Sharepoint์์ ํ์ผ์ CRUDํ๊ณ ์ถ์ต๋๋ค. ์ด๋ฅผ ์ํด ๋ค์๊ณผ ๊ฐ์ ๊ธฐ๋ณธ ์ ๋ฅผ ๋ฐ๋ฅด๋ ค๊ณ ํฉ๋๋ค.
from office365.sharepoint.client_context import ClientContext
settings = {
'url': 'https://*****.sharepoint.com/sites/*****',
'user_credentials': {
'username': '*****@gmail.com',
'password': '*****',
},
}
ctx = ClientContext(settings["url"]).with_user_credentials(settings.get('user_credentials').get('username'),
settings.get('user_credentials').get('password'))
web = ctx.web.get().execute_query()
print(web.properties["Url"])
๋์๊ฒ ์ค๋ฅ๋ฅผ ์ ๊ณตํฉ๋๋ค :
IndexError Traceback (most recent call last)
<ipython-input-23-c5907526ff22> in <module>
12 settings.get('user_credentials').get('password'))
13
---> 14 web = ctx.web.get().execute_query()
15 print(web.properties["Url"])
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\client_object.py in execute_query(self)
31
32 def execute_query(self):
---> 33 self.context.execute_query()
34 return self
35
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\client_runtime_context.py in execute_query(self)
136 def execute_query(self):
137 if self.has_pending_request:
--> 138 self.pending_request().execute_query()
139
140 def add_query(self, query, to_begin=False):
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\client_request.py in execute_query(self)
72 request = self.build_request()
73 self.beforeExecute.notify(request)
---> 74 response = self.execute_request_direct(request)
75 response.raise_for_status()
76 self.process_response(response)
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\odata\odata_request.py in execute_request_direct(self, request)
32 def execute_request_direct(self, request):
33 self.ensure_media_type(request)
---> 34 return super(ODataRequest, self).execute_request_direct(request)
35
36 def build_request(self):
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\client_request.py in execute_request_direct(self, request_options)
84 :type request_options: office365.runtime.http.request_options.RequestOptions
85 """
---> 86 self.context.authenticate_request(request_options)
87 if request_options.method == HttpMethod.Post:
88 if request_options.is_bytes or request_options.is_file:
D:\Anaconda\envs\hplc\lib\site-packages\office365\sharepoint\client_context.py in authenticate_request(self, request)
151
152 def authenticate_request(self, request):
--> 153 self._auth_context.authenticate_request(request)
154
155 def _build_modification_query(self, request):
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\auth\authentication_context.py in authenticate_request(self, request)
82 """Authenticate request
83 :type request: RequestOptions"""
---> 84 self._provider.authenticate_request(request)
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\auth\providers\saml_token_provider.py in authenticate_request(self, request)
71 """
72 logger = self.logger(self.authenticate_request.__name__)
---> 73 self.ensure_authentication_cookie()
74 logger.debug_secrets(self._cached_auth_cookies)
75 cookie_header_value = "; ".join(["=".join([key, str(val)]) for key, val in self._cached_auth_cookies.items()])
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\auth\providers\saml_token_provider.py in ensure_authentication_cookie(self)
78 def ensure_authentication_cookie(self):
79 if self._cached_auth_cookies is None:
---> 80 self._cached_auth_cookies = self.get_authentication_cookie()
81 return True
82
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\auth\providers\saml_token_provider.py in get_authentication_cookie(self)
91 user_realm = self._get_user_realm()
92 if user_realm.IsFederated:
---> 93 token = self._acquire_service_token_from_adfs(user_realm.STSAuthUrl)
94 else:
95 token = self._acquire_service_token()
D:\Anaconda\envs\hplc\lib\site-packages\office365\runtime\auth\providers\saml_token_provider.py in _acquire_service_token_from_adfs(self, adfs_url)
134 headers={'Content-Type': 'application/soap+xml; charset=utf-8'})
135 dom = minidom.parseString(response.content.decode())
--> 136 assertion_node = dom.getElementsByTagNameNS("urn:oasis:names:tc:SAML:1.0:assertion", 'Assertion')[0].toxml()
137
138 try:
IndexError: list index out of range
์ด๋ค ์์ด๋์ด? ์ธ์ฆ ๋ฌธ์ ๋ ์๋ ๊ฒ ๊ฐ์ต๋๋ค.
@ahulist saml_token_provider.py์ 135๋ฒ์งธ ์ค์์ response.content.decode()
๋ฅผ ๊ธฐ๋กํ๊ณ ์ด๋ฅผ ์ฝ์ผ๋ฉด ์ด์ค์
์ด ์ ๊ณต๋์ง ์์ ์ด์ ๋ฅผ ์ดํดํ๋ ๋ฐ ๋์์ด ๋ ์ ์์ต๋๋ค.
@vgrem , ๋น๋ก ์ฌ๋ฌ๋ถ์ด ์ ์ ์์์ minidom ๋ชจ๋๋ก ์ด ์ฝ๋๋ฅผ ์ป์์ง๋ง ์ ๋ ๊ฑฐ๊ธฐ์ ๊ฐ๋จํ ์ ๊ท์ ์ผ์น๋ฅผ ์ฌ์ฉํ๊ฒ ๋์์ต๋๋ค. ๊ฐ์ฅ ํจ๊ณผ์ ์ด์ด์ผ ํ๋ฉฐ ๋ค๋ฅธ ๊ณณ์์๋ ์ฌ์ฉํ์ง ์๋ ๋ฏธ๋๋์ด ํ์ํ์ง ์์ต๋๋ค.
match = re.search(r'<saml:Assertion.+</saml:Assertion>', response.content.decode())
if match is None:
self.error = 'Cannot get security assertion for user {0} from {1}'.format(self.__username, adfs_url)
logger.error(self.error)
return None
assertion_node = match.group()
์ด ์ฒญํฌ๋ ์ด์ 2.2.1.1 ๋ฒ์ ์์ ๊ฐ์ ธ์จ ๊ฒ์ ๋๋ค.
@nsmcan , ๋๋ ์ฐ๋ฆฌ๊ฐ #297์ ํ๋ค๊ณ ๋ฏฟ๋๋ค :)
@nsmcan , ๋ถํํ๋ ์ด ๋ณ๊ฒฝ์ด
@vgrem , Microsoft์์ ์ฐพ์ ์ฐธ์กฐ ๊ตฌํ์ ๋ํด ์ฝ๋๋ฅผ ๋ค์ ํ์ธํด์ผ ํฉ๋๋ค. SharePoint ๊ด๋ฆฌ์(@Zerg00s)์๊ฒ ์ ์ ํ๊ฒ ํ ์คํธํ ์ ์๋ ๋ช ๊ฐ์ง ํ ์คํธ ์ธ์คํด์ค๋ฅผ ์ค์น ๋ฐ ๊ตฌ์ฑํ๋ ๋ฐ ๋์์ ์์ฒญํ ๊ฒ์ ๋๋ค.
๊ฐ์ฅ ์ ์ฉํ ๋๊ธ
@vgrem , Microsoft์์ ์ฐพ์ ์ฐธ์กฐ ๊ตฌํ์ ๋ํด ์ฝ๋๋ฅผ ๋ค์ ํ์ธํด์ผ ํฉ๋๋ค. SharePoint ๊ด๋ฆฌ์(@Zerg00s)์๊ฒ ์ ์ ํ๊ฒ ํ ์คํธํ ์ ์๋ ๋ช ๊ฐ์ง ํ ์คํธ ์ธ์คํด์ค๋ฅผ ์ค์น ๋ฐ ๊ตฌ์ฑํ๋ ๋ฐ ๋์์ ์์ฒญํ ๊ฒ์ ๋๋ค.