = data.attributes
satosa_logging(logger, logging.DEBUG, "Input attributes {}".format(attributes), context.state)
# Get the values configured list of identifier names for this candidate
# and substitute None if there are no values for a configured identifier.
values = []
for identifier_name in candidate['attribute_names']:
v = attributes.get(identifier_name, None)
if isinstance(v, list):
v = v[0]
values.append(v)
satosa_logging(logger, logging.DEBUG, "Found candidate values {}".format(values), context.state)
# If one of the configured identifier names is name_id then if there is also a configured
# name_id_format add the value for the NameID of that format if it was asserted by the IdP
# or else add the value None.
if 'name_id' in candidate['attribute_names']:
candidate_nameid_value = None
candidate_name_id_format = candidate.get('name_id_format')
name_id_value = data.subject_id
name_id_format = data.subject_type
if (
name_id_value
and candidate_name_id_format
and candidate_name_id_format == name_id_format
):
satosa_logging(logger, logging.DEBUG, "IdP asserted NameID {}".format(name_id_value), context.state)
candidate_nameid_value = name_id_value
# Only add the NameID value asserted by the IdP if it is not already
# in the list of values. This is necessary because some non-compliant IdPs
# have been known, for example, to assert the value of eduPersonPrincipalName
# in the value for SAML2 persistent NameID as well as asserting
# eduPersonPrincipalName.
if candidate_nameid_value not in values:
satosa_logging(logger, logging.DEBUG, "Added NameID {} to candidate values".format(candidate_nameid_value), context.state)
values.append(candidate_nameid_value)
else:
satosa_logging(logger, logging.WARN, "NameID {} value also asserted as attribute value".format(candidate_nameid_value), context.state)
# If no value was asserted by the IdP for one of the configured list of identifier names
# for this candidate then go onto the next candidate.
if None in values:
satosa_logging(logger, logging.DEBUG, "Candidate is missing value so skipping", context.state)
return None
# All values for the configured list of attribute names are present
# so we can create a value. Add a scope if configured
# to do so.
if 'add_scope' in candidate:
if candidate['add_scope'] == 'issuer_entityid':
scope = data.auth_info.issuer
else:
scope = candidate['add_scope']
satosa_logging(logger, logging.DEBUG, "Added scope {} to values".format(scope), context.state)
values.append(scope)
# Concatenate all values to create the filter value.
value = ''.join(values)
satosa_logging(logger, logging.DEBUG, "Constructed filter value {}".format(value), context.state)
return value | python | def _construct_filter_value(self, candidate, data):
context = self.context
attributes = data.attributes
satosa_logging(logger, logging.DEBUG, "Input attributes {}".format(attributes), context.state)
# Get the values configured list of identifier names for this candidate
# and substitute None if there are no values for a configured identifier.
values = []
for identifier_name in candidate['attribute_names']:
v = attributes.get(identifier_name, None)
if isinstance(v, list):
v = v[0]
values.append(v)
satosa_logging(logger, logging.DEBUG, "Found candidate values {}".format(values), context.state)
# If one of the configured identifier names is name_id then if there is also a configured
# name_id_format add the value for the NameID of that format if it was asserted by the IdP
# or else add the value None.
if 'name_id' in candidate['attribute_names']:
candidate_nameid_value = None
candidate_name_id_format = candidate.get('name_id_format')
name_id_value = data.subject_id
name_id_format = data.subject_type
if (
name_id_value
and candidate_name_id_format
and candidate_name_id_format == name_id_format
):
satosa_logging(logger, logging.DEBUG, "IdP asserted NameID {}".format(name_id_value), context.state)
candidate_nameid_value = name_id_value
# Only add the NameID value asserted by the IdP if it is not already
# in the list of values. This is necessary because some non-compliant IdPs
# have been known, for example, to assert the value of eduPersonPrincipalName
# in the value for SAML2 persistent NameID as well as asserting
# eduPersonPrincipalName.
if candidate_nameid_value not in values:
satosa_logging(logger, logging.DEBUG, "Added NameID {} to candidate values".format(candidate_nameid_value), context.state)
values.append(candidate_nameid_value)
else:
satosa_logging(logger, logging.WARN, "NameID {} value also asserted as attribute value".format(candidate_nameid_value), context.state)
# If no value was asserted by the IdP for one of the configured list of identifier names
# for this candidate then go onto the next candidate.
if None in values:
satosa_logging(logger, logging.DEBUG, "Candidate is missing value so skipping", context.state)
return None
# All values for the configured list of attribute names are present
# so we can create a value. Add a scope if configured
# to do so.
if 'add_scope' in candidate:
if candidate['add_scope'] == 'issuer_entityid':
scope = data.auth_info.issuer
else:
scope = candidate['add_scope']
satosa_logging(logger, logging.DEBUG, "Added scope {} to values".format(scope), context.state)
values.append(scope)
# Concatenate all values to create the filter value.
value = ''.join(values)
satosa_logging(logger, logging.DEBUG, "Constructed filter value {}".format(value), context.state)
return value | [
"def",
"_construct_filter_value",
"(",
"self",
",",
"candidate",
",",
"data",
")",
":",
"context",
"=",
"self",
".",
"context",
"attributes",
"=",
"data",
".",
"attributes",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Input attributes {}\"",
".",
"format",
"(",
"attributes",
")",
",",
"context",
".",
"state",
")",
"# Get the values configured list of identifier names for this candidate",
"# and substitute None if there are no values for a configured identifier.",
"values",
"=",
"[",
"]",
"for",
"identifier_name",
"in",
"candidate",
"[",
"'attribute_names'",
"]",
":",
"v",
"=",
"attributes",
".",
"get",
"(",
"identifier_name",
",",
"None",
")",
"if",
"isinstance",
"(",
"v",
",",
"list",
")",
":",
"v",
"=",
"v",
"[",
"0",
"]",
"values",
".",
"append",
"(",
"v",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Found candidate values {}\"",
".",
"format",
"(",
"values",
")",
",",
"context",
".",
"state",
")",
"# If one of the configured identifier names is name_id then if there is also a configured",
"# name_id_format add the value for the NameID of that format if it was asserted by the IdP",
"# or else add the value None.",
"if",
"'name_id'",
"in",
"candidate",
"[",
"'attribute_names'",
"]",
":",
"candidate_nameid_value",
"=",
"None",
"candidate_name_id_format",
"=",
"candidate",
".",
"get",
"(",
"'name_id_format'",
")",
"name_id_value",
"=",
"data",
".",
"subject_id",
"name_id_format",
"=",
"data",
".",
"subject_type",
"if",
"(",
"name_id_value",
"and",
"candidate_name_id_format",
"and",
"candidate_name_id_format",
"==",
"name_id_format",
")",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"IdP asserted NameID {}\"",
".",
"format",
"(",
"name_id_value",
")",
",",
"context",
".",
"state",
")",
"candidate_nameid_value",
"=",
"name_id_value",
"# Only add the NameID value asserted by the IdP if it is not already",
"# in the list of values. This is necessary because some non-compliant IdPs",
"# have been known, for example, to assert the value of eduPersonPrincipalName",
"# in the value for SAML2 persistent NameID as well as asserting",
"# eduPersonPrincipalName.",
"if",
"candidate_nameid_value",
"not",
"in",
"values",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Added NameID {} to candidate values\"",
".",
"format",
"(",
"candidate_nameid_value",
")",
",",
"context",
".",
"state",
")",
"values",
".",
"append",
"(",
"candidate_nameid_value",
")",
"else",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"WARN",
",",
"\"NameID {} value also asserted as attribute value\"",
".",
"format",
"(",
"candidate_nameid_value",
")",
",",
"context",
".",
"state",
")",
"# If no value was asserted by the IdP for one of the configured list of identifier names",
"# for this candidate then go onto the next candidate.",
"if",
"None",
"in",
"values",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Candidate is missing value so skipping\"",
",",
"context",
".",
"state",
")",
"return",
"None",
"# All values for the configured list of attribute names are present",
"# so we can create a value. Add a scope if configured",
"# to do so.",
"if",
"'add_scope'",
"in",
"candidate",
":",
"if",
"candidate",
"[",
"'add_scope'",
"]",
"==",
"'issuer_entityid'",
":",
"scope",
"=",
"data",
".",
"auth_info",
".",
"issuer",
"else",
":",
"scope",
"=",
"candidate",
"[",
"'add_scope'",
"]",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Added scope {} to values\"",
".",
"format",
"(",
"scope",
")",
",",
"context",
".",
"state",
")",
"values",
".",
"append",
"(",
"scope",
")",
"# Concatenate all values to create the filter value.",
"value",
"=",
"''",
".",
"join",
"(",
"values",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Constructed filter value {}\"",
".",
"format",
"(",
"value",
")",
",",
"context",
".",
"state",
")",
"return",
"value"
] | Construct and return a LDAP directory search filter value from the
candidate identifier.
Argument 'canidate' is a dictionary with one required key and
two optional keys:
key required value
--------------- -------- ---------------------------------
attribute_names Y list of identifier names
name_id_format N NameID format (string)
add_scope N "issuer_entityid" or other string
Argument 'data' is that object passed into the microservice
method process().
If the attribute_names list consists of more than one identifier
name then the values of the identifiers will be concatenated together
to create the filter value.
If one of the identifier names in the attribute_names is the string
'name_id' then the NameID value with format name_id_format
will be concatenated to the filter value.
If the add_scope key is present with value 'issuer_entityid' then the
entityID for the IdP will be concatenated to "scope" the value. If the
string is any other value it will be directly concatenated. | [
"Construct",
"and",
"return",
"a",
"LDAP",
"directory",
"search",
"filter",
"value",
"from",
"the",
"candidate",
"identifier",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/ldap_attribute_store.py#L119-L214 |
250,822 | IdentityPython/SATOSA | src/satosa/micro_services/ldap_attribute_store.py | LdapAttributeStore._filter_config | def _filter_config(self, config, fields=None):
"""
Filter sensitive details like passwords from a configuration
dictionary.
"""
filter_fields_default = [
'bind_password',
'connection'
]
filter_fields = fields or filter_fields_default
return dict(
map(
lambda key: (key, '<hidden>' if key in filter_fields else config[key]),
config.keys()
)
) | python | def _filter_config(self, config, fields=None):
filter_fields_default = [
'bind_password',
'connection'
]
filter_fields = fields or filter_fields_default
return dict(
map(
lambda key: (key, '<hidden>' if key in filter_fields else config[key]),
config.keys()
)
) | [
"def",
"_filter_config",
"(",
"self",
",",
"config",
",",
"fields",
"=",
"None",
")",
":",
"filter_fields_default",
"=",
"[",
"'bind_password'",
",",
"'connection'",
"]",
"filter_fields",
"=",
"fields",
"or",
"filter_fields_default",
"return",
"dict",
"(",
"map",
"(",
"lambda",
"key",
":",
"(",
"key",
",",
"'<hidden>'",
"if",
"key",
"in",
"filter_fields",
"else",
"config",
"[",
"key",
"]",
")",
",",
"config",
".",
"keys",
"(",
")",
")",
")"
] | Filter sensitive details like passwords from a configuration
dictionary. | [
"Filter",
"sensitive",
"details",
"like",
"passwords",
"from",
"a",
"configuration",
"dictionary",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/ldap_attribute_store.py#L216-L232 |
250,823 | IdentityPython/SATOSA | src/satosa/micro_services/ldap_attribute_store.py | LdapAttributeStore._ldap_connection_factory | def _ldap_connection_factory(self, config):
"""
Use the input configuration to instantiate and return
a ldap3 Connection object.
"""
ldap_url = config['ldap_url']
bind_dn = config['bind_dn']
bind_password = config['bind_password']
if not ldap_url:
raise LdapAttributeStoreError("ldap_url is not configured")
if not bind_dn:
raise LdapAttributeStoreError("bind_dn is not configured")
if not bind_password:
raise LdapAttributeStoreError("bind_password is not configured")
pool_size = config['pool_size']
pool_keepalive = config['pool_keepalive']
server = ldap3.Server(config['ldap_url'])
satosa_logging(logger, logging.DEBUG, "Creating a new LDAP connection", None)
satosa_logging(logger, logging.DEBUG, "Using LDAP URL {}".format(ldap_url), None)
satosa_logging(logger, logging.DEBUG, "Using bind DN {}".format(bind_dn), None)
satosa_logging(logger, logging.DEBUG, "Using pool size {}".format(pool_size), None)
satosa_logging(logger, logging.DEBUG, "Using pool keep alive {}".format(pool_keepalive), None)
try:
connection = ldap3.Connection(
server,
bind_dn,
bind_password,
auto_bind=True,
client_strategy=ldap3.REUSABLE,
pool_size=pool_size,
pool_keepalive=pool_keepalive
)
except LDAPException as e:
msg = "Caught exception when connecting to LDAP server: {}".format(e)
satosa_logging(logger, logging.ERROR, msg, None)
raise LdapAttributeStoreError(msg)
satosa_logging(logger, logging.DEBUG, "Successfully connected to LDAP server", None)
return connection | python | def _ldap_connection_factory(self, config):
ldap_url = config['ldap_url']
bind_dn = config['bind_dn']
bind_password = config['bind_password']
if not ldap_url:
raise LdapAttributeStoreError("ldap_url is not configured")
if not bind_dn:
raise LdapAttributeStoreError("bind_dn is not configured")
if not bind_password:
raise LdapAttributeStoreError("bind_password is not configured")
pool_size = config['pool_size']
pool_keepalive = config['pool_keepalive']
server = ldap3.Server(config['ldap_url'])
satosa_logging(logger, logging.DEBUG, "Creating a new LDAP connection", None)
satosa_logging(logger, logging.DEBUG, "Using LDAP URL {}".format(ldap_url), None)
satosa_logging(logger, logging.DEBUG, "Using bind DN {}".format(bind_dn), None)
satosa_logging(logger, logging.DEBUG, "Using pool size {}".format(pool_size), None)
satosa_logging(logger, logging.DEBUG, "Using pool keep alive {}".format(pool_keepalive), None)
try:
connection = ldap3.Connection(
server,
bind_dn,
bind_password,
auto_bind=True,
client_strategy=ldap3.REUSABLE,
pool_size=pool_size,
pool_keepalive=pool_keepalive
)
except LDAPException as e:
msg = "Caught exception when connecting to LDAP server: {}".format(e)
satosa_logging(logger, logging.ERROR, msg, None)
raise LdapAttributeStoreError(msg)
satosa_logging(logger, logging.DEBUG, "Successfully connected to LDAP server", None)
return connection | [
"def",
"_ldap_connection_factory",
"(",
"self",
",",
"config",
")",
":",
"ldap_url",
"=",
"config",
"[",
"'ldap_url'",
"]",
"bind_dn",
"=",
"config",
"[",
"'bind_dn'",
"]",
"bind_password",
"=",
"config",
"[",
"'bind_password'",
"]",
"if",
"not",
"ldap_url",
":",
"raise",
"LdapAttributeStoreError",
"(",
"\"ldap_url is not configured\"",
")",
"if",
"not",
"bind_dn",
":",
"raise",
"LdapAttributeStoreError",
"(",
"\"bind_dn is not configured\"",
")",
"if",
"not",
"bind_password",
":",
"raise",
"LdapAttributeStoreError",
"(",
"\"bind_password is not configured\"",
")",
"pool_size",
"=",
"config",
"[",
"'pool_size'",
"]",
"pool_keepalive",
"=",
"config",
"[",
"'pool_keepalive'",
"]",
"server",
"=",
"ldap3",
".",
"Server",
"(",
"config",
"[",
"'ldap_url'",
"]",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Creating a new LDAP connection\"",
",",
"None",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Using LDAP URL {}\"",
".",
"format",
"(",
"ldap_url",
")",
",",
"None",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Using bind DN {}\"",
".",
"format",
"(",
"bind_dn",
")",
",",
"None",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Using pool size {}\"",
".",
"format",
"(",
"pool_size",
")",
",",
"None",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Using pool keep alive {}\"",
".",
"format",
"(",
"pool_keepalive",
")",
",",
"None",
")",
"try",
":",
"connection",
"=",
"ldap3",
".",
"Connection",
"(",
"server",
",",
"bind_dn",
",",
"bind_password",
",",
"auto_bind",
"=",
"True",
",",
"client_strategy",
"=",
"ldap3",
".",
"REUSABLE",
",",
"pool_size",
"=",
"pool_size",
",",
"pool_keepalive",
"=",
"pool_keepalive",
")",
"except",
"LDAPException",
"as",
"e",
":",
"msg",
"=",
"\"Caught exception when connecting to LDAP server: {}\"",
".",
"format",
"(",
"e",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"msg",
",",
"None",
")",
"raise",
"LdapAttributeStoreError",
"(",
"msg",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Successfully connected to LDAP server\"",
",",
"None",
")",
"return",
"connection"
] | Use the input configuration to instantiate and return
a ldap3 Connection object. | [
"Use",
"the",
"input",
"configuration",
"to",
"instantiate",
"and",
"return",
"a",
"ldap3",
"Connection",
"object",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/ldap_attribute_store.py#L234-L279 |
250,824 | IdentityPython/SATOSA | src/satosa/micro_services/ldap_attribute_store.py | LdapAttributeStore._populate_attributes | def _populate_attributes(self, config, record, context, data):
"""
Use a record found in LDAP to populate attributes.
"""
search_return_attributes = config['search_return_attributes']
for attr in search_return_attributes.keys():
if attr in record["attributes"]:
if record["attributes"][attr]:
data.attributes[search_return_attributes[attr]] = record["attributes"][attr]
satosa_logging(
logger,
logging.DEBUG,
"Setting internal attribute {} with values {}".format(
search_return_attributes[attr],
record["attributes"][attr]
),
context.state
)
else:
satosa_logging(
logger,
logging.DEBUG,
"Not setting internal attribute {} because value {} is null or empty".format(
search_return_attributes[attr],
record["attributes"][attr]
),
context.state
) | python | def _populate_attributes(self, config, record, context, data):
search_return_attributes = config['search_return_attributes']
for attr in search_return_attributes.keys():
if attr in record["attributes"]:
if record["attributes"][attr]:
data.attributes[search_return_attributes[attr]] = record["attributes"][attr]
satosa_logging(
logger,
logging.DEBUG,
"Setting internal attribute {} with values {}".format(
search_return_attributes[attr],
record["attributes"][attr]
),
context.state
)
else:
satosa_logging(
logger,
logging.DEBUG,
"Not setting internal attribute {} because value {} is null or empty".format(
search_return_attributes[attr],
record["attributes"][attr]
),
context.state
) | [
"def",
"_populate_attributes",
"(",
"self",
",",
"config",
",",
"record",
",",
"context",
",",
"data",
")",
":",
"search_return_attributes",
"=",
"config",
"[",
"'search_return_attributes'",
"]",
"for",
"attr",
"in",
"search_return_attributes",
".",
"keys",
"(",
")",
":",
"if",
"attr",
"in",
"record",
"[",
"\"attributes\"",
"]",
":",
"if",
"record",
"[",
"\"attributes\"",
"]",
"[",
"attr",
"]",
":",
"data",
".",
"attributes",
"[",
"search_return_attributes",
"[",
"attr",
"]",
"]",
"=",
"record",
"[",
"\"attributes\"",
"]",
"[",
"attr",
"]",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Setting internal attribute {} with values {}\"",
".",
"format",
"(",
"search_return_attributes",
"[",
"attr",
"]",
",",
"record",
"[",
"\"attributes\"",
"]",
"[",
"attr",
"]",
")",
",",
"context",
".",
"state",
")",
"else",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Not setting internal attribute {} because value {} is null or empty\"",
".",
"format",
"(",
"search_return_attributes",
"[",
"attr",
"]",
",",
"record",
"[",
"\"attributes\"",
"]",
"[",
"attr",
"]",
")",
",",
"context",
".",
"state",
")"
] | Use a record found in LDAP to populate attributes. | [
"Use",
"a",
"record",
"found",
"in",
"LDAP",
"to",
"populate",
"attributes",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/ldap_attribute_store.py#L281-L308 |
250,825 | IdentityPython/SATOSA | src/satosa/micro_services/ldap_attribute_store.py | LdapAttributeStore._populate_input_for_name_id | def _populate_input_for_name_id(self, config, record, context, data):
"""
Use a record found in LDAP to populate input for
NameID generation.
"""
user_id = ""
user_id_from_attrs = config['user_id_from_attrs']
for attr in user_id_from_attrs:
if attr in record["attributes"]:
value = record["attributes"][attr]
if isinstance(value, list):
# Use a default sort to ensure some predictability since the
# LDAP directory server may return multi-valued attributes
# in any order.
value.sort()
user_id += "".join(value)
satosa_logging(
logger,
logging.DEBUG,
"Added attribute {} with values {} to input for NameID".format(attr, value),
context.state
)
else:
user_id += value
satosa_logging(
logger,
logging.DEBUG,
"Added attribute {} with value {} to input for NameID".format(attr, value),
context.state
)
if not user_id:
satosa_logging(
logger,
logging.WARNING,
"Input for NameID is empty so not overriding default",
context.state
)
else:
data.subject_id = user_id
satosa_logging(
logger,
logging.DEBUG,
"Input for NameID is {}".format(data.subject_id),
context.state
) | python | def _populate_input_for_name_id(self, config, record, context, data):
user_id = ""
user_id_from_attrs = config['user_id_from_attrs']
for attr in user_id_from_attrs:
if attr in record["attributes"]:
value = record["attributes"][attr]
if isinstance(value, list):
# Use a default sort to ensure some predictability since the
# LDAP directory server may return multi-valued attributes
# in any order.
value.sort()
user_id += "".join(value)
satosa_logging(
logger,
logging.DEBUG,
"Added attribute {} with values {} to input for NameID".format(attr, value),
context.state
)
else:
user_id += value
satosa_logging(
logger,
logging.DEBUG,
"Added attribute {} with value {} to input for NameID".format(attr, value),
context.state
)
if not user_id:
satosa_logging(
logger,
logging.WARNING,
"Input for NameID is empty so not overriding default",
context.state
)
else:
data.subject_id = user_id
satosa_logging(
logger,
logging.DEBUG,
"Input for NameID is {}".format(data.subject_id),
context.state
) | [
"def",
"_populate_input_for_name_id",
"(",
"self",
",",
"config",
",",
"record",
",",
"context",
",",
"data",
")",
":",
"user_id",
"=",
"\"\"",
"user_id_from_attrs",
"=",
"config",
"[",
"'user_id_from_attrs'",
"]",
"for",
"attr",
"in",
"user_id_from_attrs",
":",
"if",
"attr",
"in",
"record",
"[",
"\"attributes\"",
"]",
":",
"value",
"=",
"record",
"[",
"\"attributes\"",
"]",
"[",
"attr",
"]",
"if",
"isinstance",
"(",
"value",
",",
"list",
")",
":",
"# Use a default sort to ensure some predictability since the",
"# LDAP directory server may return multi-valued attributes",
"# in any order.",
"value",
".",
"sort",
"(",
")",
"user_id",
"+=",
"\"\"",
".",
"join",
"(",
"value",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Added attribute {} with values {} to input for NameID\"",
".",
"format",
"(",
"attr",
",",
"value",
")",
",",
"context",
".",
"state",
")",
"else",
":",
"user_id",
"+=",
"value",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Added attribute {} with value {} to input for NameID\"",
".",
"format",
"(",
"attr",
",",
"value",
")",
",",
"context",
".",
"state",
")",
"if",
"not",
"user_id",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"WARNING",
",",
"\"Input for NameID is empty so not overriding default\"",
",",
"context",
".",
"state",
")",
"else",
":",
"data",
".",
"subject_id",
"=",
"user_id",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Input for NameID is {}\"",
".",
"format",
"(",
"data",
".",
"subject_id",
")",
",",
"context",
".",
"state",
")"
] | Use a record found in LDAP to populate input for
NameID generation. | [
"Use",
"a",
"record",
"found",
"in",
"LDAP",
"to",
"populate",
"input",
"for",
"NameID",
"generation",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/ldap_attribute_store.py#L310-L354 |
250,826 | IdentityPython/SATOSA | src/satosa/satosa_config.py | SATOSAConfig._verify_dict | def _verify_dict(self, conf):
"""
Check that the configuration contains all necessary keys.
:type conf: dict
:rtype: None
:raise SATOSAConfigurationError: if the configuration is incorrect
:param conf: config to verify
:return: None
"""
if not conf:
raise SATOSAConfigurationError("Missing configuration or unknown format")
for key in SATOSAConfig.mandatory_dict_keys:
if key not in conf:
raise SATOSAConfigurationError("Missing key '%s' in config" % key)
for key in SATOSAConfig.sensitive_dict_keys:
if key not in conf and "SATOSA_{key}".format(key=key) not in os.environ:
raise SATOSAConfigurationError("Missing key '%s' from config and ENVIRONMENT" % key) | python | def _verify_dict(self, conf):
if not conf:
raise SATOSAConfigurationError("Missing configuration or unknown format")
for key in SATOSAConfig.mandatory_dict_keys:
if key not in conf:
raise SATOSAConfigurationError("Missing key '%s' in config" % key)
for key in SATOSAConfig.sensitive_dict_keys:
if key not in conf and "SATOSA_{key}".format(key=key) not in os.environ:
raise SATOSAConfigurationError("Missing key '%s' from config and ENVIRONMENT" % key) | [
"def",
"_verify_dict",
"(",
"self",
",",
"conf",
")",
":",
"if",
"not",
"conf",
":",
"raise",
"SATOSAConfigurationError",
"(",
"\"Missing configuration or unknown format\"",
")",
"for",
"key",
"in",
"SATOSAConfig",
".",
"mandatory_dict_keys",
":",
"if",
"key",
"not",
"in",
"conf",
":",
"raise",
"SATOSAConfigurationError",
"(",
"\"Missing key '%s' in config\"",
"%",
"key",
")",
"for",
"key",
"in",
"SATOSAConfig",
".",
"sensitive_dict_keys",
":",
"if",
"key",
"not",
"in",
"conf",
"and",
"\"SATOSA_{key}\"",
".",
"format",
"(",
"key",
"=",
"key",
")",
"not",
"in",
"os",
".",
"environ",
":",
"raise",
"SATOSAConfigurationError",
"(",
"\"Missing key '%s' from config and ENVIRONMENT\"",
"%",
"key",
")"
] | Check that the configuration contains all necessary keys.
:type conf: dict
:rtype: None
:raise SATOSAConfigurationError: if the configuration is incorrect
:param conf: config to verify
:return: None | [
"Check",
"that",
"the",
"configuration",
"contains",
"all",
"necessary",
"keys",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/satosa_config.py#L68-L88 |
250,827 | IdentityPython/SATOSA | src/satosa/satosa_config.py | SATOSAConfig._load_yaml | def _load_yaml(self, config_file):
"""
Load config from yaml file or string
:type config_file: str
:rtype: dict
:param config_file: config to load. Can be file path or yaml string
:return: Loaded config
"""
try:
with open(config_file) as f:
return yaml.safe_load(f.read())
except yaml.YAMLError as exc:
logger.error("Could not parse config as YAML: {}", str(exc))
if hasattr(exc, 'problem_mark'):
mark = exc.problem_mark
logger.error("Error position: (%s:%s)" % (mark.line + 1, mark.column + 1))
except IOError as e:
logger.debug("Could not open config file: {}", str(e))
return None | python | def _load_yaml(self, config_file):
try:
with open(config_file) as f:
return yaml.safe_load(f.read())
except yaml.YAMLError as exc:
logger.error("Could not parse config as YAML: {}", str(exc))
if hasattr(exc, 'problem_mark'):
mark = exc.problem_mark
logger.error("Error position: (%s:%s)" % (mark.line + 1, mark.column + 1))
except IOError as e:
logger.debug("Could not open config file: {}", str(e))
return None | [
"def",
"_load_yaml",
"(",
"self",
",",
"config_file",
")",
":",
"try",
":",
"with",
"open",
"(",
"config_file",
")",
"as",
"f",
":",
"return",
"yaml",
".",
"safe_load",
"(",
"f",
".",
"read",
"(",
")",
")",
"except",
"yaml",
".",
"YAMLError",
"as",
"exc",
":",
"logger",
".",
"error",
"(",
"\"Could not parse config as YAML: {}\"",
",",
"str",
"(",
"exc",
")",
")",
"if",
"hasattr",
"(",
"exc",
",",
"'problem_mark'",
")",
":",
"mark",
"=",
"exc",
".",
"problem_mark",
"logger",
".",
"error",
"(",
"\"Error position: (%s:%s)\"",
"%",
"(",
"mark",
".",
"line",
"+",
"1",
",",
"mark",
".",
"column",
"+",
"1",
")",
")",
"except",
"IOError",
"as",
"e",
":",
"logger",
".",
"debug",
"(",
"\"Could not open config file: {}\"",
",",
"str",
"(",
"e",
")",
")",
"return",
"None"
] | Load config from yaml file or string
:type config_file: str
:rtype: dict
:param config_file: config to load. Can be file path or yaml string
:return: Loaded config | [
"Load",
"config",
"from",
"yaml",
"file",
"or",
"string"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/satosa_config.py#L136-L157 |
250,828 | IdentityPython/SATOSA | src/satosa/logging_util.py | satosa_logging | def satosa_logging(logger, level, message, state, **kwargs):
"""
Adds a session ID to the message.
:type logger: logging
:type level: int
:type message: str
:type state: satosa.state.State
:param logger: Logger to use
:param level: Logger level (ex: logging.DEBUG/logging.WARN/...)
:param message: Message
:param state: The current state
:param kwargs: set exc_info=True to get an exception stack trace in the log
"""
if state is None:
session_id = "UNKNOWN"
else:
try:
session_id = state[LOGGER_STATE_KEY]
except KeyError:
session_id = uuid4().urn
state[LOGGER_STATE_KEY] = session_id
logger.log(level, "[{id}] {msg}".format(id=session_id, msg=message), **kwargs) | python | def satosa_logging(logger, level, message, state, **kwargs):
if state is None:
session_id = "UNKNOWN"
else:
try:
session_id = state[LOGGER_STATE_KEY]
except KeyError:
session_id = uuid4().urn
state[LOGGER_STATE_KEY] = session_id
logger.log(level, "[{id}] {msg}".format(id=session_id, msg=message), **kwargs) | [
"def",
"satosa_logging",
"(",
"logger",
",",
"level",
",",
"message",
",",
"state",
",",
"*",
"*",
"kwargs",
")",
":",
"if",
"state",
"is",
"None",
":",
"session_id",
"=",
"\"UNKNOWN\"",
"else",
":",
"try",
":",
"session_id",
"=",
"state",
"[",
"LOGGER_STATE_KEY",
"]",
"except",
"KeyError",
":",
"session_id",
"=",
"uuid4",
"(",
")",
".",
"urn",
"state",
"[",
"LOGGER_STATE_KEY",
"]",
"=",
"session_id",
"logger",
".",
"log",
"(",
"level",
",",
"\"[{id}] {msg}\"",
".",
"format",
"(",
"id",
"=",
"session_id",
",",
"msg",
"=",
"message",
")",
",",
"*",
"*",
"kwargs",
")"
] | Adds a session ID to the message.
:type logger: logging
:type level: int
:type message: str
:type state: satosa.state.State
:param logger: Logger to use
:param level: Logger level (ex: logging.DEBUG/logging.WARN/...)
:param message: Message
:param state: The current state
:param kwargs: set exc_info=True to get an exception stack trace in the log | [
"Adds",
"a",
"session",
"ID",
"to",
"the",
"message",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/logging_util.py#L10-L33 |
250,829 | IdentityPython/SATOSA | src/satosa/micro_services/consent.py | Consent.process | def process(self, context, internal_response):
"""
Manage consent and attribute filtering
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: response context
:param internal_response: the response
:return: response
"""
consent_state = context.state[STATE_KEY]
internal_response.attributes = self._filter_attributes(internal_response.attributes, consent_state["filter"])
id_hash = self._get_consent_id(internal_response.requester, internal_response.subject_id,
internal_response.attributes)
try:
# Check if consent is already given
consent_attributes = self._verify_consent(id_hash)
except requests.exceptions.ConnectionError as e:
satosa_logging(logger, logging.ERROR,
"Consent service is not reachable, no consent given.", context.state)
# Send an internal_response without any attributes
internal_response.attributes = {}
return self._end_consent(context, internal_response)
# Previous consent was given
if consent_attributes is not None:
satosa_logging(logger, logging.DEBUG, "Previous consent was given", context.state)
internal_response.attributes = self._filter_attributes(internal_response.attributes, consent_attributes)
return self._end_consent(context, internal_response)
# No previous consent, request consent by user
return self._approve_new_consent(context, internal_response, id_hash) | python | def process(self, context, internal_response):
consent_state = context.state[STATE_KEY]
internal_response.attributes = self._filter_attributes(internal_response.attributes, consent_state["filter"])
id_hash = self._get_consent_id(internal_response.requester, internal_response.subject_id,
internal_response.attributes)
try:
# Check if consent is already given
consent_attributes = self._verify_consent(id_hash)
except requests.exceptions.ConnectionError as e:
satosa_logging(logger, logging.ERROR,
"Consent service is not reachable, no consent given.", context.state)
# Send an internal_response without any attributes
internal_response.attributes = {}
return self._end_consent(context, internal_response)
# Previous consent was given
if consent_attributes is not None:
satosa_logging(logger, logging.DEBUG, "Previous consent was given", context.state)
internal_response.attributes = self._filter_attributes(internal_response.attributes, consent_attributes)
return self._end_consent(context, internal_response)
# No previous consent, request consent by user
return self._approve_new_consent(context, internal_response, id_hash) | [
"def",
"process",
"(",
"self",
",",
"context",
",",
"internal_response",
")",
":",
"consent_state",
"=",
"context",
".",
"state",
"[",
"STATE_KEY",
"]",
"internal_response",
".",
"attributes",
"=",
"self",
".",
"_filter_attributes",
"(",
"internal_response",
".",
"attributes",
",",
"consent_state",
"[",
"\"filter\"",
"]",
")",
"id_hash",
"=",
"self",
".",
"_get_consent_id",
"(",
"internal_response",
".",
"requester",
",",
"internal_response",
".",
"subject_id",
",",
"internal_response",
".",
"attributes",
")",
"try",
":",
"# Check if consent is already given",
"consent_attributes",
"=",
"self",
".",
"_verify_consent",
"(",
"id_hash",
")",
"except",
"requests",
".",
"exceptions",
".",
"ConnectionError",
"as",
"e",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"\"Consent service is not reachable, no consent given.\"",
",",
"context",
".",
"state",
")",
"# Send an internal_response without any attributes",
"internal_response",
".",
"attributes",
"=",
"{",
"}",
"return",
"self",
".",
"_end_consent",
"(",
"context",
",",
"internal_response",
")",
"# Previous consent was given",
"if",
"consent_attributes",
"is",
"not",
"None",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Previous consent was given\"",
",",
"context",
".",
"state",
")",
"internal_response",
".",
"attributes",
"=",
"self",
".",
"_filter_attributes",
"(",
"internal_response",
".",
"attributes",
",",
"consent_attributes",
")",
"return",
"self",
".",
"_end_consent",
"(",
"context",
",",
"internal_response",
")",
"# No previous consent, request consent by user",
"return",
"self",
".",
"_approve_new_consent",
"(",
"context",
",",
"internal_response",
",",
"id_hash",
")"
] | Manage consent and attribute filtering
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: response context
:param internal_response: the response
:return: response | [
"Manage",
"consent",
"and",
"attribute",
"filtering"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/consent.py#L106-L141 |
250,830 | IdentityPython/SATOSA | src/satosa/micro_services/consent.py | Consent._get_consent_id | def _get_consent_id(self, requester, user_id, filtered_attr):
"""
Get a hashed id based on requester, user id and filtered attributes
:type requester: str
:type user_id: str
:type filtered_attr: dict[str, str]
:param requester: The calling requester
:param user_id: The authorized user id
:param filtered_attr: a list containing all attributes to be sent
:return: an id
"""
filtered_attr_key_list = sorted(filtered_attr.keys())
hash_str = ""
for key in filtered_attr_key_list:
_hash_value = "".join(sorted(filtered_attr[key]))
hash_str += key + _hash_value
id_string = "%s%s%s" % (requester, user_id, hash_str)
return urlsafe_b64encode(hashlib.sha512(id_string.encode("utf-8")).hexdigest().encode("utf-8")).decode("utf-8") | python | def _get_consent_id(self, requester, user_id, filtered_attr):
filtered_attr_key_list = sorted(filtered_attr.keys())
hash_str = ""
for key in filtered_attr_key_list:
_hash_value = "".join(sorted(filtered_attr[key]))
hash_str += key + _hash_value
id_string = "%s%s%s" % (requester, user_id, hash_str)
return urlsafe_b64encode(hashlib.sha512(id_string.encode("utf-8")).hexdigest().encode("utf-8")).decode("utf-8") | [
"def",
"_get_consent_id",
"(",
"self",
",",
"requester",
",",
"user_id",
",",
"filtered_attr",
")",
":",
"filtered_attr_key_list",
"=",
"sorted",
"(",
"filtered_attr",
".",
"keys",
"(",
")",
")",
"hash_str",
"=",
"\"\"",
"for",
"key",
"in",
"filtered_attr_key_list",
":",
"_hash_value",
"=",
"\"\"",
".",
"join",
"(",
"sorted",
"(",
"filtered_attr",
"[",
"key",
"]",
")",
")",
"hash_str",
"+=",
"key",
"+",
"_hash_value",
"id_string",
"=",
"\"%s%s%s\"",
"%",
"(",
"requester",
",",
"user_id",
",",
"hash_str",
")",
"return",
"urlsafe_b64encode",
"(",
"hashlib",
".",
"sha512",
"(",
"id_string",
".",
"encode",
"(",
"\"utf-8\"",
")",
")",
".",
"hexdigest",
"(",
")",
".",
"encode",
"(",
"\"utf-8\"",
")",
")",
".",
"decode",
"(",
"\"utf-8\"",
")"
] | Get a hashed id based on requester, user id and filtered attributes
:type requester: str
:type user_id: str
:type filtered_attr: dict[str, str]
:param requester: The calling requester
:param user_id: The authorized user id
:param filtered_attr: a list containing all attributes to be sent
:return: an id | [
"Get",
"a",
"hashed",
"id",
"based",
"on",
"requester",
"user",
"id",
"and",
"filtered",
"attributes"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/consent.py#L146-L166 |
250,831 | IdentityPython/SATOSA | src/satosa/micro_services/consent.py | Consent._consent_registration | def _consent_registration(self, consent_args):
"""
Register a request at the consent service
:type consent_args: dict
:rtype: str
:param consent_args: All necessary parameters for the consent request
:return: Ticket received from the consent service
"""
jws = JWS(json.dumps(consent_args), alg=self.signing_key.alg).sign_compact([self.signing_key])
request = "{}/creq/{}".format(self.api_url, jws)
res = requests.get(request)
if res.status_code != 200:
raise UnexpectedResponseError("Consent service error: %s %s", res.status_code, res.text)
return res.text | python | def _consent_registration(self, consent_args):
jws = JWS(json.dumps(consent_args), alg=self.signing_key.alg).sign_compact([self.signing_key])
request = "{}/creq/{}".format(self.api_url, jws)
res = requests.get(request)
if res.status_code != 200:
raise UnexpectedResponseError("Consent service error: %s %s", res.status_code, res.text)
return res.text | [
"def",
"_consent_registration",
"(",
"self",
",",
"consent_args",
")",
":",
"jws",
"=",
"JWS",
"(",
"json",
".",
"dumps",
"(",
"consent_args",
")",
",",
"alg",
"=",
"self",
".",
"signing_key",
".",
"alg",
")",
".",
"sign_compact",
"(",
"[",
"self",
".",
"signing_key",
"]",
")",
"request",
"=",
"\"{}/creq/{}\"",
".",
"format",
"(",
"self",
".",
"api_url",
",",
"jws",
")",
"res",
"=",
"requests",
".",
"get",
"(",
"request",
")",
"if",
"res",
".",
"status_code",
"!=",
"200",
":",
"raise",
"UnexpectedResponseError",
"(",
"\"Consent service error: %s %s\"",
",",
"res",
".",
"status_code",
",",
"res",
".",
"text",
")",
"return",
"res",
".",
"text"
] | Register a request at the consent service
:type consent_args: dict
:rtype: str
:param consent_args: All necessary parameters for the consent request
:return: Ticket received from the consent service | [
"Register",
"a",
"request",
"at",
"the",
"consent",
"service"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/consent.py#L168-L185 |
250,832 | IdentityPython/SATOSA | src/satosa/micro_services/consent.py | Consent._verify_consent | def _verify_consent(self, consent_id):
"""
Connects to the consent service using the REST api and checks if the user has given consent
:type consent_id: str
:rtype: Optional[List[str]]
:param consent_id: An id associated to the authenticated user, the calling requester and
attributes to be sent.
:return: list attributes given which have been approved by user consent
"""
request = "{}/verify/{}".format(self.api_url, consent_id)
res = requests.get(request)
if res.status_code == 200:
return json.loads(res.text)
return None | python | def _verify_consent(self, consent_id):
request = "{}/verify/{}".format(self.api_url, consent_id)
res = requests.get(request)
if res.status_code == 200:
return json.loads(res.text)
return None | [
"def",
"_verify_consent",
"(",
"self",
",",
"consent_id",
")",
":",
"request",
"=",
"\"{}/verify/{}\"",
".",
"format",
"(",
"self",
".",
"api_url",
",",
"consent_id",
")",
"res",
"=",
"requests",
".",
"get",
"(",
"request",
")",
"if",
"res",
".",
"status_code",
"==",
"200",
":",
"return",
"json",
".",
"loads",
"(",
"res",
".",
"text",
")",
"return",
"None"
] | Connects to the consent service using the REST api and checks if the user has given consent
:type consent_id: str
:rtype: Optional[List[str]]
:param consent_id: An id associated to the authenticated user, the calling requester and
attributes to be sent.
:return: list attributes given which have been approved by user consent | [
"Connects",
"to",
"the",
"consent",
"service",
"using",
"the",
"REST",
"api",
"and",
"checks",
"if",
"the",
"user",
"has",
"given",
"consent"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/consent.py#L187-L204 |
250,833 | IdentityPython/SATOSA | src/satosa/micro_services/consent.py | Consent._end_consent | def _end_consent(self, context, internal_response):
"""
Clear the state for consent and end the consent step
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: response context
:param internal_response: the response
:return: response
"""
del context.state[STATE_KEY]
return super().process(context, internal_response) | python | def _end_consent(self, context, internal_response):
del context.state[STATE_KEY]
return super().process(context, internal_response) | [
"def",
"_end_consent",
"(",
"self",
",",
"context",
",",
"internal_response",
")",
":",
"del",
"context",
".",
"state",
"[",
"STATE_KEY",
"]",
"return",
"super",
"(",
")",
".",
"process",
"(",
"context",
",",
"internal_response",
")"
] | Clear the state for consent and end the consent step
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: response context
:param internal_response: the response
:return: response | [
"Clear",
"the",
"state",
"for",
"consent",
"and",
"end",
"the",
"consent",
"step"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/consent.py#L206-L219 |
250,834 | IdentityPython/SATOSA | src/satosa/micro_services/primary_identifier.py | PrimaryIdentifier.constructPrimaryIdentifier | def constructPrimaryIdentifier(self, data, ordered_identifier_candidates):
"""
Construct and return a primary identifier value from the
data asserted by the IdP using the ordered list of candidates
from the configuration.
"""
logprefix = PrimaryIdentifier.logprefix
context = self.context
attributes = data.attributes
satosa_logging(logger, logging.DEBUG, "{} Input attributes {}".format(logprefix, attributes), context.state)
value = None
for candidate in ordered_identifier_candidates:
satosa_logging(logger, logging.DEBUG, "{} Considering candidate {}".format(logprefix, candidate), context.state)
# Get the values asserted by the IdP for the configured list of attribute names for this candidate
# and substitute None if the IdP did not assert any value for a configured attribute.
values = [ attributes.get(attribute_name, [None])[0] for attribute_name in candidate['attribute_names'] ]
satosa_logging(logger, logging.DEBUG, "{} Found candidate values {}".format(logprefix, values), context.state)
# If one of the configured attribute names is name_id then if there is also a configured
# name_id_format add the value for the NameID of that format if it was asserted by the IdP
# or else add the value None.
if 'name_id' in candidate['attribute_names']:
candidate_nameid_value = None
candidate_nameid_value = None
candidate_name_id_format = candidate.get('name_id_format')
name_id_value = data.subject_id
name_id_format = data.subject_type
if (
name_id_value
and candidate_name_id_format
and candidate_name_id_format == name_id_format
):
satosa_logging(logger, logging.DEBUG, "{} IdP asserted NameID {}".format(logprefix, name_id_value), context.state)
candidate_nameid_value = name_id_value
# Only add the NameID value asserted by the IdP if it is not already
# in the list of values. This is necessary because some non-compliant IdPs
# have been known, for example, to assert the value of eduPersonPrincipalName
# in the value for SAML2 persistent NameID as well as asserting
# eduPersonPrincipalName.
if candidate_nameid_value not in values:
satosa_logging(logger, logging.DEBUG, "{} Added NameID {} to candidate values".format(logprefix, candidate_nameid_value), context.state)
values.append(candidate_nameid_value)
else:
satosa_logging(logger, logging.WARN, "{} NameID {} value also asserted as attribute value".format(logprefix, candidate_nameid_value), context.state)
# If no value was asserted by the IdP for one of the configured list of attribute names
# for this candidate then go onto the next candidate.
if None in values:
satosa_logging(logger, logging.DEBUG, "{} Candidate is missing value so skipping".format(logprefix), context.state)
continue
# All values for the configured list of attribute names are present
# so we can create a primary identifer. Add a scope if configured
# to do so.
if 'add_scope' in candidate:
if candidate['add_scope'] == 'issuer_entityid':
scope = data.auth_info.issuer
else:
scope = candidate['add_scope']
satosa_logging(logger, logging.DEBUG, "{} Added scope {} to values".format(logprefix, scope), context.state)
values.append(scope)
# Concatenate all values to create the primary identifier.
value = ''.join(values)
break
return value | python | def constructPrimaryIdentifier(self, data, ordered_identifier_candidates):
logprefix = PrimaryIdentifier.logprefix
context = self.context
attributes = data.attributes
satosa_logging(logger, logging.DEBUG, "{} Input attributes {}".format(logprefix, attributes), context.state)
value = None
for candidate in ordered_identifier_candidates:
satosa_logging(logger, logging.DEBUG, "{} Considering candidate {}".format(logprefix, candidate), context.state)
# Get the values asserted by the IdP for the configured list of attribute names for this candidate
# and substitute None if the IdP did not assert any value for a configured attribute.
values = [ attributes.get(attribute_name, [None])[0] for attribute_name in candidate['attribute_names'] ]
satosa_logging(logger, logging.DEBUG, "{} Found candidate values {}".format(logprefix, values), context.state)
# If one of the configured attribute names is name_id then if there is also a configured
# name_id_format add the value for the NameID of that format if it was asserted by the IdP
# or else add the value None.
if 'name_id' in candidate['attribute_names']:
candidate_nameid_value = None
candidate_nameid_value = None
candidate_name_id_format = candidate.get('name_id_format')
name_id_value = data.subject_id
name_id_format = data.subject_type
if (
name_id_value
and candidate_name_id_format
and candidate_name_id_format == name_id_format
):
satosa_logging(logger, logging.DEBUG, "{} IdP asserted NameID {}".format(logprefix, name_id_value), context.state)
candidate_nameid_value = name_id_value
# Only add the NameID value asserted by the IdP if it is not already
# in the list of values. This is necessary because some non-compliant IdPs
# have been known, for example, to assert the value of eduPersonPrincipalName
# in the value for SAML2 persistent NameID as well as asserting
# eduPersonPrincipalName.
if candidate_nameid_value not in values:
satosa_logging(logger, logging.DEBUG, "{} Added NameID {} to candidate values".format(logprefix, candidate_nameid_value), context.state)
values.append(candidate_nameid_value)
else:
satosa_logging(logger, logging.WARN, "{} NameID {} value also asserted as attribute value".format(logprefix, candidate_nameid_value), context.state)
# If no value was asserted by the IdP for one of the configured list of attribute names
# for this candidate then go onto the next candidate.
if None in values:
satosa_logging(logger, logging.DEBUG, "{} Candidate is missing value so skipping".format(logprefix), context.state)
continue
# All values for the configured list of attribute names are present
# so we can create a primary identifer. Add a scope if configured
# to do so.
if 'add_scope' in candidate:
if candidate['add_scope'] == 'issuer_entityid':
scope = data.auth_info.issuer
else:
scope = candidate['add_scope']
satosa_logging(logger, logging.DEBUG, "{} Added scope {} to values".format(logprefix, scope), context.state)
values.append(scope)
# Concatenate all values to create the primary identifier.
value = ''.join(values)
break
return value | [
"def",
"constructPrimaryIdentifier",
"(",
"self",
",",
"data",
",",
"ordered_identifier_candidates",
")",
":",
"logprefix",
"=",
"PrimaryIdentifier",
".",
"logprefix",
"context",
"=",
"self",
".",
"context",
"attributes",
"=",
"data",
".",
"attributes",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Input attributes {}\"",
".",
"format",
"(",
"logprefix",
",",
"attributes",
")",
",",
"context",
".",
"state",
")",
"value",
"=",
"None",
"for",
"candidate",
"in",
"ordered_identifier_candidates",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Considering candidate {}\"",
".",
"format",
"(",
"logprefix",
",",
"candidate",
")",
",",
"context",
".",
"state",
")",
"# Get the values asserted by the IdP for the configured list of attribute names for this candidate",
"# and substitute None if the IdP did not assert any value for a configured attribute.",
"values",
"=",
"[",
"attributes",
".",
"get",
"(",
"attribute_name",
",",
"[",
"None",
"]",
")",
"[",
"0",
"]",
"for",
"attribute_name",
"in",
"candidate",
"[",
"'attribute_names'",
"]",
"]",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Found candidate values {}\"",
".",
"format",
"(",
"logprefix",
",",
"values",
")",
",",
"context",
".",
"state",
")",
"# If one of the configured attribute names is name_id then if there is also a configured",
"# name_id_format add the value for the NameID of that format if it was asserted by the IdP",
"# or else add the value None.",
"if",
"'name_id'",
"in",
"candidate",
"[",
"'attribute_names'",
"]",
":",
"candidate_nameid_value",
"=",
"None",
"candidate_nameid_value",
"=",
"None",
"candidate_name_id_format",
"=",
"candidate",
".",
"get",
"(",
"'name_id_format'",
")",
"name_id_value",
"=",
"data",
".",
"subject_id",
"name_id_format",
"=",
"data",
".",
"subject_type",
"if",
"(",
"name_id_value",
"and",
"candidate_name_id_format",
"and",
"candidate_name_id_format",
"==",
"name_id_format",
")",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} IdP asserted NameID {}\"",
".",
"format",
"(",
"logprefix",
",",
"name_id_value",
")",
",",
"context",
".",
"state",
")",
"candidate_nameid_value",
"=",
"name_id_value",
"# Only add the NameID value asserted by the IdP if it is not already",
"# in the list of values. This is necessary because some non-compliant IdPs",
"# have been known, for example, to assert the value of eduPersonPrincipalName",
"# in the value for SAML2 persistent NameID as well as asserting",
"# eduPersonPrincipalName.",
"if",
"candidate_nameid_value",
"not",
"in",
"values",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Added NameID {} to candidate values\"",
".",
"format",
"(",
"logprefix",
",",
"candidate_nameid_value",
")",
",",
"context",
".",
"state",
")",
"values",
".",
"append",
"(",
"candidate_nameid_value",
")",
"else",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"WARN",
",",
"\"{} NameID {} value also asserted as attribute value\"",
".",
"format",
"(",
"logprefix",
",",
"candidate_nameid_value",
")",
",",
"context",
".",
"state",
")",
"# If no value was asserted by the IdP for one of the configured list of attribute names",
"# for this candidate then go onto the next candidate.",
"if",
"None",
"in",
"values",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Candidate is missing value so skipping\"",
".",
"format",
"(",
"logprefix",
")",
",",
"context",
".",
"state",
")",
"continue",
"# All values for the configured list of attribute names are present",
"# so we can create a primary identifer. Add a scope if configured",
"# to do so.",
"if",
"'add_scope'",
"in",
"candidate",
":",
"if",
"candidate",
"[",
"'add_scope'",
"]",
"==",
"'issuer_entityid'",
":",
"scope",
"=",
"data",
".",
"auth_info",
".",
"issuer",
"else",
":",
"scope",
"=",
"candidate",
"[",
"'add_scope'",
"]",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"{} Added scope {} to values\"",
".",
"format",
"(",
"logprefix",
",",
"scope",
")",
",",
"context",
".",
"state",
")",
"values",
".",
"append",
"(",
"scope",
")",
"# Concatenate all values to create the primary identifier.",
"value",
"=",
"''",
".",
"join",
"(",
"values",
")",
"break",
"return",
"value"
] | Construct and return a primary identifier value from the
data asserted by the IdP using the ordered list of candidates
from the configuration. | [
"Construct",
"and",
"return",
"a",
"primary",
"identifier",
"value",
"from",
"the",
"data",
"asserted",
"by",
"the",
"IdP",
"using",
"the",
"ordered",
"list",
"of",
"candidates",
"from",
"the",
"configuration",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/primary_identifier.py#L32-L103 |
250,835 | IdentityPython/SATOSA | src/satosa/state.py | state_to_cookie | def state_to_cookie(state, name, path, encryption_key):
"""
Saves a state to a cookie
:type state: satosa.state.State
:type name: str
:type path: str
:type encryption_key: str
:rtype: http.cookies.SimpleCookie
:param state: The state to save
:param name: Name identifier of the cookie
:param path: Endpoint path the cookie will be associated to
:param encryption_key: Key to encrypt the state information
:return: A cookie
"""
cookie_data = "" if state.delete else state.urlstate(encryption_key)
max_age = 0 if state.delete else STATE_COOKIE_MAX_AGE
satosa_logging(logger, logging.DEBUG,
"Saving state as cookie, secure: %s, max-age: %s, path: %s" %
(STATE_COOKIE_SECURE, STATE_COOKIE_MAX_AGE, path), state)
cookie = SimpleCookie()
cookie[name] = cookie_data
cookie[name]["secure"] = STATE_COOKIE_SECURE
cookie[name]["path"] = path
cookie[name]["max-age"] = max_age
return cookie | python | def state_to_cookie(state, name, path, encryption_key):
cookie_data = "" if state.delete else state.urlstate(encryption_key)
max_age = 0 if state.delete else STATE_COOKIE_MAX_AGE
satosa_logging(logger, logging.DEBUG,
"Saving state as cookie, secure: %s, max-age: %s, path: %s" %
(STATE_COOKIE_SECURE, STATE_COOKIE_MAX_AGE, path), state)
cookie = SimpleCookie()
cookie[name] = cookie_data
cookie[name]["secure"] = STATE_COOKIE_SECURE
cookie[name]["path"] = path
cookie[name]["max-age"] = max_age
return cookie | [
"def",
"state_to_cookie",
"(",
"state",
",",
"name",
",",
"path",
",",
"encryption_key",
")",
":",
"cookie_data",
"=",
"\"\"",
"if",
"state",
".",
"delete",
"else",
"state",
".",
"urlstate",
"(",
"encryption_key",
")",
"max_age",
"=",
"0",
"if",
"state",
".",
"delete",
"else",
"STATE_COOKIE_MAX_AGE",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Saving state as cookie, secure: %s, max-age: %s, path: %s\"",
"%",
"(",
"STATE_COOKIE_SECURE",
",",
"STATE_COOKIE_MAX_AGE",
",",
"path",
")",
",",
"state",
")",
"cookie",
"=",
"SimpleCookie",
"(",
")",
"cookie",
"[",
"name",
"]",
"=",
"cookie_data",
"cookie",
"[",
"name",
"]",
"[",
"\"secure\"",
"]",
"=",
"STATE_COOKIE_SECURE",
"cookie",
"[",
"name",
"]",
"[",
"\"path\"",
"]",
"=",
"path",
"cookie",
"[",
"name",
"]",
"[",
"\"max-age\"",
"]",
"=",
"max_age",
"return",
"cookie"
] | Saves a state to a cookie
:type state: satosa.state.State
:type name: str
:type path: str
:type encryption_key: str
:rtype: http.cookies.SimpleCookie
:param state: The state to save
:param name: Name identifier of the cookie
:param path: Endpoint path the cookie will be associated to
:param encryption_key: Key to encrypt the state information
:return: A cookie | [
"Saves",
"a",
"state",
"to",
"a",
"cookie"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L26-L54 |
250,836 | IdentityPython/SATOSA | src/satosa/state.py | cookie_to_state | def cookie_to_state(cookie_str, name, encryption_key):
"""
Loads a state from a cookie
:type cookie_str: str
:type name: str
:type encryption_key: str
:rtype: satosa.state.State
:param cookie_str: string representation of cookie/s
:param name: Name identifier of the cookie
:param encryption_key: Key to encrypt the state information
:return: A state
"""
try:
cookie = SimpleCookie(cookie_str)
state = State(cookie[name].value, encryption_key)
except KeyError as e:
msg_tmpl = 'No cookie named {name} in {data}'
msg = msg_tmpl.format(name=name, data=cookie_str)
logger.exception(msg)
raise SATOSAStateError(msg) from e
except ValueError as e:
msg_tmpl = 'Failed to process {name} from {data}'
msg = msg_tmpl.format(name=name, data=cookie_str)
logger.exception(msg)
raise SATOSAStateError(msg) from e
else:
msg_tmpl = 'Loading state from cookie {data}'
msg = msg_tmpl.format(data=cookie_str)
satosa_logging(logger, logging.DEBUG, msg, state)
return state | python | def cookie_to_state(cookie_str, name, encryption_key):
try:
cookie = SimpleCookie(cookie_str)
state = State(cookie[name].value, encryption_key)
except KeyError as e:
msg_tmpl = 'No cookie named {name} in {data}'
msg = msg_tmpl.format(name=name, data=cookie_str)
logger.exception(msg)
raise SATOSAStateError(msg) from e
except ValueError as e:
msg_tmpl = 'Failed to process {name} from {data}'
msg = msg_tmpl.format(name=name, data=cookie_str)
logger.exception(msg)
raise SATOSAStateError(msg) from e
else:
msg_tmpl = 'Loading state from cookie {data}'
msg = msg_tmpl.format(data=cookie_str)
satosa_logging(logger, logging.DEBUG, msg, state)
return state | [
"def",
"cookie_to_state",
"(",
"cookie_str",
",",
"name",
",",
"encryption_key",
")",
":",
"try",
":",
"cookie",
"=",
"SimpleCookie",
"(",
"cookie_str",
")",
"state",
"=",
"State",
"(",
"cookie",
"[",
"name",
"]",
".",
"value",
",",
"encryption_key",
")",
"except",
"KeyError",
"as",
"e",
":",
"msg_tmpl",
"=",
"'No cookie named {name} in {data}'",
"msg",
"=",
"msg_tmpl",
".",
"format",
"(",
"name",
"=",
"name",
",",
"data",
"=",
"cookie_str",
")",
"logger",
".",
"exception",
"(",
"msg",
")",
"raise",
"SATOSAStateError",
"(",
"msg",
")",
"from",
"e",
"except",
"ValueError",
"as",
"e",
":",
"msg_tmpl",
"=",
"'Failed to process {name} from {data}'",
"msg",
"=",
"msg_tmpl",
".",
"format",
"(",
"name",
"=",
"name",
",",
"data",
"=",
"cookie_str",
")",
"logger",
".",
"exception",
"(",
"msg",
")",
"raise",
"SATOSAStateError",
"(",
"msg",
")",
"from",
"e",
"else",
":",
"msg_tmpl",
"=",
"'Loading state from cookie {data}'",
"msg",
"=",
"msg_tmpl",
".",
"format",
"(",
"data",
"=",
"cookie_str",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"msg",
",",
"state",
")",
"return",
"state"
] | Loads a state from a cookie
:type cookie_str: str
:type name: str
:type encryption_key: str
:rtype: satosa.state.State
:param cookie_str: string representation of cookie/s
:param name: Name identifier of the cookie
:param encryption_key: Key to encrypt the state information
:return: A state | [
"Loads",
"a",
"state",
"from",
"a",
"cookie"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L57-L88 |
250,837 | IdentityPython/SATOSA | src/satosa/state.py | _AESCipher.encrypt | def encrypt(self, raw):
"""
Encryptes the parameter raw.
:type raw: bytes
:rtype: str
:param: bytes to be encrypted.
:return: A base 64 encoded string.
"""
raw = self._pad(raw)
iv = Random.new().read(AES.block_size)
cipher = AES.new(self.key, AES.MODE_CBC, iv)
return base64.urlsafe_b64encode(iv + cipher.encrypt(raw)) | python | def encrypt(self, raw):
raw = self._pad(raw)
iv = Random.new().read(AES.block_size)
cipher = AES.new(self.key, AES.MODE_CBC, iv)
return base64.urlsafe_b64encode(iv + cipher.encrypt(raw)) | [
"def",
"encrypt",
"(",
"self",
",",
"raw",
")",
":",
"raw",
"=",
"self",
".",
"_pad",
"(",
"raw",
")",
"iv",
"=",
"Random",
".",
"new",
"(",
")",
".",
"read",
"(",
"AES",
".",
"block_size",
")",
"cipher",
"=",
"AES",
".",
"new",
"(",
"self",
".",
"key",
",",
"AES",
".",
"MODE_CBC",
",",
"iv",
")",
"return",
"base64",
".",
"urlsafe_b64encode",
"(",
"iv",
"+",
"cipher",
".",
"encrypt",
"(",
"raw",
")",
")"
] | Encryptes the parameter raw.
:type raw: bytes
:rtype: str
:param: bytes to be encrypted.
:return: A base 64 encoded string. | [
"Encryptes",
"the",
"parameter",
"raw",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L109-L123 |
250,838 | IdentityPython/SATOSA | src/satosa/state.py | _AESCipher._pad | def _pad(self, b):
"""
Will padd the param to be of the correct length for the encryption alg.
:type b: bytes
:rtype: bytes
"""
return b + (self.bs - len(b) % self.bs) * chr(self.bs - len(b) % self.bs).encode("UTF-8") | python | def _pad(self, b):
return b + (self.bs - len(b) % self.bs) * chr(self.bs - len(b) % self.bs).encode("UTF-8") | [
"def",
"_pad",
"(",
"self",
",",
"b",
")",
":",
"return",
"b",
"+",
"(",
"self",
".",
"bs",
"-",
"len",
"(",
"b",
")",
"%",
"self",
".",
"bs",
")",
"*",
"chr",
"(",
"self",
".",
"bs",
"-",
"len",
"(",
"b",
")",
"%",
"self",
".",
"bs",
")",
".",
"encode",
"(",
"\"UTF-8\"",
")"
] | Will padd the param to be of the correct length for the encryption alg.
:type b: bytes
:rtype: bytes | [
"Will",
"padd",
"the",
"param",
"to",
"be",
"of",
"the",
"correct",
"length",
"for",
"the",
"encryption",
"alg",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L140-L147 |
250,839 | IdentityPython/SATOSA | src/satosa/state.py | State.urlstate | def urlstate(self, encryption_key):
"""
Will return a url safe representation of the state.
:type encryption_key: Key used for encryption.
:rtype: str
:return: Url representation av of the state.
"""
lzma = LZMACompressor()
urlstate_data = json.dumps(self._state_dict)
urlstate_data = lzma.compress(urlstate_data.encode("UTF-8"))
urlstate_data += lzma.flush()
urlstate_data = _AESCipher(encryption_key).encrypt(urlstate_data)
lzma = LZMACompressor()
urlstate_data = lzma.compress(urlstate_data)
urlstate_data += lzma.flush()
urlstate_data = base64.urlsafe_b64encode(urlstate_data)
return urlstate_data.decode("utf-8") | python | def urlstate(self, encryption_key):
lzma = LZMACompressor()
urlstate_data = json.dumps(self._state_dict)
urlstate_data = lzma.compress(urlstate_data.encode("UTF-8"))
urlstate_data += lzma.flush()
urlstate_data = _AESCipher(encryption_key).encrypt(urlstate_data)
lzma = LZMACompressor()
urlstate_data = lzma.compress(urlstate_data)
urlstate_data += lzma.flush()
urlstate_data = base64.urlsafe_b64encode(urlstate_data)
return urlstate_data.decode("utf-8") | [
"def",
"urlstate",
"(",
"self",
",",
"encryption_key",
")",
":",
"lzma",
"=",
"LZMACompressor",
"(",
")",
"urlstate_data",
"=",
"json",
".",
"dumps",
"(",
"self",
".",
"_state_dict",
")",
"urlstate_data",
"=",
"lzma",
".",
"compress",
"(",
"urlstate_data",
".",
"encode",
"(",
"\"UTF-8\"",
")",
")",
"urlstate_data",
"+=",
"lzma",
".",
"flush",
"(",
")",
"urlstate_data",
"=",
"_AESCipher",
"(",
"encryption_key",
")",
".",
"encrypt",
"(",
"urlstate_data",
")",
"lzma",
"=",
"LZMACompressor",
"(",
")",
"urlstate_data",
"=",
"lzma",
".",
"compress",
"(",
"urlstate_data",
")",
"urlstate_data",
"+=",
"lzma",
".",
"flush",
"(",
")",
"urlstate_data",
"=",
"base64",
".",
"urlsafe_b64encode",
"(",
"urlstate_data",
")",
"return",
"urlstate_data",
".",
"decode",
"(",
"\"utf-8\"",
")"
] | Will return a url safe representation of the state.
:type encryption_key: Key used for encryption.
:rtype: str
:return: Url representation av of the state. | [
"Will",
"return",
"a",
"url",
"safe",
"representation",
"of",
"the",
"state",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L235-L253 |
250,840 | IdentityPython/SATOSA | src/satosa/state.py | State.copy | def copy(self):
"""
Returns a deepcopy of the state
:rtype: satosa.state.State
:return: A copy of the state
"""
state_copy = State()
state_copy._state_dict = copy.deepcopy(self._state_dict)
return state_copy | python | def copy(self):
state_copy = State()
state_copy._state_dict = copy.deepcopy(self._state_dict)
return state_copy | [
"def",
"copy",
"(",
"self",
")",
":",
"state_copy",
"=",
"State",
"(",
")",
"state_copy",
".",
"_state_dict",
"=",
"copy",
".",
"deepcopy",
"(",
"self",
".",
"_state_dict",
")",
"return",
"state_copy"
] | Returns a deepcopy of the state
:rtype: satosa.state.State
:return: A copy of the state | [
"Returns",
"a",
"deepcopy",
"of",
"the",
"state"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/state.py#L255-L265 |
250,841 | IdentityPython/SATOSA | src/satosa/deprecated.py | saml_name_id_format_to_hash_type | def saml_name_id_format_to_hash_type(name_format):
"""
Translate pySAML2 name format to satosa format
:type name_format: str
:rtype: satosa.internal_data.UserIdHashType
:param name_format: SAML2 name format
:return: satosa format
"""
msg = "saml_name_id_format_to_hash_type is deprecated and will be removed."
_warnings.warn(msg, DeprecationWarning)
name_id_format_to_hash_type = {
NAMEID_FORMAT_TRANSIENT: UserIdHashType.transient,
NAMEID_FORMAT_PERSISTENT: UserIdHashType.persistent,
NAMEID_FORMAT_EMAILADDRESS: UserIdHashType.emailaddress,
NAMEID_FORMAT_UNSPECIFIED: UserIdHashType.unspecified,
}
return name_id_format_to_hash_type.get(
name_format, UserIdHashType.transient
) | python | def saml_name_id_format_to_hash_type(name_format):
msg = "saml_name_id_format_to_hash_type is deprecated and will be removed."
_warnings.warn(msg, DeprecationWarning)
name_id_format_to_hash_type = {
NAMEID_FORMAT_TRANSIENT: UserIdHashType.transient,
NAMEID_FORMAT_PERSISTENT: UserIdHashType.persistent,
NAMEID_FORMAT_EMAILADDRESS: UserIdHashType.emailaddress,
NAMEID_FORMAT_UNSPECIFIED: UserIdHashType.unspecified,
}
return name_id_format_to_hash_type.get(
name_format, UserIdHashType.transient
) | [
"def",
"saml_name_id_format_to_hash_type",
"(",
"name_format",
")",
":",
"msg",
"=",
"\"saml_name_id_format_to_hash_type is deprecated and will be removed.\"",
"_warnings",
".",
"warn",
"(",
"msg",
",",
"DeprecationWarning",
")",
"name_id_format_to_hash_type",
"=",
"{",
"NAMEID_FORMAT_TRANSIENT",
":",
"UserIdHashType",
".",
"transient",
",",
"NAMEID_FORMAT_PERSISTENT",
":",
"UserIdHashType",
".",
"persistent",
",",
"NAMEID_FORMAT_EMAILADDRESS",
":",
"UserIdHashType",
".",
"emailaddress",
",",
"NAMEID_FORMAT_UNSPECIFIED",
":",
"UserIdHashType",
".",
"unspecified",
",",
"}",
"return",
"name_id_format_to_hash_type",
".",
"get",
"(",
"name_format",
",",
"UserIdHashType",
".",
"transient",
")"
] | Translate pySAML2 name format to satosa format
:type name_format: str
:rtype: satosa.internal_data.UserIdHashType
:param name_format: SAML2 name format
:return: satosa format | [
"Translate",
"pySAML2",
"name",
"format",
"to",
"satosa",
"format"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/deprecated.py#L204-L225 |
250,842 | IdentityPython/SATOSA | src/satosa/deprecated.py | hash_type_to_saml_name_id_format | def hash_type_to_saml_name_id_format(hash_type):
"""
Translate satosa format to pySAML2 name format
:type hash_type: satosa.internal_data.UserIdHashType
:rtype: str
:param hash_type: satosa format
:return: pySAML2 name format
"""
msg = "hash_type_to_saml_name_id_format is deprecated and will be removed."
_warnings.warn(msg, DeprecationWarning)
hash_type_to_name_id_format = {
UserIdHashType.transient: NAMEID_FORMAT_TRANSIENT,
UserIdHashType.persistent: NAMEID_FORMAT_PERSISTENT,
UserIdHashType.emailaddress: NAMEID_FORMAT_EMAILADDRESS,
UserIdHashType.unspecified: NAMEID_FORMAT_UNSPECIFIED,
}
return hash_type_to_name_id_format.get(hash_type, NAMEID_FORMAT_PERSISTENT) | python | def hash_type_to_saml_name_id_format(hash_type):
msg = "hash_type_to_saml_name_id_format is deprecated and will be removed."
_warnings.warn(msg, DeprecationWarning)
hash_type_to_name_id_format = {
UserIdHashType.transient: NAMEID_FORMAT_TRANSIENT,
UserIdHashType.persistent: NAMEID_FORMAT_PERSISTENT,
UserIdHashType.emailaddress: NAMEID_FORMAT_EMAILADDRESS,
UserIdHashType.unspecified: NAMEID_FORMAT_UNSPECIFIED,
}
return hash_type_to_name_id_format.get(hash_type, NAMEID_FORMAT_PERSISTENT) | [
"def",
"hash_type_to_saml_name_id_format",
"(",
"hash_type",
")",
":",
"msg",
"=",
"\"hash_type_to_saml_name_id_format is deprecated and will be removed.\"",
"_warnings",
".",
"warn",
"(",
"msg",
",",
"DeprecationWarning",
")",
"hash_type_to_name_id_format",
"=",
"{",
"UserIdHashType",
".",
"transient",
":",
"NAMEID_FORMAT_TRANSIENT",
",",
"UserIdHashType",
".",
"persistent",
":",
"NAMEID_FORMAT_PERSISTENT",
",",
"UserIdHashType",
".",
"emailaddress",
":",
"NAMEID_FORMAT_EMAILADDRESS",
",",
"UserIdHashType",
".",
"unspecified",
":",
"NAMEID_FORMAT_UNSPECIFIED",
",",
"}",
"return",
"hash_type_to_name_id_format",
".",
"get",
"(",
"hash_type",
",",
"NAMEID_FORMAT_PERSISTENT",
")"
] | Translate satosa format to pySAML2 name format
:type hash_type: satosa.internal_data.UserIdHashType
:rtype: str
:param hash_type: satosa format
:return: pySAML2 name format | [
"Translate",
"satosa",
"format",
"to",
"pySAML2",
"name",
"format"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/deprecated.py#L228-L247 |
250,843 | IdentityPython/SATOSA | src/satosa/deprecated.py | UserIdHasher.save_state | def save_state(internal_request, state):
"""
Saves all necessary information needed by the UserIdHasher
:type internal_request: satosa.internal_data.InternalRequest
:param internal_request: The request
:param state: The current state
"""
state_data = {"hash_type": internal_request.user_id_hash_type}
state[UserIdHasher.STATE_KEY] = state_data | python | def save_state(internal_request, state):
state_data = {"hash_type": internal_request.user_id_hash_type}
state[UserIdHasher.STATE_KEY] = state_data | [
"def",
"save_state",
"(",
"internal_request",
",",
"state",
")",
":",
"state_data",
"=",
"{",
"\"hash_type\"",
":",
"internal_request",
".",
"user_id_hash_type",
"}",
"state",
"[",
"UserIdHasher",
".",
"STATE_KEY",
"]",
"=",
"state_data"
] | Saves all necessary information needed by the UserIdHasher
:type internal_request: satosa.internal_data.InternalRequest
:param internal_request: The request
:param state: The current state | [
"Saves",
"all",
"necessary",
"information",
"needed",
"by",
"the",
"UserIdHasher"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/deprecated.py#L122-L132 |
250,844 | IdentityPython/SATOSA | src/satosa/deprecated.py | UserIdHasher.hash_id | def hash_id(salt, user_id, requester, state):
"""
Sets a user id to the internal_response,
in the format specified by the internal response
:type salt: str
:type user_id: str
:type requester: str
:type state: satosa.state.State
:rtype: str
:param salt: A salt string for the ID hashing
:param user_id: the user id
:param user_id_hash_type: Hashing type
:param state: The current state
:return: the internal_response containing the hashed user ID
"""
hash_type_to_format = {
NAMEID_FORMAT_TRANSIENT: "{id}{req}{time}",
NAMEID_FORMAT_PERSISTENT: "{id}{req}",
"pairwise": "{id}{req}",
"public": "{id}",
NAMEID_FORMAT_EMAILADDRESS: "{id}",
NAMEID_FORMAT_UNSPECIFIED: "{id}",
}
format_args = {
"id": user_id,
"req": requester,
"time": datetime.datetime.utcnow().timestamp(),
}
hash_type = UserIdHasher.hash_type(state)
try:
fmt = hash_type_to_format[hash_type]
except KeyError as e:
raise ValueError("Unknown hash type: {}".format(hash_type)) from e
else:
user_id = fmt.format(**format_args)
hasher = (
(lambda salt, value: value)
if hash_type
in [NAMEID_FORMAT_EMAILADDRESS, NAMEID_FORMAT_UNSPECIFIED]
else util.hash_data
)
return hasher(salt, user_id) | python | def hash_id(salt, user_id, requester, state):
hash_type_to_format = {
NAMEID_FORMAT_TRANSIENT: "{id}{req}{time}",
NAMEID_FORMAT_PERSISTENT: "{id}{req}",
"pairwise": "{id}{req}",
"public": "{id}",
NAMEID_FORMAT_EMAILADDRESS: "{id}",
NAMEID_FORMAT_UNSPECIFIED: "{id}",
}
format_args = {
"id": user_id,
"req": requester,
"time": datetime.datetime.utcnow().timestamp(),
}
hash_type = UserIdHasher.hash_type(state)
try:
fmt = hash_type_to_format[hash_type]
except KeyError as e:
raise ValueError("Unknown hash type: {}".format(hash_type)) from e
else:
user_id = fmt.format(**format_args)
hasher = (
(lambda salt, value: value)
if hash_type
in [NAMEID_FORMAT_EMAILADDRESS, NAMEID_FORMAT_UNSPECIFIED]
else util.hash_data
)
return hasher(salt, user_id) | [
"def",
"hash_id",
"(",
"salt",
",",
"user_id",
",",
"requester",
",",
"state",
")",
":",
"hash_type_to_format",
"=",
"{",
"NAMEID_FORMAT_TRANSIENT",
":",
"\"{id}{req}{time}\"",
",",
"NAMEID_FORMAT_PERSISTENT",
":",
"\"{id}{req}\"",
",",
"\"pairwise\"",
":",
"\"{id}{req}\"",
",",
"\"public\"",
":",
"\"{id}\"",
",",
"NAMEID_FORMAT_EMAILADDRESS",
":",
"\"{id}\"",
",",
"NAMEID_FORMAT_UNSPECIFIED",
":",
"\"{id}\"",
",",
"}",
"format_args",
"=",
"{",
"\"id\"",
":",
"user_id",
",",
"\"req\"",
":",
"requester",
",",
"\"time\"",
":",
"datetime",
".",
"datetime",
".",
"utcnow",
"(",
")",
".",
"timestamp",
"(",
")",
",",
"}",
"hash_type",
"=",
"UserIdHasher",
".",
"hash_type",
"(",
"state",
")",
"try",
":",
"fmt",
"=",
"hash_type_to_format",
"[",
"hash_type",
"]",
"except",
"KeyError",
"as",
"e",
":",
"raise",
"ValueError",
"(",
"\"Unknown hash type: {}\"",
".",
"format",
"(",
"hash_type",
")",
")",
"from",
"e",
"else",
":",
"user_id",
"=",
"fmt",
".",
"format",
"(",
"*",
"*",
"format_args",
")",
"hasher",
"=",
"(",
"(",
"lambda",
"salt",
",",
"value",
":",
"value",
")",
"if",
"hash_type",
"in",
"[",
"NAMEID_FORMAT_EMAILADDRESS",
",",
"NAMEID_FORMAT_UNSPECIFIED",
"]",
"else",
"util",
".",
"hash_data",
")",
"return",
"hasher",
"(",
"salt",
",",
"user_id",
")"
] | Sets a user id to the internal_response,
in the format specified by the internal response
:type salt: str
:type user_id: str
:type requester: str
:type state: satosa.state.State
:rtype: str
:param salt: A salt string for the ID hashing
:param user_id: the user id
:param user_id_hash_type: Hashing type
:param state: The current state
:return: the internal_response containing the hashed user ID | [
"Sets",
"a",
"user",
"id",
"to",
"the",
"internal_response",
"in",
"the",
"format",
"specified",
"by",
"the",
"internal",
"response"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/deprecated.py#L155-L201 |
250,845 | IdentityPython/SATOSA | src/satosa/plugin_loader.py | load_backends | def load_backends(config, callback, internal_attributes):
"""
Load all backend modules specified in the config
:type config: satosa.satosa_config.SATOSAConfig
:type callback:
(satosa.context.Context, satosa.internal.InternalData) -> satosa.response.Response
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype: Sequence[satosa.backends.base.BackendModule]
:param config: The configuration of the satosa proxy
:param callback: Function that will be called by the backend after the authentication is done.
:return: A list of backend modules
"""
backend_modules = _load_plugins(config.get("CUSTOM_PLUGIN_MODULE_PATHS"), config["BACKEND_MODULES"], backend_filter,
config["BASE"], internal_attributes, callback)
logger.info("Setup backends: %s" % [backend.name for backend in backend_modules])
return backend_modules | python | def load_backends(config, callback, internal_attributes):
backend_modules = _load_plugins(config.get("CUSTOM_PLUGIN_MODULE_PATHS"), config["BACKEND_MODULES"], backend_filter,
config["BASE"], internal_attributes, callback)
logger.info("Setup backends: %s" % [backend.name for backend in backend_modules])
return backend_modules | [
"def",
"load_backends",
"(",
"config",
",",
"callback",
",",
"internal_attributes",
")",
":",
"backend_modules",
"=",
"_load_plugins",
"(",
"config",
".",
"get",
"(",
"\"CUSTOM_PLUGIN_MODULE_PATHS\"",
")",
",",
"config",
"[",
"\"BACKEND_MODULES\"",
"]",
",",
"backend_filter",
",",
"config",
"[",
"\"BASE\"",
"]",
",",
"internal_attributes",
",",
"callback",
")",
"logger",
".",
"info",
"(",
"\"Setup backends: %s\"",
"%",
"[",
"backend",
".",
"name",
"for",
"backend",
"in",
"backend_modules",
"]",
")",
"return",
"backend_modules"
] | Load all backend modules specified in the config
:type config: satosa.satosa_config.SATOSAConfig
:type callback:
(satosa.context.Context, satosa.internal.InternalData) -> satosa.response.Response
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype: Sequence[satosa.backends.base.BackendModule]
:param config: The configuration of the satosa proxy
:param callback: Function that will be called by the backend after the authentication is done.
:return: A list of backend modules | [
"Load",
"all",
"backend",
"modules",
"specified",
"in",
"the",
"config"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/plugin_loader.py#L30-L47 |
250,846 | IdentityPython/SATOSA | src/satosa/plugin_loader.py | load_frontends | def load_frontends(config, callback, internal_attributes):
"""
Load all frontend modules specified in the config
:type config: satosa.satosa_config.SATOSAConfig
:type callback:
(satosa.context.Context, satosa.internal.InternalData) -> satosa.response.Response
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype: Sequence[satosa.frontends.base.FrontendModule]
:param config: The configuration of the satosa proxy
:param callback: Function that will be called by the frontend after the authentication request
has been processed.
:return: A list of frontend modules
"""
frontend_modules = _load_plugins(config.get("CUSTOM_PLUGIN_MODULE_PATHS"), config["FRONTEND_MODULES"],
frontend_filter, config["BASE"], internal_attributes, callback)
logger.info("Setup frontends: %s" % [frontend.name for frontend in frontend_modules])
return frontend_modules | python | def load_frontends(config, callback, internal_attributes):
frontend_modules = _load_plugins(config.get("CUSTOM_PLUGIN_MODULE_PATHS"), config["FRONTEND_MODULES"],
frontend_filter, config["BASE"], internal_attributes, callback)
logger.info("Setup frontends: %s" % [frontend.name for frontend in frontend_modules])
return frontend_modules | [
"def",
"load_frontends",
"(",
"config",
",",
"callback",
",",
"internal_attributes",
")",
":",
"frontend_modules",
"=",
"_load_plugins",
"(",
"config",
".",
"get",
"(",
"\"CUSTOM_PLUGIN_MODULE_PATHS\"",
")",
",",
"config",
"[",
"\"FRONTEND_MODULES\"",
"]",
",",
"frontend_filter",
",",
"config",
"[",
"\"BASE\"",
"]",
",",
"internal_attributes",
",",
"callback",
")",
"logger",
".",
"info",
"(",
"\"Setup frontends: %s\"",
"%",
"[",
"frontend",
".",
"name",
"for",
"frontend",
"in",
"frontend_modules",
"]",
")",
"return",
"frontend_modules"
] | Load all frontend modules specified in the config
:type config: satosa.satosa_config.SATOSAConfig
:type callback:
(satosa.context.Context, satosa.internal.InternalData) -> satosa.response.Response
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype: Sequence[satosa.frontends.base.FrontendModule]
:param config: The configuration of the satosa proxy
:param callback: Function that will be called by the frontend after the authentication request
has been processed.
:return: A list of frontend modules | [
"Load",
"all",
"frontend",
"modules",
"specified",
"in",
"the",
"config"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/plugin_loader.py#L50-L68 |
250,847 | IdentityPython/SATOSA | src/satosa/plugin_loader.py | _micro_service_filter | def _micro_service_filter(cls):
"""
Will only give a find on classes that is a subclass of MicroService, with the exception that
the class is not allowed to be a direct ResponseMicroService or RequestMicroService.
:type cls: type
:rtype: bool
:param cls: A class object
:return: True if match, else false
"""
is_microservice_module = issubclass(cls, MicroService)
is_correct_subclass = cls != MicroService and cls != ResponseMicroService and cls != RequestMicroService
return is_microservice_module and is_correct_subclass | python | def _micro_service_filter(cls):
is_microservice_module = issubclass(cls, MicroService)
is_correct_subclass = cls != MicroService and cls != ResponseMicroService and cls != RequestMicroService
return is_microservice_module and is_correct_subclass | [
"def",
"_micro_service_filter",
"(",
"cls",
")",
":",
"is_microservice_module",
"=",
"issubclass",
"(",
"cls",
",",
"MicroService",
")",
"is_correct_subclass",
"=",
"cls",
"!=",
"MicroService",
"and",
"cls",
"!=",
"ResponseMicroService",
"and",
"cls",
"!=",
"RequestMicroService",
"return",
"is_microservice_module",
"and",
"is_correct_subclass"
] | Will only give a find on classes that is a subclass of MicroService, with the exception that
the class is not allowed to be a direct ResponseMicroService or RequestMicroService.
:type cls: type
:rtype: bool
:param cls: A class object
:return: True if match, else false | [
"Will",
"only",
"give",
"a",
"find",
"on",
"classes",
"that",
"is",
"a",
"subclass",
"of",
"MicroService",
"with",
"the",
"exception",
"that",
"the",
"class",
"is",
"not",
"allowed",
"to",
"be",
"a",
"direct",
"ResponseMicroService",
"or",
"RequestMicroService",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/plugin_loader.py#L97-L110 |
250,848 | IdentityPython/SATOSA | src/satosa/plugin_loader.py | _load_plugins | def _load_plugins(plugin_paths, plugins, plugin_filter, base_url, internal_attributes, callback):
"""
Loads endpoint plugins
:type plugin_paths: list[str]
:type plugins: list[str]
:type plugin_filter: (type | str) -> bool
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype list[satosa.plugin_base.endpoint.InterfaceModulePlugin]
:param plugin_paths: Path to the plugin directory
:param plugins: A list with the name of the plugin files
:param plugin_filter: Filter what to load from the module file
:param args: Arguments to the plugin
:return: A list with all the loaded plugins
"""
loaded_plugin_modules = []
with prepend_to_import_path(plugin_paths):
for plugin_config in plugins:
try:
module_class = _load_endpoint_module(plugin_config, plugin_filter)
except SATOSAConfigurationError as e:
raise SATOSAConfigurationError("Configuration error in {}".format(json.dumps(plugin_config))) from e
if module_class:
module_config = _replace_variables_in_plugin_module_config(plugin_config["config"], base_url,
plugin_config["name"])
instance = module_class(callback, internal_attributes, module_config, base_url,
plugin_config["name"])
loaded_plugin_modules.append(instance)
return loaded_plugin_modules | python | def _load_plugins(plugin_paths, plugins, plugin_filter, base_url, internal_attributes, callback):
loaded_plugin_modules = []
with prepend_to_import_path(plugin_paths):
for plugin_config in plugins:
try:
module_class = _load_endpoint_module(plugin_config, plugin_filter)
except SATOSAConfigurationError as e:
raise SATOSAConfigurationError("Configuration error in {}".format(json.dumps(plugin_config))) from e
if module_class:
module_config = _replace_variables_in_plugin_module_config(plugin_config["config"], base_url,
plugin_config["name"])
instance = module_class(callback, internal_attributes, module_config, base_url,
plugin_config["name"])
loaded_plugin_modules.append(instance)
return loaded_plugin_modules | [
"def",
"_load_plugins",
"(",
"plugin_paths",
",",
"plugins",
",",
"plugin_filter",
",",
"base_url",
",",
"internal_attributes",
",",
"callback",
")",
":",
"loaded_plugin_modules",
"=",
"[",
"]",
"with",
"prepend_to_import_path",
"(",
"plugin_paths",
")",
":",
"for",
"plugin_config",
"in",
"plugins",
":",
"try",
":",
"module_class",
"=",
"_load_endpoint_module",
"(",
"plugin_config",
",",
"plugin_filter",
")",
"except",
"SATOSAConfigurationError",
"as",
"e",
":",
"raise",
"SATOSAConfigurationError",
"(",
"\"Configuration error in {}\"",
".",
"format",
"(",
"json",
".",
"dumps",
"(",
"plugin_config",
")",
")",
")",
"from",
"e",
"if",
"module_class",
":",
"module_config",
"=",
"_replace_variables_in_plugin_module_config",
"(",
"plugin_config",
"[",
"\"config\"",
"]",
",",
"base_url",
",",
"plugin_config",
"[",
"\"name\"",
"]",
")",
"instance",
"=",
"module_class",
"(",
"callback",
",",
"internal_attributes",
",",
"module_config",
",",
"base_url",
",",
"plugin_config",
"[",
"\"name\"",
"]",
")",
"loaded_plugin_modules",
".",
"append",
"(",
"instance",
")",
"return",
"loaded_plugin_modules"
] | Loads endpoint plugins
:type plugin_paths: list[str]
:type plugins: list[str]
:type plugin_filter: (type | str) -> bool
:type internal_attributes: dict[string, dict[str, str | list[str]]]
:rtype list[satosa.plugin_base.endpoint.InterfaceModulePlugin]
:param plugin_paths: Path to the plugin directory
:param plugins: A list with the name of the plugin files
:param plugin_filter: Filter what to load from the module file
:param args: Arguments to the plugin
:return: A list with all the loaded plugins | [
"Loads",
"endpoint",
"plugins"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/plugin_loader.py#L151-L181 |
250,849 | IdentityPython/SATOSA | src/satosa/scripts/satosa_saml_metadata.py | create_and_write_saml_metadata | def create_and_write_saml_metadata(proxy_conf, key, cert, dir, valid, split_frontend_metadata=False,
split_backend_metadata=False):
"""
Generates SAML metadata for the given PROXY_CONF, signed with the given KEY and associated CERT.
"""
satosa_config = SATOSAConfig(proxy_conf)
secc = _get_security_context(key, cert)
frontend_entities, backend_entities = create_entity_descriptors(satosa_config)
output = []
if frontend_entities:
if split_frontend_metadata:
output.extend(_create_split_entity_descriptors(frontend_entities, secc, valid))
else:
output.extend(_create_merged_entities_descriptors(frontend_entities, secc, valid, "frontend.xml"))
if backend_entities:
if split_backend_metadata:
output.extend(_create_split_entity_descriptors(backend_entities, secc, valid))
else:
output.extend(_create_merged_entities_descriptors(backend_entities, secc, valid, "backend.xml"))
for metadata, filename in output:
path = os.path.join(dir, filename)
print("Writing metadata to '{}'".format(path))
with open(path, "w") as f:
f.write(metadata) | python | def create_and_write_saml_metadata(proxy_conf, key, cert, dir, valid, split_frontend_metadata=False,
split_backend_metadata=False):
satosa_config = SATOSAConfig(proxy_conf)
secc = _get_security_context(key, cert)
frontend_entities, backend_entities = create_entity_descriptors(satosa_config)
output = []
if frontend_entities:
if split_frontend_metadata:
output.extend(_create_split_entity_descriptors(frontend_entities, secc, valid))
else:
output.extend(_create_merged_entities_descriptors(frontend_entities, secc, valid, "frontend.xml"))
if backend_entities:
if split_backend_metadata:
output.extend(_create_split_entity_descriptors(backend_entities, secc, valid))
else:
output.extend(_create_merged_entities_descriptors(backend_entities, secc, valid, "backend.xml"))
for metadata, filename in output:
path = os.path.join(dir, filename)
print("Writing metadata to '{}'".format(path))
with open(path, "w") as f:
f.write(metadata) | [
"def",
"create_and_write_saml_metadata",
"(",
"proxy_conf",
",",
"key",
",",
"cert",
",",
"dir",
",",
"valid",
",",
"split_frontend_metadata",
"=",
"False",
",",
"split_backend_metadata",
"=",
"False",
")",
":",
"satosa_config",
"=",
"SATOSAConfig",
"(",
"proxy_conf",
")",
"secc",
"=",
"_get_security_context",
"(",
"key",
",",
"cert",
")",
"frontend_entities",
",",
"backend_entities",
"=",
"create_entity_descriptors",
"(",
"satosa_config",
")",
"output",
"=",
"[",
"]",
"if",
"frontend_entities",
":",
"if",
"split_frontend_metadata",
":",
"output",
".",
"extend",
"(",
"_create_split_entity_descriptors",
"(",
"frontend_entities",
",",
"secc",
",",
"valid",
")",
")",
"else",
":",
"output",
".",
"extend",
"(",
"_create_merged_entities_descriptors",
"(",
"frontend_entities",
",",
"secc",
",",
"valid",
",",
"\"frontend.xml\"",
")",
")",
"if",
"backend_entities",
":",
"if",
"split_backend_metadata",
":",
"output",
".",
"extend",
"(",
"_create_split_entity_descriptors",
"(",
"backend_entities",
",",
"secc",
",",
"valid",
")",
")",
"else",
":",
"output",
".",
"extend",
"(",
"_create_merged_entities_descriptors",
"(",
"backend_entities",
",",
"secc",
",",
"valid",
",",
"\"backend.xml\"",
")",
")",
"for",
"metadata",
",",
"filename",
"in",
"output",
":",
"path",
"=",
"os",
".",
"path",
".",
"join",
"(",
"dir",
",",
"filename",
")",
"print",
"(",
"\"Writing metadata to '{}'\"",
".",
"format",
"(",
"path",
")",
")",
"with",
"open",
"(",
"path",
",",
"\"w\"",
")",
"as",
"f",
":",
"f",
".",
"write",
"(",
"metadata",
")"
] | Generates SAML metadata for the given PROXY_CONF, signed with the given KEY and associated CERT. | [
"Generates",
"SAML",
"metadata",
"for",
"the",
"given",
"PROXY_CONF",
"signed",
"with",
"the",
"given",
"KEY",
"and",
"associated",
"CERT",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/scripts/satosa_saml_metadata.py#L38-L63 |
250,850 | IdentityPython/SATOSA | src/satosa/micro_services/account_linking.py | AccountLinking._handle_al_response | def _handle_al_response(self, context):
"""
Endpoint for handling account linking service response. When getting here
user might have approved or rejected linking their account
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The current context
:return: response
"""
saved_state = context.state[self.name]
internal_response = InternalData.from_dict(saved_state)
#subject_id here is the linked id , not the facebook one, Figure out what to do
status_code, message = self._get_uuid(context, internal_response.auth_info.issuer, internal_response.attributes['issuer_user_id'])
if status_code == 200:
satosa_logging(logger, logging.INFO, "issuer/id pair is linked in AL service",
context.state)
internal_response.subject_id = message
if self.id_to_attr:
internal_response.attributes[self.id_to_attr] = [message]
del context.state[self.name]
return super().process(context, internal_response)
else:
# User selected not to link their accounts, so the internal.response.subject_id is based on the
# issuers id/sub which is fine
satosa_logging(logger, logging.INFO, "User selected to not link their identity in AL service",
context.state)
del context.state[self.name]
return super().process(context, internal_response) | python | def _handle_al_response(self, context):
saved_state = context.state[self.name]
internal_response = InternalData.from_dict(saved_state)
#subject_id here is the linked id , not the facebook one, Figure out what to do
status_code, message = self._get_uuid(context, internal_response.auth_info.issuer, internal_response.attributes['issuer_user_id'])
if status_code == 200:
satosa_logging(logger, logging.INFO, "issuer/id pair is linked in AL service",
context.state)
internal_response.subject_id = message
if self.id_to_attr:
internal_response.attributes[self.id_to_attr] = [message]
del context.state[self.name]
return super().process(context, internal_response)
else:
# User selected not to link their accounts, so the internal.response.subject_id is based on the
# issuers id/sub which is fine
satosa_logging(logger, logging.INFO, "User selected to not link their identity in AL service",
context.state)
del context.state[self.name]
return super().process(context, internal_response) | [
"def",
"_handle_al_response",
"(",
"self",
",",
"context",
")",
":",
"saved_state",
"=",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"internal_response",
"=",
"InternalData",
".",
"from_dict",
"(",
"saved_state",
")",
"#subject_id here is the linked id , not the facebook one, Figure out what to do",
"status_code",
",",
"message",
"=",
"self",
".",
"_get_uuid",
"(",
"context",
",",
"internal_response",
".",
"auth_info",
".",
"issuer",
",",
"internal_response",
".",
"attributes",
"[",
"'issuer_user_id'",
"]",
")",
"if",
"status_code",
"==",
"200",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"INFO",
",",
"\"issuer/id pair is linked in AL service\"",
",",
"context",
".",
"state",
")",
"internal_response",
".",
"subject_id",
"=",
"message",
"if",
"self",
".",
"id_to_attr",
":",
"internal_response",
".",
"attributes",
"[",
"self",
".",
"id_to_attr",
"]",
"=",
"[",
"message",
"]",
"del",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"return",
"super",
"(",
")",
".",
"process",
"(",
"context",
",",
"internal_response",
")",
"else",
":",
"# User selected not to link their accounts, so the internal.response.subject_id is based on the",
"# issuers id/sub which is fine",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"INFO",
",",
"\"User selected to not link their identity in AL service\"",
",",
"context",
".",
"state",
")",
"del",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"return",
"super",
"(",
")",
".",
"process",
"(",
"context",
",",
"internal_response",
")"
] | Endpoint for handling account linking service response. When getting here
user might have approved or rejected linking their account
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The current context
:return: response | [
"Endpoint",
"for",
"handling",
"account",
"linking",
"service",
"response",
".",
"When",
"getting",
"here",
"user",
"might",
"have",
"approved",
"or",
"rejected",
"linking",
"their",
"account"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/account_linking.py#L38-L70 |
250,851 | IdentityPython/SATOSA | src/satosa/micro_services/account_linking.py | AccountLinking.process | def process(self, context, internal_response):
"""
Manage account linking and recovery
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context:
:param internal_response:
:return: response
:
"""
status_code, message = self._get_uuid(context, internal_response.auth_info.issuer, internal_response.subject_id)
data = {
"issuer": internal_response.auth_info.issuer,
"redirect_endpoint": "%s/account_linking%s" % (self.base_url, self.endpoint)
}
# Store the issuer subject_id/sub because we'll need it in handle_al_response
internal_response.attributes['issuer_user_id'] = internal_response.subject_id
if status_code == 200:
satosa_logging(logger, logging.INFO, "issuer/id pair is linked in AL service",
context.state)
internal_response.subject_id = message
data['user_id'] = message
if self.id_to_attr:
internal_response.attributes[self.id_to_attr] = [message]
else:
satosa_logging(logger, logging.INFO, "issuer/id pair is not linked in AL service. Got a ticket",
context.state)
data['ticket'] = message
jws = JWS(json.dumps(data), alg=self.signing_key.alg).sign_compact([self.signing_key])
context.state[self.name] = internal_response.to_dict()
return Redirect("%s/%s" % (self.redirect_url, jws)) | python | def process(self, context, internal_response):
status_code, message = self._get_uuid(context, internal_response.auth_info.issuer, internal_response.subject_id)
data = {
"issuer": internal_response.auth_info.issuer,
"redirect_endpoint": "%s/account_linking%s" % (self.base_url, self.endpoint)
}
# Store the issuer subject_id/sub because we'll need it in handle_al_response
internal_response.attributes['issuer_user_id'] = internal_response.subject_id
if status_code == 200:
satosa_logging(logger, logging.INFO, "issuer/id pair is linked in AL service",
context.state)
internal_response.subject_id = message
data['user_id'] = message
if self.id_to_attr:
internal_response.attributes[self.id_to_attr] = [message]
else:
satosa_logging(logger, logging.INFO, "issuer/id pair is not linked in AL service. Got a ticket",
context.state)
data['ticket'] = message
jws = JWS(json.dumps(data), alg=self.signing_key.alg).sign_compact([self.signing_key])
context.state[self.name] = internal_response.to_dict()
return Redirect("%s/%s" % (self.redirect_url, jws)) | [
"def",
"process",
"(",
"self",
",",
"context",
",",
"internal_response",
")",
":",
"status_code",
",",
"message",
"=",
"self",
".",
"_get_uuid",
"(",
"context",
",",
"internal_response",
".",
"auth_info",
".",
"issuer",
",",
"internal_response",
".",
"subject_id",
")",
"data",
"=",
"{",
"\"issuer\"",
":",
"internal_response",
".",
"auth_info",
".",
"issuer",
",",
"\"redirect_endpoint\"",
":",
"\"%s/account_linking%s\"",
"%",
"(",
"self",
".",
"base_url",
",",
"self",
".",
"endpoint",
")",
"}",
"# Store the issuer subject_id/sub because we'll need it in handle_al_response",
"internal_response",
".",
"attributes",
"[",
"'issuer_user_id'",
"]",
"=",
"internal_response",
".",
"subject_id",
"if",
"status_code",
"==",
"200",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"INFO",
",",
"\"issuer/id pair is linked in AL service\"",
",",
"context",
".",
"state",
")",
"internal_response",
".",
"subject_id",
"=",
"message",
"data",
"[",
"'user_id'",
"]",
"=",
"message",
"if",
"self",
".",
"id_to_attr",
":",
"internal_response",
".",
"attributes",
"[",
"self",
".",
"id_to_attr",
"]",
"=",
"[",
"message",
"]",
"else",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"INFO",
",",
"\"issuer/id pair is not linked in AL service. Got a ticket\"",
",",
"context",
".",
"state",
")",
"data",
"[",
"'ticket'",
"]",
"=",
"message",
"jws",
"=",
"JWS",
"(",
"json",
".",
"dumps",
"(",
"data",
")",
",",
"alg",
"=",
"self",
".",
"signing_key",
".",
"alg",
")",
".",
"sign_compact",
"(",
"[",
"self",
".",
"signing_key",
"]",
")",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"=",
"internal_response",
".",
"to_dict",
"(",
")",
"return",
"Redirect",
"(",
"\"%s/%s\"",
"%",
"(",
"self",
".",
"redirect_url",
",",
"jws",
")",
")"
] | Manage account linking and recovery
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context:
:param internal_response:
:return: response
: | [
"Manage",
"account",
"linking",
"and",
"recovery"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/micro_services/account_linking.py#L73-L109 |
250,852 | IdentityPython/SATOSA | src/satosa/routing.py | ModuleRouter.backend_routing | def backend_routing(self, context):
"""
Returns the targeted backend and an updated state
:type context: satosa.context.Context
:rtype satosa.backends.base.BackendModule
:param context: The request context
:return: backend
"""
satosa_logging(logger, logging.DEBUG, "Routing to backend: %s " % context.target_backend, context.state)
backend = self.backends[context.target_backend]["instance"]
context.state[STATE_KEY] = context.target_frontend
return backend | python | def backend_routing(self, context):
satosa_logging(logger, logging.DEBUG, "Routing to backend: %s " % context.target_backend, context.state)
backend = self.backends[context.target_backend]["instance"]
context.state[STATE_KEY] = context.target_frontend
return backend | [
"def",
"backend_routing",
"(",
"self",
",",
"context",
")",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Routing to backend: %s \"",
"%",
"context",
".",
"target_backend",
",",
"context",
".",
"state",
")",
"backend",
"=",
"self",
".",
"backends",
"[",
"context",
".",
"target_backend",
"]",
"[",
"\"instance\"",
"]",
"context",
".",
"state",
"[",
"STATE_KEY",
"]",
"=",
"context",
".",
"target_frontend",
"return",
"backend"
] | Returns the targeted backend and an updated state
:type context: satosa.context.Context
:rtype satosa.backends.base.BackendModule
:param context: The request context
:return: backend | [
"Returns",
"the",
"targeted",
"backend",
"and",
"an",
"updated",
"state"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/routing.py#L73-L86 |
250,853 | IdentityPython/SATOSA | src/satosa/routing.py | ModuleRouter.frontend_routing | def frontend_routing(self, context):
"""
Returns the targeted frontend and original state
:type context: satosa.context.Context
:rtype satosa.frontends.base.FrontendModule
:param context: The response context
:return: frontend
"""
target_frontend = context.state[STATE_KEY]
satosa_logging(logger, logging.DEBUG, "Routing to frontend: %s " % target_frontend, context.state)
context.target_frontend = target_frontend
frontend = self.frontends[context.target_frontend]["instance"]
return frontend | python | def frontend_routing(self, context):
target_frontend = context.state[STATE_KEY]
satosa_logging(logger, logging.DEBUG, "Routing to frontend: %s " % target_frontend, context.state)
context.target_frontend = target_frontend
frontend = self.frontends[context.target_frontend]["instance"]
return frontend | [
"def",
"frontend_routing",
"(",
"self",
",",
"context",
")",
":",
"target_frontend",
"=",
"context",
".",
"state",
"[",
"STATE_KEY",
"]",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Routing to frontend: %s \"",
"%",
"target_frontend",
",",
"context",
".",
"state",
")",
"context",
".",
"target_frontend",
"=",
"target_frontend",
"frontend",
"=",
"self",
".",
"frontends",
"[",
"context",
".",
"target_frontend",
"]",
"[",
"\"instance\"",
"]",
"return",
"frontend"
] | Returns the targeted frontend and original state
:type context: satosa.context.Context
:rtype satosa.frontends.base.FrontendModule
:param context: The response context
:return: frontend | [
"Returns",
"the",
"targeted",
"frontend",
"and",
"original",
"state"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/routing.py#L88-L103 |
250,854 | IdentityPython/SATOSA | src/satosa/routing.py | ModuleRouter.endpoint_routing | def endpoint_routing(self, context):
"""
Finds and returns the endpoint function bound to the path
:type context: satosa.context.Context
:rtype: ((satosa.context.Context, Any) -> Any, Any)
:param context: The request context
:return: registered endpoint and bound parameters
"""
if context.path is None:
satosa_logging(logger, logging.DEBUG, "Context did not contain a path!", context.state)
raise SATOSABadContextError("Context did not contain any path")
satosa_logging(logger, logging.DEBUG, "Routing path: %s" % context.path, context.state)
path_split = context.path.split("/")
backend = path_split[0]
if backend in self.backends:
context.target_backend = backend
else:
satosa_logging(logger, logging.DEBUG, "Unknown backend %s" % backend, context.state)
try:
name, frontend_endpoint = self._find_registered_endpoint(context, self.frontends)
except ModuleRouter.UnknownEndpoint as e:
pass
else:
context.target_frontend = name
return frontend_endpoint
try:
name, micro_service_endpoint = self._find_registered_endpoint(context, self.micro_services)
except ModuleRouter.UnknownEndpoint as e:
pass
else:
context.target_micro_service = name
return micro_service_endpoint
if backend in self.backends:
backend_endpoint = self._find_registered_backend_endpoint(context)
if backend_endpoint:
return backend_endpoint
raise SATOSANoBoundEndpointError("'{}' not bound to any function".format(context.path)) | python | def endpoint_routing(self, context):
if context.path is None:
satosa_logging(logger, logging.DEBUG, "Context did not contain a path!", context.state)
raise SATOSABadContextError("Context did not contain any path")
satosa_logging(logger, logging.DEBUG, "Routing path: %s" % context.path, context.state)
path_split = context.path.split("/")
backend = path_split[0]
if backend in self.backends:
context.target_backend = backend
else:
satosa_logging(logger, logging.DEBUG, "Unknown backend %s" % backend, context.state)
try:
name, frontend_endpoint = self._find_registered_endpoint(context, self.frontends)
except ModuleRouter.UnknownEndpoint as e:
pass
else:
context.target_frontend = name
return frontend_endpoint
try:
name, micro_service_endpoint = self._find_registered_endpoint(context, self.micro_services)
except ModuleRouter.UnknownEndpoint as e:
pass
else:
context.target_micro_service = name
return micro_service_endpoint
if backend in self.backends:
backend_endpoint = self._find_registered_backend_endpoint(context)
if backend_endpoint:
return backend_endpoint
raise SATOSANoBoundEndpointError("'{}' not bound to any function".format(context.path)) | [
"def",
"endpoint_routing",
"(",
"self",
",",
"context",
")",
":",
"if",
"context",
".",
"path",
"is",
"None",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Context did not contain a path!\"",
",",
"context",
".",
"state",
")",
"raise",
"SATOSABadContextError",
"(",
"\"Context did not contain any path\"",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Routing path: %s\"",
"%",
"context",
".",
"path",
",",
"context",
".",
"state",
")",
"path_split",
"=",
"context",
".",
"path",
".",
"split",
"(",
"\"/\"",
")",
"backend",
"=",
"path_split",
"[",
"0",
"]",
"if",
"backend",
"in",
"self",
".",
"backends",
":",
"context",
".",
"target_backend",
"=",
"backend",
"else",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Unknown backend %s\"",
"%",
"backend",
",",
"context",
".",
"state",
")",
"try",
":",
"name",
",",
"frontend_endpoint",
"=",
"self",
".",
"_find_registered_endpoint",
"(",
"context",
",",
"self",
".",
"frontends",
")",
"except",
"ModuleRouter",
".",
"UnknownEndpoint",
"as",
"e",
":",
"pass",
"else",
":",
"context",
".",
"target_frontend",
"=",
"name",
"return",
"frontend_endpoint",
"try",
":",
"name",
",",
"micro_service_endpoint",
"=",
"self",
".",
"_find_registered_endpoint",
"(",
"context",
",",
"self",
".",
"micro_services",
")",
"except",
"ModuleRouter",
".",
"UnknownEndpoint",
"as",
"e",
":",
"pass",
"else",
":",
"context",
".",
"target_micro_service",
"=",
"name",
"return",
"micro_service_endpoint",
"if",
"backend",
"in",
"self",
".",
"backends",
":",
"backend_endpoint",
"=",
"self",
".",
"_find_registered_backend_endpoint",
"(",
"context",
")",
"if",
"backend_endpoint",
":",
"return",
"backend_endpoint",
"raise",
"SATOSANoBoundEndpointError",
"(",
"\"'{}' not bound to any function\"",
".",
"format",
"(",
"context",
".",
"path",
")",
")"
] | Finds and returns the endpoint function bound to the path
:type context: satosa.context.Context
:rtype: ((satosa.context.Context, Any) -> Any, Any)
:param context: The request context
:return: registered endpoint and bound parameters | [
"Finds",
"and",
"returns",
"the",
"endpoint",
"function",
"bound",
"to",
"the",
"path"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/routing.py#L128-L172 |
250,855 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase._auth_req_callback_func | def _auth_req_callback_func(self, context, internal_request):
"""
This function is called by a frontend module when an authorization request has been
processed.
:type context: satosa.context.Context
:type internal_request: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: The request context
:param internal_request: request processed by the frontend
:return: response
"""
state = context.state
state[STATE_KEY] = {"requester": internal_request.requester}
# TODO consent module should manage any state it needs by itself
try:
state_dict = context.state[consent.STATE_KEY]
except KeyError:
state_dict = context.state[consent.STATE_KEY] = {}
finally:
state_dict.update({
"filter": internal_request.attributes or [],
"requester_name": internal_request.requester_name,
})
satosa_logging(logger, logging.INFO,
"Requesting provider: {}".format(internal_request.requester), state)
if self.request_micro_services:
return self.request_micro_services[0].process(context, internal_request)
return self._auth_req_finish(context, internal_request) | python | def _auth_req_callback_func(self, context, internal_request):
state = context.state
state[STATE_KEY] = {"requester": internal_request.requester}
# TODO consent module should manage any state it needs by itself
try:
state_dict = context.state[consent.STATE_KEY]
except KeyError:
state_dict = context.state[consent.STATE_KEY] = {}
finally:
state_dict.update({
"filter": internal_request.attributes or [],
"requester_name": internal_request.requester_name,
})
satosa_logging(logger, logging.INFO,
"Requesting provider: {}".format(internal_request.requester), state)
if self.request_micro_services:
return self.request_micro_services[0].process(context, internal_request)
return self._auth_req_finish(context, internal_request) | [
"def",
"_auth_req_callback_func",
"(",
"self",
",",
"context",
",",
"internal_request",
")",
":",
"state",
"=",
"context",
".",
"state",
"state",
"[",
"STATE_KEY",
"]",
"=",
"{",
"\"requester\"",
":",
"internal_request",
".",
"requester",
"}",
"# TODO consent module should manage any state it needs by itself",
"try",
":",
"state_dict",
"=",
"context",
".",
"state",
"[",
"consent",
".",
"STATE_KEY",
"]",
"except",
"KeyError",
":",
"state_dict",
"=",
"context",
".",
"state",
"[",
"consent",
".",
"STATE_KEY",
"]",
"=",
"{",
"}",
"finally",
":",
"state_dict",
".",
"update",
"(",
"{",
"\"filter\"",
":",
"internal_request",
".",
"attributes",
"or",
"[",
"]",
",",
"\"requester_name\"",
":",
"internal_request",
".",
"requester_name",
",",
"}",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"INFO",
",",
"\"Requesting provider: {}\"",
".",
"format",
"(",
"internal_request",
".",
"requester",
")",
",",
"state",
")",
"if",
"self",
".",
"request_micro_services",
":",
"return",
"self",
".",
"request_micro_services",
"[",
"0",
"]",
".",
"process",
"(",
"context",
",",
"internal_request",
")",
"return",
"self",
".",
"_auth_req_finish",
"(",
"context",
",",
"internal_request",
")"
] | This function is called by a frontend module when an authorization request has been
processed.
:type context: satosa.context.Context
:type internal_request: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: The request context
:param internal_request: request processed by the frontend
:return: response | [
"This",
"function",
"is",
"called",
"by",
"a",
"frontend",
"module",
"when",
"an",
"authorization",
"request",
"has",
"been",
"processed",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L114-L146 |
250,856 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase._auth_resp_callback_func | def _auth_resp_callback_func(self, context, internal_response):
"""
This function is called by a backend module when the authorization is
complete.
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: The request context
:param internal_response: The authentication response
:return: response
"""
context.request = None
internal_response.requester = context.state[STATE_KEY]["requester"]
# If configured construct the user id from attribute values.
if "user_id_from_attrs" in self.config["INTERNAL_ATTRIBUTES"]:
subject_id = [
"".join(internal_response.attributes[attr]) for attr in
self.config["INTERNAL_ATTRIBUTES"]["user_id_from_attrs"]
]
internal_response.subject_id = "".join(subject_id)
if self.response_micro_services:
return self.response_micro_services[0].process(
context, internal_response)
return self._auth_resp_finish(context, internal_response) | python | def _auth_resp_callback_func(self, context, internal_response):
context.request = None
internal_response.requester = context.state[STATE_KEY]["requester"]
# If configured construct the user id from attribute values.
if "user_id_from_attrs" in self.config["INTERNAL_ATTRIBUTES"]:
subject_id = [
"".join(internal_response.attributes[attr]) for attr in
self.config["INTERNAL_ATTRIBUTES"]["user_id_from_attrs"]
]
internal_response.subject_id = "".join(subject_id)
if self.response_micro_services:
return self.response_micro_services[0].process(
context, internal_response)
return self._auth_resp_finish(context, internal_response) | [
"def",
"_auth_resp_callback_func",
"(",
"self",
",",
"context",
",",
"internal_response",
")",
":",
"context",
".",
"request",
"=",
"None",
"internal_response",
".",
"requester",
"=",
"context",
".",
"state",
"[",
"STATE_KEY",
"]",
"[",
"\"requester\"",
"]",
"# If configured construct the user id from attribute values.",
"if",
"\"user_id_from_attrs\"",
"in",
"self",
".",
"config",
"[",
"\"INTERNAL_ATTRIBUTES\"",
"]",
":",
"subject_id",
"=",
"[",
"\"\"",
".",
"join",
"(",
"internal_response",
".",
"attributes",
"[",
"attr",
"]",
")",
"for",
"attr",
"in",
"self",
".",
"config",
"[",
"\"INTERNAL_ATTRIBUTES\"",
"]",
"[",
"\"user_id_from_attrs\"",
"]",
"]",
"internal_response",
".",
"subject_id",
"=",
"\"\"",
".",
"join",
"(",
"subject_id",
")",
"if",
"self",
".",
"response_micro_services",
":",
"return",
"self",
".",
"response_micro_services",
"[",
"0",
"]",
".",
"process",
"(",
"context",
",",
"internal_response",
")",
"return",
"self",
".",
"_auth_resp_finish",
"(",
"context",
",",
"internal_response",
")"
] | This function is called by a backend module when the authorization is
complete.
:type context: satosa.context.Context
:type internal_response: satosa.internal.InternalData
:rtype: satosa.response.Response
:param context: The request context
:param internal_response: The authentication response
:return: response | [
"This",
"function",
"is",
"called",
"by",
"a",
"backend",
"module",
"when",
"the",
"authorization",
"is",
"complete",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L170-L199 |
250,857 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase._handle_satosa_authentication_error | def _handle_satosa_authentication_error(self, error):
"""
Sends a response to the requester about the error
:type error: satosa.exception.SATOSAAuthenticationError
:rtype: satosa.response.Response
:param error: The exception
:return: response
"""
context = Context()
context.state = error.state
frontend = self.module_router.frontend_routing(context)
return frontend.handle_backend_error(error) | python | def _handle_satosa_authentication_error(self, error):
context = Context()
context.state = error.state
frontend = self.module_router.frontend_routing(context)
return frontend.handle_backend_error(error) | [
"def",
"_handle_satosa_authentication_error",
"(",
"self",
",",
"error",
")",
":",
"context",
"=",
"Context",
"(",
")",
"context",
".",
"state",
"=",
"error",
".",
"state",
"frontend",
"=",
"self",
".",
"module_router",
".",
"frontend_routing",
"(",
"context",
")",
"return",
"frontend",
".",
"handle_backend_error",
"(",
"error",
")"
] | Sends a response to the requester about the error
:type error: satosa.exception.SATOSAAuthenticationError
:rtype: satosa.response.Response
:param error: The exception
:return: response | [
"Sends",
"a",
"response",
"to",
"the",
"requester",
"about",
"the",
"error"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L201-L214 |
250,858 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase._load_state | def _load_state(self, context):
"""
Load state from cookie to the context
:type context: satosa.context.Context
:param context: Session context
"""
try:
state = cookie_to_state(
context.cookie,
self.config["COOKIE_STATE_NAME"],
self.config["STATE_ENCRYPTION_KEY"])
except SATOSAStateError as e:
msg_tmpl = 'Failed to decrypt state {state} with {error}'
msg = msg_tmpl.format(state=context.cookie, error=str(e))
satosa_logging(logger, logging.WARNING, msg, None)
state = State()
finally:
context.state = state | python | def _load_state(self, context):
try:
state = cookie_to_state(
context.cookie,
self.config["COOKIE_STATE_NAME"],
self.config["STATE_ENCRYPTION_KEY"])
except SATOSAStateError as e:
msg_tmpl = 'Failed to decrypt state {state} with {error}'
msg = msg_tmpl.format(state=context.cookie, error=str(e))
satosa_logging(logger, logging.WARNING, msg, None)
state = State()
finally:
context.state = state | [
"def",
"_load_state",
"(",
"self",
",",
"context",
")",
":",
"try",
":",
"state",
"=",
"cookie_to_state",
"(",
"context",
".",
"cookie",
",",
"self",
".",
"config",
"[",
"\"COOKIE_STATE_NAME\"",
"]",
",",
"self",
".",
"config",
"[",
"\"STATE_ENCRYPTION_KEY\"",
"]",
")",
"except",
"SATOSAStateError",
"as",
"e",
":",
"msg_tmpl",
"=",
"'Failed to decrypt state {state} with {error}'",
"msg",
"=",
"msg_tmpl",
".",
"format",
"(",
"state",
"=",
"context",
".",
"cookie",
",",
"error",
"=",
"str",
"(",
"e",
")",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"WARNING",
",",
"msg",
",",
"None",
")",
"state",
"=",
"State",
"(",
")",
"finally",
":",
"context",
".",
"state",
"=",
"state"
] | Load state from cookie to the context
:type context: satosa.context.Context
:param context: Session context | [
"Load",
"state",
"from",
"cookie",
"to",
"the",
"context"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L238-L256 |
250,859 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase._save_state | def _save_state(self, resp, context):
"""
Saves a state from context to cookie
:type resp: satosa.response.Response
:type context: satosa.context.Context
:param resp: The response
:param context: Session context
"""
cookie = state_to_cookie(context.state, self.config["COOKIE_STATE_NAME"], "/",
self.config["STATE_ENCRYPTION_KEY"])
resp.headers.append(tuple(cookie.output().split(": ", 1))) | python | def _save_state(self, resp, context):
cookie = state_to_cookie(context.state, self.config["COOKIE_STATE_NAME"], "/",
self.config["STATE_ENCRYPTION_KEY"])
resp.headers.append(tuple(cookie.output().split(": ", 1))) | [
"def",
"_save_state",
"(",
"self",
",",
"resp",
",",
"context",
")",
":",
"cookie",
"=",
"state_to_cookie",
"(",
"context",
".",
"state",
",",
"self",
".",
"config",
"[",
"\"COOKIE_STATE_NAME\"",
"]",
",",
"\"/\"",
",",
"self",
".",
"config",
"[",
"\"STATE_ENCRYPTION_KEY\"",
"]",
")",
"resp",
".",
"headers",
".",
"append",
"(",
"tuple",
"(",
"cookie",
".",
"output",
"(",
")",
".",
"split",
"(",
"\": \"",
",",
"1",
")",
")",
")"
] | Saves a state from context to cookie
:type resp: satosa.response.Response
:type context: satosa.context.Context
:param resp: The response
:param context: Session context | [
"Saves",
"a",
"state",
"from",
"context",
"to",
"cookie"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L258-L271 |
250,860 | IdentityPython/SATOSA | src/satosa/base.py | SATOSABase.run | def run(self, context):
"""
Runs the satosa proxy with the given context.
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The request context
:return: response
"""
try:
self._load_state(context)
spec = self.module_router.endpoint_routing(context)
resp = self._run_bound_endpoint(context, spec)
self._save_state(resp, context)
except SATOSANoBoundEndpointError:
raise
except SATOSAError:
satosa_logging(logger, logging.ERROR, "Uncaught SATOSA error ", context.state,
exc_info=True)
raise
except UnknownSystemEntity as err:
satosa_logging(logger, logging.ERROR,
"configuration error: unknown system entity " + str(err),
context.state, exc_info=False)
raise
except Exception as err:
satosa_logging(logger, logging.ERROR, "Uncaught exception", context.state,
exc_info=True)
raise SATOSAUnknownError("Unknown error") from err
return resp | python | def run(self, context):
try:
self._load_state(context)
spec = self.module_router.endpoint_routing(context)
resp = self._run_bound_endpoint(context, spec)
self._save_state(resp, context)
except SATOSANoBoundEndpointError:
raise
except SATOSAError:
satosa_logging(logger, logging.ERROR, "Uncaught SATOSA error ", context.state,
exc_info=True)
raise
except UnknownSystemEntity as err:
satosa_logging(logger, logging.ERROR,
"configuration error: unknown system entity " + str(err),
context.state, exc_info=False)
raise
except Exception as err:
satosa_logging(logger, logging.ERROR, "Uncaught exception", context.state,
exc_info=True)
raise SATOSAUnknownError("Unknown error") from err
return resp | [
"def",
"run",
"(",
"self",
",",
"context",
")",
":",
"try",
":",
"self",
".",
"_load_state",
"(",
"context",
")",
"spec",
"=",
"self",
".",
"module_router",
".",
"endpoint_routing",
"(",
"context",
")",
"resp",
"=",
"self",
".",
"_run_bound_endpoint",
"(",
"context",
",",
"spec",
")",
"self",
".",
"_save_state",
"(",
"resp",
",",
"context",
")",
"except",
"SATOSANoBoundEndpointError",
":",
"raise",
"except",
"SATOSAError",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"\"Uncaught SATOSA error \"",
",",
"context",
".",
"state",
",",
"exc_info",
"=",
"True",
")",
"raise",
"except",
"UnknownSystemEntity",
"as",
"err",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"\"configuration error: unknown system entity \"",
"+",
"str",
"(",
"err",
")",
",",
"context",
".",
"state",
",",
"exc_info",
"=",
"False",
")",
"raise",
"except",
"Exception",
"as",
"err",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"ERROR",
",",
"\"Uncaught exception\"",
",",
"context",
".",
"state",
",",
"exc_info",
"=",
"True",
")",
"raise",
"SATOSAUnknownError",
"(",
"\"Unknown error\"",
")",
"from",
"err",
"return",
"resp"
] | Runs the satosa proxy with the given context.
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The request context
:return: response | [
"Runs",
"the",
"satosa",
"proxy",
"with",
"the",
"given",
"context",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/base.py#L273-L303 |
250,861 | IdentityPython/SATOSA | src/satosa/backends/saml2.py | SAMLBackend.disco_query | def disco_query(self):
"""
Makes a request to the discovery server
:type context: satosa.context.Context
:type internal_req: satosa.internal.InternalData
:rtype: satosa.response.SeeOther
:param context: The current context
:param internal_req: The request
:return: Response
"""
return_url = self.sp.config.getattr("endpoints", "sp")["discovery_response"][0][0]
loc = self.sp.create_discovery_service_request(self.discosrv, self.sp.config.entityid, **{"return": return_url})
return SeeOther(loc) | python | def disco_query(self):
return_url = self.sp.config.getattr("endpoints", "sp")["discovery_response"][0][0]
loc = self.sp.create_discovery_service_request(self.discosrv, self.sp.config.entityid, **{"return": return_url})
return SeeOther(loc) | [
"def",
"disco_query",
"(",
"self",
")",
":",
"return_url",
"=",
"self",
".",
"sp",
".",
"config",
".",
"getattr",
"(",
"\"endpoints\"",
",",
"\"sp\"",
")",
"[",
"\"discovery_response\"",
"]",
"[",
"0",
"]",
"[",
"0",
"]",
"loc",
"=",
"self",
".",
"sp",
".",
"create_discovery_service_request",
"(",
"self",
".",
"discosrv",
",",
"self",
".",
"sp",
".",
"config",
".",
"entityid",
",",
"*",
"*",
"{",
"\"return\"",
":",
"return_url",
"}",
")",
"return",
"SeeOther",
"(",
"loc",
")"
] | Makes a request to the discovery server
:type context: satosa.context.Context
:type internal_req: satosa.internal.InternalData
:rtype: satosa.response.SeeOther
:param context: The current context
:param internal_req: The request
:return: Response | [
"Makes",
"a",
"request",
"to",
"the",
"discovery",
"server"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/backends/saml2.py#L107-L121 |
250,862 | IdentityPython/SATOSA | src/satosa/backends/saml2.py | SAMLBackend.authn_request | def authn_request(self, context, entity_id):
"""
Do an authorization request on idp with given entity id.
This is the start of the authorization.
:type context: satosa.context.Context
:type entity_id: str
:rtype: satosa.response.Response
:param context: The current context
:param entity_id: Target IDP entity id
:return: response to the user agent
"""
# If IDP blacklisting is enabled and the selected IDP is blacklisted,
# stop here
if self.idp_blacklist_file:
with open(self.idp_blacklist_file) as blacklist_file:
blacklist_array = json.load(blacklist_file)['blacklist']
if entity_id in blacklist_array:
satosa_logging(logger, logging.DEBUG, "IdP with EntityID {} is blacklisted".format(entity_id), context.state, exc_info=False)
raise SATOSAAuthenticationError(context.state, "Selected IdP is blacklisted for this backend")
kwargs = {}
authn_context = self.construct_requested_authn_context(entity_id)
if authn_context:
kwargs['requested_authn_context'] = authn_context
try:
binding, destination = self.sp.pick_binding(
"single_sign_on_service", None, "idpsso", entity_id=entity_id)
satosa_logging(logger, logging.DEBUG, "binding: %s, destination: %s" % (binding, destination),
context.state)
acs_endp, response_binding = self.sp.config.getattr("endpoints", "sp")["assertion_consumer_service"][0]
req_id, req = self.sp.create_authn_request(
destination, binding=response_binding, **kwargs)
relay_state = util.rndstr()
ht_args = self.sp.apply_binding(binding, "%s" % req, destination, relay_state=relay_state)
satosa_logging(logger, logging.DEBUG, "ht_args: %s" % ht_args, context.state)
except Exception as exc:
satosa_logging(logger, logging.DEBUG, "Failed to construct the AuthnRequest for state", context.state,
exc_info=True)
raise SATOSAAuthenticationError(context.state, "Failed to construct the AuthnRequest") from exc
if self.sp.config.getattr('allow_unsolicited', 'sp') is False:
if req_id in self.outstanding_queries:
errmsg = "Request with duplicate id {}".format(req_id)
satosa_logging(logger, logging.DEBUG, errmsg, context.state)
raise SATOSAAuthenticationError(context.state, errmsg)
self.outstanding_queries[req_id] = req
context.state[self.name] = {"relay_state": relay_state}
return make_saml_response(binding, ht_args) | python | def authn_request(self, context, entity_id):
# If IDP blacklisting is enabled and the selected IDP is blacklisted,
# stop here
if self.idp_blacklist_file:
with open(self.idp_blacklist_file) as blacklist_file:
blacklist_array = json.load(blacklist_file)['blacklist']
if entity_id in blacklist_array:
satosa_logging(logger, logging.DEBUG, "IdP with EntityID {} is blacklisted".format(entity_id), context.state, exc_info=False)
raise SATOSAAuthenticationError(context.state, "Selected IdP is blacklisted for this backend")
kwargs = {}
authn_context = self.construct_requested_authn_context(entity_id)
if authn_context:
kwargs['requested_authn_context'] = authn_context
try:
binding, destination = self.sp.pick_binding(
"single_sign_on_service", None, "idpsso", entity_id=entity_id)
satosa_logging(logger, logging.DEBUG, "binding: %s, destination: %s" % (binding, destination),
context.state)
acs_endp, response_binding = self.sp.config.getattr("endpoints", "sp")["assertion_consumer_service"][0]
req_id, req = self.sp.create_authn_request(
destination, binding=response_binding, **kwargs)
relay_state = util.rndstr()
ht_args = self.sp.apply_binding(binding, "%s" % req, destination, relay_state=relay_state)
satosa_logging(logger, logging.DEBUG, "ht_args: %s" % ht_args, context.state)
except Exception as exc:
satosa_logging(logger, logging.DEBUG, "Failed to construct the AuthnRequest for state", context.state,
exc_info=True)
raise SATOSAAuthenticationError(context.state, "Failed to construct the AuthnRequest") from exc
if self.sp.config.getattr('allow_unsolicited', 'sp') is False:
if req_id in self.outstanding_queries:
errmsg = "Request with duplicate id {}".format(req_id)
satosa_logging(logger, logging.DEBUG, errmsg, context.state)
raise SATOSAAuthenticationError(context.state, errmsg)
self.outstanding_queries[req_id] = req
context.state[self.name] = {"relay_state": relay_state}
return make_saml_response(binding, ht_args) | [
"def",
"authn_request",
"(",
"self",
",",
"context",
",",
"entity_id",
")",
":",
"# If IDP blacklisting is enabled and the selected IDP is blacklisted,",
"# stop here",
"if",
"self",
".",
"idp_blacklist_file",
":",
"with",
"open",
"(",
"self",
".",
"idp_blacklist_file",
")",
"as",
"blacklist_file",
":",
"blacklist_array",
"=",
"json",
".",
"load",
"(",
"blacklist_file",
")",
"[",
"'blacklist'",
"]",
"if",
"entity_id",
"in",
"blacklist_array",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"IdP with EntityID {} is blacklisted\"",
".",
"format",
"(",
"entity_id",
")",
",",
"context",
".",
"state",
",",
"exc_info",
"=",
"False",
")",
"raise",
"SATOSAAuthenticationError",
"(",
"context",
".",
"state",
",",
"\"Selected IdP is blacklisted for this backend\"",
")",
"kwargs",
"=",
"{",
"}",
"authn_context",
"=",
"self",
".",
"construct_requested_authn_context",
"(",
"entity_id",
")",
"if",
"authn_context",
":",
"kwargs",
"[",
"'requested_authn_context'",
"]",
"=",
"authn_context",
"try",
":",
"binding",
",",
"destination",
"=",
"self",
".",
"sp",
".",
"pick_binding",
"(",
"\"single_sign_on_service\"",
",",
"None",
",",
"\"idpsso\"",
",",
"entity_id",
"=",
"entity_id",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"binding: %s, destination: %s\"",
"%",
"(",
"binding",
",",
"destination",
")",
",",
"context",
".",
"state",
")",
"acs_endp",
",",
"response_binding",
"=",
"self",
".",
"sp",
".",
"config",
".",
"getattr",
"(",
"\"endpoints\"",
",",
"\"sp\"",
")",
"[",
"\"assertion_consumer_service\"",
"]",
"[",
"0",
"]",
"req_id",
",",
"req",
"=",
"self",
".",
"sp",
".",
"create_authn_request",
"(",
"destination",
",",
"binding",
"=",
"response_binding",
",",
"*",
"*",
"kwargs",
")",
"relay_state",
"=",
"util",
".",
"rndstr",
"(",
")",
"ht_args",
"=",
"self",
".",
"sp",
".",
"apply_binding",
"(",
"binding",
",",
"\"%s\"",
"%",
"req",
",",
"destination",
",",
"relay_state",
"=",
"relay_state",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"ht_args: %s\"",
"%",
"ht_args",
",",
"context",
".",
"state",
")",
"except",
"Exception",
"as",
"exc",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"Failed to construct the AuthnRequest for state\"",
",",
"context",
".",
"state",
",",
"exc_info",
"=",
"True",
")",
"raise",
"SATOSAAuthenticationError",
"(",
"context",
".",
"state",
",",
"\"Failed to construct the AuthnRequest\"",
")",
"from",
"exc",
"if",
"self",
".",
"sp",
".",
"config",
".",
"getattr",
"(",
"'allow_unsolicited'",
",",
"'sp'",
")",
"is",
"False",
":",
"if",
"req_id",
"in",
"self",
".",
"outstanding_queries",
":",
"errmsg",
"=",
"\"Request with duplicate id {}\"",
".",
"format",
"(",
"req_id",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"errmsg",
",",
"context",
".",
"state",
")",
"raise",
"SATOSAAuthenticationError",
"(",
"context",
".",
"state",
",",
"errmsg",
")",
"self",
".",
"outstanding_queries",
"[",
"req_id",
"]",
"=",
"req",
"context",
".",
"state",
"[",
"self",
".",
"name",
"]",
"=",
"{",
"\"relay_state\"",
":",
"relay_state",
"}",
"return",
"make_saml_response",
"(",
"binding",
",",
"ht_args",
")"
] | Do an authorization request on idp with given entity id.
This is the start of the authorization.
:type context: satosa.context.Context
:type entity_id: str
:rtype: satosa.response.Response
:param context: The current context
:param entity_id: Target IDP entity id
:return: response to the user agent | [
"Do",
"an",
"authorization",
"request",
"on",
"idp",
"with",
"given",
"entity",
"id",
".",
"This",
"is",
"the",
"start",
"of",
"the",
"authorization",
"."
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/backends/saml2.py#L143-L195 |
250,863 | IdentityPython/SATOSA | src/satosa/backends/saml2.py | SAMLBackend.disco_response | def disco_response(self, context):
"""
Endpoint for the discovery server response
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The current context
:return: response
"""
info = context.request
state = context.state
try:
entity_id = info["entityID"]
except KeyError as err:
satosa_logging(logger, logging.DEBUG, "No IDP chosen for state", state, exc_info=True)
raise SATOSAAuthenticationError(state, "No IDP chosen") from err
return self.authn_request(context, entity_id) | python | def disco_response(self, context):
info = context.request
state = context.state
try:
entity_id = info["entityID"]
except KeyError as err:
satosa_logging(logger, logging.DEBUG, "No IDP chosen for state", state, exc_info=True)
raise SATOSAAuthenticationError(state, "No IDP chosen") from err
return self.authn_request(context, entity_id) | [
"def",
"disco_response",
"(",
"self",
",",
"context",
")",
":",
"info",
"=",
"context",
".",
"request",
"state",
"=",
"context",
".",
"state",
"try",
":",
"entity_id",
"=",
"info",
"[",
"\"entityID\"",
"]",
"except",
"KeyError",
"as",
"err",
":",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"No IDP chosen for state\"",
",",
"state",
",",
"exc_info",
"=",
"True",
")",
"raise",
"SATOSAAuthenticationError",
"(",
"state",
",",
"\"No IDP chosen\"",
")",
"from",
"err",
"return",
"self",
".",
"authn_request",
"(",
"context",
",",
"entity_id",
")"
] | Endpoint for the discovery server response
:type context: satosa.context.Context
:rtype: satosa.response.Response
:param context: The current context
:return: response | [
"Endpoint",
"for",
"the",
"discovery",
"server",
"response"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/backends/saml2.py#L240-L259 |
250,864 | IdentityPython/SATOSA | src/satosa/backends/saml2.py | SAMLBackend._translate_response | def _translate_response(self, response, state):
"""
Translates a saml authorization response to an internal response
:type response: saml2.response.AuthnResponse
:rtype: satosa.internal.InternalData
:param response: The saml authorization response
:return: A translated internal response
"""
# The response may have been encrypted by the IdP so if we have an
# encryption key, try it.
if self.encryption_keys:
response.parse_assertion(self.encryption_keys)
authn_info = response.authn_info()[0]
auth_class_ref = authn_info[0]
timestamp = response.assertion.authn_statement[0].authn_instant
issuer = response.response.issuer.text
auth_info = AuthenticationInformation(
auth_class_ref, timestamp, issuer,
)
# The SAML response may not include a NameID.
subject = response.get_subject()
name_id = subject.text if subject else None
name_id_format = subject.format if subject else None
attributes = self.converter.to_internal(
self.attribute_profile, response.ava,
)
internal_resp = InternalData(
auth_info=auth_info,
attributes=attributes,
subject_type=name_id_format,
subject_id=name_id,
)
satosa_logging(logger, logging.DEBUG,
"backend received attributes:\n%s" %
json.dumps(response.ava, indent=4), state)
return internal_resp | python | def _translate_response(self, response, state):
# The response may have been encrypted by the IdP so if we have an
# encryption key, try it.
if self.encryption_keys:
response.parse_assertion(self.encryption_keys)
authn_info = response.authn_info()[0]
auth_class_ref = authn_info[0]
timestamp = response.assertion.authn_statement[0].authn_instant
issuer = response.response.issuer.text
auth_info = AuthenticationInformation(
auth_class_ref, timestamp, issuer,
)
# The SAML response may not include a NameID.
subject = response.get_subject()
name_id = subject.text if subject else None
name_id_format = subject.format if subject else None
attributes = self.converter.to_internal(
self.attribute_profile, response.ava,
)
internal_resp = InternalData(
auth_info=auth_info,
attributes=attributes,
subject_type=name_id_format,
subject_id=name_id,
)
satosa_logging(logger, logging.DEBUG,
"backend received attributes:\n%s" %
json.dumps(response.ava, indent=4), state)
return internal_resp | [
"def",
"_translate_response",
"(",
"self",
",",
"response",
",",
"state",
")",
":",
"# The response may have been encrypted by the IdP so if we have an",
"# encryption key, try it.",
"if",
"self",
".",
"encryption_keys",
":",
"response",
".",
"parse_assertion",
"(",
"self",
".",
"encryption_keys",
")",
"authn_info",
"=",
"response",
".",
"authn_info",
"(",
")",
"[",
"0",
"]",
"auth_class_ref",
"=",
"authn_info",
"[",
"0",
"]",
"timestamp",
"=",
"response",
".",
"assertion",
".",
"authn_statement",
"[",
"0",
"]",
".",
"authn_instant",
"issuer",
"=",
"response",
".",
"response",
".",
"issuer",
".",
"text",
"auth_info",
"=",
"AuthenticationInformation",
"(",
"auth_class_ref",
",",
"timestamp",
",",
"issuer",
",",
")",
"# The SAML response may not include a NameID.",
"subject",
"=",
"response",
".",
"get_subject",
"(",
")",
"name_id",
"=",
"subject",
".",
"text",
"if",
"subject",
"else",
"None",
"name_id_format",
"=",
"subject",
".",
"format",
"if",
"subject",
"else",
"None",
"attributes",
"=",
"self",
".",
"converter",
".",
"to_internal",
"(",
"self",
".",
"attribute_profile",
",",
"response",
".",
"ava",
",",
")",
"internal_resp",
"=",
"InternalData",
"(",
"auth_info",
"=",
"auth_info",
",",
"attributes",
"=",
"attributes",
",",
"subject_type",
"=",
"name_id_format",
",",
"subject_id",
"=",
"name_id",
",",
")",
"satosa_logging",
"(",
"logger",
",",
"logging",
".",
"DEBUG",
",",
"\"backend received attributes:\\n%s\"",
"%",
"json",
".",
"dumps",
"(",
"response",
".",
"ava",
",",
"indent",
"=",
"4",
")",
",",
"state",
")",
"return",
"internal_resp"
] | Translates a saml authorization response to an internal response
:type response: saml2.response.AuthnResponse
:rtype: satosa.internal.InternalData
:param response: The saml authorization response
:return: A translated internal response | [
"Translates",
"a",
"saml",
"authorization",
"response",
"to",
"an",
"internal",
"response"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/backends/saml2.py#L261-L304 |
250,865 | IdentityPython/SATOSA | src/satosa/attribute_mapping.py | AttributeMapper.to_internal_filter | def to_internal_filter(self, attribute_profile, external_attribute_names):
"""
Converts attribute names from external "type" to internal
:type attribute_profile: str
:type external_attribute_names: list[str]
:type case_insensitive: bool
:rtype: list[str]
:param attribute_profile: From which external type to convert (ex: oidc, saml, ...)
:param external_attribute_names: A list of attribute names
:param case_insensitive: Create a case insensitive filter
:return: A list of attribute names in the internal format
"""
try:
profile_mapping = self.to_internal_attributes[attribute_profile]
except KeyError:
logger.warn("no attribute mapping found for the given attribute profile '%s'", attribute_profile)
# no attributes since the given profile is not configured
return []
internal_attribute_names = set() # use set to ensure only unique values
for external_attribute_name in external_attribute_names:
try:
internal_attribute_name = profile_mapping[external_attribute_name]
internal_attribute_names.add(internal_attribute_name)
except KeyError:
pass
return list(internal_attribute_names) | python | def to_internal_filter(self, attribute_profile, external_attribute_names):
try:
profile_mapping = self.to_internal_attributes[attribute_profile]
except KeyError:
logger.warn("no attribute mapping found for the given attribute profile '%s'", attribute_profile)
# no attributes since the given profile is not configured
return []
internal_attribute_names = set() # use set to ensure only unique values
for external_attribute_name in external_attribute_names:
try:
internal_attribute_name = profile_mapping[external_attribute_name]
internal_attribute_names.add(internal_attribute_name)
except KeyError:
pass
return list(internal_attribute_names) | [
"def",
"to_internal_filter",
"(",
"self",
",",
"attribute_profile",
",",
"external_attribute_names",
")",
":",
"try",
":",
"profile_mapping",
"=",
"self",
".",
"to_internal_attributes",
"[",
"attribute_profile",
"]",
"except",
"KeyError",
":",
"logger",
".",
"warn",
"(",
"\"no attribute mapping found for the given attribute profile '%s'\"",
",",
"attribute_profile",
")",
"# no attributes since the given profile is not configured",
"return",
"[",
"]",
"internal_attribute_names",
"=",
"set",
"(",
")",
"# use set to ensure only unique values",
"for",
"external_attribute_name",
"in",
"external_attribute_names",
":",
"try",
":",
"internal_attribute_name",
"=",
"profile_mapping",
"[",
"external_attribute_name",
"]",
"internal_attribute_names",
".",
"add",
"(",
"internal_attribute_name",
")",
"except",
"KeyError",
":",
"pass",
"return",
"list",
"(",
"internal_attribute_names",
")"
] | Converts attribute names from external "type" to internal
:type attribute_profile: str
:type external_attribute_names: list[str]
:type case_insensitive: bool
:rtype: list[str]
:param attribute_profile: From which external type to convert (ex: oidc, saml, ...)
:param external_attribute_names: A list of attribute names
:param case_insensitive: Create a case insensitive filter
:return: A list of attribute names in the internal format | [
"Converts",
"attribute",
"names",
"from",
"external",
"type",
"to",
"internal"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/attribute_mapping.py#L44-L73 |
250,866 | IdentityPython/SATOSA | src/satosa/attribute_mapping.py | AttributeMapper.to_internal | def to_internal(self, attribute_profile, external_dict):
"""
Converts the external data from "type" to internal
:type attribute_profile: str
:type external_dict: dict[str, str]
:rtype: dict[str, str]
:param attribute_profile: From which external type to convert (ex: oidc, saml, ...)
:param external_dict: Attributes in the external format
:return: Attributes in the internal format
"""
internal_dict = {}
for internal_attribute_name, mapping in self.from_internal_attributes.items():
if attribute_profile not in mapping:
logger.debug("no attribute mapping found for internal attribute '%s' the attribute profile '%s'" % (
internal_attribute_name, attribute_profile))
# skip this internal attribute if we have no mapping in the specified profile
continue
external_attribute_name = mapping[attribute_profile]
attribute_values = self._collate_attribute_values_by_priority_order(external_attribute_name,
external_dict)
if attribute_values: # Only insert key if it has some values
logger.debug("backend attribute '%s' mapped to %s" % (external_attribute_name,
internal_attribute_name))
internal_dict[internal_attribute_name] = attribute_values
else:
logger.debug("skipped backend attribute '%s': no value found", external_attribute_name)
internal_dict = self._handle_template_attributes(attribute_profile, internal_dict)
return internal_dict | python | def to_internal(self, attribute_profile, external_dict):
internal_dict = {}
for internal_attribute_name, mapping in self.from_internal_attributes.items():
if attribute_profile not in mapping:
logger.debug("no attribute mapping found for internal attribute '%s' the attribute profile '%s'" % (
internal_attribute_name, attribute_profile))
# skip this internal attribute if we have no mapping in the specified profile
continue
external_attribute_name = mapping[attribute_profile]
attribute_values = self._collate_attribute_values_by_priority_order(external_attribute_name,
external_dict)
if attribute_values: # Only insert key if it has some values
logger.debug("backend attribute '%s' mapped to %s" % (external_attribute_name,
internal_attribute_name))
internal_dict[internal_attribute_name] = attribute_values
else:
logger.debug("skipped backend attribute '%s': no value found", external_attribute_name)
internal_dict = self._handle_template_attributes(attribute_profile, internal_dict)
return internal_dict | [
"def",
"to_internal",
"(",
"self",
",",
"attribute_profile",
",",
"external_dict",
")",
":",
"internal_dict",
"=",
"{",
"}",
"for",
"internal_attribute_name",
",",
"mapping",
"in",
"self",
".",
"from_internal_attributes",
".",
"items",
"(",
")",
":",
"if",
"attribute_profile",
"not",
"in",
"mapping",
":",
"logger",
".",
"debug",
"(",
"\"no attribute mapping found for internal attribute '%s' the attribute profile '%s'\"",
"%",
"(",
"internal_attribute_name",
",",
"attribute_profile",
")",
")",
"# skip this internal attribute if we have no mapping in the specified profile",
"continue",
"external_attribute_name",
"=",
"mapping",
"[",
"attribute_profile",
"]",
"attribute_values",
"=",
"self",
".",
"_collate_attribute_values_by_priority_order",
"(",
"external_attribute_name",
",",
"external_dict",
")",
"if",
"attribute_values",
":",
"# Only insert key if it has some values",
"logger",
".",
"debug",
"(",
"\"backend attribute '%s' mapped to %s\"",
"%",
"(",
"external_attribute_name",
",",
"internal_attribute_name",
")",
")",
"internal_dict",
"[",
"internal_attribute_name",
"]",
"=",
"attribute_values",
"else",
":",
"logger",
".",
"debug",
"(",
"\"skipped backend attribute '%s': no value found\"",
",",
"external_attribute_name",
")",
"internal_dict",
"=",
"self",
".",
"_handle_template_attributes",
"(",
"attribute_profile",
",",
"internal_dict",
")",
"return",
"internal_dict"
] | Converts the external data from "type" to internal
:type attribute_profile: str
:type external_dict: dict[str, str]
:rtype: dict[str, str]
:param attribute_profile: From which external type to convert (ex: oidc, saml, ...)
:param external_dict: Attributes in the external format
:return: Attributes in the internal format | [
"Converts",
"the",
"external",
"data",
"from",
"type",
"to",
"internal"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/attribute_mapping.py#L75-L107 |
250,867 | IdentityPython/SATOSA | src/satosa/attribute_mapping.py | AttributeMapper.from_internal | def from_internal(self, attribute_profile, internal_dict):
"""
Converts the internal data to "type"
:type attribute_profile: str
:type internal_dict: dict[str, str]
:rtype: dict[str, str]
:param attribute_profile: To which external type to convert (ex: oidc, saml, ...)
:param internal_dict: attributes to map
:return: attribute values and names in the specified "profile"
"""
external_dict = {}
for internal_attribute_name in internal_dict:
try:
attribute_mapping = self.from_internal_attributes[internal_attribute_name]
except KeyError:
logger.debug("no attribute mapping found for the internal attribute '%s'", internal_attribute_name)
continue
if attribute_profile not in attribute_mapping:
# skip this internal attribute if we have no mapping in the specified profile
logger.debug("no mapping found for '%s' in attribute profile '%s'" %
(internal_attribute_name,
attribute_profile))
continue
external_attribute_names = self.from_internal_attributes[internal_attribute_name][attribute_profile]
# select the first attribute name
external_attribute_name = external_attribute_names[0]
logger.debug("frontend attribute %s mapped from %s" % (external_attribute_name,
internal_attribute_name))
if self.separator in external_attribute_name:
nested_attribute_names = external_attribute_name.split(self.separator)
nested_dict = self._create_nested_attribute_value(nested_attribute_names[1:],
internal_dict[internal_attribute_name])
external_dict[nested_attribute_names[0]] = nested_dict
else:
external_dict[external_attribute_name] = internal_dict[internal_attribute_name]
return external_dict | python | def from_internal(self, attribute_profile, internal_dict):
external_dict = {}
for internal_attribute_name in internal_dict:
try:
attribute_mapping = self.from_internal_attributes[internal_attribute_name]
except KeyError:
logger.debug("no attribute mapping found for the internal attribute '%s'", internal_attribute_name)
continue
if attribute_profile not in attribute_mapping:
# skip this internal attribute if we have no mapping in the specified profile
logger.debug("no mapping found for '%s' in attribute profile '%s'" %
(internal_attribute_name,
attribute_profile))
continue
external_attribute_names = self.from_internal_attributes[internal_attribute_name][attribute_profile]
# select the first attribute name
external_attribute_name = external_attribute_names[0]
logger.debug("frontend attribute %s mapped from %s" % (external_attribute_name,
internal_attribute_name))
if self.separator in external_attribute_name:
nested_attribute_names = external_attribute_name.split(self.separator)
nested_dict = self._create_nested_attribute_value(nested_attribute_names[1:],
internal_dict[internal_attribute_name])
external_dict[nested_attribute_names[0]] = nested_dict
else:
external_dict[external_attribute_name] = internal_dict[internal_attribute_name]
return external_dict | [
"def",
"from_internal",
"(",
"self",
",",
"attribute_profile",
",",
"internal_dict",
")",
":",
"external_dict",
"=",
"{",
"}",
"for",
"internal_attribute_name",
"in",
"internal_dict",
":",
"try",
":",
"attribute_mapping",
"=",
"self",
".",
"from_internal_attributes",
"[",
"internal_attribute_name",
"]",
"except",
"KeyError",
":",
"logger",
".",
"debug",
"(",
"\"no attribute mapping found for the internal attribute '%s'\"",
",",
"internal_attribute_name",
")",
"continue",
"if",
"attribute_profile",
"not",
"in",
"attribute_mapping",
":",
"# skip this internal attribute if we have no mapping in the specified profile",
"logger",
".",
"debug",
"(",
"\"no mapping found for '%s' in attribute profile '%s'\"",
"%",
"(",
"internal_attribute_name",
",",
"attribute_profile",
")",
")",
"continue",
"external_attribute_names",
"=",
"self",
".",
"from_internal_attributes",
"[",
"internal_attribute_name",
"]",
"[",
"attribute_profile",
"]",
"# select the first attribute name",
"external_attribute_name",
"=",
"external_attribute_names",
"[",
"0",
"]",
"logger",
".",
"debug",
"(",
"\"frontend attribute %s mapped from %s\"",
"%",
"(",
"external_attribute_name",
",",
"internal_attribute_name",
")",
")",
"if",
"self",
".",
"separator",
"in",
"external_attribute_name",
":",
"nested_attribute_names",
"=",
"external_attribute_name",
".",
"split",
"(",
"self",
".",
"separator",
")",
"nested_dict",
"=",
"self",
".",
"_create_nested_attribute_value",
"(",
"nested_attribute_names",
"[",
"1",
":",
"]",
",",
"internal_dict",
"[",
"internal_attribute_name",
"]",
")",
"external_dict",
"[",
"nested_attribute_names",
"[",
"0",
"]",
"]",
"=",
"nested_dict",
"else",
":",
"external_dict",
"[",
"external_attribute_name",
"]",
"=",
"internal_dict",
"[",
"internal_attribute_name",
"]",
"return",
"external_dict"
] | Converts the internal data to "type"
:type attribute_profile: str
:type internal_dict: dict[str, str]
:rtype: dict[str, str]
:param attribute_profile: To which external type to convert (ex: oidc, saml, ...)
:param internal_dict: attributes to map
:return: attribute values and names in the specified "profile" | [
"Converts",
"the",
"internal",
"data",
"to",
"type"
] | 49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb | https://github.com/IdentityPython/SATOSA/blob/49da5d4c0ac1a5ebf1a71b4f7aaf04f0e52d8fdb/src/satosa/attribute_mapping.py#L167-L208 |
250,868 | c4urself/bump2version | bumpversion/version_part.py | VersionConfig._serialize | def _serialize(self, version, serialize_format, context, raise_if_incomplete=False):
"""
Attempts to serialize a version with the given serialization format.
Raises MissingValueForSerializationException if not serializable
"""
values = context.copy()
for k in version:
values[k] = version[k]
# TODO dump complete context on debug level
try:
# test whether all parts required in the format have values
serialized = serialize_format.format(**values)
except KeyError as e:
missing_key = getattr(e, "message", e.args[0])
raise MissingValueForSerializationException(
"Did not find key {} in {} when serializing version number".format(
repr(missing_key), repr(version)
)
)
keys_needing_representation = set()
found_required = False
for k in self.order():
v = values[k]
if not isinstance(v, VersionPart):
# values coming from environment variables don't need
# representation
continue
if not v.is_optional():
found_required = True
keys_needing_representation.add(k)
elif not found_required:
keys_needing_representation.add(k)
required_by_format = set(self._labels_for_format(serialize_format))
# try whether all parsed keys are represented
if raise_if_incomplete:
if not (keys_needing_representation <= required_by_format):
raise IncompleteVersionRepresentationException(
"Could not represent '{}' in format '{}'".format(
"', '".join(keys_needing_representation ^ required_by_format),
serialize_format,
)
)
return serialized | python | def _serialize(self, version, serialize_format, context, raise_if_incomplete=False):
values = context.copy()
for k in version:
values[k] = version[k]
# TODO dump complete context on debug level
try:
# test whether all parts required in the format have values
serialized = serialize_format.format(**values)
except KeyError as e:
missing_key = getattr(e, "message", e.args[0])
raise MissingValueForSerializationException(
"Did not find key {} in {} when serializing version number".format(
repr(missing_key), repr(version)
)
)
keys_needing_representation = set()
found_required = False
for k in self.order():
v = values[k]
if not isinstance(v, VersionPart):
# values coming from environment variables don't need
# representation
continue
if not v.is_optional():
found_required = True
keys_needing_representation.add(k)
elif not found_required:
keys_needing_representation.add(k)
required_by_format = set(self._labels_for_format(serialize_format))
# try whether all parsed keys are represented
if raise_if_incomplete:
if not (keys_needing_representation <= required_by_format):
raise IncompleteVersionRepresentationException(
"Could not represent '{}' in format '{}'".format(
"', '".join(keys_needing_representation ^ required_by_format),
serialize_format,
)
)
return serialized | [
"def",
"_serialize",
"(",
"self",
",",
"version",
",",
"serialize_format",
",",
"context",
",",
"raise_if_incomplete",
"=",
"False",
")",
":",
"values",
"=",
"context",
".",
"copy",
"(",
")",
"for",
"k",
"in",
"version",
":",
"values",
"[",
"k",
"]",
"=",
"version",
"[",
"k",
"]",
"# TODO dump complete context on debug level",
"try",
":",
"# test whether all parts required in the format have values",
"serialized",
"=",
"serialize_format",
".",
"format",
"(",
"*",
"*",
"values",
")",
"except",
"KeyError",
"as",
"e",
":",
"missing_key",
"=",
"getattr",
"(",
"e",
",",
"\"message\"",
",",
"e",
".",
"args",
"[",
"0",
"]",
")",
"raise",
"MissingValueForSerializationException",
"(",
"\"Did not find key {} in {} when serializing version number\"",
".",
"format",
"(",
"repr",
"(",
"missing_key",
")",
",",
"repr",
"(",
"version",
")",
")",
")",
"keys_needing_representation",
"=",
"set",
"(",
")",
"found_required",
"=",
"False",
"for",
"k",
"in",
"self",
".",
"order",
"(",
")",
":",
"v",
"=",
"values",
"[",
"k",
"]",
"if",
"not",
"isinstance",
"(",
"v",
",",
"VersionPart",
")",
":",
"# values coming from environment variables don't need",
"# representation",
"continue",
"if",
"not",
"v",
".",
"is_optional",
"(",
")",
":",
"found_required",
"=",
"True",
"keys_needing_representation",
".",
"add",
"(",
"k",
")",
"elif",
"not",
"found_required",
":",
"keys_needing_representation",
".",
"add",
"(",
"k",
")",
"required_by_format",
"=",
"set",
"(",
"self",
".",
"_labels_for_format",
"(",
"serialize_format",
")",
")",
"# try whether all parsed keys are represented",
"if",
"raise_if_incomplete",
":",
"if",
"not",
"(",
"keys_needing_representation",
"<=",
"required_by_format",
")",
":",
"raise",
"IncompleteVersionRepresentationException",
"(",
"\"Could not represent '{}' in format '{}'\"",
".",
"format",
"(",
"\"', '\"",
".",
"join",
"(",
"keys_needing_representation",
"^",
"required_by_format",
")",
",",
"serialize_format",
",",
")",
")",
"return",
"serialized"
] | Attempts to serialize a version with the given serialization format.
Raises MissingValueForSerializationException if not serializable | [
"Attempts",
"to",
"serialize",
"a",
"version",
"with",
"the",
"given",
"serialization",
"format",
"."
] | 22d981ebfb94a7d26716e2b936f932a58883aa30 | https://github.com/c4urself/bump2version/blob/22d981ebfb94a7d26716e2b936f932a58883aa30/bumpversion/version_part.py#L194-L247 |
250,869 | lawsie/guizero | guizero/ButtonGroup.py | ButtonGroup.value_text | def value_text(self):
"""
Sets or returns the option selected in a ButtonGroup by its text value.
"""
search = self._selected.get() # a string containing the selected option
# This is a bit nasty - suggestions welcome
for item in self._rbuttons:
if item.value == search:
return item.text
return "" | python | def value_text(self):
search = self._selected.get() # a string containing the selected option
# This is a bit nasty - suggestions welcome
for item in self._rbuttons:
if item.value == search:
return item.text
return "" | [
"def",
"value_text",
"(",
"self",
")",
":",
"search",
"=",
"self",
".",
"_selected",
".",
"get",
"(",
")",
"# a string containing the selected option",
"# This is a bit nasty - suggestions welcome",
"for",
"item",
"in",
"self",
".",
"_rbuttons",
":",
"if",
"item",
".",
"value",
"==",
"search",
":",
"return",
"item",
".",
"text",
"return",
"\"\""
] | Sets or returns the option selected in a ButtonGroup by its text value. | [
"Sets",
"or",
"returns",
"the",
"option",
"selected",
"in",
"a",
"ButtonGroup",
"by",
"its",
"text",
"value",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/ButtonGroup.py#L171-L180 |
250,870 | lawsie/guizero | guizero/ButtonGroup.py | ButtonGroup.append | def append(self, option):
"""
Appends a new `option` to the end of the ButtonGroup.
:param string/List option:
The option to append to the ButtonGroup. If a 2D list is specified,
the first element is the text, the second is the value.
"""
self._options.append(self._parse_option(option))
self._refresh_options()
self.resize(self._width, self._height) | python | def append(self, option):
self._options.append(self._parse_option(option))
self._refresh_options()
self.resize(self._width, self._height) | [
"def",
"append",
"(",
"self",
",",
"option",
")",
":",
"self",
".",
"_options",
".",
"append",
"(",
"self",
".",
"_parse_option",
"(",
"option",
")",
")",
"self",
".",
"_refresh_options",
"(",
")",
"self",
".",
"resize",
"(",
"self",
".",
"_width",
",",
"self",
".",
"_height",
")"
] | Appends a new `option` to the end of the ButtonGroup.
:param string/List option:
The option to append to the ButtonGroup. If a 2D list is specified,
the first element is the text, the second is the value. | [
"Appends",
"a",
"new",
"option",
"to",
"the",
"end",
"of",
"the",
"ButtonGroup",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/ButtonGroup.py#L235-L245 |
250,871 | lawsie/guizero | guizero/ButtonGroup.py | ButtonGroup.insert | def insert(self, index, option):
"""
Insert a new `option` in the ButtonGroup at `index`.
:param int option:
The index of where to insert the option.
:param string/List option:
The option to append to the ButtonGroup. If a 2D list is specified,
the first element is the text, the second is the value.
"""
self._options.insert(index, self._parse_option(option))
self._refresh_options()
self.resize(self._width, self._height) | python | def insert(self, index, option):
self._options.insert(index, self._parse_option(option))
self._refresh_options()
self.resize(self._width, self._height) | [
"def",
"insert",
"(",
"self",
",",
"index",
",",
"option",
")",
":",
"self",
".",
"_options",
".",
"insert",
"(",
"index",
",",
"self",
".",
"_parse_option",
"(",
"option",
")",
")",
"self",
".",
"_refresh_options",
"(",
")",
"self",
".",
"resize",
"(",
"self",
".",
"_width",
",",
"self",
".",
"_height",
")"
] | Insert a new `option` in the ButtonGroup at `index`.
:param int option:
The index of where to insert the option.
:param string/List option:
The option to append to the ButtonGroup. If a 2D list is specified,
the first element is the text, the second is the value. | [
"Insert",
"a",
"new",
"option",
"in",
"the",
"ButtonGroup",
"at",
"index",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/ButtonGroup.py#L247-L260 |
250,872 | lawsie/guizero | guizero/ButtonGroup.py | ButtonGroup.remove | def remove(self, option):
"""
Removes the first `option` from the ButtonGroup.
Returns `True` if an item was removed.
:param string option:
The value of the option to remove from the ButtonGroup.
"""
for existing_option in self._options:
if existing_option[1] == option:
self._options.remove(existing_option)
self._refresh_options()
return True
return False | python | def remove(self, option):
for existing_option in self._options:
if existing_option[1] == option:
self._options.remove(existing_option)
self._refresh_options()
return True
return False | [
"def",
"remove",
"(",
"self",
",",
"option",
")",
":",
"for",
"existing_option",
"in",
"self",
".",
"_options",
":",
"if",
"existing_option",
"[",
"1",
"]",
"==",
"option",
":",
"self",
".",
"_options",
".",
"remove",
"(",
"existing_option",
")",
"self",
".",
"_refresh_options",
"(",
")",
"return",
"True",
"return",
"False"
] | Removes the first `option` from the ButtonGroup.
Returns `True` if an item was removed.
:param string option:
The value of the option to remove from the ButtonGroup. | [
"Removes",
"the",
"first",
"option",
"from",
"the",
"ButtonGroup",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/ButtonGroup.py#L262-L276 |
250,873 | lawsie/guizero | guizero/ButtonGroup.py | ButtonGroup.update_command | def update_command(self, command, args=None):
"""
Updates the callback command which is called when the ButtonGroup
changes.
Setting to `None` stops the callback.
:param callback command:
The callback function to call.
:param callback args:
A list of arguments to pass to the widgets `command`, defaults to
`None`.
"""
if command is None:
self._command = lambda: None
else:
if args is None:
self._command = command
else:
self._command = utils.with_args(command, *args) | python | def update_command(self, command, args=None):
if command is None:
self._command = lambda: None
else:
if args is None:
self._command = command
else:
self._command = utils.with_args(command, *args) | [
"def",
"update_command",
"(",
"self",
",",
"command",
",",
"args",
"=",
"None",
")",
":",
"if",
"command",
"is",
"None",
":",
"self",
".",
"_command",
"=",
"lambda",
":",
"None",
"else",
":",
"if",
"args",
"is",
"None",
":",
"self",
".",
"_command",
"=",
"command",
"else",
":",
"self",
".",
"_command",
"=",
"utils",
".",
"with_args",
"(",
"command",
",",
"*",
"args",
")"
] | Updates the callback command which is called when the ButtonGroup
changes.
Setting to `None` stops the callback.
:param callback command:
The callback function to call.
:param callback args:
A list of arguments to pass to the widgets `command`, defaults to
`None`. | [
"Updates",
"the",
"callback",
"command",
"which",
"is",
"called",
"when",
"the",
"ButtonGroup",
"changes",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/ButtonGroup.py#L290-L310 |
250,874 | lawsie/guizero | guizero/Combo.py | Combo.insert | def insert(self, index, option):
"""
Insert a new `option` in the Combo at `index`.
:param int option:
The index of where to insert the option.
:param string option:
The option to insert into to the Combo.
"""
option = str(option)
self._options.insert(index, option)
# if this is the first option, set it.
if len(self._options) == 1:
self.value = option
self._refresh_options() | python | def insert(self, index, option):
option = str(option)
self._options.insert(index, option)
# if this is the first option, set it.
if len(self._options) == 1:
self.value = option
self._refresh_options() | [
"def",
"insert",
"(",
"self",
",",
"index",
",",
"option",
")",
":",
"option",
"=",
"str",
"(",
"option",
")",
"self",
".",
"_options",
".",
"insert",
"(",
"index",
",",
"option",
")",
"# if this is the first option, set it.",
"if",
"len",
"(",
"self",
".",
"_options",
")",
"==",
"1",
":",
"self",
".",
"value",
"=",
"option",
"self",
".",
"_refresh_options",
"(",
")"
] | Insert a new `option` in the Combo at `index`.
:param int option:
The index of where to insert the option.
:param string option:
The option to insert into to the Combo. | [
"Insert",
"a",
"new",
"option",
"in",
"the",
"Combo",
"at",
"index",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Combo.py#L204-L220 |
250,875 | lawsie/guizero | guizero/Combo.py | Combo.remove | def remove(self, option):
"""
Removes the first `option` from the Combo.
Returns `True` if an item was removed.
:param string option:
The option to remove from the Combo.
"""
if option in self._options:
if len(self._options) == 1:
# this is the last option in the list so clear it
self.clear()
else:
self._options.remove(option)
self._refresh_options()
# have we just removed the selected option?
# if so set it to the first option
if option == self.value:
self._set_option(self._options[0])
return True
else:
return False | python | def remove(self, option):
if option in self._options:
if len(self._options) == 1:
# this is the last option in the list so clear it
self.clear()
else:
self._options.remove(option)
self._refresh_options()
# have we just removed the selected option?
# if so set it to the first option
if option == self.value:
self._set_option(self._options[0])
return True
else:
return False | [
"def",
"remove",
"(",
"self",
",",
"option",
")",
":",
"if",
"option",
"in",
"self",
".",
"_options",
":",
"if",
"len",
"(",
"self",
".",
"_options",
")",
"==",
"1",
":",
"# this is the last option in the list so clear it",
"self",
".",
"clear",
"(",
")",
"else",
":",
"self",
".",
"_options",
".",
"remove",
"(",
"option",
")",
"self",
".",
"_refresh_options",
"(",
")",
"# have we just removed the selected option?",
"# if so set it to the first option",
"if",
"option",
"==",
"self",
".",
"value",
":",
"self",
".",
"_set_option",
"(",
"self",
".",
"_options",
"[",
"0",
"]",
")",
"return",
"True",
"else",
":",
"return",
"False"
] | Removes the first `option` from the Combo.
Returns `True` if an item was removed.
:param string option:
The option to remove from the Combo. | [
"Removes",
"the",
"first",
"option",
"from",
"the",
"Combo",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Combo.py#L222-L244 |
250,876 | lawsie/guizero | guizero/Combo.py | Combo.clear | def clear(self):
"""
Clears all the options in a Combo
"""
self._options = []
self._combo_menu.tk.delete(0, END)
self._selected.set("") | python | def clear(self):
self._options = []
self._combo_menu.tk.delete(0, END)
self._selected.set("") | [
"def",
"clear",
"(",
"self",
")",
":",
"self",
".",
"_options",
"=",
"[",
"]",
"self",
".",
"_combo_menu",
".",
"tk",
".",
"delete",
"(",
"0",
",",
"END",
")",
"self",
".",
"_selected",
".",
"set",
"(",
"\"\"",
")"
] | Clears all the options in a Combo | [
"Clears",
"all",
"the",
"options",
"in",
"a",
"Combo"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Combo.py#L247-L253 |
250,877 | lawsie/guizero | guizero/Combo.py | Combo._set_option | def _set_option(self, value):
"""
Sets a single option in the Combo, returning True if it was able too.
"""
if len(self._options) > 0:
if value in self._options:
self._selected.set(value)
return True
else:
return False
else:
return False | python | def _set_option(self, value):
if len(self._options) > 0:
if value in self._options:
self._selected.set(value)
return True
else:
return False
else:
return False | [
"def",
"_set_option",
"(",
"self",
",",
"value",
")",
":",
"if",
"len",
"(",
"self",
".",
"_options",
")",
">",
"0",
":",
"if",
"value",
"in",
"self",
".",
"_options",
":",
"self",
".",
"_selected",
".",
"set",
"(",
"value",
")",
"return",
"True",
"else",
":",
"return",
"False",
"else",
":",
"return",
"False"
] | Sets a single option in the Combo, returning True if it was able too. | [
"Sets",
"a",
"single",
"option",
"in",
"the",
"Combo",
"returning",
"True",
"if",
"it",
"was",
"able",
"too",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Combo.py#L271-L282 |
250,878 | lawsie/guizero | guizero/Combo.py | Combo._set_option_by_index | def _set_option_by_index(self, index):
"""
Sets a single option in the Combo by its index, returning True if it was able too.
"""
if index < len(self._options):
self._selected.set(self._options[index])
return True
else:
return False | python | def _set_option_by_index(self, index):
if index < len(self._options):
self._selected.set(self._options[index])
return True
else:
return False | [
"def",
"_set_option_by_index",
"(",
"self",
",",
"index",
")",
":",
"if",
"index",
"<",
"len",
"(",
"self",
".",
"_options",
")",
":",
"self",
".",
"_selected",
".",
"set",
"(",
"self",
".",
"_options",
"[",
"index",
"]",
")",
"return",
"True",
"else",
":",
"return",
"False"
] | Sets a single option in the Combo by its index, returning True if it was able too. | [
"Sets",
"a",
"single",
"option",
"in",
"the",
"Combo",
"by",
"its",
"index",
"returning",
"True",
"if",
"it",
"was",
"able",
"too",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Combo.py#L284-L292 |
250,879 | lawsie/guizero | guizero/tkmixins.py | ScheduleMixin.after | def after(self, time, function, args = []):
"""Call `function` after `time` milliseconds."""
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function] = [callback_id, False] | python | def after(self, time, function, args = []):
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function] = [callback_id, False] | [
"def",
"after",
"(",
"self",
",",
"time",
",",
"function",
",",
"args",
"=",
"[",
"]",
")",
":",
"callback_id",
"=",
"self",
".",
"tk",
".",
"after",
"(",
"time",
",",
"self",
".",
"_call_wrapper",
",",
"time",
",",
"function",
",",
"*",
"args",
")",
"self",
".",
"_callback",
"[",
"function",
"]",
"=",
"[",
"callback_id",
",",
"False",
"]"
] | Call `function` after `time` milliseconds. | [
"Call",
"function",
"after",
"time",
"milliseconds",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/tkmixins.py#L8-L11 |
250,880 | lawsie/guizero | guizero/tkmixins.py | ScheduleMixin.repeat | def repeat(self, time, function, args = []):
"""Repeat `function` every `time` milliseconds."""
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function] = [callback_id, True] | python | def repeat(self, time, function, args = []):
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function] = [callback_id, True] | [
"def",
"repeat",
"(",
"self",
",",
"time",
",",
"function",
",",
"args",
"=",
"[",
"]",
")",
":",
"callback_id",
"=",
"self",
".",
"tk",
".",
"after",
"(",
"time",
",",
"self",
".",
"_call_wrapper",
",",
"time",
",",
"function",
",",
"*",
"args",
")",
"self",
".",
"_callback",
"[",
"function",
"]",
"=",
"[",
"callback_id",
",",
"True",
"]"
] | Repeat `function` every `time` milliseconds. | [
"Repeat",
"function",
"every",
"time",
"milliseconds",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/tkmixins.py#L13-L16 |
250,881 | lawsie/guizero | guizero/tkmixins.py | ScheduleMixin.cancel | def cancel(self, function):
"""Cancel the scheduled `function` calls."""
if function in self._callback.keys():
callback_id = self._callback[function][0]
self.tk.after_cancel(callback_id)
self._callback.pop(function)
else:
utils.error_format("Could not cancel function - it doesnt exist, it may have already run") | python | def cancel(self, function):
if function in self._callback.keys():
callback_id = self._callback[function][0]
self.tk.after_cancel(callback_id)
self._callback.pop(function)
else:
utils.error_format("Could not cancel function - it doesnt exist, it may have already run") | [
"def",
"cancel",
"(",
"self",
",",
"function",
")",
":",
"if",
"function",
"in",
"self",
".",
"_callback",
".",
"keys",
"(",
")",
":",
"callback_id",
"=",
"self",
".",
"_callback",
"[",
"function",
"]",
"[",
"0",
"]",
"self",
".",
"tk",
".",
"after_cancel",
"(",
"callback_id",
")",
"self",
".",
"_callback",
".",
"pop",
"(",
"function",
")",
"else",
":",
"utils",
".",
"error_format",
"(",
"\"Could not cancel function - it doesnt exist, it may have already run\"",
")"
] | Cancel the scheduled `function` calls. | [
"Cancel",
"the",
"scheduled",
"function",
"calls",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/tkmixins.py#L18-L25 |
250,882 | lawsie/guizero | guizero/tkmixins.py | ScheduleMixin._call_wrapper | def _call_wrapper(self, time, function, *args):
"""Fired by tk.after, gets the callback and either executes the function and cancels or repeats"""
# execute the function
function(*args)
if function in self._callback.keys():
repeat = self._callback[function][1]
if repeat:
# setup the call back again and update the id
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function][0] = callback_id
else:
# remove it from the call back dictionary
self._callback.pop(function) | python | def _call_wrapper(self, time, function, *args):
# execute the function
function(*args)
if function in self._callback.keys():
repeat = self._callback[function][1]
if repeat:
# setup the call back again and update the id
callback_id = self.tk.after(time, self._call_wrapper, time, function, *args)
self._callback[function][0] = callback_id
else:
# remove it from the call back dictionary
self._callback.pop(function) | [
"def",
"_call_wrapper",
"(",
"self",
",",
"time",
",",
"function",
",",
"*",
"args",
")",
":",
"# execute the function",
"function",
"(",
"*",
"args",
")",
"if",
"function",
"in",
"self",
".",
"_callback",
".",
"keys",
"(",
")",
":",
"repeat",
"=",
"self",
".",
"_callback",
"[",
"function",
"]",
"[",
"1",
"]",
"if",
"repeat",
":",
"# setup the call back again and update the id",
"callback_id",
"=",
"self",
".",
"tk",
".",
"after",
"(",
"time",
",",
"self",
".",
"_call_wrapper",
",",
"time",
",",
"function",
",",
"*",
"args",
")",
"self",
".",
"_callback",
"[",
"function",
"]",
"[",
"0",
"]",
"=",
"callback_id",
"else",
":",
"# remove it from the call back dictionary",
"self",
".",
"_callback",
".",
"pop",
"(",
"function",
")"
] | Fired by tk.after, gets the callback and either executes the function and cancels or repeats | [
"Fired",
"by",
"tk",
".",
"after",
"gets",
"the",
"callback",
"and",
"either",
"executes",
"the",
"function",
"and",
"cancels",
"or",
"repeats"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/tkmixins.py#L27-L39 |
250,883 | lawsie/guizero | guizero/event.py | EventCallback.rebind | def rebind(self, tks):
"""
Rebinds the tk event, only used if a widget has been destroyed
and recreated.
"""
self._tks = tks
for tk in self._tks:
tk.unbind_all(self._tk_event)
func_id = tk.bind(self._tk_event, self._event_callback)
self._func_ids.append(func_id) | python | def rebind(self, tks):
self._tks = tks
for tk in self._tks:
tk.unbind_all(self._tk_event)
func_id = tk.bind(self._tk_event, self._event_callback)
self._func_ids.append(func_id) | [
"def",
"rebind",
"(",
"self",
",",
"tks",
")",
":",
"self",
".",
"_tks",
"=",
"tks",
"for",
"tk",
"in",
"self",
".",
"_tks",
":",
"tk",
".",
"unbind_all",
"(",
"self",
".",
"_tk_event",
")",
"func_id",
"=",
"tk",
".",
"bind",
"(",
"self",
".",
"_tk_event",
",",
"self",
".",
"_event_callback",
")",
"self",
".",
"_func_ids",
".",
"append",
"(",
"func_id",
")"
] | Rebinds the tk event, only used if a widget has been destroyed
and recreated. | [
"Rebinds",
"the",
"tk",
"event",
"only",
"used",
"if",
"a",
"widget",
"has",
"been",
"destroyed",
"and",
"recreated",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/event.py#L129-L138 |
250,884 | lawsie/guizero | guizero/event.py | EventManager.rebind_events | def rebind_events(self, *tks):
"""
Rebinds all the tk events, only used if a tk widget has been destroyed
and recreated.
"""
for ref in self._refs:
self._refs[ref].rebind(tks) | python | def rebind_events(self, *tks):
for ref in self._refs:
self._refs[ref].rebind(tks) | [
"def",
"rebind_events",
"(",
"self",
",",
"*",
"tks",
")",
":",
"for",
"ref",
"in",
"self",
".",
"_refs",
":",
"self",
".",
"_refs",
"[",
"ref",
"]",
".",
"rebind",
"(",
"tks",
")"
] | Rebinds all the tk events, only used if a tk widget has been destroyed
and recreated. | [
"Rebinds",
"all",
"the",
"tk",
"events",
"only",
"used",
"if",
"a",
"tk",
"widget",
"has",
"been",
"destroyed",
"and",
"recreated",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/event.py#L200-L206 |
250,885 | lawsie/guizero | guizero/Box.py | Box.set_border | def set_border(self, thickness, color="black"):
"""
Sets the border thickness and color.
:param int thickness:
The thickenss of the border.
:param str color:
The color of the border.
"""
self._set_tk_config("highlightthickness", thickness)
self._set_tk_config("highlightbackground", utils.convert_color(color)) | python | def set_border(self, thickness, color="black"):
self._set_tk_config("highlightthickness", thickness)
self._set_tk_config("highlightbackground", utils.convert_color(color)) | [
"def",
"set_border",
"(",
"self",
",",
"thickness",
",",
"color",
"=",
"\"black\"",
")",
":",
"self",
".",
"_set_tk_config",
"(",
"\"highlightthickness\"",
",",
"thickness",
")",
"self",
".",
"_set_tk_config",
"(",
"\"highlightbackground\"",
",",
"utils",
".",
"convert_color",
"(",
"color",
")",
")"
] | Sets the border thickness and color.
:param int thickness:
The thickenss of the border.
:param str color:
The color of the border. | [
"Sets",
"the",
"border",
"thickness",
"and",
"color",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Box.py#L87-L98 |
250,886 | lawsie/guizero | guizero/Window.py | Window.hide | def hide(self):
"""Hide the window."""
self.tk.withdraw()
self._visible = False
if self._modal:
self.tk.grab_release() | python | def hide(self):
self.tk.withdraw()
self._visible = False
if self._modal:
self.tk.grab_release() | [
"def",
"hide",
"(",
"self",
")",
":",
"self",
".",
"tk",
".",
"withdraw",
"(",
")",
"self",
".",
"_visible",
"=",
"False",
"if",
"self",
".",
"_modal",
":",
"self",
".",
"tk",
".",
"grab_release",
"(",
")"
] | Hide the window. | [
"Hide",
"the",
"window",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Window.py#L32-L37 |
250,887 | lawsie/guizero | guizero/Window.py | Window.show | def show(self, wait = False):
"""Show the window."""
self.tk.deiconify()
self._visible = True
self._modal = wait
if self._modal:
self.tk.grab_set() | python | def show(self, wait = False):
self.tk.deiconify()
self._visible = True
self._modal = wait
if self._modal:
self.tk.grab_set() | [
"def",
"show",
"(",
"self",
",",
"wait",
"=",
"False",
")",
":",
"self",
".",
"tk",
".",
"deiconify",
"(",
")",
"self",
".",
"_visible",
"=",
"True",
"self",
".",
"_modal",
"=",
"wait",
"if",
"self",
".",
"_modal",
":",
"self",
".",
"tk",
".",
"grab_set",
"(",
")"
] | Show the window. | [
"Show",
"the",
"window",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Window.py#L39-L45 |
250,888 | lawsie/guizero | guizero/App.py | App.destroy | def destroy(self):
"""
Destroy and close the App.
:return:
None.
:note:
Once destroyed an App can no longer be used.
"""
# if this is the main_app - set the _main_app class variable to `None`.
if self == App._main_app:
App._main_app = None
self.tk.destroy() | python | def destroy(self):
# if this is the main_app - set the _main_app class variable to `None`.
if self == App._main_app:
App._main_app = None
self.tk.destroy() | [
"def",
"destroy",
"(",
"self",
")",
":",
"# if this is the main_app - set the _main_app class variable to `None`.",
"if",
"self",
"==",
"App",
".",
"_main_app",
":",
"App",
".",
"_main_app",
"=",
"None",
"self",
".",
"tk",
".",
"destroy",
"(",
")"
] | Destroy and close the App.
:return:
None.
:note:
Once destroyed an App can no longer be used. | [
"Destroy",
"and",
"close",
"the",
"App",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/App.py#L51-L64 |
250,889 | lawsie/guizero | guizero/Drawing.py | Drawing.line | def line(self, x1, y1, x2, y2, color="black", width=1):
"""
Draws a line between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the line. Defaults to `"black"`.
:param int width:
The width of the line. Defaults to `1`.
:return:
The id of the line.
"""
return self.tk.create_line(
x1, y1, x2, y2,
width = width,
fill = "" if color is None else utils.convert_color(color)
) | python | def line(self, x1, y1, x2, y2, color="black", width=1):
return self.tk.create_line(
x1, y1, x2, y2,
width = width,
fill = "" if color is None else utils.convert_color(color)
) | [
"def",
"line",
"(",
"self",
",",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"color",
"=",
"\"black\"",
",",
"width",
"=",
"1",
")",
":",
"return",
"self",
".",
"tk",
".",
"create_line",
"(",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"width",
"=",
"width",
",",
"fill",
"=",
"\"\"",
"if",
"color",
"is",
"None",
"else",
"utils",
".",
"convert_color",
"(",
"color",
")",
")"
] | Draws a line between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the line. Defaults to `"black"`.
:param int width:
The width of the line. Defaults to `1`.
:return:
The id of the line. | [
"Draws",
"a",
"line",
"between",
"2",
"points"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Drawing.py#L49-L78 |
250,890 | lawsie/guizero | guizero/Drawing.py | Drawing.oval | def oval(self, x1, y1, x2, y2, color="black", outline=False, outline_color="black"):
"""
Draws an oval between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape.
"""
return self.tk.create_oval(
x1, y1, x2, y2,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | python | def oval(self, x1, y1, x2, y2, color="black", outline=False, outline_color="black"):
return self.tk.create_oval(
x1, y1, x2, y2,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | [
"def",
"oval",
"(",
"self",
",",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"color",
"=",
"\"black\"",
",",
"outline",
"=",
"False",
",",
"outline_color",
"=",
"\"black\"",
")",
":",
"return",
"self",
".",
"tk",
".",
"create_oval",
"(",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"outline",
"=",
"utils",
".",
"convert_color",
"(",
"outline_color",
")",
"if",
"outline",
"else",
"\"\"",
",",
"width",
"=",
"int",
"(",
"outline",
")",
",",
"fill",
"=",
"\"\"",
"if",
"color",
"is",
"None",
"else",
"utils",
".",
"convert_color",
"(",
"color",
")",
")"
] | Draws an oval between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape. | [
"Draws",
"an",
"oval",
"between",
"2",
"points"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Drawing.py#L80-L113 |
250,891 | lawsie/guizero | guizero/Drawing.py | Drawing.rectangle | def rectangle(self, x1, y1, x2, y2, color="black", outline=False, outline_color="black"):
"""
Draws a rectangle between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape.
"""
return self.tk.create_rectangle(
x1, y1, x2, y2,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | python | def rectangle(self, x1, y1, x2, y2, color="black", outline=False, outline_color="black"):
return self.tk.create_rectangle(
x1, y1, x2, y2,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | [
"def",
"rectangle",
"(",
"self",
",",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"color",
"=",
"\"black\"",
",",
"outline",
"=",
"False",
",",
"outline_color",
"=",
"\"black\"",
")",
":",
"return",
"self",
".",
"tk",
".",
"create_rectangle",
"(",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"outline",
"=",
"utils",
".",
"convert_color",
"(",
"outline_color",
")",
"if",
"outline",
"else",
"\"\"",
",",
"width",
"=",
"int",
"(",
"outline",
")",
",",
"fill",
"=",
"\"\"",
"if",
"color",
"is",
"None",
"else",
"utils",
".",
"convert_color",
"(",
"color",
")",
")"
] | Draws a rectangle between 2 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the end point.
:param int y2:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape. | [
"Draws",
"a",
"rectangle",
"between",
"2",
"points"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Drawing.py#L115-L148 |
250,892 | lawsie/guizero | guizero/Drawing.py | Drawing.polygon | def polygon(self, *coords, color="black", outline=False, outline_color="black"):
"""
Draws a polygon from an list of co-ordinates
:param int *coords:
Pairs of x and y positions which make up the polygon.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape.
"""
return self.tk.create_polygon(
*coords,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | python | def polygon(self, *coords, color="black", outline=False, outline_color="black"):
return self.tk.create_polygon(
*coords,
outline = utils.convert_color(outline_color) if outline else "",
width = int(outline),
fill = "" if color is None else utils.convert_color(color)
) | [
"def",
"polygon",
"(",
"self",
",",
"*",
"coords",
",",
"color",
"=",
"\"black\"",
",",
"outline",
"=",
"False",
",",
"outline_color",
"=",
"\"black\"",
")",
":",
"return",
"self",
".",
"tk",
".",
"create_polygon",
"(",
"*",
"coords",
",",
"outline",
"=",
"utils",
".",
"convert_color",
"(",
"outline_color",
")",
"if",
"outline",
"else",
"\"\"",
",",
"width",
"=",
"int",
"(",
"outline",
")",
",",
"fill",
"=",
"\"\"",
"if",
"color",
"is",
"None",
"else",
"utils",
".",
"convert_color",
"(",
"color",
")",
")"
] | Draws a polygon from an list of co-ordinates
:param int *coords:
Pairs of x and y positions which make up the polygon.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape. | [
"Draws",
"a",
"polygon",
"from",
"an",
"list",
"of",
"co",
"-",
"ordinates"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Drawing.py#L150-L174 |
250,893 | lawsie/guizero | guizero/Drawing.py | Drawing.triangle | def triangle(self, x1, y1, x2, y2, x3, y3, color="black", outline=False, outline_color="black"):
"""
Draws a triangle between 3 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the middle point.
:param int y2:
The y position of the middle point.
:param int x3:
The x position of the end point.
:param int y3:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape.
"""
return self.polygon(
x1, y1, x2, y2, x3, y3,
color=color,
outline=outline,
outline_color=outline_color) | python | def triangle(self, x1, y1, x2, y2, x3, y3, color="black", outline=False, outline_color="black"):
return self.polygon(
x1, y1, x2, y2, x3, y3,
color=color,
outline=outline,
outline_color=outline_color) | [
"def",
"triangle",
"(",
"self",
",",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"x3",
",",
"y3",
",",
"color",
"=",
"\"black\"",
",",
"outline",
"=",
"False",
",",
"outline_color",
"=",
"\"black\"",
")",
":",
"return",
"self",
".",
"polygon",
"(",
"x1",
",",
"y1",
",",
"x2",
",",
"y2",
",",
"x3",
",",
"y3",
",",
"color",
"=",
"color",
",",
"outline",
"=",
"outline",
",",
"outline_color",
"=",
"outline_color",
")"
] | Draws a triangle between 3 points
:param int x1:
The x position of the starting point.
:param int y1:
The y position of the starting point.
:param int x2:
The x position of the middle point.
:param int y2:
The y position of the middle point.
:param int x3:
The x position of the end point.
:param int y3:
The y position of the end point.
:param str color:
The color of the shape. Defaults to `"black"`.
:param int outline:
`0` or `False` is no outline. `True` or value > 1 sets an outline. Defaults to `False`.
:param str outline_color:
The color of the outline. Defaults to `"black"`.
:return:
The id of the shape. | [
"Draws",
"a",
"triangle",
"between",
"3",
"points"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/Drawing.py#L176-L214 |
250,894 | lawsie/guizero | guizero/base.py | Base._get_tk_config | def _get_tk_config(self, key, default=False):
"""
Gets the config from the widget's tk object.
:param string key:
The tk config key.
:param bool default:
Returns the default value for this key. Defaults to `False`.
"""
if default:
return self._tk_defaults[key]
else:
return self.tk[key] | python | def _get_tk_config(self, key, default=False):
if default:
return self._tk_defaults[key]
else:
return self.tk[key] | [
"def",
"_get_tk_config",
"(",
"self",
",",
"key",
",",
"default",
"=",
"False",
")",
":",
"if",
"default",
":",
"return",
"self",
".",
"_tk_defaults",
"[",
"key",
"]",
"else",
":",
"return",
"self",
".",
"tk",
"[",
"key",
"]"
] | Gets the config from the widget's tk object.
:param string key:
The tk config key.
:param bool default:
Returns the default value for this key. Defaults to `False`. | [
"Gets",
"the",
"config",
"from",
"the",
"widget",
"s",
"tk",
"object",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L62-L75 |
250,895 | lawsie/guizero | guizero/base.py | Base._set_tk_config | def _set_tk_config(self, keys, value):
"""
Gets the config from the widget's tk object
:param string/List keys:
The tk config key or a list of tk keys.
:param variable value:
The value to set. If the value is `None`, the config value will be
reset to its default.
"""
# if a single key is passed, convert to list
if isinstance(keys, str):
keys = [keys]
# loop through all the keys
for key in keys:
if key in self.tk.keys():
if value is None:
# reset to default
self.tk[key] = self._tk_defaults[key]
else:
self.tk[key] = value | python | def _set_tk_config(self, keys, value):
# if a single key is passed, convert to list
if isinstance(keys, str):
keys = [keys]
# loop through all the keys
for key in keys:
if key in self.tk.keys():
if value is None:
# reset to default
self.tk[key] = self._tk_defaults[key]
else:
self.tk[key] = value | [
"def",
"_set_tk_config",
"(",
"self",
",",
"keys",
",",
"value",
")",
":",
"# if a single key is passed, convert to list",
"if",
"isinstance",
"(",
"keys",
",",
"str",
")",
":",
"keys",
"=",
"[",
"keys",
"]",
"# loop through all the keys",
"for",
"key",
"in",
"keys",
":",
"if",
"key",
"in",
"self",
".",
"tk",
".",
"keys",
"(",
")",
":",
"if",
"value",
"is",
"None",
":",
"# reset to default",
"self",
".",
"tk",
"[",
"key",
"]",
"=",
"self",
".",
"_tk_defaults",
"[",
"key",
"]",
"else",
":",
"self",
".",
"tk",
"[",
"key",
"]",
"=",
"value"
] | Gets the config from the widget's tk object
:param string/List keys:
The tk config key or a list of tk keys.
:param variable value:
The value to set. If the value is `None`, the config value will be
reset to its default. | [
"Gets",
"the",
"config",
"from",
"the",
"widget",
"s",
"tk",
"object"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L77-L100 |
250,896 | lawsie/guizero | guizero/base.py | Component.destroy | def destroy(self):
"""
Destroy the tk widget.
"""
# if this widget has a master remove the it from the master
if self.master is not None:
self.master._remove_child(self)
self.tk.destroy() | python | def destroy(self):
# if this widget has a master remove the it from the master
if self.master is not None:
self.master._remove_child(self)
self.tk.destroy() | [
"def",
"destroy",
"(",
"self",
")",
":",
"# if this widget has a master remove the it from the master",
"if",
"self",
".",
"master",
"is",
"not",
"None",
":",
"self",
".",
"master",
".",
"_remove_child",
"(",
"self",
")",
"self",
".",
"tk",
".",
"destroy",
"(",
")"
] | Destroy the tk widget. | [
"Destroy",
"the",
"tk",
"widget",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L169-L177 |
250,897 | lawsie/guizero | guizero/base.py | Container.add_tk_widget | def add_tk_widget(self, tk_widget, grid=None, align=None, visible=True, enabled=None, width=None, height=None):
"""
Adds a tk widget into a guizero container.
:param tkinter.Widget tk_widget:
The Container (App, Box, etc) the tk widget will belong too.
:param List grid:
Grid co-ordinates for the widget, required if the master layout
is 'grid', defaults to `None`.
:param string align:
How to align the widget within the grid, defaults to None.
:param bool visible:
If the widget should be visible, defaults to `True`.
:param bool enabled:
If the widget should be enabled, defaults to `None`. If `None`
the value is inherited from the master.
:param int width:
The starting width of the widget. Defaults to `None` and will auto
size.
:param int height:
The starting height of the widget. Defaults to `None` and will auto
size.
"""
return Widget(self, tk_widget, "tk widget", grid, align, visible, enabled, width, height) | python | def add_tk_widget(self, tk_widget, grid=None, align=None, visible=True, enabled=None, width=None, height=None):
return Widget(self, tk_widget, "tk widget", grid, align, visible, enabled, width, height) | [
"def",
"add_tk_widget",
"(",
"self",
",",
"tk_widget",
",",
"grid",
"=",
"None",
",",
"align",
"=",
"None",
",",
"visible",
"=",
"True",
",",
"enabled",
"=",
"None",
",",
"width",
"=",
"None",
",",
"height",
"=",
"None",
")",
":",
"return",
"Widget",
"(",
"self",
",",
"tk_widget",
",",
"\"tk widget\"",
",",
"grid",
",",
"align",
",",
"visible",
",",
"enabled",
",",
"width",
",",
"height",
")"
] | Adds a tk widget into a guizero container.
:param tkinter.Widget tk_widget:
The Container (App, Box, etc) the tk widget will belong too.
:param List grid:
Grid co-ordinates for the widget, required if the master layout
is 'grid', defaults to `None`.
:param string align:
How to align the widget within the grid, defaults to None.
:param bool visible:
If the widget should be visible, defaults to `True`.
:param bool enabled:
If the widget should be enabled, defaults to `None`. If `None`
the value is inherited from the master.
:param int width:
The starting width of the widget. Defaults to `None` and will auto
size.
:param int height:
The starting height of the widget. Defaults to `None` and will auto
size. | [
"Adds",
"a",
"tk",
"widget",
"into",
"a",
"guizero",
"container",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L289-L318 |
250,898 | lawsie/guizero | guizero/base.py | Container.display_widgets | def display_widgets(self):
"""
Displays all the widgets associated with this Container.
Should be called when the widgets need to be "re-packed/gridded".
"""
# All widgets are removed and then recreated to ensure the order they
# were created is the order they are displayed.
for child in self.children:
if child.displayable:
# forget the widget
if self.layout != "grid":
child.tk.pack_forget()
else:
child.tk.grid_forget()
# display the widget
if child.visible:
if self.layout != "grid":
self._pack_widget(child)
else:
self._grid_widget(child) | python | def display_widgets(self):
# All widgets are removed and then recreated to ensure the order they
# were created is the order they are displayed.
for child in self.children:
if child.displayable:
# forget the widget
if self.layout != "grid":
child.tk.pack_forget()
else:
child.tk.grid_forget()
# display the widget
if child.visible:
if self.layout != "grid":
self._pack_widget(child)
else:
self._grid_widget(child) | [
"def",
"display_widgets",
"(",
"self",
")",
":",
"# All widgets are removed and then recreated to ensure the order they",
"# were created is the order they are displayed.",
"for",
"child",
"in",
"self",
".",
"children",
":",
"if",
"child",
".",
"displayable",
":",
"# forget the widget",
"if",
"self",
".",
"layout",
"!=",
"\"grid\"",
":",
"child",
".",
"tk",
".",
"pack_forget",
"(",
")",
"else",
":",
"child",
".",
"tk",
".",
"grid_forget",
"(",
")",
"# display the widget",
"if",
"child",
".",
"visible",
":",
"if",
"self",
".",
"layout",
"!=",
"\"grid\"",
":",
"self",
".",
"_pack_widget",
"(",
"child",
")",
"else",
":",
"self",
".",
"_grid_widget",
"(",
"child",
")"
] | Displays all the widgets associated with this Container.
Should be called when the widgets need to be "re-packed/gridded". | [
"Displays",
"all",
"the",
"widgets",
"associated",
"with",
"this",
"Container",
"."
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L334-L358 |
250,899 | lawsie/guizero | guizero/base.py | Container.disable | def disable(self):
"""
Disable all the widgets in this container
"""
self._enabled = False
for child in self.children:
if isinstance(child, (Container, Widget)):
child.disable() | python | def disable(self):
self._enabled = False
for child in self.children:
if isinstance(child, (Container, Widget)):
child.disable() | [
"def",
"disable",
"(",
"self",
")",
":",
"self",
".",
"_enabled",
"=",
"False",
"for",
"child",
"in",
"self",
".",
"children",
":",
"if",
"isinstance",
"(",
"child",
",",
"(",
"Container",
",",
"Widget",
")",
")",
":",
"child",
".",
"disable",
"(",
")"
] | Disable all the widgets in this container | [
"Disable",
"all",
"the",
"widgets",
"in",
"this",
"container"
] | 84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2 | https://github.com/lawsie/guizero/blob/84c7f0b314fa86f9fc88eb11c9a0f6c4b57155e2/guizero/base.py#L442-L449 |
Subsets and Splits