GenShadow
[mirror/userdir-ldap.git] / UDLdap.py
1 import ldap
2 import time
3 import userdir_ldap
4
5 class Account:
6     array_values = ['keyFingerPrint', 'mailWhitelist', 'mailRBL', 'mailRHSBL', 'supplementaryGid', 'sshRSAAuthKey', 'sudoPassword']
7     int_values = ['shadowExpire', 'gidNumber']
8     defaults = {
9                  'accountStatus': 'active',
10                  'keyFingerPrint': []
11                }
12
13     @staticmethod
14     def from_search(ldap_connection, base, user):
15         searchresult = ldap_connection.search_s(base, ldap.SCOPE_SUBTREE, 'uid=%s'%(user))
16         if len(searchresult) < 1:
17             sys.stderr.write("No such user: %s\n"%(user))
18             return
19         elif len(searchresult) > 1:
20             sys.stderr.write("More than one hit when getting %s\n"%(user))
21             return
22         else:
23             return Account(searchresult[0][0], searchresult[0][1])
24
25     def __init__(self, dn, attributes):
26         self.dn = dn
27         self.attributes = attributes
28
29     def __getitem__(self, key):
30         if key in self.attributes:
31             if key in self.array_values:
32                 return self.attributes[key]
33
34             if not len(self.attributes[key]) == 1:
35                 raise ValueError, 'non-array value has not exactly one value'
36
37             if key in self.int_values:
38                 return int(self.attributes[key][0])
39             else:
40                 return self.attributes[key][0]
41         elif key in self.defaults:
42             return self.defaults[key]
43         else:
44             raise IndexError
45
46     def __contains__(self, key):
47         return key in self.attributes
48
49     def has_mail(self):
50         if 'mailDisableMessage' in self.attributes:
51             return False
52         return True
53
54     # not locked locked,  just reset to something invalid like {crypt}*SSLRESET* is still active
55     def pw_active(self):
56         if self['userPassword'] == '{crypt}*LK*':
57             return False
58         if self['userPassword'].startswith("{crypt}!"):
59             return False
60         return True
61
62     def get_password(self):
63         p = self['userPassword']
64         if not p.startswith('{crypt}') or len(p) > 50:
65             return p
66         else:
67             return p[7:]
68
69     # not expired
70     def shadow_active(self):
71         if 'shadowExpire' in self and \
72             self['shadowExpire'] < (time.time() / 3600 / 24):
73             return False
74         return True
75
76     def numkeys(self):
77         return len(self['keyFingerPrint'])
78
79     def is_active_user(self):
80         return self['accountStatus'] == 'active' and self.numkeys() != 0
81
82     def latitude_dec(self, anonymized=False):
83         return userdir_ldap.DecDegree(self['latitude'], anonymized)
84     def longitude_dec(self, anonymized=False):
85         return userdir_ldap.DecDegree(self['longitude'], anonymized)
86
87     def verbose_status(self):
88         status = []
89         status.append('mail: %s'  %(['disabled', 'active'][ self.has_mail() ]))
90         status.append('pw: %s'    %(['locked', 'active'][ self.pw_active() ]))
91         status.append('shadow: %s'%(['expired', 'active'][ self.shadow_active() ]))
92         status.append('keys: %d'  %( self.numkeys() ))
93         status.append('status: %s'%( self['accountStatus'] ))
94
95         return '(%s)'%(', '.join(status))
96
97     def get_dn(self):
98         return self.dn
99
100 # vim:set et:
101 # vim:set ts=4:
102 # vim:set shiftwidth=4: