Script that merges several metadata streams into one.
This commit is contained in:
93
tools/merge_metadata.py
Executable file
93
tools/merge_metadata.py
Executable file
@@ -0,0 +1,93 @@
|
||||
#!/usr/bin/env python
|
||||
from saml2.md import EntitiesDescriptor
|
||||
from saml2.sigver import _get_xmlsec_cryptobackend, SecurityContext
|
||||
from saml2.httpbase import HTTPBase
|
||||
|
||||
from saml2 import saml
|
||||
from saml2 import md
|
||||
from saml2.attribute_converter import ac_factory
|
||||
from saml2.extension import dri
|
||||
from saml2.extension import idpdisc
|
||||
from saml2.extension import mdattr
|
||||
from saml2.extension import mdrpi
|
||||
from saml2.extension import mdui
|
||||
from saml2.extension import shibmd
|
||||
from saml2.extension import ui
|
||||
import xmldsig
|
||||
import xmlenc
|
||||
|
||||
import argparse
|
||||
|
||||
from saml2.mdstore import MetaDataFile, MetaDataExtern
|
||||
|
||||
__author__ = 'rolandh'
|
||||
|
||||
"""
|
||||
A script that imports and verifies metadata.
|
||||
"""
|
||||
|
||||
|
||||
ONTS = {
|
||||
saml.NAMESPACE: saml,
|
||||
mdui.NAMESPACE: mdui,
|
||||
mdattr.NAMESPACE: mdattr,
|
||||
mdrpi.NAMESPACE: mdrpi,
|
||||
dri.NAMESPACE: dri,
|
||||
ui.NAMESPACE: ui,
|
||||
idpdisc.NAMESPACE: idpdisc,
|
||||
md.NAMESPACE: md,
|
||||
xmldsig.NAMESPACE: xmldsig,
|
||||
xmlenc.NAMESPACE: xmlenc,
|
||||
shibmd.NAMESPACE: shibmd
|
||||
}
|
||||
|
||||
|
||||
parser = argparse.ArgumentParser()
|
||||
parser.add_argument('-a', dest='attrsmap')
|
||||
parser.add_argument('-o', dest='output', default="local")
|
||||
parser.add_argument('-x', dest='xmlsec')
|
||||
parser.add_argument('-i', dest='ignore_valid', action='store_true')
|
||||
parser.add_argument(dest="conf")
|
||||
args = parser.parse_args()
|
||||
|
||||
metad = None
|
||||
|
||||
output = EntitiesDescriptor()
|
||||
|
||||
# config file format
|
||||
# local <local file name>
|
||||
# external <url> <local file name for certificate use to verify signature>
|
||||
|
||||
for line in open(args.conf).readlines():
|
||||
line = line.strip()
|
||||
if line[0] == "#":
|
||||
continue
|
||||
spec = line.split(" ")
|
||||
|
||||
if args.ignore_valid:
|
||||
kwargs = {"check_validity": False}
|
||||
else:
|
||||
kwargs = {}
|
||||
|
||||
if spec[0] == "local":
|
||||
metad = MetaDataFile(ONTS.values(), spec[1], spec[1], **kwargs)
|
||||
elif spec[0] == "remote":
|
||||
ATTRCONV = ac_factory(args.attrsmap)
|
||||
httpc = HTTPBase()
|
||||
crypto = _get_xmlsec_cryptobackend(args.xmlsec)
|
||||
sc = SecurityContext(crypto, key_type="", cert_type="")
|
||||
metad = MetaDataExtern(ONTS.values(), ATTRCONV, spec[1],
|
||||
sc, cert=spec[2], http=httpc, **kwargs)
|
||||
|
||||
if metad:
|
||||
try:
|
||||
metad.load()
|
||||
except:
|
||||
raise
|
||||
|
||||
output.entity_descriptor.extend(metad.entities_descr.entity_descriptor)
|
||||
|
||||
print output
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user