rem
stringlengths
0
322k
add
stringlengths
0
2.05M
context
stringlengths
8
228k
ScenarioTest(commands, context=context, descr="get tests").Run()
ScenarioTest(commands, context=context, descr='''CLI get tests''').Run()
def test_get(context): """Test GET a lot.""" commands = [] for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: commands.append(GET + [ 'configuration', category, mode ]) for category in [ 'skels', 'shells', 'backends' ]: commands.append(GET + [ 'config', category ]) commands += [ # users GET + [ "users" ], GET + [ "users", "--xml" ], GET + [ "users", "--long" ], GET + [ "users", "--long", "--xml" ], GET + [ "users", "--all" ], GET + [ "users", "--xml", "--all" ], GET + [ "users", "--all", "--long" ], GET + [ "users", "--xml", "--all", "--long" ], # groups GET + [ "groups" ], GET + [ "groups", "--xml" ], GET + [ "groups", "--long" ], GET + [ "groups", "--long", "--xml" ], GET + [ "groups", "--xml", "--all" ], GET + [ "groups", "--xml", "--all", "--long" ], GET + [ "groups", "--xml", "--guests" ], GET + [ "groups", "--xml", "--guests", "--long" ], GET + [ "groups", "--xml", "--responsibles" ], GET + [ "groups", "--xml", "--responsibles", "--long" ], GET + [ "groups", "--xml", "--privileged" ], GET + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GET + [ "profiles" ], GET + [ "profiles", "--xml" ], ] ScenarioTest(commands, context=context, descr="get tests").Run()
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') for argument in ( ['user', '''toto,tutu,tata,titi,test,utilisager.normal,''' \ '''test.responsibilly,utilicateur.accentue,user_test,''' \ '''grp-acl-user,utest_267,user_test2,user_test3,user_testsys,''' \ '''user_testsys2,user_testsys3,user_test_DEBIAN,usertestdebian''', '--no-archive', '-v' ], ['profile', '''--group=utilisagers,responsibilisateurs,''' '''profil_test''', '--del-users', '--no-archive', '-v' ], ['group', '''test_users_A,test_users_B,groupeA,B-Group_Test,''' \ '''groupe_a_skel,ACL_tests,MOD_tests,SYSTEM-test,SKEL-tests,''' \ '''ARCHIVES-test,group_test,group_testsys,group_test2,''' \ '''group_test3,GRP-ACL-test,gtest_267,group_test4,ce1,ce2,cm2,cp''', '--no-archive', '-v' ], ['privilege', '--name=group_test', '-v' ] ): execute(DEL + argument) for directory in ( configuration.home_backup_dir, configuration.home_archive_dir ): clean_dir_contents(directory) execute(ADD + ['group', '--system', 'acl,admins,remotessh,licorn-wmi']) test_message('''system cleaned from previous testsuite runs.''') def clean_dir_contents(directory): """ Totally empty the contents of a given directory, the licorn way. """ if verbose: test_message('Cleaning directory %s.' % directory) def delete_entry(entry): if verbose: logging.notice('Deleting %s.' % entry) if os.path.isdir(entry): shutil.rmtree(entry) else: os.unlink(entry) for entry in fsapi.minifind(directory, mindepth=1, maxdepth=2, type=stat.S_IFDIR|stat.S_IFREG): delete_entry(entry) if verbose: test_message('Cleaned directory %s.' % directory) def make_backups(mode): """Make backup of important system files before messing them up ;-) """ execute([ 'chk', 'config', '-avvb']) if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): execute([ 'cp', '-f', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute([ 'slapcat', '-l', '/tmp/backup.1.ldif' ]) else: logging.error('backup mode not understood.') test_message('''made backups of system config files.''') def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec([ '/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)], False, comment="should not display any diff (system has been cleaned).", verb = True) execute([ 'rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute([ 'slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec([ '/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], False, comment="should not display any diff (system has been cleaned).", verb = True) execute([ 'rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) else: logging.error('backup mode not understood.') test_message('''system config files backup comparison finished successfully.''')
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', '''toto,tutu,tata,titi,test,utilisager.normal,''' \ '''test.responsibilly,utilicateur.accentue,user_test,''' \ '''grp-acl-user,utest_267,user_test2,user_test3,user_testsys,''' \ '''user_testsys2,user_testsys3,user_test_DEBIAN,usertestdebian''', '--no-archive', '-v' ], ['profile', '''--group=utilisagers,responsibilisateurs,''' '''profil_test''', '--del-users', '--no-archive', '-v' ], ['group', '''test_users_A,test_users_B,groupeA,B-Group_Test,''' \ '''groupe_a_skel,ACL_tests,MOD_tests,SYSTEM-test,SKEL-tests,''' \ '''ARCHIVES-test,group_test,group_testsys,group_test2,''' \ '''group_test3,GRP-ACL-test,gtest_267,group_test4,ce1,ce2,cm2,cp''', '--no-archive', '-v' ], ['privilege', '--name=group_test', '-v' ] ): execute(DEL + argument) for directory in ( configuration.home_backup_dir, configuration.home_archive_dir ): clean_dir_contents(directory) execute(ADD + ['group', '--system', 'acl,admins,remotessh,licorn-wmi']) test_message('''system cleaned from previous testsuite runs.''')
descr='ADD group with specified skel and descr',
descr='''ADD group with specified skel and descr''',
def chk_acls_cmds(group, subdir=None): return [ 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names.plural, group, '/%s' % subdir if subdir else '') ]
descr='tests of groups commands with --gid option (fix
descr='''tests of groups commands with --gid option (fix
def chk_acls_cmds(group, subdir=None): return [ 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names.plural, group, '/%s' % subdir if subdir else '') ]
descr='''check if a user can be modified with an incorrect shell and with a correct shell'''
descr='''check if a user can be modified with an incorrect shell and ''' '''with a correct shell'''
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='test add user with --firstname and --lastname options (fix
descr='''test add user with --firstname and --lastname options ''' '''(fix
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='modify one or more parameters of a user (avoid
descr='''modify one or more parameters of a user (avoid
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='check option --home of user command (fix
descr='''check option --home of user command (fix
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='''check messages of --lock and --unlock on mod user command and answer of get user --long (avoid
descr='''check messages of --lock and --unlock on mod user command ''' '''and answer of get user --long (avoid
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='''Add a profil and check if it has been affected to a new user (avoid
descr='''Add a profil and check if it has been affected to a new ''' '''user (avoid
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='check add user with --firstname and --lastname (avoid
descr='''check add user with --firstname and --lastname (avoid '''
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='''(avoid
descr='''avoid
def chk_acls_cmds(dir): return [ 'getfacl', '-R', dir ]
descr='check if a error occurs when a non-existing group is added to a profile'
descr='''check if a error occurs when a non-existing group is added ''' '''to a profile'''
def chk_acls_cmd(user): return [ 'getfacl', '-R', '%s/%s' % ( configuration.users.base_path, user) ]
descr='test short users/groups commands'
descr='''test short users/groups commands'''
def test_short_syntax(): uname = 'user_test' gname = 'group_test' pname = 'profil_test' ScenarioTest([ ADD + [ 'user', uname, '-v' ], GET + [ 'user', uname ], ADD + [ 'group', gname, '-v' ], GET + [ 'group', gname ], ADD + [ 'user', uname, gname, '-v' ], GET + [ 'user', uname, '-l' ], ADD + [ 'group', '%s2' % gname, '-v' ], GET + [ 'group', '%s2' % gname ], ADD + [ 'group', '%s3,%s4' % (gname, gname), '-v' ], # should fail (already present) GET + [ 'group', '%s3,%s4' % (gname, gname) ], # should add user2 & user3 ADD + [ 'user', '%s2,%s3' % (uname, uname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname) ], # add 2 users in 3 groups each ADD + [ 'user', '%s2,%s3' % (uname, uname), '%s2,%s3,%s4' % (gname,gname,gname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname), '-l' ], # should add ONLY ONE user in a group and bypass empty one ADD + [ 'user', ',%s' % uname, ',%s2' % gname, '-v' ], # idem ADD + [ 'user', '%s,' % uname, '%s3,' % gname, '-v' ], GET + [ 'user', uname, '-l' ], # should delete only one user and bypass empty one DEL + [ 'user', ',%s' % uname, '-v'], # should fail (already deleted) DEL + [ 'user', '%s,' % uname, '-v'], # IDEM DEL + [ 'user', uname, '-v'], # delete 2 users at same time DEL + [ 'user', '%s2,%s3' % (uname, uname), '-v'], # delete groups, one, then two, then one (bypassing empty) DEL + [ 'group', gname, '-v'], DEL + [ 'group', '%s2,%s3' % (gname, gname), '-v'], DEL + [ 'group', ',%s4' % gname, '-v'], DEL + [ 'group', '%s4,' % gname, '-v'], DEL + [ 'group', '%s4' % gname, '-v'], ], descr='test short users/groups commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], #should fail (the group is not a system group) ADD + [ 'privilege', gname, '-v' ], GET + [ 'privileges' ], ADD + [ 'group', '%ssys' % gname, '--system', '-v' ], ADD + [ 'privilege', '%ssys' % gname, '-v' ], GET + [ 'privileges' ], DEL + [ 'privilege', '%ssys' % gname ], GET + [ 'privileges' ], DEL + [ 'group', gname ], DEL + [ 'group', '%ssys' % gname ], ], descr='test short privileges commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '--system', '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], ADD + [ 'group', '%s3' % gname, '-v' ], # should fail (not a system group) ADD + [ 'profile', pname, '--group=%s2' % gname, '--force-existing' ], GET + [ 'profiles' ], # should be OK ADD + [ 'profile', pname, '--group=%s' % gname, '--force-existing' ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--add-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--del-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], DEL + [ 'profile', pname ], DEL + [ 'group', '%s2' % gname, '-v' ], DEL + [ 'group', '%s3' % gname, '-v' ], GET + [ 'profiles' ], ], descr='test short profiles commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], CHK + [ 'group', gname, '--auto-no', '-vv' ], CHK + [ 'group', gname, '--auto-yes', '-vv' ], CHK + [ 'group', gname, '-vb' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-no', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-yes', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '-vb' ], DEL + [ 'group', '%s,%s2' % (gname,gname), '-v' ], CHK + [ 'config','--auto-no', '-vvae' ], CHK + [ 'config','--auto-yes', '-vvae' ], CHK + [ 'config','--batch', '-vvae' ], ADD + [ 'user', uname, '-v' ], CHK + [ 'user', uname, '--auto-no', '-v' ], CHK + [ 'user', uname, '--auto-yes', '-v' ], CHK + [ 'user', uname, '-vb' ], DEL + [ 'user', uname, '-v' ], ], descr='test short chk commands' ).Run() """ # extended check on user not implemented yet CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-no', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-yes', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--batch', '-vve' ], DEL + [ 'user', '%s,%s2' % (uname,uname), '-v' ], # check on profile not implemented yet ADD + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], CHK + [ 'profile', pname, '--auto-no', '-vve' ], CHK + [ 'profile', pname, '--auto-yes', '-vve' ], CHK + [ 'profile', pname, '--batch', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-no', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-yes', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--batch', '-vve' ], DEL + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], """
descr='test short privileges commands'
descr='''test short privileges commands'''
def test_short_syntax(): uname = 'user_test' gname = 'group_test' pname = 'profil_test' ScenarioTest([ ADD + [ 'user', uname, '-v' ], GET + [ 'user', uname ], ADD + [ 'group', gname, '-v' ], GET + [ 'group', gname ], ADD + [ 'user', uname, gname, '-v' ], GET + [ 'user', uname, '-l' ], ADD + [ 'group', '%s2' % gname, '-v' ], GET + [ 'group', '%s2' % gname ], ADD + [ 'group', '%s3,%s4' % (gname, gname), '-v' ], # should fail (already present) GET + [ 'group', '%s3,%s4' % (gname, gname) ], # should add user2 & user3 ADD + [ 'user', '%s2,%s3' % (uname, uname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname) ], # add 2 users in 3 groups each ADD + [ 'user', '%s2,%s3' % (uname, uname), '%s2,%s3,%s4' % (gname,gname,gname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname), '-l' ], # should add ONLY ONE user in a group and bypass empty one ADD + [ 'user', ',%s' % uname, ',%s2' % gname, '-v' ], # idem ADD + [ 'user', '%s,' % uname, '%s3,' % gname, '-v' ], GET + [ 'user', uname, '-l' ], # should delete only one user and bypass empty one DEL + [ 'user', ',%s' % uname, '-v'], # should fail (already deleted) DEL + [ 'user', '%s,' % uname, '-v'], # IDEM DEL + [ 'user', uname, '-v'], # delete 2 users at same time DEL + [ 'user', '%s2,%s3' % (uname, uname), '-v'], # delete groups, one, then two, then one (bypassing empty) DEL + [ 'group', gname, '-v'], DEL + [ 'group', '%s2,%s3' % (gname, gname), '-v'], DEL + [ 'group', ',%s4' % gname, '-v'], DEL + [ 'group', '%s4,' % gname, '-v'], DEL + [ 'group', '%s4' % gname, '-v'], ], descr='test short users/groups commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], #should fail (the group is not a system group) ADD + [ 'privilege', gname, '-v' ], GET + [ 'privileges' ], ADD + [ 'group', '%ssys' % gname, '--system', '-v' ], ADD + [ 'privilege', '%ssys' % gname, '-v' ], GET + [ 'privileges' ], DEL + [ 'privilege', '%ssys' % gname ], GET + [ 'privileges' ], DEL + [ 'group', gname ], DEL + [ 'group', '%ssys' % gname ], ], descr='test short privileges commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '--system', '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], ADD + [ 'group', '%s3' % gname, '-v' ], # should fail (not a system group) ADD + [ 'profile', pname, '--group=%s2' % gname, '--force-existing' ], GET + [ 'profiles' ], # should be OK ADD + [ 'profile', pname, '--group=%s' % gname, '--force-existing' ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--add-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--del-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], DEL + [ 'profile', pname ], DEL + [ 'group', '%s2' % gname, '-v' ], DEL + [ 'group', '%s3' % gname, '-v' ], GET + [ 'profiles' ], ], descr='test short profiles commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], CHK + [ 'group', gname, '--auto-no', '-vv' ], CHK + [ 'group', gname, '--auto-yes', '-vv' ], CHK + [ 'group', gname, '-vb' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-no', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-yes', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '-vb' ], DEL + [ 'group', '%s,%s2' % (gname,gname), '-v' ], CHK + [ 'config','--auto-no', '-vvae' ], CHK + [ 'config','--auto-yes', '-vvae' ], CHK + [ 'config','--batch', '-vvae' ], ADD + [ 'user', uname, '-v' ], CHK + [ 'user', uname, '--auto-no', '-v' ], CHK + [ 'user', uname, '--auto-yes', '-v' ], CHK + [ 'user', uname, '-vb' ], DEL + [ 'user', uname, '-v' ], ], descr='test short chk commands' ).Run() """ # extended check on user not implemented yet CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-no', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-yes', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--batch', '-vve' ], DEL + [ 'user', '%s,%s2' % (uname,uname), '-v' ], # check on profile not implemented yet ADD + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], CHK + [ 'profile', pname, '--auto-no', '-vve' ], CHK + [ 'profile', pname, '--auto-yes', '-vve' ], CHK + [ 'profile', pname, '--batch', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-no', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-yes', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--batch', '-vve' ], DEL + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], """
descr='test short profiles commands'
descr='''test short profiles commands'''
def test_short_syntax(): uname = 'user_test' gname = 'group_test' pname = 'profil_test' ScenarioTest([ ADD + [ 'user', uname, '-v' ], GET + [ 'user', uname ], ADD + [ 'group', gname, '-v' ], GET + [ 'group', gname ], ADD + [ 'user', uname, gname, '-v' ], GET + [ 'user', uname, '-l' ], ADD + [ 'group', '%s2' % gname, '-v' ], GET + [ 'group', '%s2' % gname ], ADD + [ 'group', '%s3,%s4' % (gname, gname), '-v' ], # should fail (already present) GET + [ 'group', '%s3,%s4' % (gname, gname) ], # should add user2 & user3 ADD + [ 'user', '%s2,%s3' % (uname, uname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname) ], # add 2 users in 3 groups each ADD + [ 'user', '%s2,%s3' % (uname, uname), '%s2,%s3,%s4' % (gname,gname,gname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname), '-l' ], # should add ONLY ONE user in a group and bypass empty one ADD + [ 'user', ',%s' % uname, ',%s2' % gname, '-v' ], # idem ADD + [ 'user', '%s,' % uname, '%s3,' % gname, '-v' ], GET + [ 'user', uname, '-l' ], # should delete only one user and bypass empty one DEL + [ 'user', ',%s' % uname, '-v'], # should fail (already deleted) DEL + [ 'user', '%s,' % uname, '-v'], # IDEM DEL + [ 'user', uname, '-v'], # delete 2 users at same time DEL + [ 'user', '%s2,%s3' % (uname, uname), '-v'], # delete groups, one, then two, then one (bypassing empty) DEL + [ 'group', gname, '-v'], DEL + [ 'group', '%s2,%s3' % (gname, gname), '-v'], DEL + [ 'group', ',%s4' % gname, '-v'], DEL + [ 'group', '%s4,' % gname, '-v'], DEL + [ 'group', '%s4' % gname, '-v'], ], descr='test short users/groups commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], #should fail (the group is not a system group) ADD + [ 'privilege', gname, '-v' ], GET + [ 'privileges' ], ADD + [ 'group', '%ssys' % gname, '--system', '-v' ], ADD + [ 'privilege', '%ssys' % gname, '-v' ], GET + [ 'privileges' ], DEL + [ 'privilege', '%ssys' % gname ], GET + [ 'privileges' ], DEL + [ 'group', gname ], DEL + [ 'group', '%ssys' % gname ], ], descr='test short privileges commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '--system', '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], ADD + [ 'group', '%s3' % gname, '-v' ], # should fail (not a system group) ADD + [ 'profile', pname, '--group=%s2' % gname, '--force-existing' ], GET + [ 'profiles' ], # should be OK ADD + [ 'profile', pname, '--group=%s' % gname, '--force-existing' ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--add-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--del-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], DEL + [ 'profile', pname ], DEL + [ 'group', '%s2' % gname, '-v' ], DEL + [ 'group', '%s3' % gname, '-v' ], GET + [ 'profiles' ], ], descr='test short profiles commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], CHK + [ 'group', gname, '--auto-no', '-vv' ], CHK + [ 'group', gname, '--auto-yes', '-vv' ], CHK + [ 'group', gname, '-vb' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-no', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-yes', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '-vb' ], DEL + [ 'group', '%s,%s2' % (gname,gname), '-v' ], CHK + [ 'config','--auto-no', '-vvae' ], CHK + [ 'config','--auto-yes', '-vvae' ], CHK + [ 'config','--batch', '-vvae' ], ADD + [ 'user', uname, '-v' ], CHK + [ 'user', uname, '--auto-no', '-v' ], CHK + [ 'user', uname, '--auto-yes', '-v' ], CHK + [ 'user', uname, '-vb' ], DEL + [ 'user', uname, '-v' ], ], descr='test short chk commands' ).Run() """ # extended check on user not implemented yet CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-no', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-yes', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--batch', '-vve' ], DEL + [ 'user', '%s,%s2' % (uname,uname), '-v' ], # check on profile not implemented yet ADD + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], CHK + [ 'profile', pname, '--auto-no', '-vve' ], CHK + [ 'profile', pname, '--auto-yes', '-vve' ], CHK + [ 'profile', pname, '--batch', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-no', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-yes', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--batch', '-vve' ], DEL + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], """
descr='test short chk commands'
descr='''test short chk commands'''
def test_short_syntax(): uname = 'user_test' gname = 'group_test' pname = 'profil_test' ScenarioTest([ ADD + [ 'user', uname, '-v' ], GET + [ 'user', uname ], ADD + [ 'group', gname, '-v' ], GET + [ 'group', gname ], ADD + [ 'user', uname, gname, '-v' ], GET + [ 'user', uname, '-l' ], ADD + [ 'group', '%s2' % gname, '-v' ], GET + [ 'group', '%s2' % gname ], ADD + [ 'group', '%s3,%s4' % (gname, gname), '-v' ], # should fail (already present) GET + [ 'group', '%s3,%s4' % (gname, gname) ], # should add user2 & user3 ADD + [ 'user', '%s2,%s3' % (uname, uname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname) ], # add 2 users in 3 groups each ADD + [ 'user', '%s2,%s3' % (uname, uname), '%s2,%s3,%s4' % (gname,gname,gname), '-v' ], GET + [ 'user', '%s2,%s3' % (uname, uname), '-l' ], # should add ONLY ONE user in a group and bypass empty one ADD + [ 'user', ',%s' % uname, ',%s2' % gname, '-v' ], # idem ADD + [ 'user', '%s,' % uname, '%s3,' % gname, '-v' ], GET + [ 'user', uname, '-l' ], # should delete only one user and bypass empty one DEL + [ 'user', ',%s' % uname, '-v'], # should fail (already deleted) DEL + [ 'user', '%s,' % uname, '-v'], # IDEM DEL + [ 'user', uname, '-v'], # delete 2 users at same time DEL + [ 'user', '%s2,%s3' % (uname, uname), '-v'], # delete groups, one, then two, then one (bypassing empty) DEL + [ 'group', gname, '-v'], DEL + [ 'group', '%s2,%s3' % (gname, gname), '-v'], DEL + [ 'group', ',%s4' % gname, '-v'], DEL + [ 'group', '%s4,' % gname, '-v'], DEL + [ 'group', '%s4' % gname, '-v'], ], descr='test short users/groups commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], #should fail (the group is not a system group) ADD + [ 'privilege', gname, '-v' ], GET + [ 'privileges' ], ADD + [ 'group', '%ssys' % gname, '--system', '-v' ], ADD + [ 'privilege', '%ssys' % gname, '-v' ], GET + [ 'privileges' ], DEL + [ 'privilege', '%ssys' % gname ], GET + [ 'privileges' ], DEL + [ 'group', gname ], DEL + [ 'group', '%ssys' % gname ], ], descr='test short privileges commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '--system', '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], ADD + [ 'group', '%s3' % gname, '-v' ], # should fail (not a system group) ADD + [ 'profile', pname, '--group=%s2' % gname, '--force-existing' ], GET + [ 'profiles' ], # should be OK ADD + [ 'profile', pname, '--group=%s' % gname, '--force-existing' ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--add-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], MOD + [ 'profile', pname, '--del-groups=%s2,%s3' % (gname,gname) ], GET + [ 'profiles' ], DEL + [ 'profile', pname ], DEL + [ 'group', '%s2' % gname, '-v' ], DEL + [ 'group', '%s3' % gname, '-v' ], GET + [ 'profiles' ], ], descr='test short profiles commands' ).Run() ScenarioTest([ ADD + [ 'group', gname, '-v' ], ADD + [ 'group', '%s2' % gname, '-v' ], CHK + [ 'group', gname, '--auto-no', '-vv' ], CHK + [ 'group', gname, '--auto-yes', '-vv' ], CHK + [ 'group', gname, '-vb' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-no', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '--auto-yes', '-vv' ], CHK + [ 'group', '%s,%s2' % (gname,gname), '-vb' ], DEL + [ 'group', '%s,%s2' % (gname,gname), '-v' ], CHK + [ 'config','--auto-no', '-vvae' ], CHK + [ 'config','--auto-yes', '-vvae' ], CHK + [ 'config','--batch', '-vvae' ], ADD + [ 'user', uname, '-v' ], CHK + [ 'user', uname, '--auto-no', '-v' ], CHK + [ 'user', uname, '--auto-yes', '-v' ], CHK + [ 'user', uname, '-vb' ], DEL + [ 'user', uname, '-v' ], ], descr='test short chk commands' ).Run() """ # extended check on user not implemented yet CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-no', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--auto-yes', '-vve' ], CHK + [ 'user', '%s,%s2' % (uname,uname), '--batch', '-vve' ], DEL + [ 'user', '%s,%s2' % (uname,uname), '-v' ], # check on profile not implemented yet ADD + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], CHK + [ 'profile', pname, '--auto-no', '-vve' ], CHK + [ 'profile', pname, '--auto-yes', '-vve' ], CHK + [ 'profile', pname, '--batch', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-no', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--auto-yes', '-vve' ], CHK + [ 'profile', '%s,%s2' % (pname,pname), '--batch', '-vve' ], DEL + [ 'profile', '%s,%s2' % (pname,pname), '-v' ], """
if entry[2] == "": users[uid]['shadowLastChange'] = 0 else: users[uid]['shadowLastChange'] = int(entry[2]) if entry[3] == "": users[uid]['shadowInactive'] = 99999 else: users[uid]['shadowInactive'] = int(entry[3]) if entry[4] == "": users[uid]['shadowWarning'] = entry[4] else: users[uid]['shadowWarning'] = int(entry[4]) if entry[5] == "": users[uid]['shadowExpire'] = entry[5] else: users[uid]['shadowExpire'] = int(entry[5])
users[uid]['shadowLastChange'] = int(entry[2]) \ if entry[2] != '' else 0 users[uid]['shadowMin'] = int(entry[3]) \ if entry[3] != '' else 0 users[uid]['shadowMax'] = int(entry[4]) \ if entry[4] != '' else 99999 users[uid]['shadowWarning'] = int(entry[5]) \ if entry[5] != '' else 7 users[uid]['shadowInactive'] = int(entry[6]) \ if entry[6] != '' else '' users[uid]['shadowExpire'] = int(entry[7]) \ if entry[7] != '' else '' users[uid]['shadowFlag'] = int(entry[8]) \ if entry[8] != '' else ''
def load_users(self, groups = None): """ Load user accounts from /etc/{passwd,shadow} """ users = {} login_cache = {}
str(users[uid]['shadowWarning']),
def save_users(self): """ Write /etc/passwd and /etc/shadow """
"","",""
str(users[uid]['shadowFlag'])
def save_users(self): """ Write /etc/passwd and /etc/shadow """
['profile', '--group=utilisagers', '--del-users', '--no-archive'], ['profile', '--group=responsibilisateurs', '--del-users', '--no-archive'], ['profile', '--group=profil_test', '--del-users',
['profile', '''--group=utilisagers,responsibilisateurs,''' '''profil_test''', '--del-users',
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', '''toto,tutu,tata,titi,test,utilisager.normal,''' \ '''test.responsibilly,utilicateur.accentue,user_test,''' \ '''grp-acl-user,utest_267,user_test2,user_test3,user_testsys,''' \ '''user_testsys2,user_testsys3''', '--no-archive'], ['profile', '--group=utilisagers', '--del-users', '--no-archive'], ['profile', '--group=responsibilisateurs', '--del-users', '--no-archive'], ['profile', '--group=profil_test', '--del-users', '--no-archive'], ['group', '''test_users_A,test_users_B,groupeA,B-Group_Test,''' \ '''groupe_a_skel,ACL_tests,MOD_tests,SYSTEM-test,SKEL-tests,''' \ '''ARCHIVES-test,group_test,group_testsys,group_test2,group_test3,''' \ '''GRP-ACL-test,gtest_267,group_testsys'''], ['privilege', '--name=group_test' ], ): execute(DEL + argument) execute([ 'sudo', 'rm', '-rf', '%s/*' % configuration.home_backup_dir, '%s/*' % configuration.home_archive_dir ]) execute(ADD + ['group', '--system', 'acl,admins,remotessh,licorn-wmi']) test_message('''system cleaned from previous testsuite runs.''')
\ '''GRP-ACL-test,gtest_267,group_testsys'''], ['privilege', '--name=group_test' ], ):
'''group_test3,GRP-ACL-test,gtest_267,group_testsys''' ], ['privilege', '--name=group_test' ] ):
def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', '''toto,tutu,tata,titi,test,utilisager.normal,''' \ '''test.responsibilly,utilicateur.accentue,user_test,''' \ '''grp-acl-user,utest_267,user_test2,user_test3,user_testsys,''' \ '''user_testsys2,user_testsys3''', '--no-archive'], ['profile', '--group=utilisagers', '--del-users', '--no-archive'], ['profile', '--group=responsibilisateurs', '--del-users', '--no-archive'], ['profile', '--group=profil_test', '--del-users', '--no-archive'], ['group', '''test_users_A,test_users_B,groupeA,B-Group_Test,''' \ '''groupe_a_skel,ACL_tests,MOD_tests,SYSTEM-test,SKEL-tests,''' \ '''ARCHIVES-test,group_test,group_testsys,group_test2,group_test3,''' \ '''GRP-ACL-test,gtest_267,group_testsys'''], ['privilege', '--name=group_test' ], ): execute(DEL + argument) execute([ 'sudo', 'rm', '-rf', '%s/*' % configuration.home_backup_dir, '%s/*' % configuration.home_archive_dir ]) execute(ADD + ['group', '--system', 'acl,admins,remotessh,licorn-wmi']) test_message('''system cleaned from previous testsuite runs.''')
DEL + [ 'group', gname ],
DEL + [ 'group', gname ]
def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ]
GET + [ 'privileges' ], ], context=context, descr='Check if privilege list is up to date after group deletion (fix
GET + [ 'privileges' ] ], context=context, descr='''Check if privilege list is up to date after group deletion''' ''' (fix
def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ]
GET + [ 'groups' ],
GET + [ 'groups' ]
def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ]
pname = 'profil_test'
def chk_acls_cmds(dir): return [ 'sudo', 'getfacl', '-R', dir ]
AddUsersInGroup('users', [ u ])
AddUsersInGroup('users', [ u ], batch = True)
def AddUsersInGroup(self, name, users_to_add, batch = False): """ Add a user list in the group 'name'. """
<li><a href="http://dev.licorn.org/wiki/UserDoc/WMI" title="%s">%s</a></li> <li%s><a href="mailto:[email protected]?subject=[support] " title="%s">%s</a></li>
<li><a href="http://docs.licorn.org/userdoc.html" title="%s">%s</a></li> <li%s><a href="mailto:[email protected]?subject=[Support Licorn®] " title="%s">%s</a></li>
def __getitem__(self, key): try: return dict.__getitem__(self, key) except KeyError: return self.default
_('Go to online documentation and community website (in new window or new tab).'), _('Documentation'),
_('Go to online documentation website.'), _('Documentation'),
def __getitem__(self, key): try: return dict.__getitem__(self, key) except KeyError: return self.default
from licorn.system import keywords kw = keywords.KeywordsController(configuration) kw.DeleteKeyword(opts.name, opts.del_children)
from licorn.core import keywords keywords.DeleteKeyword(opts.name, opts.del_children)
def delete_keyword(): """ delete a system wide User profile. """ from licorn.system import keywords kw = keywords.KeywordsController(configuration) kw.DeleteKeyword(opts.name, opts.del_children)
getpass.getpass(_('Please enter your LDAP password: ')),
getpass.getpass('Please enter your LDAP password: '),
def bind(self, need_write_access=True): """ Bind as admin or user, when LDAP needs a stronger authentication.""" ltrace('ldap','binding as %s.' % ( styles.stylize(styles.ST_LOGIN, self.bind_dn)))
os.path.dirname(__file__),input_name), 'r'))
'/usr/share/licorn', input_name), 'r'))
def __init__(self, input_name): LDIFParser.__init__(self, open('%s/schemas/%s.ldif' % ( os.path.dirname(__file__),input_name), 'r'))
logging.progress('%s: saving data structures to disk.' % \ self.pretty_name) lock_file = file_locks.FileLock(self.configuration, self.configuration.keywords_data_file) lock_file.Lock() open(self.configuration.keywords_data_file , "w").write(self.__build_cli_output()) lock_file.Unlock()
if self.changed : logging.progress('%s: saving data structures to disk.' % \ self.pretty_name) lock_file = file_locks.FileLock(self.configuration, self.configuration.keywords_data_file) lock_file.Lock() open(self.configuration.keywords_data_file , "w").write(self.__build_cli_output()) lock_file.Unlock() logging.progress('%s: data structures saved.' % \ self.pretty_name) self.changed = False
def WriteConf(self): """ Write the keywords data in appropriate system files.""" logging.progress('%s: saving data structures to disk.' % \ self.pretty_name)
from licorn import system as hzsys
def AddKeyword(self, name = None, parent = "", description = ""): """ Add a new keyword on the system, provided some checks are OK. """ if name is None: raise exceptions.BadArgumentError(logging.SYSK_SPECIFY_KEYWORD)
"""
""" Delete a keyword
def DeleteKeyword(self, name=None, del_children=False, modify_file=True): """ """ if name is None: raise exceptions.BadArgumentError(logging.SYSK_SPECIFY_KEYWORD)
self.WriteConf()
self.changed = True
def DeleteKeyword(self, name=None, del_children=False, modify_file=True): """ """ if name is None: raise exceptions.BadArgumentError(logging.SYSK_SPECIFY_KEYWORD)
self.WriteConf()
self.changed = True
def ChangeParent(self, name, parent): """ Change keyword's parent """ try: self.keywords[parent] self.keywords[name]["parent"] = parent except KeyError, e: raise exceptions.BadArgumentError("The keyword %s doesn't exist on this system." % str(e)) self.WriteConf()
self.WriteConf()
self.changed = True
def RemoveParent(self, name): """ Remove parent of the keyword 'name' """ try: self.keywords[name]["parent"] = "" except KeyError, e: raise exceptions.BadArgumentError("The keyword you specified doesn't exist on this system.") self.WriteConf()
self.WriteConf()
self.changed = True
def ChangeDescription(self, name, description): """ Change the description of a keyword """ try: self.keywords[name]["description"] = description except KeyError, e: raise exceptions.BadArgumentError("The keyword you specified doesn't exist on this system.") self.WriteConf()
if opts.groups_to_del: something_done = True for g in opts.groups_to_del.split(','): if g != '': try: LMC.groups.DeleteUsersFromGroup(name=g, users_to_del=[ uid ]) except exceptions.LicornRuntimeException, e: logging.warning('''Unable to remove user %s from ''' '''group %s (was: %s).''' % ( stylize(ST_LOGIN, opts.login), stylize(ST_NAME, g), str(e))) except exceptions.LicornException, e: raise exceptions.LicornRuntimeError( '''Unable to remove user %s from ''' '''group %s (was: %s).''' % ( stylize(ST_LOGIN, opts.login), stylize(ST_NAME, g), str(e)))
def mod_user(self, opts, args): """ Modify a POSIX user account (Samba / LDAP included). """
users.Select(filters.STANDARD) dest = group['memberUid'] source = [ u[uid]['login'] for uid in users.filtered_users ] for current in group['memberUid']:
dest = groups[groups.name_to_gid(gname)]['memberUid'][:] source = [ u[uid]['login'] \ for uid in users.Select(filters.STANDARD) ] for current in dest[:]:
def edit(uri, http_user, name): """Edit a group.""" users.reload() groups.reload() u = users.users g = groups.groups title = _("Editing group %s") % name if protected_group(name, complete=False): return w.forgery_error(title) data = w.page_body_start(uri, http_user, ctxtnav, title, False) try: group = g[groups.name_to_gid(name)] sys = groups.is_system_group(name) dbl_lists = {} if sys: groups_filters_lists_ids = [ (name, [ _('Manage members'), _('Users not yet members'), _('Current members') ], 'members' ) ] # , # (configuration.groups.resp_prefix + name, None, '&#160;' ), # (configuration.groups.guest_prefix + name, None, '&#160;' ) else: groups_filters_lists_ids = ( (name, [_('Manage members'), _('Users not yet members'), _('Current members')], 'members'), (configuration.groups.resp_prefix + name, [_('Manage responsibles'), _('Users not yet responsibles'), _('Current responsibles')], 'resps'), (configuration.groups.guest_prefix + name, [_('Manage guests'), _('Users not yet guests'), _('Current guests')], 'guests') ) for (gname, titles, id) in groups_filters_lists_ids: if titles is None: dbl_lists[gname] = id else: users.Select(filters.STANDARD) dest = group['memberUid'] source = [ u[uid]['login'] for uid in users.filtered_users ] for current in group['memberUid']: try: source.remove(current) except ValueError: dest.remove(current) dest.sort() source.sort() dbl_lists[gname] = w.doubleListBox(titles, id, source, dest) def descr(desc, system): return w.input('description', desc, size=30, maxlength=256, accesskey='D') def skel(cur_skel, system): return '' if system else \ ''' <tr> <td><strong>%s</strong></td> <td class="right">%s</td> </tr> ''' % (_('Skeleton'), w.select('skel', configuration.users.skels, cur_skel, func = os.path.basename)) def permissive(perm, system): return '' if system else \ ''' <tr> <td><strong>%s</strong></td> <td class="right">%s</td> </tr> ''' % (_('Permissive shared dir?'), w.checkbox('permissive', "True", "Oui", checked = perm )) form_name = "group_edit_form" if sys: data_rsp_gst ='' else : data_rsp_gst = '''
def refork_as_root_or_die(process_title='licorn-generic', prefunc=None):
def refork_as_root_or_die(process_title='licorn-generic', prefunc=None, group='admins'):
def refork_as_root_or_die(process_title='licorn-generic', prefunc=None): """ check if current user is root. if not, check if he/she is member of group "admins" and then refork ourselves with sudo, to gain root privileges, needed for Licorn® daemon. Do it with traditionnal syscalls, because the rest of Licorn® is not initialized if we run this function. """ group = 'admins' if pwd.getpwuid(os.getuid()).pw_name in grp.getgrnam(group).gr_mem: cmd=[ process_title ] cmd.extend(sys.argv) if prefunc != None: prefunc() logging.progress('''Exec'ing ourselves with sudo to gain root ''' '''privileges (execvp(%s)).''' % cmd) os.execvp('sudo', cmd) else: raise exceptions.LicornRuntimeError('''You're not a member of group ''' '''%s, can't do anything for you, sorry!''' % group)
group = 'admins' if pwd.getpwuid(os.getuid()).pw_name in grp.getgrnam(group).gr_mem:
try: gmembers = grp.getgrnam(group).gr_mem except KeyError: logging.error('''group %s doesn't exist and we are not root, ''' '''aborting. Please manually relaunch this program with root ''' '''privileges for the group to be created.''' % group) if pwd.getpwuid(os.getuid()).pw_name in gmembers:
def refork_as_root_or_die(process_title='licorn-generic', prefunc=None): """ check if current user is root. if not, check if he/she is member of group "admins" and then refork ourselves with sudo, to gain root privileges, needed for Licorn® daemon. Do it with traditionnal syscalls, because the rest of Licorn® is not initialized if we run this function. """ group = 'admins' if pwd.getpwuid(os.getuid()).pw_name in grp.getgrnam(group).gr_mem: cmd=[ process_title ] cmd.extend(sys.argv) if prefunc != None: prefunc() logging.progress('''Exec'ing ourselves with sudo to gain root ''' '''privileges (execvp(%s)).''' % cmd) os.execvp('sudo', cmd) else: raise exceptions.LicornRuntimeError('''You're not a member of group ''' '''%s, can't do anything for you, sorry!''' % group)
self.users.users[uid]['groups'].sort()
LMC.users[uid]['groups'].sort()
def AddUsersInGroup(self, name=None, gid=None, users_to_add=None, batch=False, listener=None): """ Add a user list in the group 'name'. """
description = 'Les membres du groupe "%s"' % name
description = 'Les membres du groupe “%s”' % name
def AddGroup(self, name, gid=None, description="", skel="", system=False, permissive=False, batch=False): """ Add an Licorn group (the group + the responsible group + the shared dir + permissions). """
raise exceptions.BadArgumentError("Malformed group name `%s', must match /%s/i."
raise exceptions.BadArgumentError("Malformed group name '%s', must match /%s/i."
def AddGroup(self, name, gid=None, description="", skel="", system=False, permissive=False, batch=False): """ Add an Licorn group (the group + the responsible group + the shared dir + permissions). """
('gecos', str),
('gecos', decodestring),
def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value
user['cn'] = login
def save_user(self, uid): """ Save one user in the LDAP backend. If updating, the entry will be dropped prior of insertion. """
data = '%s\n%s\n%s' % (w.backto(), __groups_actions(), w.menu(uri))
data = w.page_body_start(uri, http_user, ctxtnav, title, False)
def unlock(uri, http_user, name, sure = False): """ Make a shared group dir permissive. """ title = _("Make group %s permissive") % name data = '%s\n%s\n%s' % (w.backto(), __groups_actions(), w.menu(uri)) if not sure: description = _('''This will permit large access to files and folders in the group shared dir, and will allow any member of the group to modify / delete any document, even if he/she is not owner of the document. This option can be dangerous, but if group members are accustomed to work together, there is no problem. Generally speaking you will use this feature on small working groups. <br /> Warning: <strong> The operation may be lengthy because the system will change permissions of all current data </ strong> (duration is therefore depending on the volume of data, about 1 second for 100Mio).''') data += w.question(_("Are you sure you want to active permissiveness on group <strong>%s</strong>?") % name, description, yes_values = [ _("Activate") + ' >>', "/groups/unlock/%s/sure" % name, _("A") ], no_values = [ '<< ' + _("Cancel"), "/groups/list", _("N") ]) return w.page(title, data) else: # we are sure, do it ! command = [ "sudo", "mod", "group", "--quiet", "--no-colors", "--name", name, "--set-permissive" ] return w.page(title, data + w.run(command, uri, successfull_redirect = "/groups/list", err_msg = _("Failed to activate permissivenes on group <strong>%s</strong>!") % name))
data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri))
data = w.page_body_start(uri, http_user, ctxtnav, title, False)
def lock(uri, http_user, name, sure = False): """ Make a group not permissive. """ title = _("Make group %s not permissive") % name data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri)) if not sure: description = _('''This will ensure finer write access to files and folders in the group shared dir. Only the owner / creator of a document will be able to modify it; other group members will only be able to read such a document (unless the owner manually assign other permissions, which are not guaranteed to be maintained by the system). <br /> Warning: <strong> The operation may be lengthy because the system will switch permissions of all current group shared data</strong> (duration is therefore depending on the volume of data, about 1 second for 100Mio).''') data += w.question(_("Are you sure you want to make group <strong>%s</strong> not permissive?") % name, description, yes_values = [ _("Deactivate") + ' >>', "/groups/lock/%s/sure" % name, _("D") ], no_values = [ '<< ' + _("Cancel"), "/groups/list", _("N") ]) return w.page(title, data) else: # we are sure, do it ! command = [ "sudo", "mod", "group", "--quiet", "--no-colors", "--name", name, "--set-not-permissive" ] return w.page(title, data + w.run(command, uri, successfull_redirect = "/groups/list", err_msg = _("Failed to remove permissiveness from group <strong>%s</strong>!") % name))
data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri))
data = w.page_body_start(uri, http_user, ctxtnav, title, False)
def delete(uri, http_user, name, sure = False, no_archive = False, yes = None): """ Remove group and archive (or not) group shared dir. """ del yes title = _("Remove group %s") % name data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri)) groups.reload() if groups.is_system_group(name): return w.page(title, w.error(_("Failed to remove group"), [ _("alter system group.") ], _("insufficient permissions to perform operation."))) if not sure: data += w.question(_("Are you sure you want to remove group <strong>%s</strong>?") % name, _("""Group shared data will be archived in directory %s, and accessible to members of group %s for eventual recovery. However, you can decideto remove them permanently.""") % (configuration.home_archive_dir, configuration.defaults.admin_group), yes_values = [ _("Remove") + ' >>', "/groups/delete/%s/sure" % name, _("R") ], no_values = [ '<< ' + _("Cancel"), "/groups/list", _("N") ], form_options = w.checkbox("no_archive", "True", _("Definitely remove group shared data."), checked = False) ) return w.page(title, data) else: # we are sure, do it ! command = [ 'sudo', 'del', 'group', '--quiet', '--no-colors', '--name', name ] if no_archive: command.extend(['--no-archive']) return w.page(title, data + w.run(command, uri, successfull_redirect = "/groups/list", err_msg = _("Failed to remove group <strong>%s</strong>!") % name))
data = '%s%s' % (w.backto(), __groups_actions(title))
data = w.page_body_start(uri, http_user, ctxtnav, title, False)
def skel(req, name, sure = False, apply_skel = configuration.users.default_skel): """ TO BE IMPLEMENTED ! reapply a user's skel with confirmation.""" users.reload() profiles.reload() groups.reload() title = _("Skeleton reapplying for group %s") % name data = '%s%s' % (w.backto(), __groups_actions(title)) if not sure: allusers = u.UsersList(configuration) allgroups = g.GroupsList(configuration, allusers) description = _('''This will reset the desktops, icons and menus of all members of the group, according to the content of the skel you choose. This will NOT alter any of the user personnal data, nor the group shared data.''') pri_group = allgroups.groups[allusers.users[users.UsersList.login_to_uid(login)]['gid']]['name'] # liste des skels du profile en cours. def filter_skels(pri_group, sk_list): ''' TODO: to be converted to licorn model if pri_group == configuration.mNames['RESPONSABLES_GROUP']: return filter(lambda x: x.rfind("/%s/" % configuration.mNames['RESPONSABLES_GROUP']) != -1, sk_list) elif pri_group == configuration.mNames['USAGERS_GROUP']: return filter(lambda x: x.rfind("/%s/" % configuration.mNames['USAGERS_GROUP']) != -1, sk_list) else: ''' return sk_list form_options = _("Which skel do you wish to reapply to members of this group? %s") \ % w.select("apply_skel", filter_skels(pri_group, configuration.users.skels), func = os.path.basename) data += w.question( _("Are you sure you want to reapply this skel to all of the members of %s?") % login, description, yes_values = [ _("Apply") + ' >>', "/users/skel/%s/sure" % login, _("A") ], no_values = [ '<< ' + _("Cancel"), "/groups/list", _("N") ], form_options = form_options) return w.page(title, data) else: # we are sure, do it ! command = [ "sudo", "mod", "user", "--quiet", "--no-colors", "--login", login, '--apply-skel', skel ] return w.page(title, data + w.run(command, req, successfull_redirect = "/groups/list", err_msg = _("Failed to apply skel %s to members of group %s.") % (os.path.basename(apply_skel), login)))
ltrace('configuration', 'CleanUp().') if os.path.exists(self.tmp_dir):
ltrace('configuration', '> CleanUp()') try:
def CleanUp(self): """This is a sort of destructor. Clean-up before being deleted..."""
if uid > self.configuration.users.system_uid_min \ and uid < self.configuration.users.system_uid_max:
if uid >= self.configuration.users.system_uid_min \ and uid <= self.configuration.users.system_uid_max:
def check_uid(uid, minimal=minimal, batch=batch, auto_answer=auto_answer):
users.LockAccount(uid, opts.lock)
users.LockAccount(uid=uid, lock=opts.lock)
def mod_user(opts, args): """ Modify a POSIX user account (Samba / LDAP included). """ configuration = LicornConfiguration() users = UsersController(configuration) uids_to_mod = cli_select(users, 'user', args, [ (opts.login, users.login_to_uid), (opts.uid, users.confirm_uid) ]) ltrace('mod', '> mod_user(%s)' % uids_to_mod) something_done = False for uid in uids_to_mod: if opts.newgecos is not None: something_done = True users.ChangeUserGecos(uid=uid, gecos=unicode(opts.newgecos)) if opts.newshell is not None: something_done = True users.ChangeUserShell(uid=uid, shell=opts.newshell) if opts.newpassword is not None: something_done = True users.ChangeUserPassword(uid=uid, password=opts.newpassword) if opts.auto_passwd is not None: something_done = True users.ChangeUserPassword(uid=uid, password=hlstr.generate_password(opts.passwd_size), display=True) if opts.lock is not None: something_done = True users.LockAccount(uid, opts.lock) if opts.groups_to_add: something_done = True for g in opts.groups_to_add.split(','): if g != '': try: groups = GroupsController(configuration, users) groups.AddUsersInGroup(name=g, users_to_add=[ uid ]) except exceptions.LicornRuntimeException, e: logging.warning('''Unable to add user %s in group ''' '''%s (was: %s).''' % ( styles.stylize(styles.ST_LOGIN, UsersController.uid_to_login(uid)), styles.stylize(styles.ST_NAME, g), str(e))) except exceptions.LicornException, e: raise exceptions.LicornRuntimeError( '''Unable to add user %s in group %s (was: %s).''' % (styles.stylize(styles.ST_LOGIN, UsersController.uid_to_login(uid)), styles.stylize(styles.ST_NAME, g), str(e))) if opts.groups_to_del: something_done = True for g in opts.groups_to_del.split(','): if g != '': try: groups = GroupsController(configuration, users) groups.DeleteUsersFromGroup(name=g, users_to_del=[ uid ]) except exceptions.LicornRuntimeException, e: logging.warning('''Unable to remove user %s from ''' '''group %s (was: %s).''' % ( styles.stylize(styles.ST_LOGIN, opts.login), styles.stylize(styles.ST_NAME, g), str(e))) except exceptions.LicornException, e: raise exceptions.LicornRuntimeError( '''Unable to remove user %s from ''' '''group %s (was: %s).''' % ( styles.stylize(styles.ST_LOGIN, opts.login), styles.stylize(styles.ST_NAME, g), str(e))) if opts.apply_skel is not None: something_done = True users.ApplyUserSkel(opts.login, opts.apply_skel) if not something_done: raise exceptions.BadArgumentError('''What do you want to modify ''' '''about user(s) ? Use --help to know !''')
)
).Run()
def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ]
self.configuration.groups.names['plural'])):
self.configuration.groups.names['plural'])) \ or home.find('/tmp') != -1:
def validate_home_dir(home=home, login=login, system=system, force=force): """ Do some basic but sane tests on the home dir provided. """
'''and a temporary directory (/var/tmp, /tmp). '''
def validate_home_dir(home=home, login=login, system=system, force=force): """ Do some basic but sane tests on the home dir provided. """
make_path = lambda x: ('_'.join(x)).replace('../', '').replace('//','_').replace('/','_')
make_path = lambda x: ('_'.join(x)).replace('__', '_').replace( './', '').replace('../', '').replace('//','_').replace( '/','_').replace('>','').replace('&', '')
def Prepare(self, cmd): """ Run commands mandatory for func_test to succeed. """
logging.warning('command "%s" failed (retcode %d instead of %d).\nPath: %s' % ( cmdfmt(cmd), retcode, ref_code, self.ref_code_file))
logging.warning( '''command "%s" failed (retcode %d instead of %d).\n''' '''(Reference path: %s)''' % ( styles.stylize(styles.ST_NAME, cmdfmt(cmd)), styles.stylize(styles.ST_BAD,retcode), styles.stylize(styles.ST_OK, ref_code), self.ref_code_file))
def RunAndCheck(self, cmd, batch = False, inverse_test=False): ref_output, ref_code = self.PrepareReferenceOutput(cmd)
gid = manual_gid
if (system and GroupsController.is_system_gid(manual_gid)) \ or (not system and GroupsController.is_standard_gid( manual_gid)): gid = manual_gid else: raise exceptions.BadArgumentError('''GID out of range ''' '''for the kind of group you specified. System GID ''' '''must be between %d and %d, standard GID must be ''' '''between %d and %d.''' % ( self.configuration.groups.system_gid_min, self.configuration.groups.system_gid_max, self.configuration.groups.gid_min, self.configuration.groups.gid_max) )
def __add_group(self, name, system, manual_gid=None, description = "", groupSkel = "", batch=False, force=False): """ Add a POSIX group, write the system data files. Return the gid of the group created."""
return (w.HTTP_TYPE_TEXT, w.page(title, w.error(_("Forbidden action"),
return (HTTP_TYPE_TEXT, page(title, error(_("Forbidden action"),
def forgery_error(title): return (w.HTTP_TYPE_TEXT, w.page(title, w.error(_("Forbidden action"), [ _("Some parts of the system cannot be modified.") ], _("insufficient permissions to perform operation."))))
title = _("Showing details of group %s") % name data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri))
title = _("Details of group %s") % name data = w.page_body_start(uri, http_user, ctxtnav, title)
def view(uri, http_user, name): """Prepare a group view to be printed.""" users.reload() groups.reload() title = _("Showing details of group %s") % name data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri)) u = users.users g = groups.groups # TODO: should we forbid system group view ? why not ? # As of now, this is harmless and I don't see any reason # apart from obfuscation which is not acceptable. # Anyway, to see a system group, user must forge an URL. try: group = g[groups.name_to_gid(name)] members = groups.all_members(name) members.sort() members_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <td><strong>%s</strong></td> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> ''' % (_('Members'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID')) def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid) members_html += "\n".join(map(user_line, members)) + '</table>' if not groups.is_system_group(name): resps = groups.all_members(configuration.groups.resp_prefix + name) resps.sort() guests = \ groups.all_members(configuration.groups.guest_prefix + name) guests.sort() if resps != []: resps_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <th><strong>%s</strong></th> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> %s </table> ''' % (_('Responsibles'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, resps))) else: resps_html = "<h2>%s</h2>" % \ _('No responsibles for this group.') if guests != []: guests_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <th><strong>%s</strong></th> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> %s </table> ''' % (_('Guests'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, guests))) else: guests_html = "<h2>%s</h2>" % _('No guests for this group.') else: resps_html = guests_html = '' form_name = "group_print_form" data += ''' <div id="content"> <form name="%s" id="%s" action="/groups/view/%s" method="post"> <table id="user_account"> <tr><td><strong>%s</strong><br />%s</td> <td class="not_modifiable">%d</td></tr> <tr><td><strong>%s</strong><br />%s</td> <td class="not_modifiable">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr> <td>%s</td> <td class="right">%s</td> </tr> </table> </form> </div> ''' % ( form_name, form_name, name, _('GID'), _('immutable'), group['gid'], _('Name'), _('immutable'), name, members_html, resps_html, guests_html, w.button(_('<< Go back'), "/groups/list", accesskey=_('B')), w.submit('print', _('Print') + ' >>', onClick="javascript:window.print(); return false;", accesskey=_('P')) ) except exceptions.LicornException, e: data += w.error(_("Group %s doesn't exist (%s, %s)!") % ( name, "group = g[groups.name_to_gid(name)]", e)) return (w.HTTP_TYPE_TEXT, w.page(title, data))
members.sort() members_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <td><strong>%s</strong></td> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> ''' % (_('Members'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID')) def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid) members_html += "\n".join(map(user_line, members)) + '</table>'
if members != []: members.sort() members_html = ''' <h2>%s</h2> <div style="text-align:left;">%s</div> <table class="group_members"> <tr> <th><strong>%s</strong></th> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> ''' % ( _('Members'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID') ) def user_line(login): uid = users.login_to_uid(login) return '''<tr> <td>%s</td> <td>%s</td> <td>%s</td> </tr>''' % ( u[uid]['gecos'], login, uid ) members_html += "\n".join(map(user_line, members)) + '</table>' else: members_html = "<h2>%s</h2>" % _('No members in this group.')
def view(uri, http_user, name): """Prepare a group view to be printed.""" users.reload() groups.reload() title = _("Showing details of group %s") % name data = '%s\n%s\n%s\n' % (w.backto(), __groups_actions(), w.menu(uri)) u = users.users g = groups.groups # TODO: should we forbid system group view ? why not ? # As of now, this is harmless and I don't see any reason # apart from obfuscation which is not acceptable. # Anyway, to see a system group, user must forge an URL. try: group = g[groups.name_to_gid(name)] members = groups.all_members(name) members.sort() members_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <td><strong>%s</strong></td> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> ''' % (_('Members'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID')) def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid) members_html += "\n".join(map(user_line, members)) + '</table>' if not groups.is_system_group(name): resps = groups.all_members(configuration.groups.resp_prefix + name) resps.sort() guests = \ groups.all_members(configuration.groups.guest_prefix + name) guests.sort() if resps != []: resps_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <th><strong>%s</strong></th> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> %s </table> ''' % (_('Responsibles'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, resps))) else: resps_html = "<h2>%s</h2>" % \ _('No responsibles for this group.') if guests != []: guests_html = ''' <h2>%s</h2><div style="text-align:center;">%s</div> <table class="group_members"> <tr> <th><strong>%s</strong></th> <th><strong>%s</strong></th> <th><strong>%s</strong></th> </tr> %s </table> ''' % (_('Guests'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, guests))) else: guests_html = "<h2>%s</h2>" % _('No guests for this group.') else: resps_html = guests_html = '' form_name = "group_print_form" data += ''' <div id="content"> <form name="%s" id="%s" action="/groups/view/%s" method="post"> <table id="user_account"> <tr><td><strong>%s</strong><br />%s</td> <td class="not_modifiable">%d</td></tr> <tr><td><strong>%s</strong><br />%s</td> <td class="not_modifiable">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr><td colspan="2" class="double_selector">%s</td></tr> <tr> <td>%s</td> <td class="right">%s</td> </tr> </table> </form> </div> ''' % ( form_name, form_name, name, _('GID'), _('immutable'), group['gid'], _('Name'), _('immutable'), name, members_html, resps_html, guests_html, w.button(_('<< Go back'), "/groups/list", accesskey=_('B')), w.submit('print', _('Print') + ' >>', onClick="javascript:window.print(); return false;", accesskey=_('P')) ) except exceptions.LicornException, e: data += w.error(_("Group %s doesn't exist (%s, %s)!") % ( name, "group = g[groups.name_to_gid(name)]", e)) return (w.HTTP_TYPE_TEXT, w.page(title, data))
resps = groups.all_members(configuration.groups.resp_prefix + name) resps.sort() guests = \ groups.all_members(configuration.groups.guest_prefix + name) guests.sort()
resps = groups.all_members(configuration.groups.resp_prefix + name)
def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid)
<h2>%s</h2><div style="text-align:center;">%s</div>
<h2>%s</h2> <div style="text-align:left;">%s</div>
def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid)
''' % (_('Guests'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, guests))) else: guests_html = "<h2>%s</h2>" % _('No guests for this group.')
''' % ( _('Guests'), _('(ordered by login)'), _('Full Name'), _('Identifier'), _('UID'), "\n".join(map(user_line, guests)) ) else: guests_html = "<h2>%s</h2>" % _('No guests in this group.')
def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid)
<div id="content">
<div id="details">
def user_line(login): uid = users.login_to_uid(login) return '''<tr><td>%s</td><td>%s</td><td>%s</td></tr>''' % ( u[uid]['gecos'], login, uid)
if not UsersController.is_system_uid(uid):
if UsersController.is_system_uid(uid): logging.progress("Checking system account %s..." % \ styles.stylize(styles.ST_NAME, user)) if os.path.exists(self.users[uid]['homeDirectory']): home_dir_info = [ { 'path' : self.users[uid]['homeDirectory'], 'user' : user, 'group' : self.groups.groups[ self.users[uid]['gidNumber']]['name'], 'mode' : 00700, 'content_mode': 00600 } ] all_went_ok &= fsapi.check_dirs_and_contents_perms_and_acls( home_dir_info, batch, auto_answer, UsersController.groups, self) else:
def check_user(user, minimal = minimal, batch = batch, auto_answer = auto_answer):
print dir(self.backends)
def SetMissingMandatoryDefauts(self): """ The defaults set here are expected to exist by other parts of the programs. """
raise exceptions.LicornRuntimeError("Filesystem must be mounted with `acl' option:\n\t%s" % e)
raise exceptions.LicornRuntimeError("Filesystem must be mounted with 'acl' option:\n\t%s" % e)
def CheckBaseDirs(self, minimal = True, batch = False, auto_answer = None) : """Check and eventually repair default needed dirs."""
dirs_to_verify = [ { 'path' : self.home_backup_dir, 'user' : 'root', 'group' : 'acl', 'access_acl' : "%s,%s,%s" % (acl_base, acl_admins_ro, acl_mask), 'default_acl' : "%s,%s,%s" % (acl_base, acl_admins_ro, acl_mask), 'content_acl' : ("%s,%s,%s" % (acl_base, acl_admins_ro, acl_mask)).replace('r-x', 'r--').replace('rwx', 'rw-'), }, { 'path' : self.home_archive_dir, 'user' : 'root', 'group' : 'acl', 'access_acl' : "%s,%s,%s" % (acl_base, acl_admins_rw, acl_mask), 'default_acl' : "%s,%s,%s" % (acl_base, acl_admins_rw, acl_mask), 'content_acl' : ("%s,%s,%s" % (acl_base, acl_admins_rw, acl_mask)).replace('r-x', 'r--').replace('rwx', 'rw-'), } ] fsapi.check_dirs_and_contents_perms_and_acls(dirs_to_verify, batch = True, allgroups = groups)
home_backup_dir_info['content_acl'] = ("%s,%s,%s" % (acl_base, acl_admins_ro, acl_mask) ).replace('r-x', 'r--').replace('rwx', 'rw-') home_archive_dir_info['content_acl'] = ("%s,%s,%s" % (acl_base, acl_admins_rw, acl_mask) ).replace('r-x', 'r--').replace('rwx', 'rw-') dirs_to_verify = [ home_backup_dir_info, home_archive_dir_info ] fsapi.check_dirs_and_contents_perms_and_acls(dirs_to_verify, batch = True, allgroups = groups)
def CheckBaseDirs(self, minimal = True, batch = False, auto_answer = None) : """Check and eventually repair default needed dirs."""
_("Definitely remove account from the LMC.system."))
_("Definitely remove account from the system."))
def html_build_compact(index, accounts = accounts): uid = ordered[index] login = u[uid]['login'] edit = (_('''<em>Click to edit current user account parameters:</em> <br /> UID: <strong>%d</strong><br /> GID: %d (primary group <strong>%s</strong>)<br /><br /> Groups:&#160;<strong>%s</strong><br /><br /> Privileges:&#160;<strong>%s</strong><br /><br /> Responsabilities:&#160;<strong>%s</strong><br /><br /> Invitations:&#160;<strong>%s</strong><br /><br /> ''') % ( uid, u[uid]['gidNumber'], g[u[uid]['gidNumber']]['name'], ", ".join(filter(lambda x: x in std_grps, u[uid]['groups'])), ", ".join(filter(lambda x: x in pri_grps, u[uid]['groups'])), ", ".join(filter(lambda x: x in rsp_grps, u[uid]['groups'])), ", ".join(filter( lambda x: x in gst_grps, u[uid]['groups'])))).replace( '<','&lt;').replace('>','&gt;')
'(objectClass=o)')
'(objectClass=organization)')
def last_init_check(self): """ do a quick LDAP content check, to validate everything is valid. """
if login in groups.all_members('remotessh'): description += _("""<br /><br /> But this will not block incoming %s network connections, if the user uses %s %s or %s public/private keys. To block ANY access to the system, <strong>remove him/her from remotessh group</strong>.""") % (w.acr('SSH'), w.acr('SSH'), w.acr('RSA'), w.acr('DSA')) form_options = w.checkbox("remove_remotessh", "True", _("Remove user from group <code>remotessh</code> in the same time."), checked = True, accesskey = _('R'))
if configuration.ssh.enabled : if login in groups.all_members(configuration.ssh.group): description += _("""<br /><br /> But this will not block incoming %s network connections, if the user uses %s %s or %s public/private keys. To block ANY access to the system, <strong>remove him/her from %s group</strong>.""") % (w.acr('SSH'), w.acr('SSH'), w.acr('RSA'), w.acr('DSA'), configuration.ssh.group) form_options = w.checkbox("remove_remotessh", "True", _("Remove user from group <code>remotessh</code> in the same time."), checked = True, accesskey = _('R')) else: form_options = None
def lock(uri, http_user, login, sure = False, remove_remotessh = False, yes = None): """lock a user account password.""" # forget about it, this is a scoria from the POST FORM to variable conversion. del yes groups.reload() users.reload() title = _("Lock account %s") % login data = w.page_body_start(uri, http_user, ctxtnav, title) if not sure: description = _('''This will prevent user to connect to network clients (thin ones, and Windows&reg;, %s/Linux&reg; and Macintosh&reg; ones).''') % w.acr('GNU') # TODO: Vérifier que le groupe "remotessh" existe bien sur le système... if login in groups.all_members('remotessh'): description += _("""<br /><br /> But this will not block incoming %s network connections, if the user uses %s %s or %s public/private keys. To block ANY access to the system, <strong>remove him/her from remotessh group</strong>.""") % (w.acr('SSH'), w.acr('SSH'), w.acr('RSA'), w.acr('DSA')) form_options = w.checkbox("remove_remotessh", "True", _("Remove user from group <code>remotessh</code> in the same time."), checked = True, accesskey = _('R')) else: form_options = None data += w.question(_("Are you sure you want to lock account <strong>%s</strong>?") % login, description, yes_values = [ _("Lock >>"), "/users/lock/%s/sure" % login, _("L") ], no_values = [ _("<< Cancel"), "/users/list", _("C") ], form_options = form_options) data += w.page_body_end() return w.page(title, data) else: if users.is_system_login(login): return w.page(title, w.error(_("Failed to lock account"), [ _("alter system account.") ], _("insufficient permissions to perform operation."))) # we are sure, do it ! command = [ "sudo", "mod", "user", "--quiet", "--no-colors", "--login", login, "--lock" ] if remove_remotessh: command.extend(['--del-groups', 'remotessh']) data += w.page_body_end() return w.page(title, data + w.run(command, uri, err_msg = _("Failed to lock account <strong>%s</strong>!") % login))
if remove_remotessh: command.extend(['--del-groups', 'remotessh'])
if configuration.ssh.enabled and remove_remotessh: command.extend(['--del-groups', configuration.ssh.group])
def lock(uri, http_user, login, sure = False, remove_remotessh = False, yes = None): """lock a user account password.""" # forget about it, this is a scoria from the POST FORM to variable conversion. del yes groups.reload() users.reload() title = _("Lock account %s") % login data = w.page_body_start(uri, http_user, ctxtnav, title) if not sure: description = _('''This will prevent user to connect to network clients (thin ones, and Windows&reg;, %s/Linux&reg; and Macintosh&reg; ones).''') % w.acr('GNU') # TODO: Vérifier que le groupe "remotessh" existe bien sur le système... if login in groups.all_members('remotessh'): description += _("""<br /><br /> But this will not block incoming %s network connections, if the user uses %s %s or %s public/private keys. To block ANY access to the system, <strong>remove him/her from remotessh group</strong>.""") % (w.acr('SSH'), w.acr('SSH'), w.acr('RSA'), w.acr('DSA')) form_options = w.checkbox("remove_remotessh", "True", _("Remove user from group <code>remotessh</code> in the same time."), checked = True, accesskey = _('R')) else: form_options = None data += w.question(_("Are you sure you want to lock account <strong>%s</strong>?") % login, description, yes_values = [ _("Lock >>"), "/users/lock/%s/sure" % login, _("L") ], no_values = [ _("<< Cancel"), "/users/list", _("C") ], form_options = form_options) data += w.page_body_end() return w.page(title, data) else: if users.is_system_login(login): return w.page(title, w.error(_("Failed to lock account"), [ _("alter system account.") ], _("insufficient permissions to perform operation."))) # we are sure, do it ! command = [ "sudo", "mod", "user", "--quiet", "--no-colors", "--login", login, "--lock" ] if remove_remotessh: command.extend(['--del-groups', 'remotessh']) data += w.page_body_end() return w.page(title, data + w.run(command, uri, err_msg = _("Failed to lock account <strong>%s</strong>!") % login))
ProfilesController.configuration.users.base_path,
def ExportCLI(self): """ Export the user profiles list to human readable form. """ data = ""
and gid > LMC.configuration.groups.gid_max
or gid > LMC.configuration.groups.gid_max
def is_restricted_system_gid(self, gid): """ Return true if gid is system, but outside the range of Licorn® controlled GIDs.""" return gid < LMC.configuration.groups.system_gid_min \ and gid > LMC.configuration.groups.gid_max
command = [ "sudo", "mod", "user", "--quiet", "--no-colors", "--login", login, '--apply-skel', skel ]
command = [ "sudo", "mod", "user", "--quiet", "--no-colors", "--login", login, '--apply-skel', apply_skel ]
def filter_skels(pri_group, sk_list): ''' TODO: to be converted to licorn model if pri_group == configuration.mNames['RESPONSABLES_GROUP']: return filter(lambda x: x.rfind("/%s/" % configuration.mNames['RESPONSABLES_GROUP']) != -1, sk_list) elif pri_group == configuration.mNames['USAGERS_GROUP']: return filter(lambda x: x.rfind("/%s/" % configuration.mNames['USAGERS_GROUP']) != -1, sk_list) else: ''' return sk_list
return styles.stylize(styles.ST_NAME, ' '.join(cmd))
return stylize(ST_NAME, ' '.join(cmd))
def cmdfmt(cmd): '''convert a sequence to a colorized string.''' return styles.stylize(styles.ST_NAME, ' '.join(cmd))
% (styles.colors[styles.ST_LOG], msg, styles.colors[styles.ST_NO]) )
% (colors[ST_LOG], msg, colors[ST_NO]) )
def test_message(msg): """ display a message to stderr. """ sys.stderr.write("%s>>> %s%s\n" % (styles.colors[styles.ST_LOG], msg, styles.colors[styles.ST_NO]) )
sys.stderr.write("%s>>> running %s%s%s\n" % (styles.colors[styles.ST_LOG], styles.colors[styles.ST_PATH], command, styles.colors[styles.ST_NO]))
sys.stderr.write("%s>>> running %s%s%s\n" % (colors[ST_LOG], colors[ST_PATH], command, colors[ST_NO]))
def log_and_exec (command, inverse_test=False, result_code=0, comment="", verb=verbose): """Display a command, execute it, and exit if soemthing went wrong.""" #if not command.startswith('colordiff'): # command += ' %s' % ' '.join(args) sys.stderr.write("%s>>> running %s%s%s\n" % (styles.colors[styles.ST_LOG], styles.colors[styles.ST_PATH], command, styles.colors[styles.ST_NO])) output, retcode = execute(command) must_exit = False # # TODO: implement a precise test on a precise exit value. # for example, when you try to add a group with an invalid name, # licorn-add should exit (e.g.) 34. We must test on this precise # value and not on != 0, because if something wrong but *other* than # errno 34 happened, we won't know it if we don't check carefully the # program output. # if inverse_test: if retcode != result_code: must_exit = True else: if retcode != 0: must_exit = True if must_exit: if inverse_test: test = (" %s→ it should have failed with reason: %s%s%s\n" % (styles.colors[styles.ST_PATH], styles.colors[styles.ST_BAD], comment, styles.colors[styles.ST_NO])) else: test = "" sys.stderr.write(" %s→ return code of command: %s%d%s (expected: %d)%s\n%s → log follows:\n" % ( styles.colors[styles.ST_LOG], styles.colors[styles.ST_BAD], retcode, styles.colors[styles.ST_LOG], result_code, styles.colors[styles.ST_NO], test) ) sys.stderr.write(output) sys.stderr.write( "The last command failed to execute, or return something wrong !\n") raise SystemExit(retcode) if verb: sys.stderr.write(output)
% (styles.colors[styles.ST_PATH], styles.colors[styles.ST_BAD], comment, styles.colors[styles.ST_NO]))
% (colors[ST_PATH], colors[ST_BAD], comment, colors[ST_NO]))
def log_and_exec (command, inverse_test=False, result_code=0, comment="", verb=verbose): """Display a command, execute it, and exit if soemthing went wrong.""" #if not command.startswith('colordiff'): # command += ' %s' % ' '.join(args) sys.stderr.write("%s>>> running %s%s%s\n" % (styles.colors[styles.ST_LOG], styles.colors[styles.ST_PATH], command, styles.colors[styles.ST_NO])) output, retcode = execute(command) must_exit = False # # TODO: implement a precise test on a precise exit value. # for example, when you try to add a group with an invalid name, # licorn-add should exit (e.g.) 34. We must test on this precise # value and not on != 0, because if something wrong but *other* than # errno 34 happened, we won't know it if we don't check carefully the # program output. # if inverse_test: if retcode != result_code: must_exit = True else: if retcode != 0: must_exit = True if must_exit: if inverse_test: test = (" %s→ it should have failed with reason: %s%s%s\n" % (styles.colors[styles.ST_PATH], styles.colors[styles.ST_BAD], comment, styles.colors[styles.ST_NO])) else: test = "" sys.stderr.write(" %s→ return code of command: %s%d%s (expected: %d)%s\n%s → log follows:\n" % ( styles.colors[styles.ST_LOG], styles.colors[styles.ST_BAD], retcode, styles.colors[styles.ST_LOG], result_code, styles.colors[styles.ST_NO], test) ) sys.stderr.write(output) sys.stderr.write( "The last command failed to execute, or return something wrong !\n") raise SystemExit(retcode) if verb: sys.stderr.write(output)
% ( styles.colors[styles.ST_LOG], styles.colors[styles.ST_BAD], retcode, styles.colors[styles.ST_LOG], result_code, styles.colors[styles.ST_NO], test) )
% ( colors[ST_LOG], colors[ST_BAD], retcode, colors[ST_LOG], result_code, colors[ST_NO], test) )
def log_and_exec (command, inverse_test=False, result_code=0, comment="", verb=verbose): """Display a command, execute it, and exit if soemthing went wrong.""" #if not command.startswith('colordiff'): # command += ' %s' % ' '.join(args) sys.stderr.write("%s>>> running %s%s%s\n" % (styles.colors[styles.ST_LOG], styles.colors[styles.ST_PATH], command, styles.colors[styles.ST_NO])) output, retcode = execute(command) must_exit = False # # TODO: implement a precise test on a precise exit value. # for example, when you try to add a group with an invalid name, # licorn-add should exit (e.g.) 34. We must test on this precise # value and not on != 0, because if something wrong but *other* than # errno 34 happened, we won't know it if we don't check carefully the # program output. # if inverse_test: if retcode != result_code: must_exit = True else: if retcode != 0: must_exit = True if must_exit: if inverse_test: test = (" %s→ it should have failed with reason: %s%s%s\n" % (styles.colors[styles.ST_PATH], styles.colors[styles.ST_BAD], comment, styles.colors[styles.ST_NO])) else: test = "" sys.stderr.write(" %s→ return code of command: %s%d%s (expected: %d)%s\n%s → log follows:\n" % ( styles.colors[styles.ST_LOG], styles.colors[styles.ST_BAD], retcode, styles.colors[styles.ST_LOG], result_code, styles.colors[styles.ST_NO], test) ) sys.stderr.write(output) sys.stderr.write( "The last command failed to execute, or return something wrong !\n") raise SystemExit(retcode) if verb: sys.stderr.write(output)
return re.sub(r'\s\[\d\d\d\d/\d\d/\d\d\s\d\d:\d\d:\d\d\.\d\d\d\d\]\s',
return re.sub(r'(\.\d\d\d\d\d\d\d\d-\d\d\d\d\d\d|\s\[\d\d\d\d/\d\d/\d\d\s\d\d:\d\d:\d\d\.\d\d\d\d\]\s)',
def strip_dates(str): """ strip dates from warnings and traces, else outputs and references always compare false .""" return re.sub(r'\s\[\d\d\d\d/\d\d/\d\d\s\d\d:\d\d:\d\d\.\d\d\d\d\]\s', r' [D/T] ', str)
class FunctionnalTest:
def save_state(num, state_type='scenarii'): open(state_files[state_type],'w').write('%d' % num) def get_state(state_type='scenarii'): if os.path.exists(state_files[state_type]): return int(open(state_files[state_type]).read()) else: return 0 class ScenarioTest:
def strip_dates(str): """ strip dates from warnings and traces, else outputs and references always compare false .""" return re.sub(r'\s\[\d\d\d\d/\d\d/\d\d\s\d\d:\d\d:\d\d\.\d\d\d\d\]\s', r' [D/T] ', str)
def __init__(self, cmd, pre_cmds=[], chk_cmds=[], manual_output=False, reference_cmd=[], context='std'): if type(cmd) == type(''): self.cmd = cmd.split(' ') else: self.cmd = cmd self.pre_cmds = pre_cmds self.chk_cmds = chk_cmds self.reference_cmd = reference_cmd self.context = context self.manual_output = manual_output FunctionnalTest.counter += 1 def Prepare(self, cmd): """ Run commands mandatory for func_test to succeed. """ make_path = lambda x: ('_'.join(x)).replace( '../', '').replace('./', '').replace('//','_').replace( '/','_').replace('>','_').replace('&', '_').replace( '`', '_').replace('\\','_').replace("'",'_').replace( '|','_').replace('^','_').replace('%', '_').replace( '(', '_').replace(')', '_').replace ('*', '_').replace( ' ', '_').replace('__', '_') out_path = 'data/' if self.reference_cmd != []: out_path += 'ref_%s/' % make_path(self.reference_cmd) if self.pre_cmds != []: logging.progress('preparing system for cmd %s.' % cmd) for pre_cmd in self.pre_cmds: out_path += 'pre_%s/' % make_path(pre_cmd) execute(pre_cmd) out_path += 'cmd_%s/context_%s' % (make_path(cmd), self.context) self.ref_output_file = '%s/out.txt' % out_path self.ref_code_file = '%s/code.txt' % out_path def SaveOutput(self, output, code):
def __init__(self, cmds, context='std', descr=None): self.context = context self.sce_number = ScenarioTest.counter self.cmd_counter = 0 self.name = '%s%s%s%s%s' % ( stylize(ST_NAME, 'Scenario stylize(ST_OK, ScenarioTest.counter), stylize(ST_NAME, ' (%s)' % descr) if descr else '', stylize(ST_NAME, ', context '), stylize(ST_OK, self.context)) ScenarioTest.counter += 1 self.cmds = {} for cmd in cmds: self.cmds[self.cmd_counter] = cmd self.cmd_counter += 1 self.hash = hashlib.sha1(self.name).hexdigest() self.base_path = 'data/scenarii/%s' % self.hash def SaveOutput(self, cmdnum, output, code):
def __init__(self, cmd, pre_cmds=[], chk_cmds=[], manual_output=False, reference_cmd=[], context='std'):
os.makedirs(os.path.dirname(self.ref_output_file))
os.makedirs('%s/%s' % (self.base_path, cmdnum))
def SaveOutput(self, output, code):
open(self.ref_output_file, 'w').write(strip_dates(output)) open(self.ref_code_file, 'w').write(str(code)) def PrepareReferenceOutput(self, cmd): if os.path.exists(self.ref_output_file): return (open(self.ref_output_file).read(), int(open(self.ref_code_file).read()))
open('%s/%s/cmdline.txt' % (self.base_path, cmdnum), 'w').write( ' '.join(self.cmds[cmdnum])) open('%s/%s/out.txt' % (self.base_path, cmdnum), 'w').write( strip_dates(output)) open('%s/%s/code.txt' % (self.base_path, cmdnum), 'w').write(str(code)) def RunCommand(self, cmdnum, batch=False): if os.path.exists('%s/%s' % (self.base_path, cmdnum)): ref_output = open('%s/%s/out.txt' % (self.base_path, cmdnum)).read() ref_code = int(open( '%s/%s/code.txt' % (self.base_path, cmdnum)).read()) output, retcode = execute(self.cmds[cmdnum]) output = strip_dates(output) if retcode != ref_code or ref_output != output: handle, tmpfilename = tempfile.mkstemp( prefix=clean_path_name(self.cmds[cmdnum])) open(tmpfilename, 'w').write(output) diff_output = process.execute(['colordiff', '-u', '%s/%s/out.txt' % (self.base_path, cmdnum), tmpfilename])[0] logging.warning( '''command '''Diffed output follows:\n%s\n%s''' % ( stylize(ST_OK, cmdnum), stylize(ST_BAD, retcode), stylize(ST_OK, ref_code), stylize(ST_NAME, cmdfmt(self.cmds[cmdnum])), '-' * 50, diff_output, '-' * 50)) if batch or logging.ask_for_repair('''Should I keep the new ''' '''return code and trace as reference for future runs?'''): self.SaveOutput(cmdnum, output, retcode) else: raise exceptions.LicornRuntimeException( 'command "%s" failed.\nPath: %s.' % ( cmdfmt(self.cmds[cmdnum]), '%s/%s/*' % ( self.base_path, cmdnum))) else: logging.notice('command cmdnum, cmdfmt(self.cmds[cmdnum])))
def SaveOutput(self, output, code):
logging.notice('no reference output for cmd FunctionnalTest.counter, cmdfmt(cmd), 'referer=%s, ' % cmdfmt(self.reference_cmd) \ if self.reference_cmd != [] else '', self.context)) output, retcode = execute(cmd)
logging.notice('''no reference output for %s, cmd ''' creating one…''' % (self.name, stylize(ST_OK, cmdnum), cmdfmt(self.cmds[cmdnum]))) output, retcode = execute(self.cmds[cmdnum])
def PrepareReferenceOutput(self, cmd):
if logging.ask_for_repair('is this output good to keep as reference for future runs?'): self.SaveOutput(output, retcode)
if logging.ask_for_repair('''is this output good to keep as ''' '''reference for future runs?'''): self.SaveOutput(cmdnum, output, retcode)
def PrepareReferenceOutput(self, cmd):
logging.error('you MUST have a reference output; please fix code or rerun this test.') def RunAndCheck(self, cmd, batch = False, inverse_test=False): ref_output, ref_code = self.PrepareReferenceOutput(cmd) output, retcode = execute(cmd) bad_run = False message = '' if retcode != ref_code: logging.warning( '''command "%s" failed (retcode %s instead of %s).\n''' '''(Reference path: %s)''' % ( styles.stylize(styles.ST_NAME, cmdfmt(cmd)), styles.stylize(styles.ST_BAD,retcode), styles.stylize(styles.ST_OK, ref_code), self.ref_code_file)) if batch or logging.ask_for_repair( 'Should I keep the new return code as reference for future runs?'): self.SaveOutput(output, retcode) else: raise exceptions.LicornRuntimeException( 'command "%s" failed.\nPath: %s.' % (cmdfmt(cmd), self.ref_output_file)) if ref_output != strip_dates(output): logging.warning('command "%s" failed.\nPath: %s.\n%s New output follows:' % ( cmdfmt(cmd), self.ref_output_file, '-' * 50)) sys.stdout.write(strip_dates(output) + ('-' * 50) + '\n') if batch or logging.ask_for_repair( 'Should I keep this new trace as reference for future runs?'): self.SaveOutput(output, retcode) else: raise exceptions.LicornRuntimeException( 'command "%s" failed.\nPath: %s.' % (cmdfmt(cmd), self.ref_output_file)) logging.notice('command FunctionnalTest.counter, cmdfmt(cmd), 'referer=%s, ' % cmdfmt(self.reference_cmd) \ if self.reference_cmd != [] else '', self.context, retcode)) def Run(self, options=[], batch=False, inverse_test=False): if self.manual_output: if batch: logging.warning('batch mode, cmd "%s" not tested !' % \ cmdfmt(self.cmd)) else: clear_term() test_message('running FunctionnalTest.counter, cmdfmt(self.cmd))) sys.stderr.write(execute(self.cmd)[0]) return logging.ask_for_repair( 'does this output seems right to you for this command?') else: self.Prepare(self.cmd) self.RunAndCheck(self.cmd, batch=batch, inverse_test=inverse_test) for chk_cmd in self.chk_cmds: FunctionnalTest(chk_cmd, reference_cmd=self.cmd).Run() for option in options: FunctionnalTest.counter += 1 self.Prepare(self.cmd + option) self.RunAndCheck(self.cmd + option, batch=batch, inverse_test=inverse_test) for chk_cmd in self.chk_cmds: FunctionnalTest(chk_cmd, reference_cmd=self.cmd).Run() def test_integrated_help ():
logging.error('''you MUST have a reference output; please ''' '''fix code or rerun this test.''') def Run(self, options=[], batch=False, inverse_test=False, ): """ run each command of the scenario, in turn. """ start_scenario = get_state() if self.sce_number < start_scenario: logging.notice('Skipping %s' % stylize(ST_NAME, self.name)) return logging.notice('Running %s' % stylize(ST_NAME, self.name)) for cmdnum in self.cmds: self.RunCommand(cmdnum) save_state(self.sce_number+1) logging.notice('End run %s' % stylize(ST_NAME, self.name)) @staticmethod def reinit(): ScenarioTest.counter = 0 save_state(0) def test_integrated_help():
def PrepareReferenceOutput(self, cmd):
test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']])
commands = [] for program in (GET, ADD, MOD, DEL, CHK): commands.extend([ program + ['-h'], program + ['--help']])
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
elif program == MODIFY:
elif program == MOD:
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
elif program == DELETE:
elif program == DEL:
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
elif program == GETENT:
elif program == GET:
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
elif program == CHECK:
elif program == CHK:
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run()
if program == GET and mode == 'configuration': commands.append(program + [ mode ])
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
commands.extend([ program + [ mode, '-h'], program + [ mode, '--help'] ]) ScenarioTest(commands, descr="integrated help").Run()
def test_integrated_help (): """Test extensively argmarser contents and intergated help.""" test_message('testing integrated help.') for program in (GETENT, ADD, MODIFY, DELETE, CHECK): FunctionnalTest(program).Run(options = [['-h'], ['--help']]) if program == ADD: modes = [ 'user', 'users', 'group', 'profile' ] elif program == MODIFY: modes = [ 'configuration', 'user', 'group', 'profile' ] elif program == DELETE: modes = [ 'user', 'group', 'groups', 'profile' ] elif program == GETENT: modes = ['user', 'users', 'passwd', 'group', 'groups', 'profiles', 'configuration' ] elif program == CHECK: modes = ['user', 'users', 'group', 'groups', 'profile', 'profiles', 'configuration' ] for mode in modes: if program == GETENT and mode == 'configuration': FunctionnalTest(program + [mode]).Run() else: FunctionnalTest(program + [mode]).Run(options = [['-h'], ['--help']]) test_message('integrated help testing finished.')
test_message('''starting get tests.''')
commands = []
def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''')