Some Fixes for pylint
This commit is contained in:
@@ -3,7 +3,7 @@ from django.core.mail import EmailMessage
|
|||||||
|
|
||||||
try:
|
try:
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
except:
|
except ImportError:
|
||||||
from django.core.urlresolver import reverse # pyre-ignore[21]
|
from django.core.urlresolver import reverse # pyre-ignore[21]
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -5,7 +5,6 @@ import datetime, random
|
|||||||
from random import randint
|
from random import randint
|
||||||
from .models import *
|
from .models import *
|
||||||
|
|
||||||
# from django.template.context import RequestContext
|
|
||||||
from .views import login
|
from .views import login
|
||||||
from .Common import send
|
from .Common import send
|
||||||
|
|
||||||
|
|||||||
@@ -1,16 +1,14 @@
|
|||||||
from fido2.client import Fido2Client
|
|
||||||
from fido2.server import Fido2Server, PublicKeyCredentialRpEntity
|
from fido2.server import Fido2Server, PublicKeyCredentialRpEntity
|
||||||
from fido2.webauthn import AttestationObject, AuthenticatorData, CollectedClientData
|
from fido2.webauthn import AttestationObject, AuthenticatorData, CollectedClientData
|
||||||
from django.template.context_processors import csrf
|
from django.template.context_processors import csrf
|
||||||
from django.views.decorators.csrf import csrf_exempt
|
from django.views.decorators.csrf import csrf_exempt
|
||||||
from django.shortcuts import render
|
from django.shortcuts import render
|
||||||
|
|
||||||
# from django.template.context import RequestContext
|
|
||||||
import simplejson
|
import simplejson
|
||||||
from fido2 import cbor
|
from fido2 import cbor
|
||||||
from django.http import HttpResponse
|
from django.http import HttpResponse
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from .models import *
|
from .models import User_Keys
|
||||||
from fido2.utils import websafe_decode, websafe_encode
|
from fido2.utils import websafe_decode, websafe_encode
|
||||||
from fido2.webauthn import AttestedCredentialData
|
from fido2.webauthn import AttestedCredentialData
|
||||||
from .views import login, reset_cookie
|
from .views import login, reset_cookie
|
||||||
|
|||||||
@@ -2,31 +2,30 @@ import string
|
|||||||
import random
|
import random
|
||||||
from django.shortcuts import render
|
from django.shortcuts import render
|
||||||
from django.http import HttpResponse
|
from django.http import HttpResponse
|
||||||
from django.template.context import RequestContext
|
|
||||||
from django.template.context_processors import csrf
|
from django.template.context_processors import csrf
|
||||||
from .models import *
|
|
||||||
import user_agents
|
import user_agents
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
|
|
||||||
|
from .models import User_Keys
|
||||||
|
|
||||||
|
|
||||||
def id_generator(size=6, chars=string.ascii_uppercase + string.digits):
|
def id_generator(size=6, chars=string.ascii_uppercase + string.digits):
|
||||||
x = "".join(random.choice(chars) for _ in range(size))
|
x = "".join(random.choice(chars) for _ in range(size))
|
||||||
if not User_Keys.objects.filter(properties__icontains='"key": "%s"' % x).exists():
|
if not User_Keys.objects.filter(properties__icontains='"key": "%s"' % x).exists():
|
||||||
return x
|
return x
|
||||||
else:
|
return id_generator(size, chars)
|
||||||
return id_generator(size, chars)
|
|
||||||
|
|
||||||
|
|
||||||
def getUserAgent(request):
|
def getUserAgent(request):
|
||||||
id = id = request.session.get("td_id", None)
|
device_id = request.session.get("td_id", None)
|
||||||
if id:
|
if device_id:
|
||||||
tk = User_Keys.objects.get(id=id)
|
tk = User_Keys.objects.get(id=device_id)
|
||||||
if tk.properties.get("user_agent", "") != "":
|
if tk.properties.get("user_agent", "") != "":
|
||||||
ua = user_agents.parse(tk.properties["user_agent"])
|
ua = user_agents.parse(tk.properties["user_agent"])
|
||||||
res = render(None, "TrustedDevices/user-agent.html", context={"ua": ua})
|
res = render(None, "TrustedDevices/user-agent.html", context={"ua": ua})
|
||||||
return HttpResponse(res)
|
return HttpResponse(res)
|
||||||
return HttpResponse("")
|
return HttpResponse("No Device provide", status=401)
|
||||||
|
|
||||||
|
|
||||||
def trust_device(request):
|
def trust_device(request):
|
||||||
|
|||||||
@@ -10,14 +10,12 @@ from cryptography.hazmat.primitives.serialization import Encoding
|
|||||||
from django.shortcuts import render
|
from django.shortcuts import render
|
||||||
import simplejson
|
import simplejson
|
||||||
|
|
||||||
# from django.template.context import RequestContext
|
|
||||||
from django.template.context_processors import csrf
|
from django.template.context_processors import csrf
|
||||||
from django.conf import settings
|
|
||||||
from django.http import HttpResponse
|
from django.http import HttpResponse
|
||||||
from .models import *
|
from django.conf import settings
|
||||||
|
from .models import User_Keys
|
||||||
from .views import login
|
from .views import login
|
||||||
from .Common import get_redirect_url
|
from .Common import get_redirect_url
|
||||||
import datetime
|
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,9 +1,8 @@
|
|||||||
import pyotp
|
from .models import User_Keys
|
||||||
from .models import *
|
|
||||||
from . import TrustedDevice, U2F, FIDO2, totp
|
from . import TrustedDevice, U2F, FIDO2, totp
|
||||||
import simplejson
|
import simplejson
|
||||||
from django.shortcuts import HttpResponse
|
from django.shortcuts import HttpResponse
|
||||||
from mfa.views import verify, goto
|
from mfa.views import verify
|
||||||
|
|
||||||
|
|
||||||
def has_mfa(request, username):
|
def has_mfa(request, username):
|
||||||
|
|||||||
@@ -2,9 +2,11 @@ import time
|
|||||||
from django.http import HttpResponseRedirect
|
from django.http import HttpResponseRedirect
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from django.core.urlresolvers import reverse # pyre-ignore[21]
|
|
||||||
except:
|
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
|
except ImportError:
|
||||||
|
from django.core.urlresolvers import reverse # pyre-ignore[21]
|
||||||
|
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ try:
|
|||||||
except ModuleNotFoundError:
|
except ModuleNotFoundError:
|
||||||
try:
|
try:
|
||||||
from jsonfield import JSONField # pyre-ignore[21]
|
from jsonfield import JSONField # pyre-ignore[21]
|
||||||
except ModuleNotFoundError:
|
except ModuleNotFoundError as exc:
|
||||||
raise ModuleNotFoundError(
|
raise ModuleNotFoundError(
|
||||||
"Can't find a JSONField implementation, please install jsonfield if django < 4.0"
|
"Can't find a JSONField implementation, please install jsonfield if django < 4.0"
|
||||||
)
|
)
|
||||||
@@ -13,10 +13,6 @@ except ModuleNotFoundError:
|
|||||||
from jose import jwt
|
from jose import jwt
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
|
|
||||||
# from jsonLookup import shasLookup, hasLookup
|
|
||||||
# JSONField.register_lookup(shasLookup)
|
|
||||||
# JSONField.register_lookup(hasLookup)
|
|
||||||
|
|
||||||
|
|
||||||
class User_Keys(models.Model):
|
class User_Keys(models.Model):
|
||||||
username = models.CharField(max_length=50)
|
username = models.CharField(max_length=50)
|
||||||
|
|||||||
@@ -3,12 +3,12 @@ from django.views.decorators.cache import never_cache
|
|||||||
from django.template.context_processors import csrf
|
from django.template.context_processors import csrf
|
||||||
from django.contrib.auth.hashers import make_password, PBKDF2PasswordHasher
|
from django.contrib.auth.hashers import make_password, PBKDF2PasswordHasher
|
||||||
from django.http import HttpResponse
|
from django.http import HttpResponse
|
||||||
|
from django.conf import settings
|
||||||
from .Common import get_redirect_url
|
from .Common import get_redirect_url
|
||||||
from .models import *
|
from .models import User_Keys
|
||||||
import simplejson
|
import simplejson
|
||||||
import random
|
import random
|
||||||
import string
|
import string
|
||||||
import datetime
|
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
|
|
||||||
USER_FRIENDLY_NAME = "Recovery Codes"
|
USER_FRIENDLY_NAME = "Recovery Codes"
|
||||||
|
|||||||
@@ -4,8 +4,10 @@ from . import views, totp, U2F, TrustedDevice, helpers, FIDO2, Email, recovery
|
|||||||
|
|
||||||
try:
|
try:
|
||||||
from django.urls import re_path as url
|
from django.urls import re_path as url
|
||||||
except:
|
except ImportError:
|
||||||
from django.conf.urls import url # pyre-ignore[21]
|
from django.conf.urls import url # pyre-ignore[21]
|
||||||
|
|
||||||
|
|
||||||
urlpatterns = [
|
urlpatterns = [
|
||||||
url(r"totp/start/", totp.start, name="start_new_otop"),
|
url(r"totp/start/", totp.start, name="start_new_otop"),
|
||||||
url(r"totp/getToken", totp.getToken, name="get_new_otop"),
|
url(r"totp/getToken", totp.getToken, name="get_new_otop"),
|
||||||
|
|||||||
@@ -2,18 +2,17 @@ import importlib
|
|||||||
|
|
||||||
from django.shortcuts import render
|
from django.shortcuts import render
|
||||||
from django.http import HttpResponse, HttpResponseRedirect
|
from django.http import HttpResponse, HttpResponseRedirect
|
||||||
from .models import *
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
except:
|
except:
|
||||||
from django.core.urlresolvers import reverse # pyre-ignore[21]
|
from django.core.urlresolvers import reverse # pyre-ignore[21]
|
||||||
from django.template.context_processors import csrf
|
|
||||||
from django.template.context import RequestContext
|
|
||||||
from django.conf import settings
|
|
||||||
from . import TrustedDevice
|
|
||||||
from django.contrib.auth.decorators import login_required
|
from django.contrib.auth.decorators import login_required
|
||||||
from user_agents import parse
|
from user_agents import parse
|
||||||
|
from django.conf import settings
|
||||||
|
from . import TrustedDevice
|
||||||
|
from .models import User_Keys
|
||||||
|
|
||||||
|
|
||||||
@login_required
|
@login_required
|
||||||
|
|||||||
Reference in New Issue
Block a user