Package turbogears :: Package identity :: Module base

Module base

source code

The TurboGears identity management package.

Functions
 
create_default_provider()
Create default identity provider.
source code
 
was_login_attempted() source code
 
set_login_attempted(flag) source code
 
set_current_identity(identity) source code
 
set_current_provider(provider) source code
 
encrypt_pw_with_algorithm(algorithm, password)
Hash the given password with the specified algorithm.
source code
 
_encrypt_password(*args, **kwargs)
Hash the given password with the specified algorithm.
source code
 
encrypt_password(cleartext) source code
 
verify_identity_status()
A tool that sets response status based on identity's success or failure.
source code
Variables
  current = IdentityWrapper()
  current_provider = ProviderWrapper()
Function Details

create_default_provider()

source code 

Create default identity provider.

Creates an identity provider according to what is found in the configuration file for the current TurboGears application

Returns an identity provider instance or raises an IdentityConfigurationException.

encrypt_pw_with_algorithm(algorithm, password)

source code 

Hash the given password with the specified algorithm.

Valid values for algorithm are 'md5' and 'sha1' or 'custom'. If the algorithm is 'custom', the config setting 'identity.custom_encryption' needs to be set to a dotted-notation path to a callable that takes an unencrypted password and gives back the password hash.

All other algorithms values will be essentially a no-op.

_encrypt_password(*args, **kwargs)

source code 

Hash the given password with the specified algorithm.

Valid values for algorithm are 'md5' and 'sha1' or 'custom'. If the algorithm is 'custom', the config setting 'identity.custom_encryption' needs to be set to a dotted-notation path to a callable that takes an unencrypted password and gives back the password hash.

All other algorithms values will be essentially a no-op.

verify_identity_status()

source code 

A tool that sets response status based on identity's success or failure.

This is necessary since the status will be overridden by the result of forwarding the user to the login page.

Does not override status if the login controller errors out.