@@ -255,22 +255,27 @@ def _load_oid_token(self):
255
255
return self .token
256
256
257
257
def _refresh_oidc (self , provider ):
258
- ca_cert = tempfile . NamedTemporaryFile ( delete = True )
258
+ config = Configuration ( )
259
259
260
- if PY3 :
261
- cert = base64 .b64decode (
262
- provider ['config' ]['idp-certificate-authority-data' ]
263
- ).decode ('utf-8' )
264
- else :
265
- cert = base64 .b64decode (
266
- provider ['config' ]['idp-certificate-authority-data' ] + "=="
267
- )
260
+ if 'idp-certificate-authority-data' in provider ['config' ]:
261
+ ca_cert = tempfile .NamedTemporaryFile (delete = True )
268
262
269
- with open (ca_cert .name , 'w' ) as fh :
270
- fh .write (cert )
263
+ if PY3 :
264
+ cert = base64 .b64decode (
265
+ provider ['config' ]['idp-certificate-authority-data' ]
266
+ ).decode ('utf-8' )
267
+ else :
268
+ cert = base64 .b64decode (
269
+ provider ['config' ]['idp-certificate-authority-data' ] + "=="
270
+ )
271
271
272
- config = Configuration ()
273
- config .ssl_ca_cert = ca_cert .name
272
+ with open (ca_cert .name , 'w' ) as fh :
273
+ fh .write (cert )
274
+
275
+ config .ssl_ca_cert = ca_cert .name
276
+
277
+ else :
278
+ config .verify_ssl = False
274
279
275
280
client = ApiClient (configuration = config )
276
281
@@ -301,7 +306,7 @@ def _refresh_oidc(self, provider):
301
306
refresh_token = provider ['config' ]['refresh-token' ],
302
307
auth = (provider ['config' ]['client-id' ],
303
308
provider ['config' ]['client-secret' ]),
304
- verify = ca_cert . name
309
+ verify = config . ssl_ca_cert if config . verify_ssl else None
305
310
)
306
311
except oauthlib .oauth2 .rfc6749 .errors .InvalidClientIdError :
307
312
return
0 commit comments