PEP8 models.
This commit is contained in:
parent
2a34a93da7
commit
7ec3a763d6
2 changed files with 24 additions and 14 deletions
|
@ -33,17 +33,20 @@ JWT_ALGS = [
|
|||
class Client(models.Model):
|
||||
|
||||
name = models.CharField(max_length=100, default='', verbose_name=_(u'Name'))
|
||||
owner = models.ForeignKey(settings.AUTH_USER_MODEL, verbose_name=_(u'Owner'), blank = True, null = True, default = None, on_delete=models.SET_NULL, related_name='oidc_clients_set')
|
||||
owner = models.ForeignKey(
|
||||
settings.AUTH_USER_MODEL, verbose_name=_(u'Owner'), blank=True,
|
||||
null=True, default=None, on_delete=models.SET_NULL, related_name='oidc_clients_set')
|
||||
client_type = models.CharField(
|
||||
max_length=30,
|
||||
choices=CLIENT_TYPE_CHOICES,
|
||||
default='confidential',
|
||||
verbose_name=_(u'Client Type'),
|
||||
help_text=_(u'<b>Confidential</b> clients are capable of maintaining the confidentiality of their credentials. '
|
||||
u'<b>Public</b> clients are incapable.'))
|
||||
help_text=_(u'<b>Confidential</b> clients are capable of maintaining the confidentiality'
|
||||
u' of their credentials. <b>Public</b> clients are incapable.'))
|
||||
client_id = models.CharField(max_length=255, unique=True, verbose_name=_(u'Client ID'))
|
||||
client_secret = models.CharField(max_length=255, blank=True, verbose_name=_(u'Client SECRET'))
|
||||
response_type = models.CharField(max_length=30, choices=RESPONSE_TYPE_CHOICES, verbose_name=_(u'Response Type'))
|
||||
response_type = models.CharField(
|
||||
max_length=30, choices=RESPONSE_TYPE_CHOICES, verbose_name=_(u'Response Type'))
|
||||
jwt_alg = models.CharField(
|
||||
max_length=10,
|
||||
choices=JWT_ALGS,
|
||||
|
@ -51,27 +54,31 @@ class Client(models.Model):
|
|||
verbose_name=_(u'JWT Algorithm'),
|
||||
help_text=_(u'Algorithm used to encode ID Tokens.'))
|
||||
date_created = models.DateField(auto_now_add=True, verbose_name=_(u'Date Created'))
|
||||
website_url = models.CharField(max_length=255, blank=True, default='', verbose_name=_(u'Website URL'))
|
||||
website_url = models.CharField(
|
||||
max_length=255, blank=True, default='', verbose_name=_(u'Website URL'))
|
||||
terms_url = models.CharField(
|
||||
max_length=255,
|
||||
blank=True,
|
||||
default='',
|
||||
verbose_name=_(u'Terms URL'),
|
||||
help_text=_(u'External reference to the privacy policy of the client.'))
|
||||
contact_email = models.CharField(max_length=255, blank=True, default='', verbose_name=_(u'Contact Email'))
|
||||
logo = models.FileField(blank=True, default='', upload_to='oidc_provider/clients', verbose_name=_(u'Logo Image'))
|
||||
contact_email = models.CharField(
|
||||
max_length=255, blank=True, default='', verbose_name=_(u'Contact Email'))
|
||||
logo = models.FileField(
|
||||
blank=True, default='', upload_to='oidc_provider/clients', verbose_name=_(u'Logo Image'))
|
||||
reuse_consent = models.BooleanField(
|
||||
default=True,
|
||||
verbose_name=_('Reuse Consent?'),
|
||||
help_text=_('If enabled, the Server will save the user consent given to a specific client, so that'
|
||||
' user won\'t be prompted for the same authorization multiple times.'))
|
||||
help_text=_('If enabled, server will save the user consent given to a specific client, '
|
||||
'so that user won\'t be prompted for the same authorization multiple times.'))
|
||||
require_consent = models.BooleanField(
|
||||
default=True,
|
||||
verbose_name=_('Require Consent?'),
|
||||
help_text=_('If disabled, the Server will NEVER ask the user for consent.'))
|
||||
|
||||
_redirect_uris = models.TextField(
|
||||
default='', verbose_name=_(u'Redirect URIs'), help_text=_(u'Enter each URI on a new line.'))
|
||||
default='', verbose_name=_(u'Redirect URIs'),
|
||||
help_text=_(u'Enter each URI on a new line.'))
|
||||
|
||||
@property
|
||||
def redirect_uris(self):
|
||||
|
@ -112,7 +119,8 @@ class Client(models.Model):
|
|||
|
||||
class BaseCodeTokenModel(models.Model):
|
||||
|
||||
user = models.ForeignKey(settings.AUTH_USER_MODEL, verbose_name=_(u'User'), on_delete=models.CASCADE)
|
||||
user = models.ForeignKey(
|
||||
settings.AUTH_USER_MODEL, verbose_name=_(u'User'), on_delete=models.CASCADE)
|
||||
client = models.ForeignKey(Client, verbose_name=_(u'Client'), on_delete=models.CASCADE)
|
||||
expires_at = models.DateTimeField(verbose_name=_(u'Expiration Date'))
|
||||
_scope = models.TextField(default='', verbose_name=_(u'Scopes'))
|
||||
|
@ -144,7 +152,8 @@ class Code(BaseCodeTokenModel):
|
|||
nonce = models.CharField(max_length=255, blank=True, default='', verbose_name=_(u'Nonce'))
|
||||
is_authentication = models.BooleanField(default=False, verbose_name=_(u'Is Authentication?'))
|
||||
code_challenge = models.CharField(max_length=255, null=True, verbose_name=_(u'Code Challenge'))
|
||||
code_challenge_method = models.CharField(max_length=255, null=True, verbose_name=_(u'Code Challenge Method'))
|
||||
code_challenge_method = models.CharField(
|
||||
max_length=255, null=True, verbose_name=_(u'Code Challenge Method'))
|
||||
|
||||
class Meta:
|
||||
verbose_name = _(u'Authorization Code')
|
||||
|
@ -192,7 +201,8 @@ class UserConsent(BaseCodeTokenModel):
|
|||
|
||||
class RSAKey(models.Model):
|
||||
|
||||
key = models.TextField(verbose_name=_(u'Key'), help_text=_(u'Paste your private RSA Key here.'))
|
||||
key = models.TextField(
|
||||
verbose_name=_(u'Key'), help_text=_(u'Paste your private RSA Key here.'))
|
||||
|
||||
class Meta:
|
||||
verbose_name = _(u'RSA Key')
|
||||
|
|
2
tox.ini
2
tox.ini
|
@ -28,7 +28,7 @@ commands =
|
|||
[pytest]
|
||||
DJANGO_SETTINGS_MODULE = oidc_provider.tests.settings
|
||||
python_files = test_*.py
|
||||
flake8-max-line-length = 99
|
||||
flake8-max-line-length = 100
|
||||
flake8-ignore =
|
||||
.git ALL
|
||||
__pycache__ ALL
|
||||
|
|
Loading…
Reference in a new issue