From 3c7efba233e7165db25c37a3b6534a3b760d5ab6 Mon Sep 17 00:00:00 2001 From: Jorrit Schaap <schaap@astron.nl> Date: Tue, 28 Jan 2020 10:55:45 +0100 Subject: [PATCH] TMSS-139: ldap protocol dependent on environment --- SAS/TMSS/src/tmss/settings.py | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/SAS/TMSS/src/tmss/settings.py b/SAS/TMSS/src/tmss/settings.py index 8605c85d371..42fe120b0cb 100644 --- a/SAS/TMSS/src/tmss/settings.py +++ b/SAS/TMSS/src/tmss/settings.py @@ -201,10 +201,7 @@ AUTH_LDAP_GLOBAL_OPTIONS = { ldap.OPT_X_TLS_REQUIRE_CERT: ldap.OPT_X_TLS_NEVER } AUTH_LDAP_CONNECTION_OPTIONS = { ldap.OPT_X_TLS_REQUIRE_CERT : ldap.OPT_X_TLS_NEVER } # cert still expired? # AUTH_LDAP_BIND_DN = '' # our LDAP is open # AUTH_LDAP_BIND_PASSWORD = '' # our LDAP is open -protocol = 'ldaps://' -if isDevelopmentEnvironment(): - logging.warning('Test ldap credentials detected, using insecure connection for ldap autenthication') # mock LDAP does not support ldaps:// - protocol = 'ldap://' +protocol = 'ldap://' if isDevelopmentEnvironment() else 'ldaps://' AUTH_LDAP_SERVER_URI = "%s%s:%s" % (protocol, django_ldap_credentials.host, django_ldap_credentials.port) AUTH_LDAP_USER_DN_TEMPLATE="cn=%(user)s,ou=Users,o=lofar,c=eu" -- GitLab