6 array_values = ['keyFingerPrint']
7 int_values = ['shadowExpire']
9 'accountStatus': 'active',
14 def from_search(ldap_connection, base, user):
15 searchresult = ldap_connection.search_s(base, ldap.SCOPE_SUBTREE, 'uid=%s'%(user))
16 if len(searchresult) < 1:
17 sys.stderr.write("No such user: %s\n"%(user))
19 elif len(searchresult) > 1:
20 sys.stderr.write("More than one hit when getting %s\n"%(user))
23 return Account(searchresult[0][0], searchresult[0][1])
25 def __init__(self, dn, attributes):
27 self.attributes = attributes
29 def __getitem__(self, key):
30 if key in self.attributes:
31 if key in self.array_values:
32 return self.attributes[key]
33 elif key in self.int_values:
34 if len(self.attributes[key]) == 1:
35 return int(self.attributes[key][0])
37 raise ValueError, 'non-array value has not exactly one value'
39 return self.attributes[key][0]
40 elif key in self.defaults:
41 return self.defaults[key]
45 def __contains__(self, key):
46 return key in self.attributes
49 if 'mailDisableMessage' in self.attributes:
53 # not locked locked, just reset to something invalid like {crypt}*SSLRESET* is still active
55 if self['userPassword'] == '{crypt}*LK*':
60 def shadow_active(self):
61 if 'shadowExpire' in self and \
62 self['shadowExpire'] < (time.time() / 3600 / 24):
67 return len(self['keyFingerPrint'])
69 def latitude_dec(self, anonymized=False):
70 return userdir_ldap.DecDegree(self['latitude'], anonymized)
71 def longitude_dec(self, anonymized=False):
72 return userdir_ldap.DecDegree(self['longitude'], anonymized)
74 def verbose_status(self):
76 status.append('mail: %s' %(['disabled', 'active'][ self.has_mail() ]))
77 status.append('pw: %s' %(['locked', 'active'][ self.pw_active() ]))
78 status.append('shadow: %s'%(['expired', 'active'][ self.shadow_active() ]))
79 status.append('keys: %d' %( self.numkeys() ))
80 status.append('status: %s'%( self['accountStatus'] ))
82 return '(%s)'%(', '.join(status))
89 # vim:set shiftwidth=4: