##// END OF EJS Templates
Added api_key into user, api key get's generated again after password change...
Added api_key into user, api key get's generated again after password change updated ini files

File last commit:

r1112:6d0a7284 beta
r1116:716911af beta
Show More
forms.py
555 lines | 22.3 KiB | text/x-python | PythonLexer
renamed project to rhodecode
r547 """ this is forms validation classes
http://formencode.org/module-formencode.validators.html
for list off all availible validators
we can create our own validators
The table below outlines the options which can be used in a schema in addition to the validators themselves
pre_validators [] These validators will be applied before the schema
chained_validators [] These validators will be applied after the schema
allow_extra_fields False If True, then it is not an error when keys that aren't associated with a validator are present
filter_extra_fields False If True, then keys that aren't associated with a validator are removed
if_key_missing NoDefault If this is given, then any keys that aren't available but are expected will be replaced with this value (and then validated). This does not override a present .if_missing attribute on validators. NoDefault is a special FormEncode class to mean that no default values has been specified and therefore missing keys shouldn't take a default value.
ignore_key_missing False If True, then missing keys will be missing in the result, if the validator doesn't have .if_missing on it already
<name> = formencode.validators.<name of validator>
<name> must equal form name
list=[1,2,3,4,5]
for SELECT use formencode.All(OneOf(list), Int())
"""
ldap auth rewrite, moved split authfunc into two functions,...
r761 import os
import re
import logging
import formencode
renamed project to rhodecode
r547 from formencode import All
from formencode.validators import UnicodeString, OneOf, Int, Number, Regex, \
#56 implemented users groups editing,...
r972 Email, Bool, StringBoolean, Set
ldap auth rewrite, moved split authfunc into two functions,...
r761
renamed project to rhodecode
r547 from pylons.i18n.translation import _
Code refactor number 2
r1022 from webhelpers.pylonslib.secure_form import authentication_token
ldap auth rewrite, moved split authfunc into two functions,...
r761
Code refactor number 2
r1022 from rhodecode.lib.utils import repo_name_slug
ldap auth rewrite, moved split authfunc into two functions,...
r761 from rhodecode.lib.auth import authenticate, get_crypt_password
implements #60, ldap configuration and authentication....
r705 from rhodecode.lib.exceptions import LdapImportError
renamed project to rhodecode
r547 from rhodecode.model import meta
Code refactoring,models renames...
r629 from rhodecode.model.user import UserModel
from rhodecode.model.repo import RepoModel
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959 from rhodecode.model.users_group import UsersGroupModel
#56 hacking on forms, and model for users groups
r1013 from rhodecode.model.db import User, UsersGroup
ldap auth rewrite, moved split authfunc into two functions,...
r761 from rhodecode import BACKENDS
renamed project to rhodecode
r547 log = logging.getLogger(__name__)
#this is needed to translate the messages using _() in validators
class State_obj(object):
_ = staticmethod(_)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 #===============================================================================
# VALIDATORS
#===============================================================================
class ValidAuthToken(formencode.validators.FancyValidator):
messages = {'invalid_token':_('Token mismatch')}
def validate_python(self, value, state):
if value != authentication_token():
raise formencode.Invalid(self.message('invalid_token', state,
search_number=value), value, state)
Code refactoring,models renames...
r629
def ValidUsername(edit, old_data):
renamed project to rhodecode
r547 class _ValidUsername(formencode.validators.FancyValidator):
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def validate_python(self, value, state):
if value in ['default', 'new_user']:
raise formencode.Invalid(_('Invalid username'), value, state)
Code refactoring,models renames...
r629 #check if user is unique
renamed project to rhodecode
r547 old_un = None
if edit:
Code refactoring,models renames...
r629 old_un = UserModel().get(old_data.get('user_id')).username
if old_un != value or not edit:
#78, fixed more reliable case insensitive searches
r742 if UserModel().get_by_username(value, cache=False,
case_insensitive=True):
renamed project to rhodecode
r547 raise formencode.Invalid(_('This username already exists') ,
value, state)
added test for username and email case senstitive validators,...
r745
fixed #102 allowed '.' character in username
r960 if re.match(r'^[a-zA-Z0-9]{1}[a-zA-Z0-9\-\_\.]+$', value) is None:
added validation of username alphanumeric+dash only
r743 raise formencode.Invalid(_('Username may only contain '
fixed #102 allowed '.' character in username
r960 'alphanumeric characters underscores, '
'periods or dashes and must begin with '
added test for username and email case senstitive validators,...
r745 'alphanumeric character'),
added validation of username alphanumeric+dash only
r743 value, state)
added test for username and email case senstitive validators,...
r745
Code refactoring,models renames...
r629 return _ValidUsername
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959
def ValidUsersGroup(edit, old_data):
class _ValidUsersGroup(formencode.validators.FancyValidator):
def validate_python(self, value, state):
if value in ['default']:
raise formencode.Invalid(_('Invalid group name'), value, state)
#check if group is unique
#56 implemented users groups editing,...
r972 old_ugname = None
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959 if edit:
#56 implemented users groups editing,...
r972 old_ugname = UsersGroupModel()\
.get(old_data.get('users_group_id')).users_group_name
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959
#56 implemented users groups editing,...
r972 if old_ugname != value or not edit:
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959 if UsersGroupModel().get_by_groupname(value, cache=False,
case_insensitive=True):
raise formencode.Invalid(_('This users group already exists') ,
value, state)
if re.match(r'^[a-zA-Z0-9]{1}[a-zA-Z0-9\-\_\.]+$', value) is None:
raise formencode.Invalid(_('Group name may only contain '
'alphanumeric characters underscores, '
'periods or dashes and must begin with '
'alphanumeric character'),
value, state)
return _ValidUsersGroup
renamed project to rhodecode
r547 class ValidPassword(formencode.validators.FancyValidator):
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def to_python(self, value, state):
fixes #69 password confirmation for register dialog....
r722
renamed project to rhodecode
r547 if value:
fixes #69 password confirmation for register dialog....
r722
if value.get('password'):
try:
value['password'] = get_crypt_password(value['password'])
except UnicodeEncodeError:
e_dict = {'password':_('Invalid characters in password')}
raise formencode.Invalid('', value, state, error_dict=e_dict)
if value.get('password_confirmation'):
try:
value['password_confirmation'] = \
get_crypt_password(value['password_confirmation'])
except UnicodeEncodeError:
e_dict = {'password_confirmation':_('Invalid characters in password')}
raise formencode.Invalid('', value, state, error_dict=e_dict)
fixed bug in forms found due to testing,...
r728 if value.get('new_password'):
try:
value['new_password'] = \
get_crypt_password(value['new_password'])
except UnicodeEncodeError:
e_dict = {'new_password':_('Invalid characters in password')}
raise formencode.Invalid('', value, state, error_dict=e_dict)
fixes #69 password confirmation for register dialog....
r722 return value
class ValidPasswordsMatch(formencode.validators.FancyValidator):
def validate_python(self, value, state):
if value['password'] != value['password_confirmation']:
e_dict = {'password_confirmation':
_('Password do not match')}
raise formencode.Invalid('', value, state, error_dict=e_dict)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 class ValidAuth(formencode.validators.FancyValidator):
messages = {
'invalid_password':_('invalid password'),
'invalid_login':_('invalid user name'),
implements #60, ldap configuration and authentication....
r705 'disabled_account':_('Your account is disabled')
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 }
#error mapping
e_dict = {'username':messages['invalid_login'],
'password':messages['invalid_password']}
e_dict_disable = {'username':messages['disabled_account']}
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def validate_python(self, value, state):
password = value['password']
username = value['username']
Code refactoring,models renames...
r629 user = UserModel().get_by_username(username)
Code refactor for auth func, preparing for ldap support...
r699
ldap auth rewrite, moved split authfunc into two functions,...
r761 if authenticate(username, password):
Code refactor for auth func, preparing for ldap support...
r699 return value
else:
if user and user.active is False:
renamed project to rhodecode
r547 log.warning('user %s is disabled', username)
raise formencode.Invalid(self.message('disabled_account',
state=State_obj),
value, state,
error_dict=self.e_dict_disable)
Code refactor for auth func, preparing for ldap support...
r699 else:
log.warning('user %s not authenticated', username)
raise formencode.Invalid(self.message('invalid_password',
state=State_obj), value, state,
error_dict=self.e_dict)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 class ValidRepoUser(formencode.validators.FancyValidator):
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def to_python(self, value, state):
Code refactoring,models renames...
r629 sa = meta.Session()
renamed project to rhodecode
r547 try:
Code refactoring,models renames...
r629 self.user_db = sa.query(User)\
renamed project to rhodecode
r547 .filter(User.active == True)\
.filter(User.username == value).one()
except Exception:
raise formencode.Invalid(_('This username is not valid'),
value, state)
finally:
meta.Session.remove()
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return self.user_db.user_id
Code refactoring,models renames...
r629 def ValidRepoName(edit, old_data):
renamed project to rhodecode
r547 class _ValidRepoName(formencode.validators.FancyValidator):
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def to_python(self, value, state):
Code refactor number 2
r1022 slug = repo_name_slug(value)
renamed project to rhodecode
r547 if slug in ['_admin']:
raise formencode.Invalid(_('This repository name is disallowed'),
value, state)
Code refactoring,models renames...
r629 if old_data.get('repo_name') != value or not edit:
added action loggers to following repositories,...
r735 if RepoModel().get_by_repo_name(slug, cache=False):
renamed project to rhodecode
r547 raise formencode.Invalid(_('This repository already exists') ,
value, state)
Code refactoring,models renames...
r629 return slug
renamed project to rhodecode
r547 return _ValidRepoName
extended repo creation by repo type. fixed fork creation to maintain repo type.
r659 def ValidForkType(old_data):
class _ValidForkType(formencode.validators.FancyValidator):
def to_python(self, value, state):
if old_data['repo_type'] != value:
#78, fixed more reliable case insensitive searches
r742 raise formencode.Invalid(_('Fork have to be the same type as original'),
value, state)
extended repo creation by repo type. fixed fork creation to maintain repo type.
r659 return value
return _ValidForkType
renamed project to rhodecode
r547 class ValidPerms(formencode.validators.FancyValidator):
#56 hacking on forms, and model for users groups
r1013 messages = {'perm_new_member_name':_('This username or users group name'
' is not valid')}
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def to_python(self, value, state):
perms_update = []
perms_new = []
#build a list of permission to update and new permission to create
for k, v in value.items():
#56 added ajax removal of users groups,...
r1015 #means new added member to permissions
if k.startswith('perm_new_member'):
new_perm = value.get('perm_new_member', False)
new_member = value.get('perm_new_member_name', False)
new_type = value.get('perm_new_member_type')
#56 hacking on forms, and model for users groups
r1013
#56 added ajax removal of users groups,...
r1015 if new_member and new_perm:
if (new_member, new_perm, new_type) not in perms_new:
perms_new.append((new_member, new_perm, new_type))
elif k.startswith('u_perm_') or k.startswith('g_perm_'):
member = k[7:]
t = {'u':'user',
'g':'users_group'}[k[0]]
if member == 'default':
if value['private']:
#set none for default when updating to private repo
v = 'repository.none'
perms_update.append((member, v, t))
renamed project to rhodecode
r547 value['perms_updates'] = perms_update
value['perms_new'] = perms_new
#56 added assignments of users groups into repository
r1014
#update permissions
renamed project to rhodecode
r547 sa = meta.Session
#56 hacking on forms, and model for users groups
r1013 for k, v, t in perms_new:
renamed project to rhodecode
r547 try:
#56 hacking on forms, and model for users groups
r1013 if t is 'user':
self.user_db = sa.query(User)\
.filter(User.active == True)\
.filter(User.username == k).one()
if t is 'users_group':
self.user_db = sa.query(UsersGroup)\
.filter(UsersGroup.users_group_active == True)\
.filter(UsersGroup.users_group_name == k).one()
renamed project to rhodecode
r547 except Exception:
#56 hacking on forms, and model for users groups
r1013 msg = self.message('perm_new_member_name',
renamed project to rhodecode
r547 state=State_obj)
#78, fixed more reliable case insensitive searches
r742 raise formencode.Invalid(msg, value, state,
#56 hacking on forms, and model for users groups
r1013 error_dict={'perm_new_member_name':msg})
renamed project to rhodecode
r547 return value
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 class ValidSettings(formencode.validators.FancyValidator):
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def to_python(self, value, state):
#settings form can't edit user
if value.has_key('user'):
del['value']['user']
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return value
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 class ValidPath(formencode.validators.FancyValidator):
def to_python(self, value, state):
Hacking for git support,and new faster repo scan
r631
if not os.path.isdir(value):
Code refactoring,models renames...
r629 msg = _('This is not a valid path')
Hacking for git support,and new faster repo scan
r631 raise formencode.Invalid(msg, value, state,
Code refactoring,models renames...
r629 error_dict={'paths_root_path':msg})
Hacking for git support,and new faster repo scan
r631 return value
renamed project to rhodecode
r547
def UniqSystemEmail(old_data):
class _UniqSystemEmail(formencode.validators.FancyValidator):
def to_python(self, value, state):
fixes issue #78, ldap makes user validation caseInsensitive...
r741 value = value.lower()
renamed project to rhodecode
r547 if old_data.get('email') != value:
Code refactoring,models renames...
r629 sa = meta.Session()
renamed project to rhodecode
r547 try:
user = sa.query(User).filter(User.email == value).scalar()
if user:
fixed grammar in taken email error
r746 raise formencode.Invalid(_("This e-mail address is already taken") ,
renamed project to rhodecode
r547 value, state)
finally:
meta.Session.remove()
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return value
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return _UniqSystemEmail
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 class ValidSystemEmail(formencode.validators.FancyValidator):
def to_python(self, value, state):
fixes issue #78, ldap makes user validation caseInsensitive...
r741 value = value.lower()
renamed project to rhodecode
r547 sa = meta.Session
try:
user = sa.query(User).filter(User.email == value).scalar()
if user is None:
fixed grammar in taken email error
r746 raise formencode.Invalid(_("This e-mail address doesn't exist.") ,
renamed project to rhodecode
r547 value, state)
finally:
meta.Session.remove()
Code refactoring,models renames...
r629
return value
renamed project to rhodecode
r547
implements #60, ldap configuration and authentication....
r705 class LdapLibValidator(formencode.validators.FancyValidator):
def to_python(self, value, state):
try:
import ldap
except ImportError:
raise LdapImportError
return value
Thayne Harbaugh
Improve LDAP authentication...
r991 class AttrLoginValidator(formencode.validators.FancyValidator):
fixes #77 and adds extendable base Dn with custom uid specification
r775
def to_python(self, value, state):
Thayne Harbaugh
Improve LDAP authentication...
r991 if not value or not isinstance(value, (str, unicode)):
#56 added ajax removal of users groups,...
r1015 raise formencode.Invalid(_("The LDAP Login attribute of the CN "
"must be specified - this is the name "
"of the attribute that is equivalent "
"to 'username'"),
Thayne Harbaugh
Improve LDAP authentication...
r991 value, state)
fixes #77 and adds extendable base Dn with custom uid specification
r775
return value
renamed project to rhodecode
r547 #===============================================================================
# FORMS
#===============================================================================
class LoginForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
username = UnicodeString(
strip=True,
min=1,
not_empty=True,
messages={
'empty':_('Please enter a login'),
'tooShort':_('Enter a value %(min)i characters long or more')}
)
password = UnicodeString(
strip=True,
min=6,
not_empty=True,
messages={
'empty':_('Please enter a password'),
added fault tolerant case when celeryconfig is not present in the directory....
r555 'tooShort':_('Enter %(min)i characters or more')}
renamed project to rhodecode
r547 )
#chained validators have access to all data
chained_validators = [ValidAuth]
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def UserForm(edit=False, old_data={}):
class _UserForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
#78, fixed more reliable case insensitive searches
r742 username = All(UnicodeString(strip=True, min=1, not_empty=True),
ValidUsername(edit, old_data))
renamed project to rhodecode
r547 if edit:
fixes #69 password confirmation for register dialog....
r722 new_password = All(UnicodeString(strip=True, min=6, not_empty=False))
renamed project to rhodecode
r547 admin = StringBoolean(if_missing=False)
else:
fixes #69 password confirmation for register dialog....
r722 password = All(UnicodeString(strip=True, min=6, not_empty=True))
renamed project to rhodecode
r547 active = StringBoolean(if_missing=False)
name = UnicodeString(strip=True, min=1, not_empty=True)
lastname = UnicodeString(strip=True, min=1, not_empty=True)
email = All(Email(not_empty=True), UniqSystemEmail(old_data))
Code refactoring,models renames...
r629
fixes #69 password confirmation for register dialog....
r722 chained_validators = [ValidPassword]
renamed project to rhodecode
r547 return _UserForm
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959
#56 implemented users groups editing,...
r972 def UsersGroupForm(edit=False, old_data={}, available_members=[]):
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959 class _UsersGroupForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
users_group_name = All(UnicodeString(strip=True, min=1, not_empty=True),
ValidUsersGroup(edit, old_data))
users_group_active = StringBoolean(if_missing=False)
#56 implemented users groups editing,...
r972 if edit:
users_group_members = OneOf(available_members, hideList=False,
testValueList=True,
if_missing=None, not_empty=False)
#56 fixed found bugs, implemented adding of new group + forms+validators...
r959 return _UsersGroupForm
fixes #69 password confirmation for register dialog....
r722 def RegisterForm(edit=False, old_data={}):
class _RegisterForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
#78, fixed more reliable case insensitive searches
r742 username = All(ValidUsername(edit, old_data),
UnicodeString(strip=True, min=1, not_empty=True))
fixes #69 password confirmation for register dialog....
r722 password = All(UnicodeString(strip=True, min=6, not_empty=True))
password_confirmation = All(UnicodeString(strip=True, min=6, not_empty=True))
active = StringBoolean(if_missing=False)
name = UnicodeString(strip=True, min=1, not_empty=True)
lastname = UnicodeString(strip=True, min=1, not_empty=True)
email = All(Email(not_empty=True), UniqSystemEmail(old_data))
chained_validators = [ValidPasswordsMatch, ValidPassword]
return _RegisterForm
renamed project to rhodecode
r547
def PasswordResetForm():
class _PasswordResetForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
Code refactoring,models renames...
r629 email = All(ValidSystemEmail(), Email(not_empty=True))
renamed project to rhodecode
r547 return _PasswordResetForm
#109, added optional clone uri when creating repo....
r1112 def RepoForm(edit=False, old_data={}, supported_backends=BACKENDS.keys(),
repo_groups=[]):
renamed project to rhodecode
r547 class _RepoForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = False
#78, fixed more reliable case insensitive searches
r742 repo_name = All(UnicodeString(strip=True, min=1, not_empty=True),
ValidRepoName(edit, old_data))
#109, added optional clone uri when creating repo....
r1112 clone_uri = UnicodeString(strip=True, min=1, not_empty=False)
repo_group = OneOf(repo_groups)
repo_type = OneOf(supported_backends)
renamed project to rhodecode
r547 description = UnicodeString(strip=True, min=1, not_empty=True)
private = StringBoolean(if_missing=False)
fixes #62, added option to disable statistics for each repository
r810 enable_statistics = StringBoolean(if_missing=False)
implemented #84 downloads can be enabled/disabled per each repository from now.
r962 enable_downloads = StringBoolean(if_missing=False)
#109, added optional clone uri when creating repo....
r1112
renamed project to rhodecode
r547 if edit:
#56 added assignments of users groups into repository
r1014 #this is repo owner
renamed project to rhodecode
r547 user = All(Int(not_empty=True), ValidRepoUser)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 chained_validators = [ValidPerms]
return _RepoForm
Disable git support due to large problems with dulwich....
r710 def RepoForkForm(edit=False, old_data={}, supported_backends=BACKENDS.keys()):
renamed project to rhodecode
r547 class _RepoForkForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = False
#78, fixed more reliable case insensitive searches
r742 fork_name = All(UnicodeString(strip=True, min=1, not_empty=True),
ValidRepoName(edit, old_data))
renamed project to rhodecode
r547 description = UnicodeString(strip=True, min=1, not_empty=True)
private = StringBoolean(if_missing=False)
Disable git support due to large problems with dulwich....
r710 repo_type = All(ValidForkType(old_data), OneOf(supported_backends))
renamed project to rhodecode
r547 return _RepoForkForm
def RepoSettingsForm(edit=False, old_data={}):
class _RepoForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = False
#78, fixed more reliable case insensitive searches
r742 repo_name = All(UnicodeString(strip=True, min=1, not_empty=True),
ValidRepoName(edit, old_data))
renamed project to rhodecode
r547 description = UnicodeString(strip=True, min=1, not_empty=True)
private = StringBoolean(if_missing=False)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 chained_validators = [ValidPerms, ValidSettings]
return _RepoForm
def ApplicationSettingsForm():
class _ApplicationSettingsForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = False
renamed hg_app to rhodecode
r548 rhodecode_title = UnicodeString(strip=True, min=1, not_empty=True)
rhodecode_realm = UnicodeString(strip=True, min=1, not_empty=True)
fixes for #89 ga code
r891 rhodecode_ga_code = UnicodeString(strip=True, min=1, not_empty=False)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return _ApplicationSettingsForm
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 def ApplicationUiSettingsForm():
class _ApplicationUiSettingsForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = False
web_push_ssl = OneOf(['true', 'false'], if_missing='false')
paths_root_path = All(ValidPath(), UnicodeString(strip=True, min=1, not_empty=True))
hooks_changegroup_update = OneOf(['True', 'False'], if_missing=False)
hooks_changegroup_repo_size = OneOf(['True', 'False'], if_missing=False)
added option to enable/disable of logger hooks from admin panel....
r661 hooks_pretxnchangegroup_push_logger = OneOf(['True', 'False'], if_missing=False)
hooks_preoutgoing_pull_logger = OneOf(['True', 'False'], if_missing=False)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return _ApplicationUiSettingsForm
def DefaultPermissionsForm(perms_choices, register_choices, create_choices):
class _DefaultPermissionsForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
implements #60, ldap configuration and authentication....
r705 overwrite_default = StringBoolean(if_missing=False)
#49 Enabled anonymous access for web interface controllable from permissions pannel
r673 anonymous = OneOf(['True', 'False'], if_missing=False)
renamed project to rhodecode
r547 default_perm = OneOf(perms_choices)
default_register = OneOf(register_choices)
default_create = OneOf(create_choices)
Code refactoring,models renames...
r629
renamed project to rhodecode
r547 return _DefaultPermissionsForm
implements #60, ldap configuration and authentication....
r705
Thayne Harbaugh
Improve LDAP authentication...
r991 def LdapSettingsForm(tls_reqcert_choices, search_scope_choices):
implements #60, ldap configuration and authentication....
r705 class _LdapSettingsForm(formencode.Schema):
allow_extra_fields = True
filter_extra_fields = True
pre_validators = [LdapLibValidator]
ldap_active = StringBoolean(if_missing=False)
ldap_host = UnicodeString(strip=True,)
ldap_port = Number(strip=True,)
ldap_ldaps = StringBoolean(if_missing=False)
Thayne Harbaugh
Improve LDAP authentication...
r991 ldap_tls_reqcert = OneOf(tls_reqcert_choices)
implements #60, ldap configuration and authentication....
r705 ldap_dn_user = UnicodeString(strip=True,)
ldap_dn_pass = UnicodeString(strip=True,)
Thayne Harbaugh
Improve LDAP authentication...
r991 ldap_base_dn = UnicodeString(strip=True,)
ldap_filter = UnicodeString(strip=True,)
ldap_search_scope = OneOf(search_scope_choices)
ldap_attr_login = All(AttrLoginValidator, UnicodeString(strip=True,))
ldap_attr_firstname = UnicodeString(strip=True,)
ldap_attr_lastname = UnicodeString(strip=True,)
ldap_attr_email = UnicodeString(strip=True,)
implements #60, ldap configuration and authentication....
r705
return _LdapSettingsForm