我们从Python开源项目中,提取了以下50个代码示例,用于说明如何使用werkzeug.security.gen_salt()。
def __init__(self, app, evalex=False, request_key='werkzeug.request', console_path='/console', console_init_func=None, show_hidden_frames=False, lodgeit_url=None): if lodgeit_url is not None: from warnings import warn warn(DeprecationWarning('Werkzeug now pastes into gists.')) if not console_init_func: console_init_func = dict self.app = app self.evalex = evalex self.frames = {} self.tracebacks = {} self.request_key = request_key self.console_path = console_path self.console_init_func = console_init_func self.show_hidden_frames = show_hidden_frames self.secret = gen_salt(20)
def post(self, args): """ Create a new OAuth2 Client. Essentially, OAuth2 Client is a ``client_id`` and ``client_secret`` pair associated with a user. """ with api.commit_or_abort( db.session, default_error_message="Failed to create a new OAuth2 client." ): # TODO: reconsider using gen_salt new_oauth2_client = OAuth2Client( user_id=current_user.id, client_id=security.gen_salt(40), client_secret=security.gen_salt(50), **args ) db.session.add(new_oauth2_client) return new_oauth2_client
def __init__(self, app, evalex=False, request_key='werkzeug.request', console_path='/console', console_init_func=None, show_hidden_frames=False, lodgeit_url=None, pin_security=True, pin_logging=True): if lodgeit_url is not None: from warnings import warn warn(DeprecationWarning('Werkzeug now pastes into gists.')) if not console_init_func: console_init_func = None self.app = app self.evalex = evalex self.frames = {} self.tracebacks = {} self.request_key = request_key self.console_path = console_path self.console_init_func = console_init_func self.show_hidden_frames = show_hidden_frames self.secret = gen_salt(20) self._failed_pin_auth = 0 self.pin_logging = pin_logging if pin_security: # Print out the pin for the debugger on standard out. if os.environ.get('WERKZEUG_RUN_MAIN') == 'true' and \ pin_logging: _log('warning', ' * Debugger is active!') if self.pin is None: _log('warning', ' * Debugger pin disabled. ' 'DEBUGGER UNSECURED!') else: _log('info', ' * Debugger pin code: %s' % self.pin) else: self.pin = None
def __init__(self, app, evalex=False, request_key='werkzeug.request', console_path='/console', console_init_func=None, show_hidden_frames=False, lodgeit_url=None, pin_security=True, pin_logging=True): if lodgeit_url is not None: from warnings import warn warn(DeprecationWarning('Werkzeug now pastes into gists.')) if not console_init_func: console_init_func = None self.app = app self.evalex = evalex self.frames = {} self.tracebacks = {} self.request_key = request_key self.console_path = console_path self.console_init_func = console_init_func self.show_hidden_frames = show_hidden_frames self.secret = gen_salt(20) self._failed_pin_auth = 0 self.pin_logging = pin_logging if pin_security: # Print out the pin for the debugger on standard out. if os.environ.get('WERKZEUG_RUN_MAIN') == 'true' and \ pin_logging: _log('warning', ' * Debugger is active!') if self.pin is None: _log('warning', ' * Debugger PIN disabled. ' 'DEBUGGER UNSECURED!') else: _log('info', ' * Debugger PIN: %s' % self.pin) else: self.pin = None
def office365(): # save parameters to session as office365 forbids parameters in return url session['office365.remember'] = request.args.get('remember') == '1' session['office365.next'] = request.args.get('next') session['office365.prev'] = 'auth.refresh' if current_user.is_authenticated else 'auth.login' # prevent csrf attacks session['office365.state'] = gen_salt(32) return office365_client.authorize(callback=external_url(url_for('auth.office365_authorized')), state=session['office365.state'])
def render_authorize(*args, **kwargs): app_id = kwargs.get('client_id') app = OauthApp.query.filter_by(client_id=app_id).first() kwargs['app'] = app session['oauthprovider.snitch'] = gen_salt(32) kwargs['snitch'] = session['oauthprovider.snitch'] kwargs['request'] = request kwargs['defined_scopes'] = defined_scopes return render_template('authorize.html', **kwargs)