Python ldap.OPT_NETWORK_TIMEOUT Examples
The following are 4
code examples of ldap.OPT_NETWORK_TIMEOUT().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
ldap
, or try the search function
.
Example #1
Source File: externalldap.py From quay with Apache License 2.0 | 6 votes |
def __enter__(self): trace_level = 2 if os.environ.get("USERS_DEBUG") == "1" else 0 self._conn = ldap.initialize(self._ldap_uri, trace_level=trace_level) self._conn.set_option(ldap.OPT_REFERRALS, 1) self._conn.set_option( ldap.OPT_NETWORK_TIMEOUT, self._network_timeout or _DEFAULT_NETWORK_TIMEOUT ) self._conn.set_option(ldap.OPT_TIMEOUT, self._timeout or _DEFAULT_TIMEOUT) if self._allow_tls_fallback: logger.debug("TLS Fallback enabled in LDAP") self._conn.set_option(ldap.OPT_X_TLS_TRY, 1) self._conn.simple_bind_s(self._user_dn, self._user_pw) return self._conn
Example #2
Source File: __init__.py From flask-simpleldap with MIT License | 6 votes |
def initialize(self): """Initialize a connection to the LDAP server. :return: LDAP connection object. """ try: conn = ldap.initialize('{0}://{1}:{2}'.format( current_app.config['LDAP_SCHEMA'], current_app.config['LDAP_HOST'], current_app.config['LDAP_PORT'])) conn.set_option(ldap.OPT_NETWORK_TIMEOUT, current_app.config['LDAP_TIMEOUT']) conn = self._set_custom_options(conn) conn.protocol_version = ldap.VERSION3 if current_app.config['LDAP_USE_TLS']: conn.start_tls_s() return conn except ldap.LDAPError as e: raise LDAPException(self.error(e.args))
Example #3
Source File: freeipaserver.py From checkipaconsistency with GNU General Public License v3.0 | 6 votes |
def _get_conn(self): self._log.debug('Setting up LDAP connection') ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_NEVER) try: conn = ldap.initialize(self._url) conn.set_option(ldap.OPT_NETWORK_TIMEOUT, 3) conn.set_option(ldap.OPT_REFERRALS, ldap.OPT_OFF) conn.simple_bind_s(self._binddn, self._bindpw) except ( ldap.SERVER_DOWN, ldap.NO_SUCH_OBJECT, ldap.INVALID_CREDENTIALS ) as e: if hasattr(e, 'message') and 'desc' in e.message: msg = e.message['desc'] else: msg = e.args[0]['desc'] self._log.debug('%s (%s)' % (msg, self._url)) return False self._log.debug('LDAP connection established') return conn
Example #4
Source File: search.py From ckanext-ldap with GNU General Public License v3.0 | 5 votes |
def find_ldap_user(login): '''Find the LDAP user identified by 'login' in the configured ldap database :param login: The login to find in the LDAP database :returns: None if no user is found, a dictionary defining 'cn', 'username', 'fullname' and 'email otherwise. ''' cnx = ldap.initialize(toolkit.config[u'ckanext.ldap.uri'], bytes_mode=False, trace_level=toolkit.config[u'ckanext.ldap.trace_level']) cnx.set_option(ldap.OPT_NETWORK_TIMEOUT, 10) if toolkit.config.get(u'ckanext.ldap.auth.dn'): try: if toolkit.config[u'ckanext.ldap.auth.method'] == u'SIMPLE': cnx.bind_s(toolkit.config[u'ckanext.ldap.auth.dn'], toolkit.config[u'ckanext.ldap.auth.password']) elif toolkit.config[u'ckanext.ldap.auth.method'] == u'SASL': if toolkit.config[u'ckanext.ldap.auth.mechanism'] == u'DIGEST-MD5': auth_tokens = ldap.sasl.digest_md5(toolkit.config[u'ckanext.ldap.auth.dn'], toolkit.config[ u'ckanext.ldap.auth.password']) cnx.sasl_interactive_bind_s(u'', auth_tokens) else: log.error(u'SASL mechanism not supported: {0}'.format( toolkit.config[u'ckanext.ldap.auth.mechanism'])) return None else: log.error(u'LDAP authentication method is not supported: {0}'.format( toolkit.config[u'ckanext.ldap.auth.method'])) return None except ldap.SERVER_DOWN: log.error(u'LDAP server is not reachable') return None except ldap.INVALID_CREDENTIALS: log.error( u'LDAP server credentials (ckanext.ldap.auth.dn and ckanext.ldap.auth.password) ' u'invalid') return None except ldap.LDAPError, e: log.error(u'Fatal LDAP Error: {0}'.format(e)) return None