lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Sudo',
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Sudo',
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
try:
conn.savefile(pol_file, ndr_pack(pol_data))
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
inf_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\Microsoft\\Windows NT\\SecEdit'])
try:
create_directory_hier(conn, inf_dir)
conn.savefile(inf_file, get_bytes(out.getvalue()))
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
pol_dir = '\\'.join([realm.lower(), 'Policies', gpo, 'MACHINE'])
pol_file = '\\'.join([pol_dir, 'Registry.pol'])
try:
create_directory_hier(conn, pol_dir)
conn.savefile(pol_file, ndr_pack(pol_data))
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Symlink'])
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Symlink'])
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Files'])
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
conn.savefile(sysvol_source, source_data)
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Files'])
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\SshCfg\\SshD'])
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Scripts\\Startup'])
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
conn.savefile(sysvol_script, script_data)
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Scripts\\Startup'])
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\MOTD'])
if value is None:
conn.unlink(vgp_xml)
+ reg.increment_gpt_ini(machine_changed=True)
return
try:
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
'MACHINE\\VGP\\VTLA\\Unix\\Issue'])
if value is None:
conn.unlink(vgp_xml)
+ reg.increment_gpt_ini(machine_changed=True)
return
try:
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
if etype == 'allow':
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "
lp=self.lp,
creds=self.creds)
+ self.samdb_connect()
+ reg = RegistryGroupPolicies(gpo, self.lp, self.creds, self.samdb, H)
+
realm = self.lp.get('realm')
if etype == 'allow':
vgp_dir = '\\'.join([realm.lower(), 'Policies', gpo,
try:
create_directory_hier(conn, vgp_dir)
conn.savefile(vgp_xml, out.read())
+ reg.increment_gpt_ini(machine_changed=True)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_ACCESS_DENIED:
raise CommandError("The authenticated user does "