zulip/zproject
Mateusz Mandera 2ce2024bd7 ldap: Fix unintended user deactivation in case of connection failure.
Fixes #13130.

django_auth_ldap doesn't give any other way of detecting that LDAPError
happened other than catching the signal it emits - so we have to
register a receiver. In the receiver we just raise our own Exception
which will properly propagate without being silenced by
django_auth_ldap. This will stop execution before the user gets
deactivated.
2019-09-05 11:59:20 -07:00
..
jinja2 cleanup: Delete leading newlines. 2019-08-06 23:29:11 -07:00
__init__.py
backends.py ldap: Fix unintended user deactivation in case of connection failure. 2019-09-05 11:59:20 -07:00
dev_settings.py dev_settings: Clean up type ignores. 2019-08-09 17:42:33 -07:00
dev_urls.py storage: Stop using django-pipeline. 2019-07-24 17:40:31 -07:00
email_backends.py tools: Upgrade Pycodestyle and fix new linter errors. 2019-01-31 12:21:41 -08:00
legacy_urls.py urls: Move the json/fetch_api_key endpoint to be an API-style route. 2018-01-08 13:15:52 -05:00
prod_settings_template.py settings: Add FAKE_EMAIL_DOMAIN setting. 2019-08-30 14:59:00 -07:00
settings.py settings: Add FAKE_EMAIL_DOMAIN setting. 2019-08-30 14:59:00 -07:00
slack_importer_test_settings.py settings: Migrate test settings to modern postgres backend name. 2019-01-23 17:08:24 -08:00
terms.md.template
test_settings.py settings: Add FAKE_EMAIL_DOMAIN setting. 2019-08-30 14:59:00 -07:00
urls.py urls: Tighten many unintentionally broad URL patterns. 2019-08-26 20:51:49 -07:00
wsgi.py wsgi.py: Fix broken error ouput for django.setup() call. 2019-06-24 12:19:51 -07:00