mirror of
https://github.com/cwinfo/powerdns-admin.git
synced 2025-04-20 02:37:32 +00:00
spelling: retrieve
This commit is contained in:
parent
e81a44fbc1
commit
50e219039b
@ -30,12 +30,12 @@ def get_idp_data():
|
|||||||
global idp_data, idp_timestamp
|
global idp_data, idp_timestamp
|
||||||
lifetime = timedelta(minutes=app.config['SAML_METADATA_CACHE_LIFETIME'])
|
lifetime = timedelta(minutes=app.config['SAML_METADATA_CACHE_LIFETIME'])
|
||||||
if idp_timestamp+lifetime < datetime.now():
|
if idp_timestamp+lifetime < datetime.now():
|
||||||
background_thread = Thread(target=retreive_idp_data)
|
background_thread = Thread(target=retrieve_idp_data)
|
||||||
background_thread.start()
|
background_thread.start()
|
||||||
return idp_data
|
return idp_data
|
||||||
|
|
||||||
|
|
||||||
def retreive_idp_data():
|
def retrieve_idp_data():
|
||||||
global idp_data, idp_timestamp
|
global idp_data, idp_timestamp
|
||||||
if 'SAML_IDP_SSO_BINDING' in app.config:
|
if 'SAML_IDP_SSO_BINDING' in app.config:
|
||||||
new_idp_data = OneLogin_Saml2_IdPMetadataParser.parse_remote(app.config['SAML_METADATA_URL'], entity_id=app.config.get('SAML_IDP_ENTITY_ID', None), required_sso_binding=app.config['SAML_IDP_SSO_BINDING'])
|
new_idp_data = OneLogin_Saml2_IdPMetadataParser.parse_remote(app.config['SAML_METADATA_URL'], entity_id=app.config.get('SAML_IDP_ENTITY_ID', None), required_sso_binding=app.config['SAML_IDP_SSO_BINDING'])
|
||||||
@ -44,9 +44,9 @@ def retreive_idp_data():
|
|||||||
if new_idp_data is not None:
|
if new_idp_data is not None:
|
||||||
idp_data = new_idp_data
|
idp_data = new_idp_data
|
||||||
idp_timestamp = datetime.now()
|
idp_timestamp = datetime.now()
|
||||||
print("SAML: IDP Metadata successfully retreived from: " + app.config['SAML_METADATA_URL'])
|
print("SAML: IDP Metadata successfully retrieved from: " + app.config['SAML_METADATA_URL'])
|
||||||
else:
|
else:
|
||||||
print("SAML: IDP Metadata could not be retreived")
|
print("SAML: IDP Metadata could not be retrieved")
|
||||||
|
|
||||||
|
|
||||||
if 'TIMEOUT' in app.config.keys():
|
if 'TIMEOUT' in app.config.keys():
|
||||||
|
@ -96,7 +96,7 @@ SAML_SP_CONTACT_MAIL = '<contact mail>'
|
|||||||
#Configures if SAML tokens should be encrypted.
|
#Configures if SAML tokens should be encrypted.
|
||||||
#If enabled a new app certificate will be generated on restart
|
#If enabled a new app certificate will be generated on restart
|
||||||
SAML_SIGN_REQUEST = False
|
SAML_SIGN_REQUEST = False
|
||||||
#Use SAML standard logout mechanism retreived from idp metadata
|
#Use SAML standard logout mechanism retrieved from idp metadata
|
||||||
#If configured false don't care about SAML session on logout.
|
#If configured false don't care about SAML session on logout.
|
||||||
#Logout from PowerDNS-Admin only and keep SAML session authenticated.
|
#Logout from PowerDNS-Admin only and keep SAML session authenticated.
|
||||||
SAML_LOGOUT = False
|
SAML_LOGOUT = False
|
||||||
|
@ -89,7 +89,7 @@ SAML_SP_CONTACT_MAIL = '<contact mail>'
|
|||||||
#Configures if SAML tokens should be encrypted.
|
#Configures if SAML tokens should be encrypted.
|
||||||
#If enabled a new app certificate will be generated on restart
|
#If enabled a new app certificate will be generated on restart
|
||||||
SAML_SIGN_REQUEST = False
|
SAML_SIGN_REQUEST = False
|
||||||
#Use SAML standard logout mechanism retreived from idp metadata
|
#Use SAML standard logout mechanism retrieved from idp metadata
|
||||||
#If configured false don't care about SAML session on logout.
|
#If configured false don't care about SAML session on logout.
|
||||||
#Logout from PowerDNS-Admin only and keep SAML session authenticated.
|
#Logout from PowerDNS-Admin only and keep SAML session authenticated.
|
||||||
SAML_LOGOUT = False
|
SAML_LOGOUT = False
|
||||||
|
Loading…
x
Reference in New Issue
Block a user