1
##############################################################################
3
# Copyright (c) 2004 TINY SPRL. (http://tiny.be) All Rights Reserved.
4
# Fabien Pinckaers <fp@tiny.Be>
6
# WARNING: This program as such is intended to be used by professional
7
# programmers who take the whole responsability of assessing all potential
8
# consequences resulting from its eventual inadequacies and bugs
9
# End users who are looking for a ready-to-use solution with commercial
10
# garantees and support are strongly adviced to contract a Free Software
13
# This program is Free Software; you can redistribute it and/or
14
# modify it under the terms of the GNU General Public License
15
# as published by the Free Software Foundation; either version 2
16
# of the License, or (at your option) any later version.
18
# This program is distributed in the hope that it will be useful,
19
# but WITHOUT ANY WARRANTY; without even the implied warranty of
20
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21
# GNU General Public License for more details.
23
# You should have received a copy of the GNU General Public License
24
# along with this program; if not, write to the Free Software
25
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27
##############################################################################
35
def login(db, login, password):
36
cr = pooler.get_db(db).cursor()
37
cr.execute('select id from res_users where login=%s and password=%s and active', (login, password))
43
raise _('Bad username or password')
45
def check_super(passwd):
46
if passwd == tools.config['admin_passwd']:
51
def check(db, uid, passwd):
52
#FIXME: this should be db dependent
53
if _uid_cache.has_key(uid) and (_uid_cache[uid]==passwd):
55
cr = pooler.get_db(db).cursor()
56
cr.execute('select count(*) from res_users where id=%d and password=%s', (int(uid), passwd))
57
res = cr.fetchone()[0]
62
_uid_cache[uid] = passwd
65
def access(db, uid, passwd, sec_level, ids):
66
cr = pooler.get_db(db).cursor()
67
cr.execute('select id from res_users where id=%s and password=%s', (uid, passwd))
71
raise _('Bad username or password')