| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485 |
- # Copyright (C) 2012 Yaco Sistemas (http://www.yaco.es)
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from django.conf import settings
- from django.core.exceptions import ImproperlyConfigured
- # from django.utils.module_loading import import_string
- # from djangosaml2.acs_failures import exception_failure
- from saml2.s_utils import UnknownSystemEntity
- def get_custom_setting(name, default=None):
- return getattr(settings, name, default)
- def available_idps(config, langpref=None):
- if langpref is None:
- langpref = "en"
- idps = set()
- for metadata_name, metadata in config.metadata.metadata.items():
- result = metadata.any('idpsso_descriptor', 'single_sign_on_service')
- if result:
- idps = idps.union(set(result.keys()))
- return dict([(idp, config.metadata.name(idp, langpref)) for idp in idps])
- def get_idp_sso_supported_bindings(idp_entity_id=None, config=None):
- """Returns the list of bindings supported by an IDP
- This is not clear in the pysaml2 code, so wrapping it in a util"""
- if config is None:
- # avoid circular import
- from djangosaml2.conf import get_config
- config = get_config()
- # load metadata store from config
- meta = getattr(config, 'metadata', {})
- # if idp is None, assume only one exists so just use that
- if idp_entity_id is None:
- # .keys() returns dict_keys in python3.5+
- try:
- idp_entity_id = list(available_idps(config).keys())[0]
- except IndexError:
- raise ImproperlyConfigured("No IdP configured!")
- try:
- return meta.service(idp_entity_id, 'idpsso_descriptor', 'single_sign_on_service').keys()
- except UnknownSystemEntity:
- return []
- def get_location(http_info):
- """Extract the redirect URL from a pysaml2 http_info object"""
- assert 'headers' in http_info
- headers = http_info['headers']
- assert len(headers) == 1
- header_name, header_value = headers[0]
- assert header_name == 'Location'
- return header_value
- def fail_acs_response(request, *args, **kwargs):
- """ Serves as a common mechanism for ending ACS in case of any SAML related failure.
- Handling can be configured by setting the SAML_ACS_FAILURE_RESPONSE_FUNCTION as
- suitable for the project.
- The default behavior uses SAML specific template that is rendered on any ACS error,
- but this can be simply changed so that PermissionDenied exception is raised instead.
- """
- # failure_function = import_string(get_custom_setting('SAML_ACS_FAILURE_RESPONSE_FUNCTION',
- # 'djangosaml2.acs_failures.template_failure'))
- from djangosaml2.acs_failures import exception_failure
- failure_function = exception_failure
- return failure_function(request, *args, **kwargs)
|