Skip to content

Commit af98241

Browse files
committed
black autofixes
1 parent fec76b7 commit af98241

File tree

4 files changed

+37
-33
lines changed

4 files changed

+37
-33
lines changed

djangosaml2/overrides.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ class Saml2Client(saml2.client.Saml2Client):
1919
def do_logout(self, *args, **kwargs):
2020
if not kwargs.get("expected_binding"):
2121
try:
22-
kwargs[
23-
"expected_binding"
24-
] = settings.SAML_LOGOUT_REQUEST_PREFERRED_BINDING
22+
kwargs["expected_binding"] = (
23+
settings.SAML_LOGOUT_REQUEST_PREFERRED_BINDING
24+
)
2525
except AttributeError:
2626
logger.warning(
2727
"SAML_LOGOUT_REQUEST_PREFERRED_BINDING setting is"

djangosaml2/tests/__init__.py

+9-5
Original file line numberDiff line numberDiff line change
@@ -139,9 +139,9 @@ def add_outstanding_query(self, session_id, came_from):
139139
came_from,
140140
)
141141
self.saml_session.save()
142-
self.client.cookies[
143-
settings.SESSION_COOKIE_NAME
144-
] = self.saml_session.session_key
142+
self.client.cookies[settings.SESSION_COOKIE_NAME] = (
143+
self.saml_session.session_key
144+
)
145145

146146
def b64_for_post(self, xml_text, encoding="utf-8"):
147147
return base64.b64encode(xml_text.encode(encoding)).decode("ascii")
@@ -308,8 +308,12 @@ def test_unknown_idp(self):
308308
metadata_file="remote_metadata_three_idps.xml",
309309
)
310310

311-
response = self.client.get(reverse("saml2_login") + "?idp=<b>https://unknown.org</b>")
312-
self.assertContains(response, "&lt;b&gt;https://unknown.org&lt;/b&gt;", status_code=403)
311+
response = self.client.get(
312+
reverse("saml2_login") + "?idp=<b>https://unknown.org</b>"
313+
)
314+
self.assertContains(
315+
response, "&lt;b&gt;https://unknown.org&lt;/b&gt;", status_code=403
316+
)
313317

314318
def test_login_authn_context(self):
315319
sp_kwargs = {

djangosaml2/utils.py

+3-8
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ def available_idps(config: SPConfig, langpref=None, idp_to_check: str = None) ->
4747
for metadata in config.metadata.metadata.values():
4848
# initiate a fetch to the selected idp when using MDQ, otherwise the MetaDataMDX is an empty database
4949
if isinstance(metadata, MetaDataMDX) and idp_to_check:
50-
m = metadata[idp_to_check]
50+
m = metadata[idp_to_check] # noqa: F841
5151
result = metadata.any("idpsso_descriptor", "single_sign_on_service")
5252
if result:
5353
idps.update(result.keys())
@@ -108,11 +108,7 @@ def validate_referral_url(request, url):
108108
# SAML_STRICT_URL_VALIDATION setting can be used to turn off this check.
109109
# This should only happen if there is no slash, host and/or protocol in the
110110
# given URL. A better fix would be to add those to the RelayState.
111-
saml_strict_url_validation = getattr(
112-
settings,
113-
"SAML_STRICT_URL_VALIDATION",
114-
True
115-
)
111+
saml_strict_url_validation = getattr(settings, "SAML_STRICT_URL_VALIDATION", True)
116112
try:
117113
if saml_strict_url_validation:
118114
# This will also resolve Django URL pattern names
@@ -133,8 +129,7 @@ def validate_referral_url(request, url):
133129
)
134130

135131
if not url_has_allowed_host_and_scheme(url=url, allowed_hosts=saml_allowed_hosts):
136-
logger.debug("Referral URL not in SAML_ALLOWED_HOSTS or of the origin "
137-
"host.")
132+
logger.debug("Referral URL not in SAML_ALLOWED_HOSTS or of the origin host.")
138133
return None
139134

140135
return url

djangosaml2/views.py

+22-17
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ def get_state_client(self, request: HttpRequest):
135135
return state, client
136136

137137

138-
@method_decorator(saml2_csp_update, name='dispatch')
138+
@method_decorator(saml2_csp_update, name="dispatch")
139139
class LoginView(SPConfigMixin, View):
140140
"""SAML Authorization Request initiator.
141141
@@ -389,7 +389,7 @@ def get(self, request, *args, **kwargs):
389389
except TemplateDoesNotExist as e:
390390
logger.debug(
391391
f"TemplateDoesNotExist: [{self.post_binding_form_template}] - {e}",
392-
exc_info=True
392+
exc_info=True,
393393
)
394394

395395
if not http_response:
@@ -574,7 +574,7 @@ def post(self, request, attribute_mapping=None, create_unknown_user=None):
574574
session_info,
575575
attribute_mapping,
576576
create_unknown_user,
577-
assertion_info
577+
assertion_info,
578578
)
579579
except PermissionDenied as e:
580580
return self.handle_acs_failure(
@@ -592,21 +592,21 @@ def post(self, request, attribute_mapping=None, create_unknown_user=None):
592592
if not relay_state:
593593
logger.debug(
594594
"RelayState is not a valid URL, redirecting to fallback: %s",
595-
relay_state
595+
relay_state,
596596
)
597597
return HttpResponseRedirect(get_fallback_login_redirect_url())
598598

599599
logger.debug("Redirecting to the RelayState: %s", relay_state)
600600
return HttpResponseRedirect(relay_state)
601601

602602
def authenticate_user(
603-
self,
604-
request,
605-
session_info,
606-
attribute_mapping,
607-
create_unknown_user,
608-
assertion_info
609-
):
603+
self,
604+
request,
605+
session_info,
606+
attribute_mapping,
607+
create_unknown_user,
608+
assertion_info,
609+
):
610610
"""Calls Django's authenticate method after the SAML response is verified"""
611611
logger.debug("Trying to authenticate the user. Session info: %s", session_info)
612612

@@ -685,7 +685,7 @@ def get(self, request, *args, **kwargs):
685685
)
686686

687687

688-
@method_decorator(saml2_csp_update, name='dispatch')
688+
@method_decorator(saml2_csp_update, name="dispatch")
689689
class LogoutInitView(LoginRequiredMixin, SPConfigMixin, View):
690690
"""SAML Logout Request initiator
691691
@@ -801,7 +801,9 @@ def do_logout_service(self, request, data, binding, *args, **kwargs):
801801
)
802802
except StatusError as e:
803803
response = None
804-
logger.warning(f"Error logging out from remote provider: {e}", exc_info=True)
804+
logger.warning(
805+
f"Error logging out from remote provider: {e}", exc_info=True
806+
)
805807
state.sync()
806808
return finish_logout(request, response)
807809

@@ -853,13 +855,16 @@ def finish_logout(request, response):
853855
return HttpResponseRedirect(next_path)
854856
elif settings.LOGOUT_REDIRECT_URL is not None:
855857
fallback_url = resolve_url(settings.LOGOUT_REDIRECT_URL)
856-
logger.debug("No valid RelayState found; Redirecting to "
857-
"LOGOUT_REDIRECT_URL")
858+
logger.debug(
859+
"No valid RelayState found; Redirecting to " "LOGOUT_REDIRECT_URL"
860+
)
858861
return HttpResponseRedirect(fallback_url)
859862
else:
860863
current_site = get_current_site(request)
861-
logger.debug("No valid RelayState or LOGOUT_REDIRECT_URL found, "
862-
"rendering fallback template.")
864+
logger.debug(
865+
"No valid RelayState or LOGOUT_REDIRECT_URL found, "
866+
"rendering fallback template."
867+
)
863868
return render(
864869
request,
865870
"registration/logged_out.html",

0 commit comments

Comments
 (0)