2015-07-20 15:39:59 +00:00
|
|
|
import ldap
|
|
|
|
import logging
|
|
|
|
import os
|
|
|
|
|
2017-02-16 20:16:47 +00:00
|
|
|
from ldap.controls import SimplePagedResultsControl
|
|
|
|
|
2015-07-20 15:39:59 +00:00
|
|
|
from collections import namedtuple
|
2016-10-27 19:32:01 +00:00
|
|
|
from data.users.federated import FederatedUsers, UserInformation
|
Optimize repository search by changing our lookup strategy
Previous to this change, repositories were looked up unfiltered in six different queries, and then filtered using the permissions model, which issued a query per repository found, making search incredibly slow. Instead, we now lookup a chunk of repositories unfiltered and then filter them via a single query to the database. By layering the filtering on top of the lookup, each as queries, we can minimize the number of queries necessary, without (at the same time) using a super expensive join.
Other changes:
- Remove the 5 page pre-lookup on V1 search and simply return that there is one more page available, until there isn't. While technically not correct, it is much more efficient, and no one should be using pagination with V1 search anyway.
- Remove the lookup for repos without entries in the RAC table. Instead, we now add a new RAC entry when the repository is created for *the day before*, with count 0, so that it is immediately searchable
- Remove lookup of results with a matching namespace; these aren't very relevant anyway, and it overly complicates sorting
2017-02-27 22:56:44 +00:00
|
|
|
from util.itertoolrecipes import take
|
2015-07-20 15:39:59 +00:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2016-12-19 16:53:06 +00:00
|
|
|
_DEFAULT_NETWORK_TIMEOUT = 10.0 # seconds
|
|
|
|
_DEFAULT_TIMEOUT = 10.0 # seconds
|
2017-02-17 19:23:50 +00:00
|
|
|
_DEFAULT_PAGE_SIZE = 1000
|
2016-12-19 16:53:06 +00:00
|
|
|
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2015-08-18 16:15:40 +00:00
|
|
|
class LDAPConnectionBuilder(object):
|
2016-12-19 16:53:06 +00:00
|
|
|
def __init__(self, ldap_uri, user_dn, user_pw, allow_tls_fallback=False,
|
|
|
|
timeout=None, network_timeout=None):
|
2015-08-18 16:15:40 +00:00
|
|
|
self._ldap_uri = ldap_uri
|
|
|
|
self._user_dn = user_dn
|
|
|
|
self._user_pw = user_pw
|
2016-05-03 19:02:39 +00:00
|
|
|
self._allow_tls_fallback = allow_tls_fallback
|
2016-12-19 16:53:06 +00:00
|
|
|
self._timeout = timeout
|
|
|
|
self._network_timeout = network_timeout
|
2015-08-18 16:15:40 +00:00
|
|
|
|
|
|
|
def get_connection(self):
|
2016-12-19 16:53:06 +00:00
|
|
|
return LDAPConnection(self._ldap_uri, self._user_dn, self._user_pw, self._allow_tls_fallback,
|
|
|
|
self._timeout, self._network_timeout)
|
2015-08-18 16:15:40 +00:00
|
|
|
|
|
|
|
|
2015-07-20 15:39:59 +00:00
|
|
|
class LDAPConnection(object):
|
2016-12-19 16:53:06 +00:00
|
|
|
def __init__(self, ldap_uri, user_dn, user_pw, allow_tls_fallback=False,
|
|
|
|
timeout=None, network_timeout=None):
|
2015-07-20 15:39:59 +00:00
|
|
|
self._ldap_uri = ldap_uri
|
|
|
|
self._user_dn = user_dn
|
|
|
|
self._user_pw = user_pw
|
2016-05-03 19:02:39 +00:00
|
|
|
self._allow_tls_fallback = allow_tls_fallback
|
2016-12-19 16:53:06 +00:00
|
|
|
self._timeout = timeout
|
|
|
|
self._network_timeout = network_timeout
|
2015-07-20 15:39:59 +00:00
|
|
|
self._conn = None
|
|
|
|
|
|
|
|
def __enter__(self):
|
|
|
|
trace_level = 2 if os.environ.get('USERS_DEBUG') == '1' else 0
|
2016-10-27 19:32:01 +00:00
|
|
|
|
2015-07-20 15:39:59 +00:00
|
|
|
self._conn = ldap.initialize(self._ldap_uri, trace_level=trace_level)
|
|
|
|
self._conn.set_option(ldap.OPT_REFERRALS, 1)
|
2016-12-19 16:53:06 +00:00
|
|
|
self._conn.set_option(ldap.OPT_NETWORK_TIMEOUT,
|
|
|
|
self._network_timeout or _DEFAULT_NETWORK_TIMEOUT)
|
|
|
|
self._conn.set_option(ldap.OPT_TIMEOUT, self._timeout or _DEFAULT_TIMEOUT)
|
2016-05-03 19:02:39 +00:00
|
|
|
|
|
|
|
if self._allow_tls_fallback:
|
|
|
|
logger.debug('TLS Fallback enabled in LDAP')
|
|
|
|
self._conn.set_option(ldap.OPT_X_TLS_TRY, 1)
|
|
|
|
|
2015-08-18 16:15:40 +00:00
|
|
|
self._conn.simple_bind_s(self._user_dn, self._user_pw)
|
2015-07-20 15:39:59 +00:00
|
|
|
return self._conn
|
|
|
|
|
|
|
|
def __exit__(self, exc_type, value, tb):
|
|
|
|
self._conn.unbind_s()
|
|
|
|
|
|
|
|
|
|
|
|
class LDAPUsers(FederatedUsers):
|
|
|
|
_LDAPResult = namedtuple('LDAPResult', ['dn', 'attrs'])
|
|
|
|
|
2016-05-03 19:02:39 +00:00
|
|
|
def __init__(self, ldap_uri, base_dn, admin_dn, admin_passwd, user_rdn, uid_attr, email_attr,
|
2016-12-19 16:53:06 +00:00
|
|
|
allow_tls_fallback=False, secondary_user_rdns=None, requires_email=True,
|
2017-02-17 23:02:53 +00:00
|
|
|
timeout=None, network_timeout=None, force_no_pagination=False):
|
2016-09-08 16:24:47 +00:00
|
|
|
super(LDAPUsers, self).__init__('ldap', requires_email)
|
2016-12-19 16:53:06 +00:00
|
|
|
|
|
|
|
self._ldap = LDAPConnectionBuilder(ldap_uri, admin_dn, admin_passwd, allow_tls_fallback,
|
|
|
|
timeout, network_timeout)
|
2015-07-20 15:39:59 +00:00
|
|
|
self._ldap_uri = ldap_uri
|
|
|
|
self._uid_attr = uid_attr
|
|
|
|
self._email_attr = email_attr
|
2016-05-03 19:02:39 +00:00
|
|
|
self._allow_tls_fallback = allow_tls_fallback
|
2016-09-08 16:24:47 +00:00
|
|
|
self._requires_email = requires_email
|
2017-02-17 23:02:53 +00:00
|
|
|
self._force_no_pagination = force_no_pagination
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2016-07-07 18:26:14 +00:00
|
|
|
# Note: user_rdn is a list of RDN pieces (for historical reasons), and secondary_user_rds
|
|
|
|
# is a list of RDN strings.
|
|
|
|
relative_user_dns = [','.join(user_rdn)] + (secondary_user_rdns or [])
|
2016-07-22 18:40:53 +00:00
|
|
|
|
|
|
|
def get_full_rdn(relative_dn):
|
|
|
|
prefix = relative_dn.split(',') if relative_dn else []
|
|
|
|
return ','.join(prefix + base_dn)
|
|
|
|
|
|
|
|
# Create the set of full DN paths.
|
|
|
|
self._user_dns = [get_full_rdn(relative_dn) for relative_dn in relative_user_dns]
|
2017-02-16 20:16:47 +00:00
|
|
|
self._base_dn = ','.join(base_dn)
|
2016-07-07 18:26:14 +00:00
|
|
|
|
2015-07-20 15:39:59 +00:00
|
|
|
def _get_ldap_referral_dn(self, referral_exception):
|
|
|
|
logger.debug('Got referral: %s', referral_exception.args[0])
|
|
|
|
if not referral_exception.args[0] or not referral_exception.args[0].get('info'):
|
|
|
|
logger.debug('LDAP referral missing info block')
|
|
|
|
return None
|
|
|
|
|
|
|
|
referral_info = referral_exception.args[0]['info']
|
|
|
|
if not referral_info.startswith('Referral:\n'):
|
|
|
|
logger.debug('LDAP referral missing Referral header')
|
|
|
|
return None
|
|
|
|
|
|
|
|
referral_uri = referral_info[len('Referral:\n'):]
|
|
|
|
if not referral_uri.startswith('ldap:///'):
|
|
|
|
logger.debug('LDAP referral URI does not start with ldap:///')
|
|
|
|
return None
|
|
|
|
|
|
|
|
referral_dn = referral_uri[len('ldap:///'):]
|
|
|
|
return referral_dn
|
|
|
|
|
2016-07-07 18:26:14 +00:00
|
|
|
def _ldap_user_search_with_rdn(self, conn, username_or_email, user_search_dn):
|
|
|
|
query = u'(|({0}={2})({1}={2}))'.format(self._uid_attr, self._email_attr,
|
|
|
|
username_or_email)
|
|
|
|
logger.debug('Conducting user search: %s under %s', query, user_search_dn)
|
|
|
|
try:
|
|
|
|
return (conn.search_s(user_search_dn, ldap.SCOPE_SUBTREE, query.encode('utf-8')), None)
|
|
|
|
except ldap.REFERRAL as re:
|
|
|
|
referral_dn = self._get_ldap_referral_dn(re)
|
|
|
|
if not referral_dn:
|
|
|
|
return (None, 'Failed to follow referral when looking up username')
|
|
|
|
|
|
|
|
try:
|
|
|
|
subquery = u'(%s=%s)' % (self._uid_attr, username_or_email)
|
|
|
|
return (conn.search_s(referral_dn, ldap.SCOPE_BASE, subquery), None)
|
|
|
|
except ldap.LDAPError:
|
2016-11-10 21:39:26 +00:00
|
|
|
logger.debug('LDAP referral search exception')
|
2016-07-07 18:26:14 +00:00
|
|
|
return (None, 'Username not found')
|
|
|
|
|
|
|
|
except ldap.LDAPError:
|
2016-11-10 21:39:26 +00:00
|
|
|
logger.debug('LDAP search exception')
|
2016-07-07 18:26:14 +00:00
|
|
|
return (None, 'Username not found')
|
|
|
|
|
2016-10-27 19:32:01 +00:00
|
|
|
def _ldap_user_search(self, username_or_email, limit=20):
|
|
|
|
if not username_or_email:
|
|
|
|
return (None, 'Empty username/email')
|
|
|
|
|
2015-08-18 16:15:40 +00:00
|
|
|
# Verify the admin connection works first. We do this here to avoid wrapping
|
|
|
|
# the entire block in the INVALID CREDENTIALS check.
|
|
|
|
try:
|
|
|
|
with self._ldap.get_connection():
|
|
|
|
pass
|
|
|
|
except ldap.INVALID_CREDENTIALS:
|
|
|
|
return (None, 'LDAP Admin dn or password is invalid')
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2015-08-18 16:15:40 +00:00
|
|
|
with self._ldap.get_connection() as conn:
|
2015-07-20 15:39:59 +00:00
|
|
|
logger.debug('Incoming username or email param: %s', username_or_email.__repr__())
|
|
|
|
|
2016-07-07 18:26:14 +00:00
|
|
|
for user_search_dn in self._user_dns:
|
|
|
|
(pairs, err_msg) = self._ldap_user_search_with_rdn(conn, username_or_email, user_search_dn)
|
|
|
|
if pairs is not None and len(pairs) > 0:
|
|
|
|
break
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2016-07-07 18:26:14 +00:00
|
|
|
if err_msg is not None:
|
|
|
|
return (None, err_msg)
|
2015-07-20 15:39:59 +00:00
|
|
|
|
|
|
|
logger.debug('Found matching pairs: %s', pairs)
|
Optimize repository search by changing our lookup strategy
Previous to this change, repositories were looked up unfiltered in six different queries, and then filtered using the permissions model, which issued a query per repository found, making search incredibly slow. Instead, we now lookup a chunk of repositories unfiltered and then filter them via a single query to the database. By layering the filtering on top of the lookup, each as queries, we can minimize the number of queries necessary, without (at the same time) using a super expensive join.
Other changes:
- Remove the 5 page pre-lookup on V1 search and simply return that there is one more page available, until there isn't. While technically not correct, it is much more efficient, and no one should be using pagination with V1 search anyway.
- Remove the lookup for repos without entries in the RAC table. Instead, we now add a new RAC entry when the repository is created for *the day before*, with count 0, so that it is immediately searchable
- Remove lookup of results with a matching namespace; these aren't very relevant anyway, and it overly complicates sorting
2017-02-27 22:56:44 +00:00
|
|
|
results = [LDAPUsers._LDAPResult(*pair) for pair in take(limit, pairs)]
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2016-10-27 19:32:01 +00:00
|
|
|
# Filter out pairs without DNs. Some LDAP impls will return such pairs.
|
2015-07-20 15:39:59 +00:00
|
|
|
with_dns = [result for result in results if result.dn]
|
2016-10-27 19:32:01 +00:00
|
|
|
return (with_dns, None)
|
|
|
|
|
|
|
|
def _ldap_single_user_search(self, username_or_email):
|
|
|
|
with_dns, err_msg = self._ldap_user_search(username_or_email)
|
|
|
|
if err_msg is not None:
|
|
|
|
return (None, err_msg)
|
|
|
|
|
|
|
|
# Make sure we have at least one result.
|
|
|
|
if len(with_dns) < 1:
|
|
|
|
return (None, 'Username not found')
|
|
|
|
|
|
|
|
# If we have found a single pair, then return it.
|
|
|
|
if len(with_dns) == 1:
|
|
|
|
return (with_dns[0], None)
|
|
|
|
|
|
|
|
# Otherwise, there are multiple pairs with DNs, so find the one with the mail
|
|
|
|
# attribute (if any).
|
|
|
|
with_mail = [result for result in with_dns if result.attrs.get(self._email_attr)]
|
|
|
|
return (with_mail[0] if with_mail else with_dns[0], None)
|
|
|
|
|
2017-02-16 20:16:47 +00:00
|
|
|
def _build_user_information(self, response):
|
2016-10-27 19:32:01 +00:00
|
|
|
if not response.get(self._uid_attr):
|
|
|
|
return (None, 'Missing uid field "%s" in user record' % self._uid_attr)
|
|
|
|
|
2016-09-08 16:24:47 +00:00
|
|
|
if self._requires_email and not response.get(self._email_attr):
|
2016-10-27 19:32:01 +00:00
|
|
|
return (None, 'Missing mail field "%s" in user record' % self._email_attr)
|
|
|
|
|
|
|
|
username = response[self._uid_attr][0].decode('utf-8')
|
2016-09-08 16:24:47 +00:00
|
|
|
email = response.get(self._email_attr, [None])[0]
|
2016-10-27 19:32:01 +00:00
|
|
|
return (UserInformation(username=username, email=email, id=username), None)
|
|
|
|
|
|
|
|
def get_user(self, username_or_email):
|
|
|
|
""" Looks up a username or email in LDAP. """
|
|
|
|
logger.debug('Looking up LDAP username or email %s', username_or_email)
|
|
|
|
(found_user, err_msg) = self._ldap_single_user_search(username_or_email)
|
|
|
|
if err_msg is not None:
|
|
|
|
return (None, err_msg)
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2016-10-27 19:32:01 +00:00
|
|
|
logger.debug('Found user for LDAP username or email %s', username_or_email)
|
|
|
|
_, found_response = found_user
|
2017-02-16 20:16:47 +00:00
|
|
|
return self._build_user_information(found_response)
|
2015-07-20 15:39:59 +00:00
|
|
|
|
2016-10-27 19:32:01 +00:00
|
|
|
def query_users(self, query, limit=20):
|
|
|
|
""" Queries LDAP for matching users. """
|
|
|
|
if not query:
|
2016-12-05 22:19:38 +00:00
|
|
|
return (None, self.federated_service, 'Empty query')
|
2016-10-27 19:32:01 +00:00
|
|
|
|
|
|
|
logger.debug('Got query %s with limit %s', query, limit)
|
|
|
|
(results, err_msg) = self._ldap_user_search(query + '*', limit=limit)
|
|
|
|
if err_msg is not None:
|
2016-12-05 22:19:38 +00:00
|
|
|
return (None, self.federated_service, err_msg)
|
2016-10-27 19:32:01 +00:00
|
|
|
|
|
|
|
final_results = []
|
|
|
|
for result in results[0:limit]:
|
2017-02-16 20:16:47 +00:00
|
|
|
credentials, err_msg = self._build_user_information(result.attrs)
|
2016-10-27 19:32:01 +00:00
|
|
|
if err_msg is not None:
|
|
|
|
continue
|
|
|
|
|
|
|
|
final_results.append(credentials)
|
|
|
|
|
|
|
|
logger.debug('For query %s found results %s', query, final_results)
|
2016-12-05 22:19:38 +00:00
|
|
|
return (final_results, self.federated_service, None)
|
2015-07-20 15:39:59 +00:00
|
|
|
|
|
|
|
def verify_credentials(self, username_or_email, password):
|
|
|
|
""" Verify the credentials with LDAP. """
|
|
|
|
# Make sure that even if the server supports anonymous binds, we don't allow it
|
|
|
|
if not password:
|
|
|
|
return (None, 'Anonymous binding not allowed')
|
|
|
|
|
2016-10-27 19:32:01 +00:00
|
|
|
(found_user, err_msg) = self._ldap_single_user_search(username_or_email)
|
2015-07-20 15:39:59 +00:00
|
|
|
if found_user is None:
|
|
|
|
return (None, err_msg)
|
|
|
|
|
|
|
|
found_dn, found_response = found_user
|
|
|
|
logger.debug('Found user for LDAP username %s; validating password', username_or_email)
|
|
|
|
logger.debug('DN %s found: %s', found_dn, found_response)
|
|
|
|
|
|
|
|
# First validate the password by binding as the user
|
|
|
|
try:
|
2016-05-03 19:02:39 +00:00
|
|
|
with LDAPConnection(self._ldap_uri, found_dn, password.encode('utf-8'),
|
2016-06-09 18:47:08 +00:00
|
|
|
self._allow_tls_fallback):
|
2015-07-20 15:39:59 +00:00
|
|
|
pass
|
|
|
|
except ldap.REFERRAL as re:
|
|
|
|
referral_dn = self._get_ldap_referral_dn(re)
|
|
|
|
if not referral_dn:
|
|
|
|
return (None, 'Invalid username')
|
|
|
|
|
|
|
|
try:
|
2016-05-03 19:02:39 +00:00
|
|
|
with LDAPConnection(self._ldap_uri, referral_dn, password.encode('utf-8'),
|
2016-06-09 18:47:08 +00:00
|
|
|
self._allow_tls_fallback):
|
2015-07-20 15:39:59 +00:00
|
|
|
pass
|
|
|
|
except ldap.INVALID_CREDENTIALS:
|
2016-11-10 21:39:26 +00:00
|
|
|
logger.debug('Invalid LDAP credentials')
|
2015-07-20 15:39:59 +00:00
|
|
|
return (None, 'Invalid password')
|
|
|
|
|
|
|
|
except ldap.INVALID_CREDENTIALS:
|
2016-11-10 21:39:26 +00:00
|
|
|
logger.debug('Invalid LDAP credentials')
|
2015-07-20 15:39:59 +00:00
|
|
|
return (None, 'Invalid password')
|
|
|
|
|
2017-02-16 20:16:47 +00:00
|
|
|
return self._build_user_information(found_response)
|
|
|
|
|
2017-02-17 22:10:26 +00:00
|
|
|
def service_metadata(self):
|
|
|
|
return {
|
|
|
|
'base_dn': self._base_dn,
|
|
|
|
}
|
|
|
|
|
|
|
|
def check_group_lookup_args(self, group_lookup_args, disable_pagination=False):
|
|
|
|
if not group_lookup_args.get('group_dn'):
|
|
|
|
return (False, 'Missing group_dn')
|
|
|
|
|
|
|
|
(it, err) = self.iterate_group_members(group_lookup_args, page_size=1,
|
|
|
|
disable_pagination=disable_pagination)
|
|
|
|
if err is not None:
|
|
|
|
return (False, err)
|
|
|
|
|
|
|
|
results = list(it)
|
|
|
|
if not results:
|
|
|
|
return (False, 'Group does not exist or is empty')
|
|
|
|
|
|
|
|
return (True, None)
|
|
|
|
|
2017-02-16 20:16:47 +00:00
|
|
|
def iterate_group_members(self, group_lookup_args, page_size=None, disable_pagination=False):
|
|
|
|
try:
|
|
|
|
with self._ldap.get_connection():
|
|
|
|
pass
|
|
|
|
except ldap.INVALID_CREDENTIALS:
|
|
|
|
return (None, 'LDAP Admin dn or password is invalid')
|
|
|
|
|
|
|
|
group_dn = group_lookup_args['group_dn']
|
|
|
|
page_size = page_size or _DEFAULT_PAGE_SIZE
|
|
|
|
return (self._iterate_members(group_dn, page_size, disable_pagination), None)
|
|
|
|
|
|
|
|
def _iterate_members(self, group_dn, page_size, disable_pagination):
|
2017-02-17 23:02:53 +00:00
|
|
|
has_pagination = not(self._force_no_pagination or disable_pagination)
|
2017-02-16 20:16:47 +00:00
|
|
|
with self._ldap.get_connection() as conn:
|
|
|
|
lc = ldap.controls.libldap.SimplePagedResultsControl(criticality=True, size=page_size,
|
|
|
|
cookie='')
|
|
|
|
|
|
|
|
search_flt = '(memberOf=%s,%s)' % (group_dn, self._base_dn)
|
2017-02-17 19:23:50 +00:00
|
|
|
attributes = [self._uid_attr, self._email_attr]
|
2017-02-16 20:16:47 +00:00
|
|
|
|
|
|
|
for user_search_dn in self._user_dns:
|
|
|
|
# Conduct the initial search for users that are a member of the group.
|
2017-02-17 23:02:53 +00:00
|
|
|
if has_pagination:
|
2017-02-17 19:23:50 +00:00
|
|
|
msgid = conn.search_ext(user_search_dn, ldap.SCOPE_SUBTREE, search_flt, serverctrls=[lc],
|
|
|
|
attrlist=attributes)
|
2017-02-17 23:02:53 +00:00
|
|
|
else:
|
|
|
|
msgid = conn.search(user_search_dn, ldap.SCOPE_SUBTREE, search_flt, attrlist=attributes)
|
2017-02-16 20:16:47 +00:00
|
|
|
|
|
|
|
while True:
|
2017-02-17 23:02:53 +00:00
|
|
|
if has_pagination:
|
2017-02-16 20:16:47 +00:00
|
|
|
_, rdata, _, serverctrls = conn.result3(msgid)
|
2017-02-17 23:02:53 +00:00
|
|
|
else:
|
|
|
|
_, rdata = conn.result(msgid)
|
2017-02-16 20:16:47 +00:00
|
|
|
|
|
|
|
# Yield any users found.
|
|
|
|
for userdata in rdata:
|
|
|
|
yield self._build_user_information(userdata[1])
|
|
|
|
|
|
|
|
# If pagination is disabled, nothing more to do.
|
2017-02-17 23:02:53 +00:00
|
|
|
if not has_pagination:
|
2017-02-16 20:16:47 +00:00
|
|
|
break
|
|
|
|
|
|
|
|
# Filter down the controls with which the server responded, looking for the paging
|
|
|
|
# control type. If not found, then the server does not support pagination and we already
|
|
|
|
# got all of the results.
|
|
|
|
pctrls = [control for control in serverctrls
|
|
|
|
if control.controlType == ldap.controls.SimplePagedResultsControl.controlType]
|
|
|
|
|
|
|
|
if pctrls:
|
|
|
|
# Server supports pagination. Update the cookie so the next search finds the next page,
|
|
|
|
# then conduct the next search.
|
|
|
|
cookie = lc.cookie = pctrls[0].cookie
|
|
|
|
if cookie:
|
|
|
|
msgid = conn.search_ext(user_search_dn, ldap.SCOPE_SUBTREE, search_flt,
|
|
|
|
serverctrls=[lc])
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
# No additional results.
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
# Pagintation is not supported.
|
|
|
|
logger.debug('Pagination is not supported for this LDAP server')
|
|
|
|
break
|