]> snippets.scripts.mit.edu Git - Scripts/git/.git/blobdiff - __init__.py
kinit when creating a MoiraList object
[Scripts/git/.git] / __init__.py
index 725d660b713858074dd409407f40da558f02df7f..07715314850892522676527b6f8da5ab990df9e3 100644 (file)
@@ -1,4 +1,6 @@
+import os
 import subprocess
+import tempfile
 import ldap
 import ldap.filter
 
@@ -9,7 +11,9 @@ from django.contrib.auth import REDIRECT_FIELD_NAME
 from django.http import HttpResponseRedirect
 from django.contrib import auth
 from django.core.exceptions import ObjectDoesNotExist
-import settings
+from django.core.validators import URLValidator, ValidationError
+
+from django.conf import settings
 
 def zephyr(msg, clas='message', instance='log', rcpt='nobody',):
     proc = subprocess.Popen(
@@ -18,6 +22,53 @@ def zephyr(msg, clas='message', instance='log', rcpt='nobody',):
     )
     proc.communicate(msg)
 
+def UrlOrAfsValidator(value):
+    if value.startswith('/mit/') or value.startswith('/afs/'):
+        return
+    else:
+        try:
+            URLValidator()(value)
+        except ValidationError:
+            raise ValidationError('Provide a valid URL or AFS path')
+
+def pag_check_helper(fn, args, aklog=False, ccname=None, **kwargs):
+    if 'executable' in kwargs:
+        raise ValueError('"executable" not supported with pag_check_*')
+
+    env = None
+    if 'env' in kwargs:
+        env = kwargs['env']
+        del kwargs['env']
+    if ccname:
+        if env is not None:
+            env = dict(env)
+        else:
+            env = dict(os.environ)
+        env['KRB5CCNAME'] = ccname
+
+    pagsh_cmd = 'exec "$@"'
+    if aklog: pagsh_cmd = "aklog && " + pagsh_cmd
+    args = ['pagsh', '-c', pagsh_cmd, 'exec', ] + args
+
+    return fn(args, env=env, **kwargs)
+
+def pag_check_call(args, **kwargs):
+    return pag_check_helper(subprocess.check_call, args, **kwargs)
+def pag_check_output(args, **kwargs):
+    return pag_check_helper(subprocess.check_output, args, **kwargs)
+
+def kinit(keytab=None, principal=None, autodelete=True, ):
+    if not keytab:
+        keytab = settings.KRB_KEYTAB
+    if not principal:
+        principal = settings.KRB_PRINCIPAL
+    assert keytab and principal
+    fd = tempfile.NamedTemporaryFile(mode='rb', prefix="krb5cc_djmit_", delete=autodelete, )
+    env = dict(KRB5CCNAME=fd.name)
+    kinit_cmd = ['kinit', '-k', '-t', keytab, principal, ]
+    subprocess.check_call(kinit_cmd, env=env)
+    return fd
+
 class ScriptsRemoteUserMiddleware(RemoteUserMiddleware):
     header = 'SSL_CLIENT_S_DN_Email'
 
@@ -41,7 +92,10 @@ class ScriptsRemoteUserBackend(RemoteUserBackend):
         if len(result) == 1:
             user.first_name = result[0][1]['givenName'][0]
             user.last_name = result[0][1]['sn'][0]
-            user.email = result[0][1]['mail'][0]
+            try:
+                user.email = result[0][1]['mail'][0]
+            except KeyError:
+                user.email = username + '@mit.edu'
             try:
                 user.groups.add(auth.models.Group.objects.get(name='mit'))
             except ObjectDoesNotExist: