def get_before_urls(self): from . import app_settings from django.conf.urls import include, url from authentic2.decorators import setting_enabled, required return required((setting_enabled('ENABLE', settings=app_settings), ), [url(r'^idp/cas/', include(__name__ + '.urls'))])
def get_before_urls(self): from . import app_settings from django.conf.urls import patterns, include from authentic2.decorators import setting_enabled, required return required( setting_enabled("ENABLE", settings=app_settings), patterns("", (r"^accounts/sslauth/", include(__name__ + ".urls"))), )
def get_before_urls(self): from . import app_settings from django.conf.urls import url, include from authentic2.decorators import (setting_enabled, required, lasso_required) return required((setting_enabled( 'ENABLE', settings=app_settings), lasso_required()), [url(r'^idp/saml2/', include(__name__ + '.urls'))])
def get_before_urls(self): from . import app_settings from django.conf.urls import patterns, include from authentic2.decorators import setting_enabled, required return required( ( setting_enabled('ENABLE', settings=app_settings), ), patterns('', (r'^idp/cas/', include(__name__ + '.urls'))))
from django.conf.urls import patterns, url from authentic2.decorators import setting_enabled, required from . import app_settings urlpatterns = required( setting_enabled('ENABLE', settings=app_settings), patterns('', url('^idp/freshdesk/login/', 'authentic2_idp_freshdesk.views.authenticate', name='idp-freshdesk-authenticate'), ) )
from django.conf.urls import patterns, url from authentic2.decorators import setting_enabled, required from . import app_settings from .views import index urlpatterns = required( setting_enabled("ENABLE", settings=app_settings), patterns("", url("^authentic2_plugin_template/$", index, name="authentic2-plugin-template-index")), )
from django.conf.urls import url from authentic2.decorators import setting_enabled, required from . import app_settings from .views import index urlpatterns = required(setting_enabled('ENABLE', settings=app_settings), [ url('^authentic2_plugin_template/$', index, name='authentic2-plugin-template-index') ])
(provider.token_endpoint, result)) messages.warning( request, _('Provider %(name)s is down, report %(request_id)s to ' 'an administrator. ') % { 'name': provider.name, 'request_id': request.request_id, }) return self.continue_to_next_url() logger.info(u'got token response %s', result) access_token = result.get('access_token') user = authenticate(access_token=access_token, id_token=result['id_token']) if user: # remember last tokens for logout tokens = request.session.setdefault('auth_oidc', {}).setdefault('tokens', []) tokens.append({ 'token_response': result, 'provider_pk': provider.pk, }) request.session.modified = True login(request, user, 'oidc') else: messages.warning(request, _('No user found')) return self.continue_to_next_url() login_callback = setting_enabled('ENABLE', settings=app_settings)( LoginCallback.as_view())
operation = form.cleaned_data["operation"] ou = form.cleaned_data["ou"] target = form.cleaned_data["target"] action = form.cleaned_data["action"] if action == "add": Permission = get_permission_model() perm, created = Permission.objects.get_or_create( operation=operation, ou=ou, target_ct=ContentType.objects.get_for_model(target), target_id=target.pk ) self.object.permissions.add(perm) else: messages.warning(self.request, _("You are not authorized")) return super(RolePermissionsView, self).form_valid(form) permissions = setting_enabled("ROLES_SHOW_PERMISSIONS", app_settings)(RolePermissionsView.as_view()) class RoleMembersExportView(views.ExportMixin, RoleMembersView): resource_class = resources.UserResource permissions = ["a2_rbac.view_role"] def get_data(self): return self.get_table_data() members_export = RoleMembersExportView.as_view() class RoleManagerViewMixin(RoleViewMixin): model = get_role_model()
def openid_enabled(func): return setting_enabled('ENABLE', app_settings)(func)