Commit b3e30557 authored by cohen's avatar cohen

On utilise le secrets.py situ dans le repertoire secrets dont les droits ne

bougeront pas. (Suggestion de Vincent)

darcs-hash:20061207224655-f6463-db93f0867483d96682d32371169a46d3e6011d81.gz
parent b46d09cf
......@@ -23,6 +23,7 @@ from user_tests import getuser
from affich_tools import cprint
try :
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import ldap_password, ldap_auth_dn
except :
ldap_password = ''
......
......@@ -239,6 +239,7 @@ exit
sw_num = int(switch[5])
# Conf radius
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import radius_key
shuffle(self.rad_servs)
rad = self.rad_template * len(self.rad_servs)
......
......@@ -19,6 +19,7 @@ from os import system
from sre import findall
try:
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import config_snmp_secrete, reconf_snmp
except :
# Si a pas le droit de lire config_snmp_secrete
......
......@@ -51,6 +51,7 @@ else:
# avec le secret
try:
sys.path.append('/usr/scripts/gestion/secrets')
from secrets import ldap_password, ldap_auth_dn
except:
sys.stdout.write(coul('Warning : impossible de lire le fichier de secret !\n', 'jaune'))
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment