rem stringlengths 0 322k | add stringlengths 0 2.05M | context stringlengths 8 228k |
|---|---|---|
FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() | commands.append(GET + [ 'configuration', category, mode ]) | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c... |
FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( | commands.append(GET + [ 'config', category ]) commands += [ | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c... |
GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], | GET + [ "users" ], GET + [ "users", "--xml" ], GET + [ "users", "--long" ], GET + [ "users", "--long", "--xml" ], GET + [ "users", "--all" ], GET + [ "users", "--xml", "--all" ], GET + [ "users", "--all", "--long" ], GET + [ "users", "--xml", "--all", "--long" ], | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c... |
GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ],... | GET + [ "groups" ], GET + [ "groups", "--xml" ], GET + [ "groups", "--long" ], GET + [ "groups", "--long", "--xml" ], GET + [ "groups", "--xml", "--all" ], GET + [ "groups", "--xml", "--all", "--long" ], GET + [ "groups", "--xml", "--guests" ], GET + [ "groups", "--xml", "--guests", "--long" ], GET + [ "groups", "--xml... | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c... |
GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') | GET + [ "profiles" ], GET + [ "profiles", "--xml" ], ] ScenarioTest(commands, context=context, descr="get tests").Run() | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c... |
ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHECK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group'... | ADD + [ 'group', "--name='_- -_'"], CHK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`l... | def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--nam... |
for cmd in regexes_commands: FunctionnalTest(cmd).Run() | ScenarioTest(regexes_commands).Run() | def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--nam... |
['group', '--name=test_users_A'], ['group', '--name=test_users_B'], ['group', '--name=groupeA'], ['group', '--name=B-Group_Test'], ['group', '--name=groupe_a_skel'] | ['group', 'test_users_A'], ['group', 'test_users_B'], ['group', 'groupeA'], ['group', 'B-Group_Test'], ['group', 'groupe_a_skel'], ['group', 'ACL_tests'], ['group', 'MOD_tests'], ['group', 'SYSTEM-test'], ['group', 'SKEL-tests'] | def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu']... |
execute(DELETE + argument) os.system('rm -rf %s/* %s/*' % (configuration.home_backup_dir, | execute(DEL + argument) os.system('sudo rm -rf %s/* %s/*' % (configuration.home_backup_dir, | def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu']... |
execute(['cp', '-f', '/etc/' + file, | execute([ 'sudo', 'cp', '-f', '/etc/%s' % file, | def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': ... |
execute(['slapcat', '-l', '/tmp/backup.1.ldif']) | execute(['sudo', 'slapcat', '-l', '/tmp/backup.1.ldif']) | def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': ... |
log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, | log_and_exec(['sudo', '/usr/bin/colordiff', '/etc/%s' % file, | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)... |
execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) | execute(['sudo', 'rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)... |
execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], | execute(['sudo', 'slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['sudo', '/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)... |
execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) | execute(['sudo', 'rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)... |
test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % ( | gname = 'groupeA' def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( | def test_groups(context): """Test ADD/MOD/DEL on groups in various ways.""" test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group) ] Function... |
group) ] FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context+'+already').Run() FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(inverse_test=True) | group, '/%s' % subdir if subdir else '') ] ScenarioTest([ ADD + [ 'group', '--name=%s' % gname, '-v' ], chk_acls_cmds(gname), ADD + [ 'group', gname ], ADD + [ 'group', gname, '-v' ], DEL + [ 'group', gname ], DEL + [ 'group', gname ], ], context=context, descr='''create group, verify ACL, ''' '''try to create again i... | def gen_chk_acls_cmds(group): |
remove_group_cmds = [ "rm", "-rf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | remove_group_cmds = [ 'sudo', "rm", "-vrf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
remove_group_html_cmds = [ "rm", "-rf", | remove_group_html_cmds = [ 'sudo', "rm", "-vrf", | def gen_chk_acls_cmds(group): |
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
remove_group_acls_cmds = [ "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | remove_group_acls_cmds = [ 'sudo', "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] bad_chown_group_cmds = ['chown', 'bin:daemon', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), '>/dev/null', '2>&1'] for pre_cmd in (rem... | configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] bad_chown_group_cmds = ['chown', 'bin:daemon', '--changes', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] for break_acl_pre_cmd, chk_acl_cmd in ( (remove_group_cmds,... | def gen_chk_acls_cmds(group): |
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name], | gname = 'SYSTEM-test' ScenarioTest([ ADD + [ 'group', "--name=%s" % gname, "--system" ], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ], DEL + ["group", "--name", gname], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ] ], descr='''add --system, check, delete and recheck.''', | def gen_chk_acls_cmds(group): |
FunctionnalTest(DELETE + ["group", "--name", group_name], | ScenarioTest([ ADD + [ 'group', gname, '--gid=1520' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=15200', '--system' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=199', '--system' ], GET... | def gen_chk_acls_cmds(group): |
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name ], context=context).Run() group_name = "groupe_a_skel" FunctionnalTest(ADD + [ "group", "--name=%s" % group_name, '''--description="Le groupe C s'il vous plaît..."''' ], context=context).Run() FunctionnalTest(MODIFY + [ "group", '--name=%s' % group_n... | gname = 'ARCHIVES-test' ScenarioTest([ ADD + [ 'group', gname, '-v' ], [ 'sudo', 'touch', "%s/%s/%s/test.txt" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ], [ 'sudo', 'mkdir', "%s/%s/%s/testdir" % ( configuration.defaults.home_base_path, configuration.groups.names['plur... | def gen_chk_acls_cmds(group): |
FunctionnalTest(DELETE + ["group", "--name", group_name, '--del-users', '--no-archive'], context=context).Run() | def gen_chk_acls_cmds(group): | |
FunctionnalTest(DELETE + ["group", "--name", group_name], context=context+'+already').Run() | def gen_chk_acls_cmds(group): | |
FunctionnalTest(ADD + ["group", "--name=%s" % group_name, "--skel=/etc/skel", "--description='Vive les skel'"], context=context).Run() FunctionnalTest(DELETE + ["group", "--name", group_name], context=context).Run() | def gen_chk_acls_cmds(group): | |
def test_users(): | def test_users(context): | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
os.system(GETENT + " groups") os.system(GETENT + " profiles") | os.system(GET + " groups") os.system(GET + " profiles") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") | log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_B") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " group -v --name test_users_B") | log_and_exec(CHK + " group -v --name test_users_B") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " group -v --name test_users_A") | log_and_exec(CHK + " group -v --name test_users_A") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", | log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-no", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") | log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-yes") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", | log_and_exec(CHK + " user -v --name utilisager.normal --auto-no", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") | log_and_exec(CHK + " user -v --name utilisager.normal --auto-yes") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(CHECK + " group -vv --name test_users_B --extended") | log_and_exec(CHK + " group -vv --name test_users_B --extended") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") | log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", | log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,te... | log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom") log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MOD + " profile --group utilisagers --apply-groups") log_and_exec(MOD + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A")... | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", | log_and_exec(DEL + " user --login utilicateur.accentue") log_and_exec(DEL + " user --login utilisateur.accentuen2", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, | log_and_exec(DEL + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs", True, 12, | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") | log_and_exec(DEL + " group --name=test_users_A --del-users --no-archive") log_and_exec(DEL + " user --login test.responsibilly") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") | log_and_exec(DEL + " profile --group responsibilisateurs") log_and_exec(DEL + " group --name=test_users_B -vv") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g... |
def test_imports(): | def test_imports(context): | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou... |
os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") | os.system(DEL + " profile --group utilisagers --del-users --no-archive") os.system(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive") | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou... |
log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") def test_profiles(): | log_and_exec(DEL + " profile --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive") def test_profiles(context): | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou... |
log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MODIFY + " profile --group utilisagers ... | log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MOD + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MOD + " profile --group utilisagers --apply-skel... | def test_profiles(): """Test the applying feature of profiles.""" test_message('''starting profiles related tests.''') log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group... |
log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profi... | log_and_exec $MOD profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DEL profile --name=profileB --del-users --no-archive log_and_exec $DEL profile --name... | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske... |
log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist | log_and_exec $MOD profile --name=theprofile --skel=/etc/doesntexist | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske... |
test_message('testing Unix backend.') if execute(['mod', 'config', '-B', 'ldap'])[1] == 0: make_backups('unix') FunctionnalTest(GETENT + ['config'], context='unix').Run( options=[['backends']]) test_get('unix') test_groups('unix') compare_delete_backups('unix') clean_system() test_message('testing LDAP backend.') ... | save_state(1, state_type='context') for ctxnum, ctx, activate_cmd in ( (1, 'unix', ['sudo', 'mod', 'config', '-B', 'ldap']), (2, 'ldap', ['sudo', 'mod', 'config', '-b', 'ldap']) ): if execute(activate_cmd)[1] == 0: start_ctx = get_state('context') if ctxnum < start_ctx: logging.notice('Skipping context %s' % styliz... | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske... |
invalid_dir_regex_text = r'^((\/|\*\/)|[^%s]*\/?\.\.\/)' % separator | invalid_dir_regex_text = r'^((~.\*|\$HOME.\*|\/|\*\/)|[^%s]*\/?\.\.\/)' % separator | def find_prefered_backend(self): """ iterate through active backends and find the prefered one. We use a copy, in case there is no prefered yet: LMC.backends will change and this would crash the for_loop. |
if rule_text[0] == '~' or rule_text[:5] == '$HOME': | if rule_text == '~' or rule_text == '$HOME': | def generate_name(self, file_name, rule_text, system_wide, controller): """ for a system configuration file named /etc/licorn/check.d/users.dropbox.conf, return "dropbox" |
UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: UsersController.users[uid]['userPassword'] = \ UsersController.users[uid]['userPassword'][1:] logging.info('Unlocked user account %s.' ... | if UsersController.users[uid]['locked']: logging.info('account %s already locked.' % styles.stylize(styles.ST_NAME, login)) else: UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: if Us... | def LockAccount(self, login, lock = True): """(Un)Lock a user account.""" if login is None: raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LOGIN) |
('gecos', decodestring), | ('gecos', gecos_decode), | def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value |
'''shared dir contents, ensure | def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ] | |
%s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % ( | %s user [-s|--system] [-p|--password "<password>"] [-g|--gid=<primary_gid>] [-r|--profile=<profile>] [-K|--skel=<skel>] [-e|--gecos=<given name>] [-H|--home=<home_dir>] […]""" % ( | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g... |
'--primary-gid', action="store", type="string", dest="primary_gid", default = None, | '--primary-gid', '--group', action="store", type="string", dest="primary_gid", default=None, | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g... |
'--add-to-groups', | '--add-to-groups', '--aux-groups', '--secondary-groups', '--groups', | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g... |
gid = self.groups.name_to_gid(group) | if self.groups.is_standard_group(group): raise exceptions.BadArgumentError( '''The group %s(%s) is not a system group. It cannot be ''' '''added as primary group of a profile.''' % ( styles.stylize(styles.ST_NAME, group), styles.stylize(styles.ST_UGID, self.groups.name_to_gid(group)))) else: gid = self.groups.name_to_g... | def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """ |
elif e.errno == 2: pass | def initialize(self, enabled=True): """ try to start it without any tests (it should work if it's installed) and become available. If that fails, try to guess a little and help user resolving issue. else, just fail miserably. | |
logging.warning("Home dir %s does not exist, can't delete it !" % styles.stylize(styles.ST_PATH, homedir)) if not no_archive : | logging.warning("Problem deleting home dir %s (was: %s)" % (styles.stylize(styles.ST_PATH, homedir), e)) else : | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) |
logging.warning("Home dir %s does not exist, can't archive it !" % styles.stylize(styles.ST_PATH, homedir)) | logging.warning("Home dir %s doesn't exist, thus not archived." % styles.stylize(styles.ST_PATH, homedir)) | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) |
del(UsersController.login_cache[login]) del(UsersController.users[uid]) logging.info(logging.SYSU_DELETED_USER % styles.stylize(styles.ST_LOGIN, login)) if not batch : self.WriteConf() | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) | |
"The profile '%s' already exists." % group) | '''Please choose another one.''' % ( group, self.group_to_name(group))) | def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """ |
if system and self.is_system_gid(existing_gid): | if system and self.is_system_gid(existing_gid) \ or not system and self.is_standard_gid(existing_gid): | def __add_group(self, name, system, manual_gid=None, description = "", groupSkel = "", batch=False, force=False): """ Add a POSIX group, write the system data files. Return the gid of the group created.""" |
f = self.send_head() if f: f.close() | try: f = self.send_head() if f: f.close() except socket.error, e: logging.warning('%s: harmless exception in do_HEAD(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0])) | def do_HEAD(self): f = self.send_head() if f: f.close() |
f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) | try: f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: | def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() |
f.close() | while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() except socket.error, e: logging.warning('%s: harmless exception in do_GET(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0])) | def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() |
for member in groups.groups[g]['members']: if member == entry[0]: | for member in groups.groups[g]['memberUid']: if member == temp_user_dict['login']: | def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value |
for name in GroupsController.configuration.groups.privileges_whitelist: | for name in \ GroupsController.configuration.groups.privileges_whitelist: | def Select(self, filter_string): """ Filter group accounts on different criteria: - 'system groups': show only «system» groups (root, bin, daemon, apache...), not normal group account. - 'normal groups': keep only «normal» groups, which includes Licorn administrators The criteria values are defined in /etc/{login.defs,... |
data += " <group>\n" \ + " <name>" + group['name'] + "</name>\n" \ + " <userPassword>" + group['userPassword'] + "</userPassword>\n" \ + " <gid>" + str(gid) + "</gid>\n" \ + " <description>" + group['description'] + "</description>\n" if not self.is_system_gid(gid): data += " <groupSkel>" + group['groupS... | data += ''' <group> <name>%s</name> <gid>%s</gid>%s%s <permissive>%s</permissive>\n%s%s%s</group>\n''' % ( group['name'], str(gid), '\n <userPassword>%s</userPassword>' % group['userPassword'] \ if group.has_key('userPassword') else '', '\n <description>%s</description>' % group['description'] \ if group.has_key('des... | def ExportXML(self, long): """ Export the groups list to XML. """ |
raise exceptions.BadArgumentError, "You must specify a name or a GID." | raise exceptions.BadArgumentError( "You must specify a name or a GID.") | def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID." |
if not del_users: if prim_memb != set(): raise exceptions.BadArgumentError, "The group still has members. You must delete them first, or force their automatic deletion with an option." home = '%s/%s/%s' % (GroupsController.configuration.defaults.home_base_path, GroupsController.configuration.groups.names['plural'], n... | if prim_memb != set() and not del_users: raise exceptions.BadArgumentError('''The group still has ''' '''members. You must delete them first, or force their ''' '''automatic deletion with the --del-users option. WARNING: ''' '''this is a bad idea, use with caution.''') home = '%s/%s/%s' % ( GroupsController.configurat... | def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID." |
tmpname = GroupsController.configuration.groups.resp_prefix + name | tmpname = GroupsController.configuration.groups.resp_prefix \ + name | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
tmpname = GroupsController.configuration.groups.guest_prefix + name | tmpname = GroupsController.configuration.groups.guest_prefix \ + name | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
raise exceptions.AlreadyExistsError("the new name you have choosen, %s, is already taken by another group !" % styles.stylize(styles.ST_NAME, new_name)) | raise exceptions.AlreadyExistsError( '''the new name you have choosen, %s, is already taken by ''' '''another group !''' % \ styles.stylize(styles.ST_NAME, new_name)) | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
raise exceptions.BadArgumentError("The skel you specified doesn't exist on this system. Valid skels are: %s." % str(GroupsController.configuration.users.skels)) | raise exceptions.BadArgumentError('''The skel you specified ''' '''doesn't exist on this system. Valid skels are: %s.''' % \ str(GroupsController.configuration.users.skels)) | def ChangeGroupSkel(self, name, groupSkel): """ Change the description of a group """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if groupSkel is None: raise exceptions.BadArgumentError, "You must specify a groupSkel" |
raise exceptions.BadArgumentError, "You must specify a group name to add." | raise exceptions.BadArgumentError( 'You must specify a group name to add.') | def AddGrantedProfiles(self, users, profiles, name): """ Allow the users of the profiles given to access to the shared dir Warning: Don't give [] for profiles, but [""] """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name to add." |
raise exceptions.BadArgumentError, "You must specify a name" | raise exceptions.BadArgumentError,("You must specify a name") | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
if p in profiles.profiles: if name in profiles.profiles[p]['memberGid']: print "Delete group '" + name + "' from the groups list of the profile '" + p + "'" profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles.profiles[p]['groupName']) self.RemoveUsersFromGroup(name, _use... | if name in profiles.profiles[p]['memberGid']: logging.notice("Deleting group '%s' from the profile '%s'." % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p))) profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles[p]['groupName']) self.RemoveUsersFro... | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
print "Profile '" + str(p) + "' doesn't exist, it's ignored" | logging.info('Group %s already absent from profile %s.' % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p))) | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith(GroupsController.configuration.groups.guest_prefix): link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1) | link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith( GroupsController.configuration.groups.guest_prefix): link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1) | def AddUsersInGroup(self, name, users_to_add, batch = False): """ Add a user list in the group 'name'. """ |
logging.progress("User %s is already not a member of %s, skipped." % (styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name))) | logging.info( "User %s is already not a member of %s, skipped." % ( styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name))) | def RemoveUsersFromGroup(self, name, users_to_remove, batch=False): """ Delete a users list in the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if users_to_remove is None: raise exceptions.BadArgumentError, "You must specify a users list" |
def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. the "@GE"... | def BuildGroupACL(self, gid, path=""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path \ in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ]. the "@GE" and ... | def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. |
file_acl_base = "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \ | file_acl_base = \ "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \ | def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. |
if os.path.exists(group_home) and os.path.isdir(os.path.realpath(group_home)): | if os.path.exists(group_home) \ and os.path.isdir(os.path.realpath(group_home)): | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
logging.progress("Checking shared group dir %s..." % \ | logging.progress("Checking shared group dir %s..." % | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
logging.warning("Shared group dir %s is missing, please repair this first." \ % styles.stylize(styles.ST_PATH, group_home)) | logging.warning( "Shared group dir %s is missing, please repair this first." % styles.stylize(styles.ST_PATH, group_home)) | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
"Checking %s symlinks in members homes, this can take a while..." \ % styles.stylize(styles.ST_NAME, group)) | "Checking %s symlinks in members homes, this can be long…" % styles.stylize(styles.ST_NAME, group)) | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
link_basename = GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1) | link_basename = \ GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1) | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ... |
logging.info("Deleted symlink %s." % \ | logging.info("Deleted symlink %s." % | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ... |
"Unable to delete symlink %s (was: %s)." \ % (styles.stylize(styles.ST_LINK, link), str(e)) ) | "Unable to delete symlink %s (was: %s)." % ( styles.stylize(styles.ST_LINK, link), str(e))) | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ... |
if e.errno == 2 and link_src_old and link_src_old == os.readlink(link): | if e.errno == 2 and link_src_old \ and link_src_old == os.readlink(link): | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ... |
logging.progress("Group %s is already%s permissive." % (styles.stylize(styles.ST_NAME, name), qualif) ) | logging.info("Group %s is already%s permissive." % ( styles.stylize(styles.ST_NAME, name), qualif) ) | def SetSharedDirPermissiveness(self, name=None, permissive=True): """ Set permissive or not permissive the shared directory of the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name." |
raise exceptions.BadArgumentError, "You must specify a group name or a GID." | raise exceptions.BadArgumentError( "You must specify a group name or a GID.") | def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive.""" |
logging.warning('''Shared dir %s doesn't exist, please run "licorn-check group --name %s" to fix.''' % (styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once = True) | logging.warning('''Shared dir %s doesn't exist, please ''' '''run "licorn-check group --name %s" to fix.''' % ( styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once=True) | def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive.""" |
return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max | return gid < GroupsController.configuration.groups.gid_min \ or gid > GroupsController.configuration.groups.gid_max | def is_system_gid(gid): """ Return true if gid is system. """ return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max |
logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.groups.gid_max | return gid >= GroupsController.configuration.groups.gid_min \ and gid <= GroupsController.configuration.groups.gid_max | def is_standard_gid(gid): """ Return true if gid is system. """ logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.g... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.