Personal tools
Skip to content. | Skip to navigation
Async aims to make writing asyncronous processing easier. It provides a task-graph with interdependent tasks that communicate using blocking channels, allowing to delay actual computations until items are requested. Tasks will automatically be distributed among 0 or more threads for the actual computation.
Authentic 2 is a versatile identity provider aiming to address a broad range of needs, from simple to complex setups; it has support for many protocols and can bridge between them. Authentic 2 is under the GNU AGPL version 3 licence. It has support for SAMLv2 thanks to Lasso, a free (GNU GPL) implementation of the Liberty Alliance specifications. Full documentation available on http://packages.python.org/authentic2. Features -------- Authentic can authenticate users against: - an LDAP directory, - a SAML 2.0 identity provider, - an OpenID identity provider, - with an X509 certificate. Authentic can provide authentication to web applications using the following protocols: - OpenID, - SAML 2.0, - CAS 1.0 & CAS 2.0. Authentic can proxy authentication between any two different protocols it support.
Authentic2 SAML2 authentication plugin
Settings AUTOMATIC_GRANT: A list of URL prefix which are automatically granted scopes without asking the user. Example: A2_OAUTH2_AUTOMATIC_GRANT = ( ('http://localhost:8000/', ('read',)), ) Web Service proxy You can configure simple REST web-service in /admin/authentic2_idp_oauth2/webservice/. URL field can contain template variable like that: http://example.com/info/?user={{ user.username|urlencode }} or like: http://example.com/categories/?format=json&NameID={{ federations.service_1.links.0|urlencode }} Supported authentication mechanisms on the target web-service are HMAC-SHA-256 and HMAC-SHA-1 as specified on http://doc.entrouvert.org/portail-citoyen/dev/. You can access your newly proxy web-service through those URLs: http://your-idp.com/idp/oauth2/ws-proxy/<web-service.id>/ or: http://your-idp.com/idp/oauth2/ws-proxy/<web-service.slug>/
Friendly state machines for python.
This project provides a set of Python packages that make it easy to access the Microsoft Azure components such as ServiceManagement, Storage, and ServiceBus. The SDK supports Python 2.7, 3.3, 3.4. Features Tables create and delete tables create, query, insert, update, merge, and delete entities Blobs create, list, and delete containers, work with container metadata and permissions, list blobs in container create block and page blobs (from a stream, a file, or a string), work with blob blocks and pages, delete blobs work with blob properties, metadata, leases, snapshot a blob Storage Queues create, list, and delete queues, and work with queue metadata create, get, peek, update, delete messages Service Bus Queues: create, list and delete queues; create, list, and delete subscriptions; send, receive, unlock and delete messages Topics: create, list, and delete topics; create, list, and delete rules Service Management storage accounts: create, update, delete, list, regenerate keys affinity groups: create, update, delete, list, get properties locations: list hosted services: create, update, delete, list, get properties deployment: create, get, delete, swap, change configuration, update status, upgrade, rollback role instance: reboot, reimage discover addresses and ports for the endpoints of other role instances in your service get configuration settings and access local resources get role instance information for current role and other role instances query and set the status of the current role
Babel is composed of two major parts: * tools to build and work with gettext message catalogs * a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc.