cms.apps.control package

Submodules

cms.apps.control.admin module

class cms.apps.control.admin.ControlUserAdmin(model, admin_site)

Bases: cms.contrib.admin.admin.CMSAdmin

list_display = ['email', 'givenName', 'sn']
media
search_fields = ['email', 'givenName', 'sn']

cms.apps.control.apps module

class cms.apps.control.apps.ControlConfig(app_name, app_module)

Bases: django.apps.config.AppConfig

name = 'cms.apps.control'
ready()

cms.apps.control.cms_plugin module

class cms.apps.control.cms_plugin.CMSPlugin

Bases: cms.core.plugins.CMSPluginBase

description = <django.utils.functional.__proxy__ object at 0x8778950>
staticfiles = {'site': {'default': {'js': ['core://lib/highchart.adapter.js', 'core://lib/highchart.js', 'core://lib/highchart.exporting.js', 'core://contrib.charts.js']}}}
status = 'stable'
verbose_name = <django.utils.functional.__proxy__ object at 0x8778ed0>
version = '0.4'

cms.apps.control.context_processor module

cms.apps.control.context_processor.vars(request)

cms.apps.control.fields module

class cms.apps.control.fields.BoolField(*args, **kwargs)

Bases: ldapdb.models.fields.CharField

from_ldap(value, connection)
get_db_prep_save(value, connection)
to_python(value)
class cms.apps.control.fields.EnabledField(*args, **kwargs)

Bases: cms.apps.control.fields.BoolField

get_db_prep_save(value, connection)
to_python(value)
class cms.apps.control.fields.ListField(max_length=None, min_length=None, *args, **kwargs)

Bases: django.forms.fields.Field

to_python(value)
class cms.apps.control.fields.ListFieldMaildrop(max_length=None, min_length=None, *args, **kwargs)

Bases: cms.apps.control.fields.ListField

validate(value)

Check if value consists only of valid emails.

cms.apps.control.managers module

class cms.apps.control.managers.ActiveManager

Bases: django.db.models.manager.Manager

active(adminID_dn=None)

If adminID_dn we asume its a query for ControlDomain If the dn of ControlUser in adminID, don’t filter accountActive accountDelete. The domain-admin can always login. Only normal users didn’t get a result. TODO: Expand LDAP-Schema for a hard-lock by Super-Admin

cms.apps.control.messages module

cms.apps.control.schema module

cms.apps.control.signals module

cms.apps.control.signals.create_profile(sender, instance, created, **kwargs)
cms.apps.control.signals.get_dn(self)
cms.apps.control.signals.pre_login(sender, request, **kwargs)

cms.apps.control.urls module

cms.apps.control.utils module

cms.apps.control.utils.activate_django_user(item)
cms.apps.control.utils.check_ldap_auth(email, raw_password)

Returns a boolean of whether the raw_password was correct.

cms.apps.control.utils.deactivate_django_user(item)
cms.apps.control.utils.gen_ssha_password(raw_password)

Encrypts a password as used for an ldap userPassword attribute.

cms.apps.control.utils.get_next_uidNumber(queryset)
cms.apps.control.utils.split_and_grep_dn(dn, suffix)

cms.apps.control.validators module

cms.apps.control.validators.clean_ldap_username(username)
cms.apps.control.validators.validate_clean_validate_ldap_username(username)
cms.apps.control.validators.validate_ldap_username(username)

Module contents