Skip to content

Commit 2e5b0f8

Browse files
committed
Remove deprecated modules and options
Signed-off-by: Ivan Kanakarakis <[email protected]>
1 parent 57e2f1b commit 2e5b0f8

File tree

10 files changed

+11
-356
lines changed

10 files changed

+11
-356
lines changed

README.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
[![Build Status](https://travis-ci.org/IdentityPython/SATOSA.svg?branch=travis)](https://travis-ci.org/IdentityPython/SATOSA)
33
[![PyPI](https://img.shields.io/pypi/v/SATOSA.svg)](https://pypi.python.org/pypi/SATOSA)
44

5-
A configurable proxy for translating between different authentication protocols such as SAML2,
5+
A configurable proxy for translating between different authentication protocols such as SAML2,
66
OpenID Connect and OAuth2.
77

88
# Table of Contents
@@ -19,7 +19,6 @@ OpenID Connect and OAuth2.
1919
- [attributes](doc/README.md#attributes)
2020
- [user_id_from_attrs](doc/README.md#user_id_from_attrs)
2121
- [user_id_to_attr](doc/README.md#user_id_to_attr)
22-
- [hash](doc/README.md#hash)
2322
- [Plugins](doc/README.md#plugins)
2423
- [SAML2 plugins](doc/README.md#saml_plugin)
2524
- [Metadata](doc/README.md#metadata)
@@ -36,26 +35,26 @@ OpenID Connect and OAuth2.
3635

3736

3837
# Use cases
39-
In this section a set of use cases for the proxy is presented.
38+
In this section a set of use cases for the proxy is presented.
4039

4140
## SAML2<->SAML2
42-
There are SAML2 service providers for example Box which is not able to handle multiple identity
43-
providers. For more information about how to set up, configure and run such a proxy instance
41+
There are SAML2 service providers for example Box which is not able to handle multiple identity
42+
providers. For more information about how to set up, configure and run such a proxy instance
4443
please visit [Single Service Provider<->Multiple Identity providers](doc/one-to-many.md)
4544

46-
If an identity provider can not communicate with service providers in for example a federation the
45+
If an identity provider can not communicate with service providers in for example a federation the
4746
can convert request and make the communication possible.
4847

4948
## SAML2<->Social logins
50-
This setup makes it possible to connect a SAML2 service provider to multiple social media identity
51-
providers such as Google and Facebook. The proxy makes it possible to mirror a identity provider by
52-
generating SAML2 metadata corresponding that provider and create dynamic endpoint which
49+
This setup makes it possible to connect a SAML2 service provider to multiple social media identity
50+
providers such as Google and Facebook. The proxy makes it possible to mirror a identity provider by
51+
generating SAML2 metadata corresponding that provider and create dynamic endpoint which
5352
are connected to a single identity provider.
54-
For more information about how to set up, configure and run such a proxy instance please visit
53+
For more information about how to set up, configure and run such a proxy instance please visit
5554
[SAML2<->Social logins](doc/SAML2-to-Social_logins.md)
5655

5756
## SAML2<->OIDC
58-
The proxy is able to act as a proxy between a SAML2 service provider and a OpenID connect provider
57+
The proxy is able to act as a proxy between a SAML2 service provider and a OpenID connect provider
5958
[SAML2<->OIDC](doc/saml2-to-oidc.md)
6059

6160
# Contact

doc/README.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,6 @@ in the [example directory](../example).
4444
| `BACKEND_MODULES` | string[] | `[openid_connect_backend.yaml, saml2_backend.yaml]` | list of plugin configuration file paths, describing enabled backends |
4545
| `FRONTEND_MODULES` | string[] | `[saml2_frontend.yaml, openid_connect_frontend.yaml]` | list of plugin configuration file paths, describing enabled frontends |
4646
| `MICRO_SERVICES` | string[] | `[statistics_service.yaml]` | list of plugin configuration file paths, describing enabled microservices |
47-
| `USER_ID_HASH_SALT` | string | `61a89d2db0b9e1e2` | **DEPRECATED - use the hasher micro-service** salt used when creating the persistent user identifier, will be overridden by the environment variable `SATOSA_USER_ID_HASH_SALT` if it is set |
4847
| `LOGGING` | dict | see [Python logging.conf](https://docs.python.org/3/library/logging.config.html) | optional configuration of application logging |
4948

5049

@@ -120,13 +119,6 @@ linking, the `user_id_to_attr` configuration parameter should be set, since that
120119
service will overwrite the subject identifier generated by the proxy.
121120

122121

123-
### hash **DEPRECATED - use the hasher micro-service**
124-
The proxy can hash any attribute value (e.g., for obfuscation) before passing
125-
it on to the client. The `hash` key should contain a list of all attribute names
126-
for which the corresponding attribute values should be hashed before being
127-
returned to the client.
128-
129-
130122
## Plugins
131123
The authentication protocol specific communication is handled by different plugins,
132124
divided into frontends (receiving requests from clients) and backends (sending requests

doc/mod_wsgi.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,8 +110,6 @@ BASE: https://some.host.org
110110
111111
STATE_ENCRYPTION_KEY: fazmC8yELv38f9PF0kbS
112112
113-
USER_ID_HASH_SALT: i7tmt34rzb2QRDgN1Ggy
114-
115113
INTERNAL_ATTRIBUTES: "/etc/satosa/internal_attributes.yaml"
116114
117115
COOKIE_STATE_NAME: "SATOSA_STATE"

src/satosa/backends/saml2.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@
3030
MetadataDescription, OrganizationDesc, ContactPersonDesc, UIInfoDesc
3131
)
3232
from satosa.backends.base import BackendModule
33-
from satosa.deprecated import SAMLInternalResponse
3433

3534

3635
logger = logging.getLogger(__name__)

src/satosa/base.py

Lines changed: 1 addition & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44
import json
55
import logging
66
import uuid
7-
import warnings as _warnings
87

98
from saml2.s_utils import UnknownSystemEntity
109

@@ -17,10 +16,9 @@
1716
from .routing import ModuleRouter, SATOSANoBoundEndpointError
1817
from .state import cookie_to_state, SATOSAStateError, State, state_to_cookie
1918

20-
from satosa.deprecated import hash_attributes
21-
2219
import satosa.logging_util as lu
2320

21+
2422
logger = logging.getLogger(__name__)
2523

2624
STATE_KEY = "SATOSA_BASE"
@@ -41,22 +39,6 @@ def __init__(self, config):
4139
"""
4240
self.config = config
4341

44-
for option in ["USER_ID_HASH_SALT"]:
45-
if option in self.config:
46-
msg = (
47-
"'{opt}' configuration option is deprecated."
48-
" Use the hasher microservice instead."
49-
).format(opt=option)
50-
_warnings.warn(msg, DeprecationWarning)
51-
52-
for option in ["hash"]:
53-
if option in self.config["INTERNAL_ATTRIBUTES"]:
54-
msg = (
55-
"'{opt}' configuration option is deprecated."
56-
" Use the hasher microservice instead."
57-
).format(opt=option)
58-
_warnings.warn(msg, DeprecationWarning)
59-
6042
logger.info("Loading backend modules...")
6143
backends = load_backends(self.config, self._auth_resp_callback_func,
6244
self.config["INTERNAL_ATTRIBUTES"])
@@ -130,12 +112,6 @@ def _auth_resp_finish(self, context, internal_response):
130112
if user_id_to_attr:
131113
internal_response.attributes[user_id_to_attr] = [internal_response.subject_id]
132114

133-
hash_attributes(
134-
self.config["INTERNAL_ATTRIBUTES"].get("hash", []),
135-
internal_response.attributes,
136-
self.config.get("USER_ID_HASH_SALT", ""),
137-
)
138-
139115
# remove all session state unless CONTEXT_STATE_DELETE is False
140116
context.state.delete = self.config.get("CONTEXT_STATE_DELETE", True)
141117
context.request = None

0 commit comments

Comments
 (0)