forked from com2ghz/openapi-generator
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Python experimental] Readme improvements (OpenAPITools#6031)
* Python experimental readme improvements * Python experimental readme improvements * execute scripts in bin directory
- Loading branch information
1 parent
d63481b
commit 5b6ae10
Showing
54 changed files
with
2,499 additions
and
543 deletions.
There are no files selected for viewing
4 changes: 2 additions & 2 deletions
4
modules/openapi-generator/src/main/resources/python/common_README.mustache
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
...es/openapi-generator/src/main/resources/python/python-experimental/README_common.mustache
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
116 changes: 89 additions & 27 deletions
116
modules/openapi-generator/src/main/resources/python/python_doc_auth_partial.mustache
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,51 +1,113 @@ | ||
# Defining the host is optional and defaults to {{{basePath}}} | ||
# See configuration.py for a list of all supported configuration parameters. | ||
configuration = {{{packageName}}}.Configuration( | ||
host = "{{{basePath}}}" | ||
) | ||
|
||
{{#hasAuthMethods}} | ||
# The client must configure the authentication and authorization parameters | ||
# in accordance with the API server security policy. | ||
# Examples for each auth method are provided below, use the example that | ||
# satisfies your auth use case. | ||
{{#authMethods}} | ||
configuration = {{{packageName}}}.Configuration() | ||
{{#isBasic}} | ||
{{#isBasicBasic}} | ||
|
||
# Configure HTTP basic authorization: {{{name}}} | ||
configuration.username = 'YOUR_USERNAME' | ||
configuration.password = 'YOUR_PASSWORD' | ||
configuration = {{{packageName}}}.Configuration( | ||
username = 'YOUR_USERNAME', | ||
password = 'YOUR_PASSWORD' | ||
) | ||
{{/isBasicBasic}} | ||
{{#isBasicBearer}} | ||
|
||
# Configure Bearer authorization{{#bearerFormat}} ({{{.}}}){{/bearerFormat}}: {{{name}}} | ||
configuration.access_token = 'YOUR_BEARER_TOKEN' | ||
configuration = {{{packageName}}}.Configuration( | ||
access_token = 'YOUR_BEARER_TOKEN' | ||
) | ||
{{/isBasicBearer}} | ||
{{#isHttpSignature}} | ||
# Configure HTTP signature authorization: {{{name}}} | ||
# You can specify the signing key-id, private key path, signing scheme, signing algorithm, | ||
# list of signed headers and signature max validity. | ||
configuration.signing_info = {{{packageName}}}.signing.HttpSigningConfiguration( | ||
key_id = 'my-key-id', | ||
private_key_path = 'rsa.pem', | ||
signing_scheme = signing.SCHEME_HS2019, | ||
signing_algorithm = signing.ALGORITHM_RSASSA_PSS, | ||
signed_headers = [signing.HEADER_REQUEST_TARGET, | ||
signing.HEADER_CREATED, | ||
signing.HEADER_EXPIRES, | ||
signing.HEADER_HOST, | ||
signing.HEADER_DATE, | ||
signing.HEADER_DIGEST, | ||
'Content-Type', | ||
'Content-Length', | ||
'User-Agent' | ||
], | ||
signature_max_validity = datetime.timedelta(minutes=5) | ||
|
||
# Configure HTTP message signature: {{{name}}} | ||
# The HTTP Signature Header mechanism that can be used by a client to | ||
# authenticate the sender of a message and ensure that particular headers | ||
# have not been modified in transit. | ||
# | ||
# You can specify the signing key-id, private key path, signing scheme, | ||
# signing algorithm, list of signed headers and signature max validity. | ||
# The 'key_id' parameter is an opaque string that the API server can use | ||
# to lookup the client and validate the signature. | ||
# The 'private_key_path' parameter should be the path to a file that | ||
# contains a DER or base-64 encoded private key. | ||
# The 'private_key_passphrase' parameter is optional. Set the passphrase | ||
# if the private key is encrypted. | ||
# The 'signed_headers' parameter is used to specify the list of | ||
# HTTP headers included when generating the signature for the message. | ||
# You can specify HTTP headers that you want to protect with a cryptographic | ||
# signature. Note that proxies may add, modify or remove HTTP headers | ||
# for legitimate reasons, so you should only add headers that you know | ||
# will not be modified. For example, if you want to protect the HTTP request | ||
# body, you can specify the Digest header. In that case, the client calculates | ||
# the digest of the HTTP request body and includes the digest in the message | ||
# signature. | ||
# The 'signature_max_validity' parameter is optional. It is configured as a | ||
# duration to express when the signature ceases to be valid. The client calculates | ||
# the expiration date every time it generates the cryptographic signature | ||
# of an HTTP request. The API server may have its own security policy | ||
# that controls the maximum validity of the signature. The client max validity | ||
# must be lower than the server max validity. | ||
# The time on the client and server must be synchronized, otherwise the | ||
# server may reject the client signature. | ||
# | ||
# The client must use a combination of private key, signing scheme, | ||
# signing algorithm and hash algorithm that matches the security policy of | ||
# the API server. | ||
# | ||
# See {{{packageName}}}.signing for a list of all supported parameters. | ||
configuration = {{{packageName}}}.Configuration( | ||
host = "{{{basePath}}}", | ||
signing_info = {{{packageName}}}.signing.HttpSigningConfiguration( | ||
key_id = 'my-key-id', | ||
private_key_path = 'private_key.pem', | ||
private_key_passphrase = 'YOUR_PASSPHRASE', | ||
signing_scheme = {{{packageName}}}.signing.SCHEME_HS2019, | ||
signing_algorithm = {{{packageName}}}.signing.ALGORITHM_ECDSA_MODE_FIPS_186_3, | ||
hash_algorithm = {{{packageName}}}.signing.SCHEME_RSA_SHA256, | ||
signed_headers = [ | ||
{{{packageName}}}.signing.HEADER_REQUEST_TARGET, | ||
{{{packageName}}}.signing.HEADER_CREATED, | ||
{{{packageName}}}.signing.HEADER_EXPIRES, | ||
{{{packageName}}}.signing.HEADER_HOST, | ||
{{{packageName}}}.signing.HEADER_DATE, | ||
{{{packageName}}}.signing.HEADER_DIGEST, | ||
'Content-Type', | ||
'Content-Length', | ||
'User-Agent' | ||
], | ||
signature_max_validity = datetime.timedelta(minutes=5) | ||
) | ||
) | ||
{{/isHttpSignature}} | ||
{{/isBasic}} | ||
{{#isApiKey}} | ||
|
||
# Configure API key authorization: {{{name}}} | ||
configuration.api_key['{{{keyParamName}}}'] = 'YOUR_API_KEY' | ||
configuration = {{{packageName}}}.Configuration( | ||
host = "{{{basePath}}}", | ||
api_key = { | ||
'{{{keyParamName}}}': 'YOUR_API_KEY' | ||
} | ||
) | ||
# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed | ||
# configuration.api_key_prefix['{{{keyParamName}}}'] = 'Bearer' | ||
{{/isApiKey}} | ||
{{#isOAuth}} | ||
|
||
# Configure OAuth2 access token for authorization: {{{name}}} | ||
configuration = {{{packageName}}}.Configuration( | ||
host = "{{{basePath}}}" | ||
) | ||
configuration.access_token = 'YOUR_ACCESS_TOKEN' | ||
{{/isOAuth}} | ||
{{/authMethods}} | ||
|
||
# Defining host is optional and default to {{{basePath}}} | ||
configuration.host = "{{{basePath}}}" | ||
{{/hasAuthMethods}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.