/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/lib/gitlab/auth/ldap/ |
H A D | user_spec.rb | 9 let(:gl_user) { ldap_user.gl_user } 92 ldap_user.save 110 ldap_user.save 122 ldap_user.save 135 ldap_user.save 192 ldap_user.save 204 ldap_user.save 213 ldap_user.save 214 ldap_user.gl_user.activate 223 ldap_user.save [all …]
|
/dports/www/py-dj32-django-auth-ldap/django-auth-ldap-4.0.0/django_auth_ldap/ |
H A D | config.py | 347 def user_groups(self, ldap_user, group_search): argument 364 def is_member(self, ldap_user, group_dn): argument 400 def user_groups(self, ldap_user, group_search): argument 408 user_uid = ldap_user.attrs["uid"][0] 410 if "gidNumber" in ldap_user.attrs: 428 def is_member(self, ldap_user, group_dn): argument 434 user_uid = ldap_user.attrs["uid"][0] 476 {self.member_attr: ldap_user.dn} 480 def is_member(self, ldap_user, group_dn): argument 669 def resolve(self, ldap_user, groups=None): argument [all …]
|
H A D | backend.py | 183 permissions = user.ldap_user.get_group_permissions() 194 ldap_user = _LDAPUser(self, username=username) 195 return ldap_user.populate_user() 201 def authenticate_ldap_user(self, ldap_user, password): argument 205 return ldap_user.authenticate(password) 207 def get_or_build_user(self, username, ldap_user): argument 324 user.ldap_user = self 604 self._user.ldap_user = self 863 def __init__(self, ldap_user): argument 864 self.settings = ldap_user.settings [all …]
|
/dports/www/py-django-auth-ldap/django-auth-ldap-4.0.0/django_auth_ldap/ |
H A D | config.py | 347 def user_groups(self, ldap_user, group_search): argument 364 def is_member(self, ldap_user, group_dn): argument 400 def user_groups(self, ldap_user, group_search): argument 408 user_uid = ldap_user.attrs["uid"][0] 410 if "gidNumber" in ldap_user.attrs: 428 def is_member(self, ldap_user, group_dn): argument 434 user_uid = ldap_user.attrs["uid"][0] 476 {self.member_attr: ldap_user.dn} 480 def is_member(self, ldap_user, group_dn): argument 669 def resolve(self, ldap_user, groups=None): argument [all …]
|
H A D | backend.py | 183 permissions = user.ldap_user.get_group_permissions() 194 ldap_user = _LDAPUser(self, username=username) 195 return ldap_user.populate_user() 201 def authenticate_ldap_user(self, ldap_user, password): argument 205 return ldap_user.authenticate(password) 207 def get_or_build_user(self, username, ldap_user): argument 324 user.ldap_user = self 604 self._user.ldap_user = self 863 def __init__(self, ldap_user): argument 864 self.settings = ldap_user.settings [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/controllers/ |
H A D | profiles_controller_spec.rb | 53 ldap_user = create(:omniauth_user) 54 …ldap_user.create_user_synced_attributes_metadata(provider: 'ldap', name_synced: true, email_synced… 55 sign_in(ldap_user) 60 ldap_user.reload 63 expect(ldap_user.unconfirmed_email).not_to eq('john@gmail.com') 70 ldap_user = create(:omniauth_user, name: 'Alex') 72 sign_in(ldap_user) 77 ldap_user.reload 80 expect(ldap_user.unconfirmed_email).not_to eq('john@gmail.com') 81 expect(ldap_user.name).not_to eq('John') [all …]
|
/dports/net/p5-ldap2pw/ldap2pw-20170922/scripts/ |
H A D | ldap2pw | 393 my $ldap_user = $ldap_users{$user}; 395 return if ($local_user && $ldap_user && 396 $$local_user{uid} == $$ldap_user{uid} && 404 verbose_pw($ldap_user); 406 $$ldap_user{name}, 407 '-u', $$ldap_user{uid}, 408 '-g', $$ldap_user{gid}, 409 '-c', $$ldap_user{gecos}, 410 '-d', $$ldap_user{home}, 411 '-s', $$ldap_user{shell}) [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/lib/gitlab/auth/o_auth/ |
H A D | user_spec.rb | 328 allow(ldap_user).to receive(:uid) { uid } 329 allow(ldap_user).to receive(:username) { uid } 330 allow(ldap_user).to receive(:name) { 'John Doe' } 332 allow(ldap_user).to receive(:dn) { dn } 460 allow(ldap_user).to receive(:uid) { uid } 461 allow(ldap_user).to receive(:username) { 'johndoe@example.com' } 463 allow(ldap_user).to receive(:dn) { dn } 500 allow(ldap_user).to receive_messages( 609 allow(ldap_user).to receive(:uid) { uid } 610 allow(ldap_user).to receive(:username) { uid } [all …]
|
/dports/www/phpmyfaq/phpmyfaq/config/ |
H A D | ldap.php.original | 5 $PMF_LDAP['ldap_user'] = ''; 14 $PMF_LDAP[1]['ldap_user'] = ''; 20 $PMF_LDAP[2]['ldap_user'] = '';
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/lib/gitlab/auth/saml/ |
H A D | user_spec.rb | 161 allow(ldap_user).to receive(:uid) { uid } 162 allow(ldap_user).to receive(:username) { uid } 163 allow(ldap_user).to receive(:email) { %w(john@mail.com john2@example.com) } 164 allow(ldap_user).to receive(:dn) { dn } 166 …allow(Gitlab::Auth::Ldap::Person).to receive(:find_by_uid).with(uid, adapter).and_return(ldap_user) 167 … allow(Gitlab::Auth::Ldap::Person).to receive(:find_by_dn).with(dn, adapter).and_return(ldap_user) 168 …Auth::Ldap::Person).to receive(:find_by_email).with('john@mail.com', adapter).and_return(ldap_user) 220 … allow(Gitlab::Auth::Ldap::Person).to receive(:"find_by_#{uid_type}").and_return(ldap_user) 287 … allow(Gitlab::Auth::Ldap::Person).to receive(:find_by_uid).with(dn, adapter).and_return(ldap_user)
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/googlecloudsdk/command_lib/anthos/ |
H A D | anthoscli_backend.py | 218 ldap_user=None, argument 237 if ldap_pass and ldap_user: 238 exec_args.extend(['--ldap-username', ldap_user, 286 ldap_user = None 295 ldap_user = console_io.PromptWithValidator( 301 return _Base64EncodeLdap(ldap_user, ldap_pass) 411 ldap_user, ldap_pass = _GetLdapUserAndPass(cluster_config, 414 return auth_method, ldap_user, ldap_pass
|
/dports/mail/roundcube-calendar-kolab/roundcubemail-plugins-kolab-3.5.5/plugins/kolab_auth_proxy/ |
H A D | kolab_auth_proxy.php | 102 $ldap_user = $this->rc->config->get('kolab_auth_proxy_ldap_user'); 105 if ($ldap_user && $ldap_pass && $args['user_specific']) { 106 $args['bind_dn'] = $ldap_user;
|
/dports/www/py-dj32-django-auth-ldap/django-auth-ldap-4.0.0/tests/ |
H A D | tests.py | 454 self.assertIsNotNone(user.ldap_user) 457 dict(user.ldap_user.attrs), 606 ldap_user=user.ldap_user, 714 self.assertIs(query.resolve(user.ldap_user), True) 747 self.assertIs(query.resolve(bob.ldap_user), True) 766 self.assertIs(query.resolve(bob.ldap_user), False) 786 self.assertIs(query.resolve(bob.ldap_user), True) 880 alice.ldap_user.group_dns, 898 alice.ldap_user.group_names, 1505 ldap_user.foo = "bar" [all …]
|
/dports/www/py-django-auth-ldap/django-auth-ldap-4.0.0/tests/ |
H A D | tests.py | 454 self.assertIsNotNone(user.ldap_user) 457 dict(user.ldap_user.attrs), 606 ldap_user=user.ldap_user, 714 self.assertIs(query.resolve(user.ldap_user), True) 747 self.assertIs(query.resolve(bob.ldap_user), True) 766 self.assertIs(query.resolve(bob.ldap_user), False) 786 self.assertIs(query.resolve(bob.ldap_user), True) 880 alice.ldap_user.group_dns, 898 alice.ldap_user.group_names, 1505 ldap_user.foo = "bar" [all …]
|
/dports/devel/truc/truc_0.12.0/api/ |
H A D | ldap_api.php | 28 $ldap_user = '(&(lmaccessstatusid=active)(uid=' . $user_id . '))'; 42 $ldapsearch = ldap_search($ldapconn, $ldap_root_dn, $ldap_user);
|
/dports/devel/rth/rth/api/ |
H A D | ldap_api.php | 31 $ldap_user = '(uid=' . $user_id . ')'; 50 $ldapsearch = ldap_search($ldapconn, $ldap_root_dn, $ldap_user);
|
/dports/www/py-dj32-django-auth-ldap/django-auth-ldap-4.0.0/docs/ |
H A D | performance.rst | 16 #. **Don't access user.ldap_user.***. Except for ``ldap_user.dn``, these 19 updated at login. ``user.ldap_user.attrs`` triggers an LDAP connection for
|
/dports/www/py-django-auth-ldap/django-auth-ldap-4.0.0/docs/ |
H A D | performance.rst | 16 #. **Don't access user.ldap_user.***. Except for ``ldap_user.dn``, these 19 updated at login. ``user.ldap_user.attrs`` triggers an LDAP connection for
|
/dports/net/boinc-client/boinc-client_release-7.8-7.8.6/html/user/ |
H A D | lookup_account.php | 38 list ($ldap_user, $error_msg) = ldap_auth($ldap_uid, $passwd); 46 $user = make_user_ldap($x, $ldap_user->name);
|
/dports/net/3proxy/3proxy-0.9.4/src/plugins/LdapPlugin/ |
H A D | ldapauth.c | 30 static char *ldap_user; variable 152 rc = ldap_bind_s( ld, ldap_user, ldap_pass, LDAP_AUTH_SIMPLE ); in ldapfunc() 198 ldap_user=strdup(argv[2]); in h_ldapconnect() 288 rc = ldap_bind_s( ld, ldap_user, ldap_pass, LDAP_AUTH_SIMPLE ); in h_trafgroup() 466 free(ldap_user); in start() 482 ldap_user=NULL; in start()
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/helpers/ |
H A D | profiles_helper_spec.rb | 62 ldap_user = create(:omniauth_user) 63 ldap_user.create_user_synced_attributes_metadata(email_synced: true) 64 allow(helper).to receive(:current_user).and_return(ldap_user)
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/auth/ldap/ |
H A D | access.rb | 44 if ldap_user 81 def ldap_user method in Gitlab.Auth.Ldap.Access
|
/dports/www/rt44/rt-4.4.5/lib/RT/Authen/ExternalAuth/ |
H A D | LDAP.pm | 735 my $ldap_user = $config->{'user'}; 764 if (($ldap_user) and ($ldap_pass)) { 765 $msg = $ldap->bind($ldap_user, password => $ldap_pass); 766 } elsif (($ldap_user) and ( ! $ldap_pass)) { 767 $msg = $ldap->bind($ldap_user);
|
/dports/www/rt50/rt-5.0.2/lib/RT/Authen/ExternalAuth/ |
H A D | LDAP.pm | 735 my $ldap_user = $config->{'user'}; 764 if (($ldap_user) and ($ldap_pass)) { 765 $msg = $ldap->bind($ldap_user, password => $ldap_pass); 766 } elsif (($ldap_user) and ( ! $ldap_pass)) { 767 $msg = $ldap->bind($ldap_user);
|
/dports/sysutils/webmin/webmin-1.981/ldap-client/ |
H A D | ldap-client-lib.pl | 201 local ($ldap_hosts, $ldap_port, $ldap_ssl, $ldap_user, $ldap_pass) = @_; 210 $ldap_hosts && $ldap_user || 343 if ($ldap_user) { 345 $dn = $ldap_user;
|