Skip to content
This repository was archived by the owner on Jun 12, 2021. It is now read-only.

Commit c522ce0

Browse files
committed
Ran isort and blacken.
1 parent 196bc80 commit c522ce0

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+703
-569
lines changed

.travis.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ python:
1010
addons:
1111
apt:
1212
packages:
13-
-
13+
-
1414

1515
install:
1616
- pip install codecov

src/oidcendpoint/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,4 +38,4 @@ def rndstr(size=16):
3838
:return: string
3939
"""
4040
chars = string.ascii_letters + string.digits
41-
return ''.join(rnd.choice(chars) for i in range(size))
41+
return "".join(rnd.choice(chars) for i in range(size))

src/oidcendpoint/client_authn.py

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ def verify(self, request, **kwargs):
137137
raise AuthnFailure("Could not verify client_assertion.")
138138

139139
authtoken = sanitize(ca_jwt)
140-
if hasattr(ca_jwt, 'to_dict') and callable(ca_jwt, 'to_dict'):
140+
if hasattr(ca_jwt, "to_dict") and callable(ca_jwt, "to_dict"):
141141
authtoken = sanitize(ca_jwt.to_dict())
142142
logger.debug("authntoken: {}".format(authtoken))
143143

@@ -258,15 +258,18 @@ def verify_client(
258258

259259
# store what authn method was used
260260
if auth_info.get("method"):
261-
if endpoint_context.cdb[client_id].get("auth_method") and \
262-
request.__class__.__name__ in endpoint_context.cdb[client_id]["auth_method"]:
261+
if (
262+
endpoint_context.cdb[client_id].get("auth_method")
263+
and request.__class__.__name__
264+
in endpoint_context.cdb[client_id]["auth_method"]
265+
):
263266
endpoint_context.cdb[client_id]["auth_method"][
264267
request.__class__.__name__
265268
] = auth_info["method"]
266269
else:
267270
endpoint_context.cdb[client_id]["auth_method"] = {
268271
request.__class__.__name__: auth_info["method"]
269-
}
272+
}
270273

271274
elif not client_id and get_client_id_from_token:
272275
if not _token:
@@ -275,8 +278,9 @@ def verify_client(
275278

276279
try:
277280
# get_client_id_from_token is a callback... Do not abuse for code readability.
278-
auth_info["client_id"] = get_client_id_from_token(endpoint_context,
279-
_token, request)
281+
auth_info["client_id"] = get_client_id_from_token(
282+
endpoint_context, _token, request
283+
)
280284
except KeyError:
281285
raise ValueError("Unknown token")
282286

src/oidcendpoint/common/authorization.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,7 @@ def inputs(form_args):
3939
element = []
4040
html_field = '<input type="hidden" name="{}" value="{}"/>'
4141
for name, value in form_args.items():
42-
element.append(
43-
html_field.format(name, value)
44-
)
42+
element.append(html_field.format(name, value))
4543
return "\n".join(element)
4644

4745

@@ -263,7 +261,9 @@ def __call__(self, client_id, endpoint_context, alg, alg_type):
263261
_allowed = _pinfo.get(_sup)
264262

265263
if alg not in _allowed:
266-
logger.error("Signing alg user: {} not among allowed: {}".format(alg, _allowed))
264+
logger.error(
265+
"Signing alg user: {} not among allowed: {}".format(alg, _allowed)
266+
)
267267
raise ValueError("Not allowed '%s' algorithm used", alg)
268268

269269

src/oidcendpoint/cookie.py

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ def ver_dec_content(parts, sign_key=None, enc_key=None, sign_alg="SHA256"):
106106
mac = base64.b64decode(b64_mac)
107107
verifier = HMACSigner(algorithm=sign_alg)
108108
if verifier.verify(
109-
load.encode("utf-8") + timestamp.encode("utf-8"), mac, sign_key.key
109+
load.encode("utf-8") + timestamp.encode("utf-8"), mac, sign_key.key
110110
):
111111
return load, timestamp
112112
else:
@@ -125,9 +125,9 @@ def ver_dec_content(parts, sign_key=None, enc_key=None, sign_alg="SHA256"):
125125
if len(p) == 3:
126126
verifier = HMACSigner(algorithm=sign_alg)
127127
if verifier.verify(
128-
load.encode("utf-8") + timestamp.encode("utf-8"),
129-
base64.b64decode(p[2]),
130-
sign_key.key,
128+
load.encode("utf-8") + timestamp.encode("utf-8"),
129+
base64.b64decode(p[2]),
130+
sign_key.key,
131131
):
132132
return load, timestamp
133133
else:
@@ -136,15 +136,15 @@ def ver_dec_content(parts, sign_key=None, enc_key=None, sign_alg="SHA256"):
136136

137137

138138
def make_cookie_content(
139-
name,
140-
load,
141-
sign_key,
142-
domain=None,
143-
path=None,
144-
timestamp="",
145-
enc_key=None,
146-
max_age=0,
147-
sign_alg="SHA256",
139+
name,
140+
load,
141+
sign_key,
142+
domain=None,
143+
path=None,
144+
timestamp="",
145+
enc_key=None,
146+
max_age=0,
147+
sign_alg="SHA256",
148148
):
149149
"""
150150
Create and return a cookies content
@@ -197,15 +197,15 @@ def make_cookie_content(
197197

198198

199199
def make_cookie(
200-
name,
201-
payload,
202-
sign_key,
203-
domain=None,
204-
path=None,
205-
timestamp="",
206-
enc_key=None,
207-
max_age=0,
208-
sign_alg="SHA256",
200+
name,
201+
payload,
202+
sign_key,
203+
domain=None,
204+
path=None,
205+
timestamp="",
206+
enc_key=None,
207+
max_age=0,
208+
sign_alg="SHA256",
209209
):
210210
content = make_cookie_content(
211211
name,
@@ -286,13 +286,13 @@ class CookieDealer(object):
286286
"""
287287

288288
def __init__(
289-
self,
290-
sign_key="",
291-
enc_key="",
292-
sign_alg="SHA256",
293-
default_values=None,
294-
sign_jwk=None,
295-
enc_jwk=None
289+
self,
290+
sign_key="",
291+
enc_key="",
292+
sign_alg="SHA256",
293+
default_values=None,
294+
sign_jwk=None,
295+
enc_jwk=None,
296296
):
297297

298298
if sign_key:
@@ -418,15 +418,15 @@ def get_cookie_value(self, cookie=None, cookie_name=None):
418418
return None
419419

420420
def append_cookie(
421-
self,
422-
cookie,
423-
name,
424-
payload,
425-
typ,
426-
domain=None,
427-
path=None,
428-
timestamp="",
429-
max_age=0,
421+
self,
422+
cookie,
423+
name,
424+
payload,
425+
typ,
426+
domain=None,
427+
path=None,
428+
timestamp="",
429+
max_age=0,
430430
):
431431
"""
432432
Adds a cookie to a SimpleCookie instance

src/oidcendpoint/endpoint.py

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,10 @@ def construct_provider_info(default_capabilities, **kwargs):
112112

113113
if _permitted and not _permitted.issuperset(set(_proposal)):
114114
raise ValueError(
115-
"Proposed set of values outside set of permitted ({})".__format__(attr))
115+
"Proposed set of values outside set of permitted ({})".__format__(
116+
attr
117+
)
118+
)
116119

117120
provider_info[attr] = _proposal
118121
return provider_info
@@ -142,8 +145,14 @@ def __init__(self, endpoint_context, **kwargs):
142145
self.kwargs = kwargs
143146
self.full_path = ""
144147

145-
for param in ["request_cls", "response_cls", "request_format", "request_placement",
146-
"response_format", "response_placement"]:
148+
for param in [
149+
"request_cls",
150+
"response_cls",
151+
"request_format",
152+
"request_placement",
153+
"response_format",
154+
"response_placement",
155+
]:
147156
_val = kwargs.get(param)
148157
if _val:
149158
setattr(self, param, _val)
@@ -152,9 +161,13 @@ def __init__(self, endpoint_context, **kwargs):
152161
self.client_authn_method = kwargs["client_authn_method"]
153162
elif self.default_capabilities is not None:
154163
if "client_authn_method" in self.default_capabilities:
155-
self.client_authn_method = self.default_capabilities["client_authn_method"]
164+
self.client_authn_method = self.default_capabilities[
165+
"client_authn_method"
166+
]
156167

157-
self.provider_info = construct_provider_info(self.default_capabilities, **kwargs)
168+
self.provider_info = construct_provider_info(
169+
self.default_capabilities, **kwargs
170+
)
158171

159172
def parse_request(self, request, auth=None, **kwargs):
160173
"""

src/oidcendpoint/endpoint_context.py

Lines changed: 32 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -84,17 +84,17 @@ def get_token_handlers(conf):
8484

8585
class EndpointContext:
8686
def __init__(
87-
self,
88-
conf,
89-
keyjar=None,
90-
client_db=None,
91-
session_db=None,
92-
sso_db=None,
93-
cwd="",
94-
cookie_dealer=None,
95-
httpc=None,
96-
cookie_name=None,
97-
jwks_uri_path=None,
87+
self,
88+
conf,
89+
keyjar=None,
90+
client_db=None,
91+
session_db=None,
92+
sso_db=None,
93+
cwd="",
94+
cookie_dealer=None,
95+
httpc=None,
96+
cookie_name=None,
97+
jwks_uri_path=None,
9898
):
9999
self.conf = conf
100100
self.keyjar = keyjar or KeyJar()
@@ -173,8 +173,9 @@ def __init__(
173173
loader = conf["template_loader"]
174174
except KeyError:
175175
template_dir = conf["template_dir"]
176-
loader = Environment(loader=FileSystemLoader(template_dir),
177-
autoescape=True)
176+
loader = Environment(
177+
loader=FileSystemLoader(template_dir), autoescape=True
178+
)
178179
self.template_handler = Jinja2TemplateHandler(loader)
179180

180181
self.setup = {}
@@ -196,15 +197,20 @@ def __init__(
196197
args = {k: v for k, v in conf["jwks"].items() if k != "uri_path"}
197198
self.keyjar = init_key_jar(**args)
198199

199-
for item in ['cookie_dealer', "authz", "authentication", "id_token", "scope2claims"]:
200+
for item in [
201+
"cookie_dealer",
202+
"authz",
203+
"authentication",
204+
"id_token",
205+
"scope2claims",
206+
]:
200207
_func = getattr(self, "do_{}".format(item), None)
201208
if _func:
202209
_func()
203210

204211
_cap = self.do_endpoints()
205212

206-
for item in ["userinfo", "login_hint_lookup", "login_hint2acrs",
207-
"add_on"]:
213+
for item in ["userinfo", "login_hint_lookup", "login_hint2acrs", "add_on"]:
208214
_func = getattr(self, "do_{}".format(item), None)
209215
if _func:
210216
_func()
@@ -225,7 +231,7 @@ def set_session_db(self, sso_db=None, db=None):
225231
self.do_session_db(sso_db, db)
226232
# append useinfo db to the session db
227233
self.do_userinfo()
228-
logger.debug('Session DB: {}'.format(self.sdb.__dict__))
234+
logger.debug("Session DB: {}".format(self.sdb.__dict__))
229235

230236
def do_add_on(self):
231237
if self.conf.get("add_on"):
@@ -258,8 +264,9 @@ def do_userinfo(self):
258264
self.userinfo = init_user_info(_conf, self.cwd)
259265
self.sdb.userinfo = self.userinfo
260266
else:
261-
logger.warning(('Cannot init_user_info if any '
262-
'session_db was provided.'))
267+
logger.warning(
268+
("Cannot init_user_info if any " "session_db was provided.")
269+
)
263270

264271
def do_id_token(self):
265272
_conf = self.conf.get("id_token")
@@ -271,7 +278,9 @@ def do_id_token(self):
271278
def do_authentication(self):
272279
_conf = self.conf.get("authentication")
273280
if _conf:
274-
self.authn_broker = populate_authn_broker(_conf, self, self.template_handler)
281+
self.authn_broker = populate_authn_broker(
282+
_conf, self, self.template_handler
283+
)
275284
else:
276285
self.authn_broker = {}
277286

@@ -283,7 +292,7 @@ def do_authentication(self):
283292
pass
284293

285294
def do_cookie_dealer(self):
286-
_conf = self.conf.get('cookie_dealer')
295+
_conf = self.conf.get("cookie_dealer")
287296
if _conf:
288297
if not self.cookie_dealer:
289298
self.cookie_dealer = init_service(_conf)
@@ -301,9 +310,7 @@ def do_sub_func(self):
301310

302311
def do_session_db(self, sso_db, db=None):
303312
self.sdb = create_session_db(
304-
self, self.th_args, db=db,
305-
sso_db=sso_db,
306-
sub_func=self._sub_func
313+
self, self.th_args, db=db, sso_db=sso_db, sub_func=self._sub_func
307314
)
308315

309316
def do_endpoints(self):
@@ -363,6 +370,6 @@ def create_providerinfo(self, capabilities):
363370
_provider_info["jwks_uri"] = self.jwks_uri
364371

365372
_provider_info.update(self.idtoken.provider_info)
366-
_provider_info['claims_supported'] = self.claims_supported()
373+
_provider_info["claims_supported"] = self.claims_supported()
367374

368375
return _provider_info

src/oidcendpoint/exception.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,4 +81,3 @@ class InvalidRequest(OidcEndpointError):
8181

8282
class CapabilitiesMisMatch(OidcEndpointError):
8383
pass
84-

0 commit comments

Comments
 (0)