444 conn.simple_bind_s(user['dn'], userpwd) |
444 conn.simple_bind_s(user['dn'], userpwd) |
445 |
445 |
446 def _auth_cram_md5(self, conn, user, userpwd): |
446 def _auth_cram_md5(self, conn, user, userpwd): |
447 from ldap import sasl |
447 from ldap import sasl |
448 auth_token = sasl.cram_md5(user['dn'], userpwd) |
448 auth_token = sasl.cram_md5(user['dn'], userpwd) |
449 conn.sasl_interactive_bind_s("", auth_tokens) |
449 conn.sasl_interactive_bind_s('', auth_tokens) |
450 |
450 |
451 def _auth_digest_md5(self, conn, user, userpwd): |
451 def _auth_digest_md5(self, conn, user, userpwd): |
452 from ldap import sasl |
452 from ldap import sasl |
453 auth_token = sasl.digest_md5(user['dn'], userpwd) |
453 auth_token = sasl.digest_md5(user['dn'], userpwd) |
454 conn.sasl_interactive_bind_s("", auth_tokens) |
454 conn.sasl_interactive_bind_s('', auth_tokens) |
455 |
455 |
456 def _auth_gssapi(self, conn, user, userpwd): |
456 def _auth_gssapi(self, conn, user, userpwd): |
457 # print XXX not proper sasl/gssapi |
457 # print XXX not proper sasl/gssapi |
458 from ldap import sasl |
|
459 import kerberos |
458 import kerberos |
460 if not kerberos.checkPassword(user[self.user_login_attr], userpwd): |
459 if not kerberos.checkPassword(user[self.user_login_attr], userpwd): |
461 raise Exception('BAD login / mdp') |
460 raise Exception('BAD login / mdp') |
462 #conn.sasl_interactive_bind_s("", auth_tokens) |
461 #from ldap import sasl |
|
462 #conn.sasl_interactive_bind_s('', sasl.gssapi()) |
463 |
463 |
464 def _search(self, session, base, scope, |
464 def _search(self, session, base, scope, |
465 searchstr='(objectClass=*)', attrs=()): |
465 searchstr='(objectClass=*)', attrs=()): |
466 """make an ldap query""" |
466 """make an ldap query""" |
467 cnx = session.pool.connection(self.uri).cnx |
467 cnx = session.pool.connection(self.uri).cnx |