"@IDXONE": [b"1"],
"@IDXGUID": [b"objectUUID"],
"@IDX_DN_GUID": [b"GUID"],
- })
+ })
except ldb.LdbError as e:
code = e.args[0]
string = e.args[1]
res = self.samdb.search(base="<GUID=%s>" % guidstr, scope=ldb.SCOPE_BASE,
attrs=attrs, controls=["extended_dn:1:1", "show_recycled:1",
"reveal_internals:0"
- ])
+ ])
except ldb.LdbError as e3:
(enum, estr) = e3.args
if enum != ldb.ERR_NO_SUCH_OBJECT:
self.mins_to_hours),
'kdc:renewal_lifetime': (self.set_kdc_tdb,
self.days_to_hours),
- }
+ }
def __str__(self):
return 'Kerberos Policy'
"minPwdLength" : (self.ch_minPwdLength, self.explicit),
"pwdProperties" : (self.ch_pwdProperties, self.explicit),
- }
+ }
def __str__(self):
return 'System Access'
inf_to_ldb),
"PasswordComplexity": ("pwdProperties",
inf_to_ldb),
- },
+ },
"Kerberos Policy": {"MaxTicketAge": (
"kdc:user_ticket_lifetime",
inf_to_kdc_tdb
"kdc:renewal_lifetime",
inf_to_kdc_tdb
),
- }
- }
+ }
+ }
elision_str,
';\n'.join(above_lines),
' -> '.join(order_lines),
- ))
+ ))
return s
colour.xterm_256_colour(220),
colour.xterm_256_colour(214),
colour.xterm_256_colour(208),
- ),
+ ),
'header': colour.UNDERLINE,
'reset': colour.C_NORMAL,
},
colour.xterm_256_colour(220, bg=True),
colour.xterm_256_colour(214, bg=True),
colour.xterm_256_colour(208, bg=True),
- ),
+ ),
'header': colour.UNDERLINE,
'reset': colour.C_NORMAL,
},
horizontal * j,
v,
c_reset
- ))
+ ))
verticals += c + vertical
connections = find_transitive_distance(vertices, edges)
horizontal * j,
v,
c_reset
- ))
+ ))
verticals += '%s%s' % (c, vertical)
end_cell = '%s%s' % (' ' * use_padding, c_reset)
use_ntvfs=ctx.use_ntvfs, dns_backend=ctx.dns_backend,
plaintext_secrets=ctx.plaintext_secrets,
backend_store=ctx.backend_store
- )
+ )
print("Provision OK for domain DN %s" % presult.domaindn)
ctx.local_samdb = presult.samdb
ctx.lp = presult.lp
(naming_dn, "naming", "DomainNamingMasterRole"),
(domaindns_dn, "domaindns", "DomainDnsZonesMasterRole"),
(forestdns_dn, "forestdns", "ForestDnsZonesMasterRole"),
- ]
+ ]
for master in masters:
(dn, short_name, long_name) = master
# XXX can't be critical for ldif test
#controls=["search_options:1:2"],
controls=["search_options:0:2"],
- )
+ )
for msg in res:
msgdn = str(msg.dn)
"a diff follows\n"
% ('when stripped ' if strip else '',
len(a), len(b),
- ))
+ ))
from difflib import unified_diff
diff = unified_diff(a.splitlines(True),
("50.62.1.2/32", self.sitename), # single IP
("aaaa:bbbb:cccc:dddd:eeee:ffff:2222:1100/120",
self.sitename2),
- )
+ )
for cidr, sitename in cidrs:
result, out, err = self.runsubcmd("sites", "subnet", "create",
("7.0.0.0.0/0", self.sitename), # insufficient zeros
("aaaa:bbbb:cccc:dddd:eeee:ffff:2222:1100/119",
self.sitename), # insufficient zeros
- )
+ )
for cidr, sitename in cidrs:
result, out, err = self.runsubcmd("sites", "subnet", "create",
def _test_indexed_search(self):
expressions = ['(objectclass=group)',
'(samaccountname=Administrator)'
- ]
+ ]
for expression in expressions:
t = time.time()
for i in range(4000):
def _test_indexed_search(self):
expressions = ['(objectclass=group)',
'(samaccountname=Administrator)'
- ]
+ ]
for expression in expressions:
t = time.time()
for i in range(100):
def _test_indexed_search(self):
expressions = ['(objectclass=group)',
'(samaccountname=Administrator)'
- ]
+ ]
for expression in expressions:
t = time.time()
for i in range(10000):
"objectClass": "computer",
"cn": "ldaptestcomputer3",
"sAMAccountType": str(ATYPE_NORMAL_ACCOUNT)
- })
+ })
self.fail()
except LdbError as e95:
(num, _) = e95.args
show_recycled=1,
show_deactivated_link=0,
reveal_internals=0
- )
+ )
def test_la_links_delete_link_reveal(self):
if opts.no_reveal_internals:
int(round((n_users - 1) *
(offset - 1) /
(denominator - 1.0)))
- )
+ )
self.assertCorrectResults(results, full_results,
real_offset, before,
'name',
'whenChanged',
'usnChanged'
- ]
+ ]
# add some deleted users first, just in case there are none
self.add_deleted_users(6)
"vlv:1:%d:%d:%d:0" %
(before, after,
offset)
- ]
- )
+ ]
+ )
results = [x[attr][0] for x in res]
self.assertCorrectResults(results, expected_order,
offset, before, after)
'sAMAccountName',
'objectSid',
'whenChanged',
- ]
+ ]
# add some deleted users first, just in case there are none
self.add_deleted_users(4)
'name',
'whenChanged',
'usnChanged'
- ]
+ ]
self.add_deleted_users(6)
random.seed(23)
for attr in attrs:
environ={'TEST_SERVER': '$SERVER', 'TEST_USERNAME': '$USERNAME',
'TEST_PASSWORD': '$PASSWORD',
'TEST_ENV': env
- },
+ },
extra_path=[os.path.join(srcdir(), "samba/python"), ]
)
planpythontestsuite(env, "samba.tests.samba_tool.visualize_drs")