From ace130e552d66588814d93b6a7687f39632051f7 Mon Sep 17 00:00:00 2001 From: Roland Hedberg Date: Thu, 30 May 2013 12:31:32 +0200 Subject: [PATCH] Added some more log info --- src/saml2/mdstore.py | 4 +++- tools/mdexport.py | 6 ++++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/src/saml2/mdstore.py b/src/saml2/mdstore.py index cdc5239..1bb3292 100644 --- a/src/saml2/mdstore.py +++ b/src/saml2/mdstore.py @@ -375,7 +375,7 @@ class MetaDataExtern(MetaData): compliance before it is imported. """ response = self.http.send(self.url) - if response.status == 200: + if response.status_code == 200: node_name="%s:%s" % (md.EntitiesDescriptor.c_namespace, md.EntitiesDescriptor.c_tag) if self.security.verify_signature(response.text, @@ -463,8 +463,10 @@ class MetadataStore(object): known_principal = True if known_principal: + logger.error("Unsupported binding: %s (%s)" % (binding, entity_id)) raise UnsupportedBinding(binding) else: + logger.error("Unknown principal: %s" % entity_id) raise UnknownPrincipal(entity_id) def _ext_service(self, entity_id, typ, service, binding=None): diff --git a/tools/mdexport.py b/tools/mdexport.py index 4f5213d..7df75d3 100755 --- a/tools/mdexport.py +++ b/tools/mdexport.py @@ -1,5 +1,6 @@ #!/usr/bin/env python import sys +from saml2.sigver import _get_xmlsec_cryptobackend, SecurityContext from saml2.httpbase import HTTPBase from saml2 import saml @@ -59,9 +60,10 @@ if args.type == "local": elif args.type == "external": ATTRCONV = ac_factory(args.attrsmap) httpc = HTTPBase() + crypto = _get_xmlsec_cryptobackend("/opt/local/bin/xmlsec1") + sc = SecurityContext(crypto) metad = MetaDataExtern(ONTS.values(), ATTRCONV, args.url, - "/opt/local/bin/xmlsec1", - args.cert, httpc) + sc, cert=args.cert, http=httpc) if metad: metad.load()