On utilise le secrets.py situ dans le repertoire secrets dont les droits ne

bougeront pas. (Suggestion de Vincent)

darcs-hash:20061207224655-f6463-db93f0867483d96682d32371169a46d3e6011d81.gz
This commit is contained in:
cohen 2006-12-07 23:46:55 +01:00
parent b46d09cf48
commit b3e305578b
4 changed files with 4 additions and 0 deletions

View file

@ -23,6 +23,7 @@ from user_tests import getuser
from affich_tools import cprint from affich_tools import cprint
try : try :
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import ldap_password, ldap_auth_dn from secrets import ldap_password, ldap_auth_dn
except : except :
ldap_password = '' ldap_password = ''

View file

@ -239,6 +239,7 @@ exit
sw_num = int(switch[5]) sw_num = int(switch[5])
# Conf radius # Conf radius
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import radius_key from secrets import radius_key
shuffle(self.rad_servs) shuffle(self.rad_servs)
rad = self.rad_template * len(self.rad_servs) rad = self.rad_template * len(self.rad_servs)

View file

@ -19,6 +19,7 @@ from os import system
from sre import findall from sre import findall
try: try:
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import config_snmp_secrete, reconf_snmp from secrets import config_snmp_secrete, reconf_snmp
except : except :
# Si a pas le droit de lire config_snmp_secrete # Si a pas le droit de lire config_snmp_secrete

View file

@ -51,6 +51,7 @@ else:
# avec le secret # avec le secret
try: try:
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import ldap_password, ldap_auth_dn from secrets import ldap_password, ldap_auth_dn
except: except:
sys.stdout.write(coul('Warning : impossible de lire le fichier de secret !\n', 'jaune')) sys.stdout.write(coul('Warning : impossible de lire le fichier de secret !\n', 'jaune'))