rem
stringlengths
0
322k
add
stringlengths
0
2.05M
context
stringlengths
8
228k
FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run()
commands.append(GET + [ 'configuration', category, mode ])
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c...
FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = (
commands.append(GET + [ 'config', category ]) commands += [
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c...
GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ],
GET + [ "users" ], GET + [ "users", "--xml" ], GET + [ "users", "--long" ], GET + [ "users", "--long", "--xml" ], GET + [ "users", "--all" ], GET + [ "users", "--xml", "--all" ], GET + [ "users", "--all", "--long" ], GET + [ "users", "--xml", "--all", "--long" ],
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c...
GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ],...
GET + [ "groups" ], GET + [ "groups", "--xml" ], GET + [ "groups", "--long" ], GET + [ "groups", "--long", "--xml" ], GET + [ "groups", "--xml", "--all" ], GET + [ "groups", "--xml", "--all", "--long" ], GET + [ "groups", "--xml", "--guests" ], GET + [ "groups", "--xml", "--guests", "--long" ], GET + [ "groups", "--xml...
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c...
GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''')
GET + [ "profiles" ], GET + [ "profiles", "--xml" ], ] ScenarioTest(commands, context=context, descr="get tests").Run()
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], c...
ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHECK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group'...
ADD + [ 'group', "--name='_- -_'"], CHK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`l...
def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--nam...
for cmd in regexes_commands: FunctionnalTest(cmd).Run()
ScenarioTest(regexes_commands).Run()
def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--nam...
['group', '--name=test_users_A'], ['group', '--name=test_users_B'], ['group', '--name=groupeA'], ['group', '--name=B-Group_Test'], ['group', '--name=groupe_a_skel']
['group', 'test_users_A'], ['group', 'test_users_B'], ['group', 'groupeA'], ['group', 'B-Group_Test'], ['group', 'groupe_a_skel'], ['group', 'ACL_tests'], ['group', 'MOD_tests'], ['group', 'SYSTEM-test'], ['group', 'SKEL-tests']
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu']...
execute(DELETE + argument) os.system('rm -rf %s/* %s/*' % (configuration.home_backup_dir,
execute(DEL + argument) os.system('sudo rm -rf %s/* %s/*' % (configuration.home_backup_dir,
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu']...
execute(['cp', '-f', '/etc/' + file,
execute([ 'sudo', 'cp', '-f', '/etc/%s' % file,
def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': ...
execute(['slapcat', '-l', '/tmp/backup.1.ldif'])
execute(['sudo', 'slapcat', '-l', '/tmp/backup.1.ldif'])
def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': ...
log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file,
log_and_exec(['sudo', '/usr/bin/colordiff', '/etc/%s' % file,
def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)...
execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)])
execute(['sudo', 'rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)])
def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)...
execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'],
execute(['sudo', 'slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['sudo', '/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'],
def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)...
execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'])
execute(['sudo', 'rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'])
def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)...
test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % (
gname = 'groupeA' def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % (
def test_groups(context): """Test ADD/MOD/DEL on groups in various ways.""" test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group) ] Function...
group) ] FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context+'+already').Run() FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(inverse_test=True)
group, '/%s' % subdir if subdir else '') ] ScenarioTest([ ADD + [ 'group', '--name=%s' % gname, '-v' ], chk_acls_cmds(gname), ADD + [ 'group', gname ], ADD + [ 'group', gname, '-v' ], DEL + [ 'group', gname ], DEL + [ 'group', gname ], ], context=context, descr='''create group, verify ACL, ''' '''try to create again i...
def gen_chk_acls_cmds(group):
remove_group_cmds = [ "rm", "-rf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ]
remove_group_cmds = [ 'sudo', "rm", "-vrf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ]
def gen_chk_acls_cmds(group):
remove_group_html_cmds = [ "rm", "-rf",
remove_group_html_cmds = [ 'sudo', "rm", "-vrf",
def gen_chk_acls_cmds(group):
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ]
configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ]
def gen_chk_acls_cmds(group):
remove_group_acls_cmds = [ "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ]
remove_group_acls_cmds = [ 'sudo', "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ]
def gen_chk_acls_cmds(group):
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] bad_chown_group_cmds = ['chown', 'bin:daemon', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), '>/dev/null', '2>&1'] for pre_cmd in (rem...
configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] bad_chown_group_cmds = ['chown', 'bin:daemon', '--changes', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] for break_acl_pre_cmd, chk_acl_cmd in ( (remove_group_cmds,...
def gen_chk_acls_cmds(group):
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name],
gname = 'SYSTEM-test' ScenarioTest([ ADD + [ 'group', "--name=%s" % gname, "--system" ], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ], DEL + ["group", "--name", gname], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ] ], descr='''add --system, check, delete and recheck.''',
def gen_chk_acls_cmds(group):
FunctionnalTest(DELETE + ["group", "--name", group_name],
ScenarioTest([ ADD + [ 'group', gname, '--gid=1520' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=15200', '--system' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=199', '--system' ], GET...
def gen_chk_acls_cmds(group):
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name ], context=context).Run() group_name = "groupe_a_skel" FunctionnalTest(ADD + [ "group", "--name=%s" % group_name, '''--description="Le groupe C s'il vous plaît..."''' ], context=context).Run() FunctionnalTest(MODIFY + [ "group", '--name=%s' % group_n...
gname = 'ARCHIVES-test' ScenarioTest([ ADD + [ 'group', gname, '-v' ], [ 'sudo', 'touch', "%s/%s/%s/test.txt" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ], [ 'sudo', 'mkdir', "%s/%s/%s/testdir" % ( configuration.defaults.home_base_path, configuration.groups.names['plur...
def gen_chk_acls_cmds(group):
FunctionnalTest(DELETE + ["group", "--name", group_name, '--del-users', '--no-archive'], context=context).Run()
def gen_chk_acls_cmds(group):
FunctionnalTest(DELETE + ["group", "--name", group_name], context=context+'+already').Run()
def gen_chk_acls_cmds(group):
FunctionnalTest(ADD + ["group", "--name=%s" % group_name, "--skel=/etc/skel", "--description='Vive les skel'"], context=context).Run() FunctionnalTest(DELETE + ["group", "--name", group_name], context=context).Run()
def gen_chk_acls_cmds(group):
def test_users():
def test_users(context):
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
os.system(GETENT + " groups") os.system(GETENT + " profiles")
os.system(GET + " groups") os.system(GET + " profiles")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B")
log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_B")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " group -v --name test_users_B")
log_and_exec(CHK + " group -v --name test_users_B")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " group -v --name test_users_A")
log_and_exec(CHK + " group -v --name test_users_A")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no",
log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-no",
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes")
log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-yes")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no",
log_and_exec(CHK + " user -v --name utilisager.normal --auto-no",
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes")
log_and_exec(CHK + " user -v --name utilisager.normal --auto-yes")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(CHECK + " group -vv --name test_users_B --extended")
log_and_exec(CHK + " group -vv --name test_users_B --extended")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A")
log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A",
log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A",
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,te...
log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom") log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MOD + " profile --group utilisagers --apply-groups") log_and_exec(MOD + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A")...
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2",
log_and_exec(DEL + " user --login utilicateur.accentue") log_and_exec(DEL + " user --login utilisateur.accentuen2",
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12,
log_and_exec(DEL + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs", True, 12,
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly")
log_and_exec(DEL + " group --name=test_users_A --del-users --no-archive") log_and_exec(DEL + " user --login test.responsibilly")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv")
log_and_exec(DEL + " profile --group responsibilisateurs") log_and_exec(DEL + " group --name=test_users_B -vv")
def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --g...
def test_imports():
def test_imports(context):
def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou...
os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive")
os.system(DEL + " profile --group utilisagers --del-users --no-archive") os.system(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive")
def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou...
log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") def test_profiles():
log_and_exec(DEL + " profile --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive") def test_profiles(context):
def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " grou...
log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MODIFY + " profile --group utilisagers ...
log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MOD + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MOD + " profile --group utilisagers --apply-skel...
def test_profiles(): """Test the applying feature of profiles.""" test_message('''starting profiles related tests.''') log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group...
log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profi...
log_and_exec $MOD profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DEL profile --name=profileB --del-users --no-archive log_and_exec $DEL profile --name...
def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske...
log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist
log_and_exec $MOD profile --name=theprofile --skel=/etc/doesntexist
def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske...
test_message('testing Unix backend.') if execute(['mod', 'config', '-B', 'ldap'])[1] == 0: make_backups('unix') FunctionnalTest(GETENT + ['config'], context='unix').Run( options=[['backends']]) test_get('unix') test_groups('unix') compare_delete_backups('unix') clean_system() test_message('testing LDAP backend.') ...
save_state(1, state_type='context') for ctxnum, ctx, activate_cmd in ( (1, 'unix', ['sudo', 'mod', 'config', '-B', 'ldap']), (2, 'ldap', ['sudo', 'mod', 'config', '-b', 'ldap']) ): if execute(activate_cmd)[1] == 0: start_ctx = get_state('context') if ctxnum < start_ctx: logging.notice('Skipping context %s' % styliz...
def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --ske...
invalid_dir_regex_text = r'^((\/|\*\/)|[^%s]*\/?\.\.\/)' % separator
invalid_dir_regex_text = r'^((~.\*|\$HOME.\*|\/|\*\/)|[^%s]*\/?\.\.\/)' % separator
def find_prefered_backend(self): """ iterate through active backends and find the prefered one. We use a copy, in case there is no prefered yet: LMC.backends will change and this would crash the for_loop.
if rule_text[0] == '~' or rule_text[:5] == '$HOME':
if rule_text == '~' or rule_text == '$HOME':
def generate_name(self, file_name, rule_text, system_wide, controller): """ for a system configuration file named /etc/licorn/check.d/users.dropbox.conf, return "dropbox"
UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: UsersController.users[uid]['userPassword'] = \ UsersController.users[uid]['userPassword'][1:] logging.info('Unlocked user account %s.' ...
if UsersController.users[uid]['locked']: logging.info('account %s already locked.' % styles.stylize(styles.ST_NAME, login)) else: UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: if Us...
def LockAccount(self, login, lock = True): """(Un)Lock a user account.""" if login is None: raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LOGIN)
('gecos', decodestring),
('gecos', gecos_decode),
def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value
'''shared dir contents, ensure
def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ]
%s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % (
%s user [-s|--system] [-p|--password "<password>"] [-g|--gid=<primary_gid>] [-r|--profile=<profile>] [-K|--skel=<skel>] [-e|--gecos=<given name>] [-H|--home=<home_dir>] […]""" % (
def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g...
'--primary-gid', action="store", type="string", dest="primary_gid", default = None,
'--primary-gid', '--group', action="store", type="string", dest="primary_gid", default=None,
def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g...
'--add-to-groups',
'--add-to-groups', '--aux-groups', '--secondary-groups', '--groups',
def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<g...
gid = self.groups.name_to_gid(group)
if self.groups.is_standard_group(group): raise exceptions.BadArgumentError( '''The group %s(%s) is not a system group. It cannot be ''' '''added as primary group of a profile.''' % ( styles.stylize(styles.ST_NAME, group), styles.stylize(styles.ST_UGID, self.groups.name_to_gid(group)))) else: gid = self.groups.name_to_g...
def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """
elif e.errno == 2: pass
def initialize(self, enabled=True): """ try to start it without any tests (it should work if it's installed) and become available. If that fails, try to guess a little and help user resolving issue. else, just fail miserably.
logging.warning("Home dir %s does not exist, can't delete it !" % styles.stylize(styles.ST_PATH, homedir)) if not no_archive :
logging.warning("Problem deleting home dir %s (was: %s)" % (styles.stylize(styles.ST_PATH, homedir), e)) else :
def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID)
logging.warning("Home dir %s does not exist, can't archive it !" % styles.stylize(styles.ST_PATH, homedir))
logging.warning("Home dir %s doesn't exist, thus not archived." % styles.stylize(styles.ST_PATH, homedir))
def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID)
del(UsersController.login_cache[login]) del(UsersController.users[uid]) logging.info(logging.SYSU_DELETED_USER % styles.stylize(styles.ST_LOGIN, login)) if not batch : self.WriteConf()
def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID)
"The profile '%s' already exists." % group)
'''Please choose another one.''' % ( group, self.group_to_name(group)))
def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """
if system and self.is_system_gid(existing_gid):
if system and self.is_system_gid(existing_gid) \ or not system and self.is_standard_gid(existing_gid):
def __add_group(self, name, system, manual_gid=None, description = "", groupSkel = "", batch=False, force=False): """ Add a POSIX group, write the system data files. Return the gid of the group created."""
f = self.send_head() if f: f.close()
try: f = self.send_head() if f: f.close() except socket.error, e: logging.warning('%s: harmless exception in do_HEAD(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0]))
def do_HEAD(self): f = self.send_head() if f: f.close()
f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf)
try: f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else:
def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close()
f.close()
while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() except socket.error, e: logging.warning('%s: harmless exception in do_GET(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0]))
def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close()
for member in groups.groups[g]['members']: if member == entry[0]:
for member in groups.groups[g]['memberUid']: if member == temp_user_dict['login']:
def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value
for name in GroupsController.configuration.groups.privileges_whitelist:
for name in \ GroupsController.configuration.groups.privileges_whitelist:
def Select(self, filter_string): """ Filter group accounts on different criteria: - 'system groups': show only «system» groups (root, bin, daemon, apache...), not normal group account. - 'normal groups': keep only «normal» groups, which includes Licorn administrators The criteria values are defined in /etc/{login.defs,...
data += " <group>\n" \ + " <name>" + group['name'] + "</name>\n" \ + " <userPassword>" + group['userPassword'] + "</userPassword>\n" \ + " <gid>" + str(gid) + "</gid>\n" \ + " <description>" + group['description'] + "</description>\n" if not self.is_system_gid(gid): data += " <groupSkel>" + group['groupS...
data += ''' <group> <name>%s</name> <gid>%s</gid>%s%s <permissive>%s</permissive>\n%s%s%s</group>\n''' % ( group['name'], str(gid), '\n <userPassword>%s</userPassword>' % group['userPassword'] \ if group.has_key('userPassword') else '', '\n <description>%s</description>' % group['description'] \ if group.has_key('des...
def ExportXML(self, long): """ Export the groups list to XML. """
raise exceptions.BadArgumentError, "You must specify a name or a GID."
raise exceptions.BadArgumentError( "You must specify a name or a GID.")
def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID."
if not del_users: if prim_memb != set(): raise exceptions.BadArgumentError, "The group still has members. You must delete them first, or force their automatic deletion with an option." home = '%s/%s/%s' % (GroupsController.configuration.defaults.home_base_path, GroupsController.configuration.groups.names['plural'], n...
if prim_memb != set() and not del_users: raise exceptions.BadArgumentError('''The group still has ''' '''members. You must delete them first, or force their ''' '''automatic deletion with the --del-users option. WARNING: ''' '''this is a bad idea, use with caution.''') home = '%s/%s/%s' % ( GroupsController.configurat...
def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID."
tmpname = GroupsController.configuration.groups.resp_prefix + name
tmpname = GroupsController.configuration.groups.resp_prefix \ + name
def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group."""
tmpname = GroupsController.configuration.groups.guest_prefix + name
tmpname = GroupsController.configuration.groups.guest_prefix \ + name
def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group."""
raise exceptions.AlreadyExistsError("the new name you have choosen, %s, is already taken by another group !" % styles.stylize(styles.ST_NAME, new_name))
raise exceptions.AlreadyExistsError( '''the new name you have choosen, %s, is already taken by ''' '''another group !''' % \ styles.stylize(styles.ST_NAME, new_name))
def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group."""
raise exceptions.BadArgumentError("The skel you specified doesn't exist on this system. Valid skels are: %s." % str(GroupsController.configuration.users.skels))
raise exceptions.BadArgumentError('''The skel you specified ''' '''doesn't exist on this system. Valid skels are: %s.''' % \ str(GroupsController.configuration.users.skels))
def ChangeGroupSkel(self, name, groupSkel): """ Change the description of a group """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if groupSkel is None: raise exceptions.BadArgumentError, "You must specify a groupSkel"
raise exceptions.BadArgumentError, "You must specify a group name to add."
raise exceptions.BadArgumentError( 'You must specify a group name to add.')
def AddGrantedProfiles(self, users, profiles, name): """ Allow the users of the profiles given to access to the shared dir Warning: Don't give [] for profiles, but [""] """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name to add."
raise exceptions.BadArgumentError, "You must specify a name"
raise exceptions.BadArgumentError,("You must specify a name")
def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """
if p in profiles.profiles: if name in profiles.profiles[p]['memberGid']: print "Delete group '" + name + "' from the groups list of the profile '" + p + "'" profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles.profiles[p]['groupName']) self.RemoveUsersFromGroup(name, _use...
if name in profiles.profiles[p]['memberGid']: logging.notice("Deleting group '%s' from the profile '%s'." % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p))) profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles[p]['groupName']) self.RemoveUsersFro...
def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """
print "Profile '" + str(p) + "' doesn't exist, it's ignored"
logging.info('Group %s already absent from profile %s.' % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p)))
def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """
link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith(GroupsController.configuration.groups.guest_prefix): link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1)
link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith( GroupsController.configuration.groups.guest_prefix): link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1)
def AddUsersInGroup(self, name, users_to_add, batch = False): """ Add a user list in the group 'name'. """
logging.progress("User %s is already not a member of %s, skipped." % (styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name)))
logging.info( "User %s is already not a member of %s, skipped." % ( styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name)))
def RemoveUsersFromGroup(self, name, users_to_remove, batch=False): """ Delete a users list in the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if users_to_remove is None: raise exceptions.BadArgumentError, "You must specify a users list"
def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. the "@GE"...
def BuildGroupACL(self, gid, path=""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path \ in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ]. the "@GE" and ...
def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc.
file_acl_base = "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \
file_acl_base = \ "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \
def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc.
if os.path.exists(group_home) and os.path.isdir(os.path.realpath(group_home)):
if os.path.exists(group_home) \ and os.path.isdir(os.path.realpath(group_home)):
def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False):
logging.progress("Checking shared group dir %s..." % \
logging.progress("Checking shared group dir %s..." %
def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False):
logging.warning("Shared group dir %s is missing, please repair this first." \ % styles.stylize(styles.ST_PATH, group_home))
logging.warning( "Shared group dir %s is missing, please repair this first." % styles.stylize(styles.ST_PATH, group_home))
def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False):
"Checking %s symlinks in members homes, this can take a while..." \ % styles.stylize(styles.ST_NAME, group))
"Checking %s symlinks in members homes, this can be long…" % styles.stylize(styles.ST_NAME, group))
def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False):
link_basename = GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1)
link_basename = \ GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1)
def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ...
logging.info("Deleted symlink %s." % \
logging.info("Deleted symlink %s." %
def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ...
"Unable to delete symlink %s (was: %s)." \ % (styles.stylize(styles.ST_LINK, link), str(e)) )
"Unable to delete symlink %s (was: %s)." % ( styles.stylize(styles.ST_LINK, link), str(e)))
def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ...
if e.errno == 2 and link_src_old and link_src_old == os.readlink(link):
if e.errno == 2 and link_src_old \ and link_src_old == os.readlink(link):
def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to ...
logging.progress("Group %s is already%s permissive." % (styles.stylize(styles.ST_NAME, name), qualif) )
logging.info("Group %s is already%s permissive." % ( styles.stylize(styles.ST_NAME, name), qualif) )
def SetSharedDirPermissiveness(self, name=None, permissive=True): """ Set permissive or not permissive the shared directory of the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name."
raise exceptions.BadArgumentError, "You must specify a group name or a GID."
raise exceptions.BadArgumentError( "You must specify a group name or a GID.")
def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive."""
logging.warning('''Shared dir %s doesn't exist, please run "licorn-check group --name %s" to fix.''' % (styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once = True)
logging.warning('''Shared dir %s doesn't exist, please ''' '''run "licorn-check group --name %s" to fix.''' % ( styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once=True)
def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive."""
return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max
return gid < GroupsController.configuration.groups.gid_min \ or gid > GroupsController.configuration.groups.gid_max
def is_system_gid(gid): """ Return true if gid is system. """ return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max
logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.groups.gid_max
return gid >= GroupsController.configuration.groups.gid_min \ and gid <= GroupsController.configuration.groups.gid_max
def is_standard_gid(gid): """ Return true if gid is system. """ logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.g...