mirror of
https://github.com/mofeng-git/One-KVM.git
synced 2026-01-29 09:01:54 +08:00
@@ -32,7 +32,7 @@ from ...logging import get_logger
|
||||
|
||||
from ... import htclient
|
||||
|
||||
from ...languages import Languages
|
||||
from ...lanuages import Lanuages
|
||||
|
||||
from . import BaseAuthService
|
||||
|
||||
@@ -91,7 +91,7 @@ class Plugin(BaseAuthService):
|
||||
htclient.raise_not_200(response)
|
||||
return True
|
||||
except Exception:
|
||||
get_logger().exception(Languages().gettext("Failed HTTP auth request for user %r"), user)
|
||||
get_logger().exception(Lanuages().gettext("Failed HTTP auth request for user %r"), user)
|
||||
return False
|
||||
|
||||
async def cleanup(self) -> None:
|
||||
|
||||
@@ -33,7 +33,7 @@ from ...logging import get_logger
|
||||
from ... import tools
|
||||
from ... import aiotools
|
||||
|
||||
from ...languages import Languages
|
||||
from ...lanuages import Lanuages
|
||||
|
||||
from . import BaseAuthService
|
||||
|
||||
@@ -103,9 +103,9 @@ class Plugin(BaseAuthService):
|
||||
except ldap.INVALID_CREDENTIALS:
|
||||
pass
|
||||
except ldap.SERVER_DOWN as err:
|
||||
get_logger().error(Languages().gettext("LDAP server is down: %s"), tools.efmt(err))
|
||||
get_logger().error(Lanuages().gettext("LDAP server is down: %s"), tools.efmt(err))
|
||||
except Exception as err:
|
||||
get_logger().error(Languages().gettext("Unexpected LDAP error: %s"), tools.efmt(err))
|
||||
get_logger().error(Lanuages().gettext("Unexpected LDAP error: %s"), tools.efmt(err))
|
||||
finally:
|
||||
if conn is not None:
|
||||
try:
|
||||
|
||||
@@ -34,7 +34,7 @@ from ...logging import get_logger
|
||||
|
||||
from ... import aiotools
|
||||
|
||||
from ...languages import Languages
|
||||
from ...lanuages import Lanuages
|
||||
|
||||
from . import BaseAuthService
|
||||
|
||||
@@ -88,13 +88,13 @@ class Plugin(BaseAuthService):
|
||||
return False
|
||||
else:
|
||||
if uid < self.__allow_uids_at:
|
||||
get_logger().error(Languages().gettext("Unallowed UID of user %r: uid=%d < allow_uids_at=%d"),
|
||||
get_logger().error(Lanuages().gettext("Unallowed UID of user %r: uid=%d < allow_uids_at=%d"),
|
||||
user, uid, self.__allow_uids_at)
|
||||
return False
|
||||
|
||||
pam_obj = pam.pam()
|
||||
if not pam_obj.authenticate(user, passwd, service=self.__service):
|
||||
get_logger().error(Languages().gettext("Can't authorize user %r using PAM: code=%d; reason=%s"),
|
||||
get_logger().error(Lanuages().gettext("Can't authorize user %r using PAM: code=%d; reason=%s"),
|
||||
user, pam_obj.code, pam_obj.reason)
|
||||
return False
|
||||
return True
|
||||
|
||||
@@ -36,7 +36,7 @@ from ...logging import get_logger
|
||||
|
||||
from ... import aiotools
|
||||
|
||||
from ...languages import Languages
|
||||
from ...lanuages import Lanuages
|
||||
|
||||
from . import BaseAuthService
|
||||
|
||||
@@ -442,5 +442,5 @@ class Plugin(BaseAuthService):
|
||||
response = client.SendPacket(request)
|
||||
return (response.code == pyrad.packet.AccessAccept)
|
||||
except Exception:
|
||||
get_logger().exception(Languages().gettext("Failed RADIUS auth request for user %r"), user)
|
||||
get_logger().exception(Lanuages().gettext("Failed RADIUS auth request for user %r"), user)
|
||||
return False
|
||||
|
||||
Reference in New Issue
Block a user