# HG changeset patch
# User Timothy Clemans <timothy.clemans@gmail.com>
# Date 1226282571 21600
# Node ID 9d61d9c07d8090640e6c94e3d0c39584581882b8
# Parent 91b58135cec80756572727af4d606b3fb863c8fe
#4309
diff -r 91b58135cec8 -r 9d61d9c07d80 sage/server/notebook/avatars.py
a
|
b
|
|
12 | 12 | from random import randint, choice |
13 | 13 | |
14 | 14 | import twist |
15 | | import kerberos |
16 | 15 | from twisted.cred import portal, checkers, credentials, error as credError |
17 | 16 | from twisted.internet import protocol, defer |
18 | 17 | from zope.interface import Interface, implements |
19 | 18 | from twisted.web2 import iweb |
20 | 19 | from twisted.python import log |
| 20 | |
| 21 | krb_data = [None, None] |
| 22 | try: |
| 23 | import kerberos |
| 24 | except ImportError: |
| 25 | if krb_data[0] and krb_data[1]: |
| 26 | raise ImportError, 'Must have kerberos installed in order to use kerberos authentification.' |
| 27 | pass |
21 | 28 | |
22 | 29 | def user_type(avatarId): |
23 | 30 | """ |
… |
… |
|
83 | 90 | self.failure_type = failure_type |
84 | 91 | |
85 | 92 | class PasswordChecker(object): |
86 | | krb_data = [] |
87 | 93 | implements(checkers.ICredentialsChecker) |
88 | 94 | credentialInterfaces = (credentials.IUsernamePassword,) |
89 | 95 | |
… |
… |
|
106 | 112 | if username == 'COOKIESDISABLED': |
107 | 113 | return defer.succeed(FailedLogin(username, failure_type = 'cookies')) |
108 | 114 | |
109 | | if self.krb_data[0] and self.krb_data[1]: |
| 115 | if krb_data[0] and krb_data[1]: |
110 | 116 | try: |
111 | 117 | kerberos.checkPassword(username,password, |
112 | 118 | self.krb_data[0], self.krb_data[1]) |
diff -r 91b58135cec8 -r 9d61d9c07d80 sage/server/notebook/run_notebook.py
a
|
b
|
|
224 | 224 | startup_checker = avatars.OneTimeTokenChecker() |
225 | 225 | startup_checker.token = startup_token |
226 | 226 | p.registerChecker(startup_checker) |
227 | | avatars.PasswordChecker.krb_data=%s |
| 227 | avatars.krb_data=%s |
228 | 228 | password_checker = avatars.PasswordChecker() |
229 | 229 | p.registerChecker(password_checker) |
230 | 230 | p.registerChecker(checkers.AllowAnonymousAccess()) |