rem
stringlengths 0
322k
| add
stringlengths 0
2.05M
| context
stringlengths 8
228k
|
---|---|---|
FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() | commands.append(GET + [ 'configuration', category, mode ]) | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') |
FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( | commands.append(GET + [ 'config', category ]) commands += [ | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') |
GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], | GET + [ "users" ], GET + [ "users", "--xml" ], GET + [ "users", "--long" ], GET + [ "users", "--long", "--xml" ], GET + [ "users", "--all" ], GET + [ "users", "--xml", "--all" ], GET + [ "users", "--all", "--long" ], GET + [ "users", "--xml", "--all", "--long" ], | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') |
GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], | GET + [ "groups" ], GET + [ "groups", "--xml" ], GET + [ "groups", "--long" ], GET + [ "groups", "--long", "--xml" ], GET + [ "groups", "--xml", "--all" ], GET + [ "groups", "--xml", "--all", "--long" ], GET + [ "groups", "--xml", "--guests" ], GET + [ "groups", "--xml", "--guests", "--long" ], GET + [ "groups", "--xml", "--responsibles" ], GET + [ "groups", "--xml", "--responsibles", "--long" ], GET + [ "groups", "--xml", "--privileged" ], GET + [ "groups", "--xml", "--privileged", "--long" ], | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') |
GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') | GET + [ "profiles" ], GET + [ "profiles", "--xml" ], ] ScenarioTest(commands, context=context, descr="get tests").Run() | def test_get(context): """Test GET a lot.""" test_message('''starting get tests.''') for category in [ 'config_dir', 'main_config_file', 'extendedgroup_data_file' ]: for mode in [ '', '-s', '-b', '--bourne-shell', '-c', '--c-shell', '-p', '--php-code' ]: FunctionnalTest(GETENT + [ 'configuration', category, mode ], context=context).Run() for category in [ 'skels', 'shells', 'backends' ]: FunctionnalTest(GETENT + [ 'config', category ], context=context).Run() commands = ( # users GETENT + [ "users" ], GETENT + [ "users", "--xml" ], GETENT + [ "users", "--long" ], GETENT + [ "users", "--long", "--xml" ], GETENT + [ "users", "--all" ], GETENT + [ "users", "--xml", "--all" ], GETENT + [ "users", "--all", "--long" ], GETENT + [ "users", "--xml", "--all", "--long" ], # groups GETENT + [ "groups" ], GETENT + [ "groups", "--xml" ], GETENT + [ "groups", "--long" ], GETENT + [ "groups", "--long", "--xml" ], GETENT + [ "groups", "--xml", "--all" ], GETENT + [ "groups", "--xml", "--all", "--long" ], GETENT + [ "groups", "--xml", "--guests" ], GETENT + [ "groups", "--xml", "--guests", "--long " ], GETENT + [ "groups", "--xml", "--responsibles" ], GETENT + [ "groups", "--xml", "--responsibles", "--long" ], GETENT + [ "groups", "--xml", "--privileged" ], GETENT + [ "groups", "--xml", "--privileged", "--long" ], # Profiles GETENT + [ "profiles" ], GETENT + [ "profiles", "--xml" ], ) for command in commands: FunctionnalTest(command, context=context) test_message('''`get` tests finished.''') |
ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHECK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'group', "--name='echo print coucou | python | nothing'"], ADD + [ 'group', "--name='**/*-'"], CHECK + [ 'group', '-v', "--name='**/*-'"] | ADD + [ 'group', "--name='_- -_'"], CHK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'group', "--name='echo print coucou | python | nothing'"], ADD + [ 'group', "--name='**/*-'"], CHK + [ 'group', '-v', "--name='**/*-'"] | def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHECK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'group', "--name='echo print coucou | python | nothing'"], ADD + [ 'group', "--name='**/*-'"], CHECK + [ 'group', '-v', "--name='**/*-'"] ]) # users related regexes_commands.extend([ ADD + [ 'user', "--login='_- -_'"], ADD + [ 'user', "--login=';-)'"], ADD + [ 'user', "--login='^_^'"], ADD + [ 'user', "--login='le copain des utilisateurs'"], ADD + [ 'user', "--login='héhéhé'"], ADD + [ 'user', "--login='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'user', "--login='echo print coucou | python'"], ADD + [ 'user', "--login='**/*-'"] ]) for cmd in regexes_commands: FunctionnalTest(cmd).Run() # TODO: profiles ? test_message('''regexes tests finished.''') |
for cmd in regexes_commands: FunctionnalTest(cmd).Run() | ScenarioTest(regexes_commands).Run() | def test_regexes(): """ Try funky strings to make regexes fail (they should not).""" # TODO: test regexes directly from defs in licorn.core.... test_message('''starting regexes tests.''') regexes_commands = [] # groups related regexes_commands.extend([ ADD + [ 'group', "--name='_- -_'"], CHECK + [ 'group', "--name='_- -_'"], ADD + [ 'group', "--name=';-)'"], ADD + [ 'group', "--name='^_^'"], ADD + [ 'group', "--name='le copain des groupes'"], CHECK + [ 'group', '-v', "--name='le copain des groupes'"], ADD + [ 'group', "--name='héhéhé'"], ADD + [ 'group', "--name='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'group', "--name='echo print coucou | python | nothing'"], ADD + [ 'group', "--name='**/*-'"], CHECK + [ 'group', '-v', "--name='**/*-'"] ]) # users related regexes_commands.extend([ ADD + [ 'user', "--login='_- -_'"], ADD + [ 'user', "--login=';-)'"], ADD + [ 'user', "--login='^_^'"], ADD + [ 'user', "--login='le copain des utilisateurs'"], ADD + [ 'user', "--login='héhéhé'"], ADD + [ 'user', "--login='%(\`ls -la /etc/passwd\`)'"], ADD + [ 'user', "--login='echo print coucou | python'"], ADD + [ 'user', "--login='**/*-'"] ]) for cmd in regexes_commands: FunctionnalTest(cmd).Run() # TODO: profiles ? test_message('''regexes tests finished.''') |
['group', '--name=test_users_A'], ['group', '--name=test_users_B'], ['group', '--name=groupeA'], ['group', '--name=B-Group_Test'], ['group', '--name=groupe_a_skel'] | ['group', 'test_users_A'], ['group', 'test_users_B'], ['group', 'groupeA'], ['group', 'B-Group_Test'], ['group', 'groupe_a_skel'], ['group', 'ACL_tests'], ['group', 'MOD_tests'], ['group', 'SYSTEM-test'], ['group', 'SKEL-tests'] | def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu'], ['user', 'tata'], ['user', '--login=utilisager.normal'], ['user', '--login=test.responsibilly'], ['user', '--login=utilicateur.accentue'], ['profile', '--group=utilisagers', '--del-users', '--no-archive'], ['profile', '--group=responsibilisateurs', '--del-users', '--no-archive'], ['group', '--name=test_users_A'], ['group', '--name=test_users_B'], ['group', '--name=groupeA'], ['group', '--name=B-Group_Test'], ['group', '--name=groupe_a_skel'] ): execute(DELETE + argument) os.system('rm -rf %s/* %s/*' % (configuration.home_backup_dir, configuration.home_archive_dir)) test_message('''system cleaned from previous testsuite runs.''') |
execute(DELETE + argument) os.system('rm -rf %s/* %s/*' % (configuration.home_backup_dir, | execute(DEL + argument) os.system('sudo rm -rf %s/* %s/*' % (configuration.home_backup_dir, | def clean_system(): """ Remove all stuff to make the system clean, testsuite-wise.""" test_message('''cleaning system from previous runs.''') # delete them first in case of a previous failed testsuite run. # don't check exit codes or such, this will be done later. for argument in ( ['user', 'toto'], ['user', 'tutu'], ['user', 'tata'], ['user', '--login=utilisager.normal'], ['user', '--login=test.responsibilly'], ['user', '--login=utilicateur.accentue'], ['profile', '--group=utilisagers', '--del-users', '--no-archive'], ['profile', '--group=responsibilisateurs', '--del-users', '--no-archive'], ['group', '--name=test_users_A'], ['group', '--name=test_users_B'], ['group', '--name=groupeA'], ['group', '--name=B-Group_Test'], ['group', '--name=groupe_a_skel'] ): execute(DELETE + argument) os.system('rm -rf %s/* %s/*' % (configuration.home_backup_dir, configuration.home_archive_dir)) test_message('''system cleaned from previous testsuite runs.''') |
execute(['cp', '-f', '/etc/' + file, | execute([ 'sudo', 'cp', '-f', '/etc/%s' % file, | def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): execute(['cp', '-f', '/etc/' + file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.1.ldif']) else: logging.error('backup mode not understood.') test_message('''made backups of system config files.''') |
execute(['slapcat', '-l', '/tmp/backup.1.ldif']) | execute(['sudo', 'slapcat', '-l', '/tmp/backup.1.ldif']) | def make_backups(mode): """Make backup of important system files before messing them up ;-) """ # this is mandatory, else there could be some inconsistencies following # backend (de)activation, and backup comparison could fail (false-negative) # because of this. execute(['chk', 'config', '-avvb']) if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): execute(['cp', '-f', '/etc/' + file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.1.ldif']) else: logging.error('backup mode not understood.') test_message('''made backups of system config files.''') |
log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, | log_and_exec(['sudo', '/usr/bin/colordiff', '/etc/%s' % file, | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) else: logging.error('backup mode not understood.') test_message('''system config files backup comparison finished successfully.''') |
execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) | execute(['sudo', 'rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) else: logging.error('backup mode not understood.') test_message('''system config files backup comparison finished successfully.''') |
execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], | execute(['sudo', 'slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['sudo', '/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) else: logging.error('backup mode not understood.') test_message('''system config files backup comparison finished successfully.''') |
execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) | execute(['sudo', 'rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) | def compare_delete_backups(mode): test_message('''comparing backups of system files after tests for side-effects alterations.''') if mode == 'unix': for file in system_files: if os.path.exists('/etc/%s' % file): log_and_exec(['/usr/bin/colordiff', '/etc/%s' % file, '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/%s.bak.%s' % (file.replace('/', '_'), bkp_ext)]) elif mode == 'ldap': execute(['slapcat', '-l', '/tmp/backup.2.ldif']) log_and_exec(['/usr/bin/colordiff', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif'], False, comment="should not display any diff (system has been cleaned).", verb = True) execute(['rm', '/tmp/backup.1.ldif', '/tmp/backup.2.ldif']) else: logging.error('backup mode not understood.') test_message('''system config files backup comparison finished successfully.''') |
test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % ( | gname = 'groupeA' def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( | def test_groups(context): """Test ADD/MOD/DEL on groups in various ways.""" test_message('''starting groups related tests.''') group_name = 'groupeA' def gen_chk_acls_cmds(group): return [ 'getfacl', '-R', '%s/%s/%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group) ] FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context+'+already').Run() # re-run the ADD command and verify it fails. FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(inverse_test=True) # completeny remove the shared group dir and verify CHK repairs it. remove_group_cmds = [ "rm", "-rf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] # idem with public_html shared subdir. remove_group_html_cmds = [ "rm", "-rf", "%s/%s/%s/public_html" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] # remove the posix ACLs and let CHK correct everything (after having # declared an error first with --auto-no). remove_group_acls_cmds = [ "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] # idem for public_html subdir. remove_group_html_acls_cmds = [ "setfacl", "-R", "-b", "%s/%s/%s/public_html" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] bad_chown_group_cmds = ['chown', 'bin:daemon', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), '>/dev/null', '2>&1'] for pre_cmd in (remove_group_cmds, remove_group_html_cmds, remove_group_acls_cmds, remove_group_html_acls_cmds, bad_chown_group_cmds): for subopt in ('--auto-no', '--auto-yes', '-b'): FunctionnalTest( CHECK + [ 'group', '--name=%s' % group_name, subopt], pre_cmds = [ remove_group_acls_cmds], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(options = [['-v'], ['-ve'], ['-vv'], ['-vve']]) # should fail FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--skel=/etc/doesntexist" ],context=context).Run() # delete it from the system, not to pollute FunctionnalTest(DELETE + [ 'group', '--name', group_name, '--del-users', '--no-archive'], context=context).Run() group_name = 'B-Group_Test' FunctionnalTest(ADD + [ 'group', "--name=%s" % group_name, "--system" ], context=context).Run() # should produce nothing FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name], context=context).Run() FunctionnalTest(DELETE + ["group", "--name", group_name], context=context).Run() # FIXME: verify /etc/group /etc/licorn/groups /home/groupes/... # should fail because group is not present anymore. FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name ], context=context).Run() group_name = "groupe_a_skel" FunctionnalTest(ADD + [ "group", "--name=%s" % group_name, '''--description="Le groupe C s'il vous plaît..."''' ], context=context).Run() # should display a message saying that the group is already not permissive... FunctionnalTest(MODIFY + [ "group", '--name=%s' % group_name, '--not-permissive' ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run() # should change ACLs. FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--permissive" ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run() # another message saying that the group is already permissive. FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--permissive" ], context=context+'+already').Run() # NOT YET #log_and_exec(ADD + " group --name=groupeE --gid=1520") # RENAME IS NOT SUPPORTED YET !! #log_and_exec(MODIFY + " group --name=TestGroup_A --rename=leTestGroup_A/etc/power") # FIXME: get members of group for later verifications... FunctionnalTest(DELETE + ["group", "--name", group_name, '--del-users', '--no-archive'], context=context).Run() # FIXME: verify deletion of groups + deletion of users... # already deleted, should fail... FunctionnalTest(DELETE + ["group", "--name", group_name], context=context+'+already').Run() # FIXME: get members. #log_and_exec(DELETE + " group --name=groupeD --del-users") # FIXME: idem last group, verify users account were archived, shared dir ws archived. #os.system("rm -rf %s >/dev/null 2>&1" % ("/home/" + configuration.groups.names['plural'] + "/groupeD") ) FunctionnalTest(ADD + ["group", "--name=%s" % group_name, "--skel=/etc/skel", "--description='Vive les skel'"], context=context).Run() FunctionnalTest(DELETE + ["group", "--name", group_name], context=context).Run() # FIXME: verify /etc/group /etc/licorn/groups /home/groupes/... test_message('''groups related tests finished.''') |
group) ] FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context+'+already').Run() FunctionnalTest( ADD + [ 'group', '--name=%s' % group_name ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(inverse_test=True) | group, '/%s' % subdir if subdir else '') ] ScenarioTest([ ADD + [ 'group', '--name=%s' % gname, '-v' ], chk_acls_cmds(gname), ADD + [ 'group', gname ], ADD + [ 'group', gname, '-v' ], DEL + [ 'group', gname ], DEL + [ 'group', gname ], ], context=context, descr='''create group, verify ACL, ''' '''try to create again in short mode, ''' '''remove various components then check, ''' '''then delete group and try to re-delete.''' ).Run() gname = 'ACL_tests' | def gen_chk_acls_cmds(group): |
remove_group_cmds = [ "rm", "-rf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | remove_group_cmds = [ 'sudo', "rm", "-vrf", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
remove_group_html_cmds = [ "rm", "-rf", | remove_group_html_cmds = [ 'sudo', "rm", "-vrf", | def gen_chk_acls_cmds(group): |
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
remove_group_acls_cmds = [ "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] | remove_group_acls_cmds = [ 'sudo', "setfacl", "-R", "-b", "%s/%s/%s" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] | def gen_chk_acls_cmds(group): |
configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), ">/dev/null", "2>&1" ] bad_chown_group_cmds = ['chown', 'bin:daemon', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group_name), '>/dev/null', '2>&1'] for pre_cmd in (remove_group_cmds, remove_group_html_cmds, remove_group_acls_cmds, remove_group_html_acls_cmds, bad_chown_group_cmds): for subopt in ('--auto-no', '--auto-yes', '-b'): FunctionnalTest( CHECK + [ 'group', '--name=%s' % group_name, subopt], pre_cmds = [ remove_group_acls_cmds], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run(options = [['-v'], ['-ve'], ['-vv'], ['-vve']]) FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--skel=/etc/doesntexist" ],context=context).Run() FunctionnalTest(DELETE + [ 'group', '--name', group_name, '--del-users', '--no-archive'], context=context).Run() group_name = 'B-Group_Test' FunctionnalTest(ADD + [ 'group', "--name=%s" % group_name, "--system" ], | configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] bad_chown_group_cmds = ['chown', 'bin:daemon', '--changes', '%s/%s/%s/public_html' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ] for break_acl_pre_cmd, chk_acl_cmd in ( (remove_group_cmds, chk_acls_cmds(gname)), (remove_group_html_cmds, chk_acls_cmds(gname, 'public_html')), (remove_group_acls_cmds, chk_acls_cmds(gname)), (remove_group_html_acls_cmds, chk_acls_cmds(gname, 'public_html')), (bad_chown_group_cmds, chk_acls_cmds(gname))): for subopt_l1 in ('--auto-no', '--auto-yes', '-b'): for subopt_l2 in ('-v', '-ve', '-vv', '-vve'): ScenarioTest([ ADD + [ 'group', gname, '-v' ], break_acl_pre_cmd, CHK + [ 'group', gname, subopt_l1, subopt_l2 ], chk_acl_cmd, DEL + [ 'group', gname, '-v', '--no-archive' ] ], descr='''Various ACLs tests on groups, ''' '''with various and combined options''', context=context).Run() gname = 'MOD_tests' ScenarioTest([ ADD + [ 'group', gname, '-v' ], MOD + [ "group", "--name=%s" % gname, "--skel=/etc/doesntexist" ], MOD + [ "group", '--name=%s' % gname, '--not-permissive' ], chk_acls_cmds(gname), MOD + [ "group", "--name=%s" % gname, "--permissive" ], chk_acls_cmds(gname), MOD + [ "group", "--name=%s" % gname, "--permissive" ], DEL + [ 'group', gname, '-v' ] ], descr='''modify with a non-existing profile, re-make not-permissive, ''' '''make permissive.''', | def gen_chk_acls_cmds(group): |
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name], | gname = 'SYSTEM-test' ScenarioTest([ ADD + [ 'group', "--name=%s" % gname, "--system" ], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ], DEL + ["group", "--name", gname], GET + [ 'groups' ], CHK + [ "group", "-v", "--name=%s" % gname ] ], descr='''add --system, check, delete and recheck.''', | def gen_chk_acls_cmds(group): |
FunctionnalTest(DELETE + ["group", "--name", group_name], | ScenarioTest([ ADD + [ 'group', gname, '--gid=1520' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=15200', '--system' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ], ADD + [ 'group', gname, '--gid=199', '--system' ], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ] ], context=context, descr='''ADD and DEL groups with fixed GIDs (ONE should fail).''').Run() gname = 'SKEL-tests' ScenarioTest([ ADD + ["group", "--name=%s" % gname, "--skel=/etc/skel", "--description='Vive les skel'"], GET + [ 'groups', '-la' ], DEL + ["group", gname ], GET + [ 'groups', '-la' ] ], descr='ADD group with specified skel and descr', | def gen_chk_acls_cmds(group): |
FunctionnalTest(CHECK + [ "group", "-v", "--name=%s" % group_name ], context=context).Run() group_name = "groupe_a_skel" FunctionnalTest(ADD + [ "group", "--name=%s" % group_name, '''--description="Le groupe C s'il vous plaît..."''' ], context=context).Run() FunctionnalTest(MODIFY + [ "group", '--name=%s' % group_name, '--not-permissive' ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run() FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--permissive" ], chk_cmds = [ gen_chk_acls_cmds(group_name) ], context=context).Run() FunctionnalTest(MODIFY + [ "group", "--name=%s" % group_name, "--permissive" ], context=context+'+already').Run() | gname = 'ARCHIVES-test' ScenarioTest([ ADD + [ 'group', gname, '-v' ], [ 'sudo', 'touch', "%s/%s/%s/test.txt" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ], [ 'sudo', 'mkdir', "%s/%s/%s/testdir" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ], [ 'sudo', 'touch', "%s/%s/%s/testdir/testfile" % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], gname) ], CHK + [ "group", "-vb", gname ], DEL + [ 'group', gname ], [ 'sudo', 'find', configuration.home_archive_dir ], [ 'sudo', 'getfacl', '-R', configuration.home_archive_dir ], [ 'sudo', 'rm', '-rf', '%s/*' % configuration.home_archive_dir ] ], context=context, descr='''verify the --archive option of DEL group and check on ''' '''shared dir contents.''' ).Run() | def gen_chk_acls_cmds(group): |
FunctionnalTest(DELETE + ["group", "--name", group_name, '--del-users', '--no-archive'], context=context).Run() | def gen_chk_acls_cmds(group): |
|
FunctionnalTest(DELETE + ["group", "--name", group_name], context=context+'+already').Run() | def gen_chk_acls_cmds(group): |
|
FunctionnalTest(ADD + ["group", "--name=%s" % group_name, "--skel=/etc/skel", "--description='Vive les skel'"], context=context).Run() FunctionnalTest(DELETE + ["group", "--name", group_name], context=context).Run() | def gen_chk_acls_cmds(group): |
|
def test_users(): | def test_users(context): | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
os.system(GETENT + " groups") os.system(GETENT + " profiles") | os.system(GET + " groups") os.system(GET + " profiles") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") | log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MOD + " user --login=utilisager.normal -v --add-groups test_users_B") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " group -v --name test_users_B") | log_and_exec(CHK + " group -v --name test_users_B") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " group -v --name test_users_A") | log_and_exec(CHK + " group -v --name test_users_A") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", | log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-no", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") | log_and_exec(CHK + " group -vv --name test_users_A --extended --auto-yes") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", | log_and_exec(CHK + " user -v --name utilisager.normal --auto-no", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") | log_and_exec(CHK + " user -v --name utilisager.normal --auto-yes") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(CHECK + " group -vv --name test_users_B --extended") | log_and_exec(CHK + " group -vv --name test_users_B --extended") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") | log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", | log_and_exec(MOD + " user --login=utilisager.normal --del-groups test_users_A", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") | log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom") log_and_exec(MOD + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MOD + " profile --group utilisagers --apply-groups") log_and_exec(MOD + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MOD + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MOD + " profile --group responsibilisateurs --apply-groups") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", | log_and_exec(DEL + " user --login utilicateur.accentue") log_and_exec(DEL + " user --login utilisateur.accentuen2", | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, | log_and_exec(DEL + " profile -vvv --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs", True, 12, | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") | log_and_exec(DEL + " group --name=test_users_A --del-users --no-archive") log_and_exec(DEL + " user --login test.responsibilly") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") | log_and_exec(DEL + " profile --group responsibilisateurs") log_and_exec(DEL + " group --name=test_users_B -vv") | def test_users(): """Test ADD/MOD/DEL on user accounts in various ways.""" test_message('''starting users related tests.''') log_and_exec(ADD + " group --name test_users_A --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " group --name test_users_B --description 'groupe créé pour la suite de tests sur les utilisateurs, vous pouvez effacer'") os.system(GETENT + " groups") os.system(GETENT + " profiles") log_and_exec(ADD + " user --firstname Utiliçateur --lastname Accentué") log_and_exec(ADD + " user --gecos 'Utilisateur Accentué n°2'", True, 12, comment = "can't build a login from only a GECOS field.") log_and_exec(ADD + " user --login utilisager.normal --profile utilisagers") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_A") log_and_exec(MODIFY + " user --login=utilisager.normal -v --add-groups test_users_B") # should produce nothing, because nothing is wrong. log_and_exec(CHECK + " group -v --name test_users_B") os.system("rm ~utilisager.normal/test_users_A") # all must be OK, extended checks are not enabled, the program will not "see" the missing link. log_and_exec(CHECK + " group -v --name test_users_A") # the link to group_A isn't here ! log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-no", True, 7, comment = "a user lacks a symlink.") log_and_exec(CHECK + " group -vv --name test_users_A --extended --auto-yes") # the same check, but checking from users.py #os.system("rm ~utilisager.normal/test_users_A") #log_and_exec(CHECK + " user --name utilisager.normal") # not yet implemented #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-no", True, 7, comment="user lacks symlink") #log_and_exec(CHECK + " user --name utilisager.normal --extended --auto-yes") # checking for Maildir repair capacity... if configuration.users.mailbox_type == configuration.MAIL_TYPE_HOME_MAILDIR: os.system("rm -rf ~utilisager.normal/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-no", True, 7, comment="user lacks ~/" + configuration.users.mailbox) log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("touch ~utilisager.normal/.dmrc ; chmod 666 ~utilisager.normal/.dmrc") log_and_exec(CHECK + " user -v --name utilisager.normal --auto-yes") os.system("mv -f ~utilisager.normal/test_users_B ~utilisager.normal/mon_groupe_B_préféré") # all must be ok, the link is just renamed... log_and_exec(CHECK + " group -vv --name test_users_B --extended") # FIXME: verify the user can create things in shared group dirs. log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A") # should fail log_and_exec(MODIFY + " user --login=utilisager.normal --del-groups test_users_A", comment = "already not a member.") log_and_exec(ADD + " user --login test.responsibilly --profile responsibilisateurs") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom") log_and_exec(MODIFY + " profile --group utilisagers --add-groups cdrom,test_users_B") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups") log_and_exec(MODIFY + " profile --group responsibilisateurs --add-groups plugdev,audio,test_users_A") log_and_exec(MODIFY + " profile --group responsibilisateurs --del-groups audio") log_and_exec(MODIFY + " profile --group responsibilisateurs --apply-groups") # clean the system log_and_exec(DELETE + " user --login utilicateur.accentue") log_and_exec(DELETE + " user --login utilisateur.accentuen2", True, 5, comment = "this user has *NOT* been created previously.") log_and_exec(DELETE + " profile -vvv --group utilisagers --del-users --no-archive") #os.system(GETENT + " users") log_and_exec(DELETE + " profile --group responsibilisateurs", True, 12, comment = "there are still some users in the pri group of this profile.") log_and_exec(DELETE + " group --name=test_users_A --del-users --no-archive") log_and_exec(DELETE + " user --login test.responsibilly") # this should work now that the last user has been deleted log_and_exec(DELETE + " profile --group responsibilisateurs") log_and_exec(DELETE + " group --name=test_users_B -vv") # already deleted before #log_and_exec(DELETE + " user --login utilisager.normal") #log_and_exec(DELETE + " user --login test.responsibilly") test_message('''users related tests finished.''') |
def test_imports(): | def test_imports(context): | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv", True, 12, comment = "You should specify a profile") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0 --confirm-import") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0 --confirm-import") # activer les 2 lignes suivantes pour importer 860 utilisateurs de Latresne... log_and_exec(ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers --confirm-import") os.system("sleep 5") log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") |
os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") | os.system(DEL + " profile --group utilisagers --del-users --no-archive") os.system(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive") | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv", True, 12, comment = "You should specify a profile") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0 --confirm-import") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0 --confirm-import") # activer les 2 lignes suivantes pour importer 860 utilisateurs de Latresne... log_and_exec(ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers --confirm-import") os.system("sleep 5") log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") |
log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") def test_profiles(): | log_and_exec(DEL + " profile --group utilisagers --del-users --no-archive") log_and_exec(DEL + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GET + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DEL + " group --name % --no-archive") def test_profiles(context): | def test_imports(): """Test massive user accounts imports.""" os.system(DELETE + " profile --group utilisagers --del-users --no-archive") os.system(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv", True, 12, comment = "You should specify a profile") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers") log_and_exec(ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users.csv --profile utilisagers --lastname-column 1 --firstname-column 0 --confirm-import") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs") log_and_exec(ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_resps.csv --profile responsibilisateurs --lastname-column 1 --firstname-column 0 --confirm-import") # activer les 2 lignes suivantes pour importer 860 utilisateurs de Latresne... log_and_exec(ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers") log_and_exec("time " + ADD + " users --filename ./testsuite/tests_users2.csv --profile utilisagers --confirm-import") os.system("sleep 5") log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") log_and_exec(DELETE + " profile --group responsibilisateurs --del-users --no-archive") log_and_exec(GETENT + " groups --empty | cut -d\":\" -f 1 | xargs -I% " + DELETE + " group --name % --no-archive") |
log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --batch") log_and_exec(MODIFY + " profile --group utilisagers --apply-group --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-all") log_and_exec(DELETE + " profile --group responsibilisateurs --no-archive") log_and_exec(DELETE + " user toto --no-archive") log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") | log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MOD + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MOD + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MOD + " profile --group utilisagers --apply-skel --to-users toto --batch") log_and_exec(MOD + " profile --group utilisagers --apply-group --to-users toto") log_and_exec(MOD + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MOD + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MOD + " profile --group utilisagers --apply-all --to-all") log_and_exec(DEL + " profile --group responsibilisateurs --no-archive") log_and_exec(DEL + " user toto --no-archive") log_and_exec(DEL + " profile --group utilisagers --del-users --no-archive") | def test_profiles(): """Test the applying feature of profiles.""" test_message('''starting profiles related tests.''') log_and_exec(ADD + " profile --name Utilisagers --group utilisagers --comment 'profil normal créé pour la suite de tests utilisateurs'") log_and_exec(ADD + " profile --name Responsibilisateurs --group responsibilisateurs --groups cdrom,lpadmin,plugdev,audio,video,scanner,fuse --comment 'profil power user créé pour la suite de tests utilisateurs.'") log_and_exec(ADD + " user toto --profile utilisagers") log_and_exec(ADD + " user tutu --profile utilisagers") log_and_exec(ADD + " user tata --profile utilisagers") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-groups utilisagers") log_and_exec(MODIFY + " profile --group utilisagers --apply-groups --to-members") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --auto-no") log_and_exec(MODIFY + " profile --group utilisagers --apply-skel --to-users toto --batch") log_and_exec(MODIFY + " profile --group utilisagers --apply-group --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-users toto") log_and_exec(MODIFY + " profile --group utilisagers --apply-all --to-all") log_and_exec(DELETE + " profile --group responsibilisateurs --no-archive") log_and_exec(DELETE + " user toto --no-archive") log_and_exec(DELETE + " profile --group utilisagers --del-users --no-archive") test_message('''profiles related tests finished.''') |
log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profile --name=profileeD log_and_exec $MODIFY profile --name=profileeC --not-permissive | log_and_exec $MOD profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DEL profile --name=profileB --del-users --no-archive log_and_exec $DEL profile --name=profileeD log_and_exec $MOD profile --name=profileeC --not-permissive | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --skeldir=/etc/skel && exit 1 # doit planter pour le skel pas un répertoire, pour le groupe jfgdghf log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profile --name=profileeD log_and_exec $MODIFY profile --name=profileeC --not-permissive log_and_exec $ADD profile --name=theprofile log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist } """ pass |
log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist | log_and_exec $MOD profile --name=theprofile --skel=/etc/doesntexist | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --skeldir=/etc/skel && exit 1 # doit planter pour le skel pas un répertoire, pour le groupe jfgdghf log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profile --name=profileeD log_and_exec $MODIFY profile --name=profileeC --not-permissive log_and_exec $ADD profile --name=theprofile log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist } """ pass |
test_message('testing Unix backend.') if execute(['mod', 'config', '-B', 'ldap'])[1] == 0: make_backups('unix') FunctionnalTest(GETENT + ['config'], context='unix').Run( options=[['backends']]) test_get('unix') test_groups('unix') compare_delete_backups('unix') clean_system() test_message('testing LDAP backend.') if execute(['mod', 'config', '-b', 'ldap'])[1] == 0: make_backups('ldap') FunctionnalTest(GETENT + ['config'], context='ldap').Run( options=[['backends']]) test_get('ldap') test_groups('ldap') compare_delete_backups('ldap') clean_system() | save_state(1, state_type='context') for ctxnum, ctx, activate_cmd in ( (1, 'unix', ['sudo', 'mod', 'config', '-B', 'ldap']), (2, 'ldap', ['sudo', 'mod', 'config', '-b', 'ldap']) ): if execute(activate_cmd)[1] == 0: start_ctx = get_state('context') if ctxnum < start_ctx: logging.notice('Skipping context %s' % stylize(ST_NAME, ctx)) continue test_message('testing %s context.' % ctx) make_backups(ctx) ScenarioTest.reinit() test_get(ctx) test_groups(ctx) compare_delete_backups(ctx) clean_system() save_state(ctxnum + 1, state_type='context') | def to_be_implemented(): """ TO BE DONE ! # # Profiles # # doit planter pour le groupe log_and_exec $ADD profile --name=profileA --group=a # doit planter pour le groupe kjsdqsdf log_and_exec $ADD profile --name=profileB --group=b --comment="le profil b" --shell=/bin/bash --quota=26 --groups=cdrom,kjsdqsdf,audio --skeldir=/etc/skel && exit 1 # doit planter pour le skel pas un répertoire, pour le groupe jfgdghf log_and_exec $MODIFY profile --name=profileA --rename=theprofile --rename-primary-group=theprofile --comment=modify --shell=/bin/sh --skel=/etc/power --quota=10 --add-groups=cdrom,remote,qsdfgkh --del-groups=cdrom,jfgdghf log_and_exec $DELETE profile --name=profileB --del-users --no-archive log_and_exec $DELETE profile --name=profileeD log_and_exec $MODIFY profile --name=profileeC --not-permissive log_and_exec $ADD profile --name=theprofile log_and_exec $MODIFY profile --name=theprofile --skel=/etc/doesntexist } """ pass |
invalid_dir_regex_text = r'^((\/|\*\/)|[^%s]*\/?\.\.\/)' % separator | invalid_dir_regex_text = r'^((~.\*|\$HOME.\*|\/|\*\/)|[^%s]*\/?\.\.\/)' % separator | def find_prefered_backend(self): """ iterate through active backends and find the prefered one. We use a copy, in case there is no prefered yet: LMC.backends will change and this would crash the for_loop. |
if rule_text[0] == '~' or rule_text[:5] == '$HOME': | if rule_text == '~' or rule_text == '$HOME': | def generate_name(self, file_name, rule_text, system_wide, controller): """ for a system configuration file named /etc/licorn/check.d/users.dropbox.conf, return "dropbox" |
UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: UsersController.users[uid]['userPassword'] = \ UsersController.users[uid]['userPassword'][1:] logging.info('Unlocked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) | if UsersController.users[uid]['locked']: logging.info('account %s already locked.' % styles.stylize(styles.ST_NAME, login)) else: UsersController.users[uid]['userPassword'] = '!' + \ UsersController.users[uid]['userPassword'] logging.info('Locked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: if UsersController.users[uid]['locked']: UsersController.users[uid]['userPassword'] = \ UsersController.users[uid]['userPassword'][1:] logging.info('Unlocked user account %s.' % \ styles.stylize(styles.ST_LOGIN, login)) else: logging.info('account %s already unlocked.' % styles.stylize(styles.ST_NAME, login)) | def LockAccount(self, login, lock = True): """(Un)Lock a user account.""" if login is None: raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LOGIN) |
('gecos', decodestring), | ('gecos', gecos_decode), | def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value |
'''shared dir contents, ensure | def chk_acls_cmds(group, subdir=None): return [ 'sudo', 'getfacl', '-R', '%s/%s/%s%s' % ( configuration.defaults.home_base_path, configuration.groups.names['plural'], group, '/%s' % subdir if subdir else '') ] |
|
%s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % ( | %s user [-s|--system] [-p|--password "<password>"] [-g|--gid=<primary_gid>] [-r|--profile=<profile>] [-K|--skel=<skel>] [-e|--gecos=<given name>] [-H|--home=<home_dir>] […]""" % ( | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % ( stylize(ST_APPNAME, "%prog"), stylize(ST_APPNAME, "%prog")) parser = OptionParser(usage=usage_text, version=build_version_string(app, version)) # common behaviour group parser.add_option_group(common_behaviour_group(app, parser, 'add_user')) user = OptionGroup(parser, stylize(ST_OPTION, "Add user options ")) user.add_option('-l', "--login", "--name", action="store", type="string", dest="login", default = None, help="""Specify user's login (%s).""" % stylize( ST_IMPORTANT, "one of login or firstname+lastname arguments is required")) user.add_option('-e', "--gecos", action="store", type="string", dest="gecos", default = None, help="""Specify user's GECOS field. If given, GECOS takes precedence """ """on --firstname and --lastname, which will be silently """ """discarded. Default: autogenerated from firstname & lastname """ """if given, else from login.""") user.add_option('-p', "--password", action="store", type="string", dest="password", default = None, help="""Specify user's password (else will be autogenerated, %d """ """chars long).""" % configuration.users.min_passwd_size) user.add_option('-g', '--in-group', '--primary-group', '--gid', '--primary-gid', action="store", type="string", dest="primary_gid", default = None, help="""Specify user's future primary group (at your preference as """ """a group name or a GID). This parameter is overriden by the """ """profile argument if you specify both. Default: %s.""" % configuration.users.default_gid) user.add_option('-G', '--in-groups', '--auxilliary-groups', '--add-to-groups', action="store", type="string", dest="in_groups", default=None, help='''Specify future user's auxilliary groups (at your preference ''' '''as groupnames or GIDs, which can be mixed, and separated by ''' '''commas without spaces). These supplemental groups are added ''' '''to the list of groups defined by the profile, if you specify ''' '''both. Default: None.''') user.add_option('-s', "--system", action="store_true", dest="system", default = False, help="Create a system account instead of a standard user (root only).") user.add_option('-r', "--profile", action="store", type="string", dest="profile", default = None, help="""Profile which will be applied to the user. Default: None, """ """overrides primary group / GID.""") user.add_option('-u', "--uid", '--desired-uid', action="store", type="int", dest="uid", default = None, help="""manually specify an UID for the new user. This UID must be """ """free and inside the range %s - %s for a standard user, and """ """outside the range for a system account, else it will be """ """rejected and the user account won't be created. Default: """ """next free UID in the selected range.""" % ( stylize(ST_DEFAULT, configuration.users.uid_min), stylize(ST_DEFAULT, configuration.users.uid_max))) user.add_option('-H', "--home", action="store", type="string", dest="home", default = None, help="""Specify the user's home directory. Only valid for a system """ """account, else discarded because standard accounts have a """ """fixed home dir %s/<login>""" % configuration.users.base_path) user.add_option("-S", "--shell", action="store", type="string", dest="shell", default = None, help="""Specify user's shell, from the ones given by command """ """`get config shells`. Default: %s""" % configuration.users.default_shell) user.add_option('-K', "--skel", action="store", type="string", dest="skel", default = None, help="""Specify a particular skeleton to apply to home dir after """ """creation, instead of the profile or the primary-group """ """implicit skel. Default: the profile skel if profile given, """ """else %s.""" % configuration.users.default_skel) user.add_option("--firstname", action="store", type="string", dest="firstname", default = None, help="""Specify user's first name (required if --lastname is given,""" """overriden by GECOS).""") user.add_option("--lastname", action="store", type="string", dest="lastname", default = None, help="""Specify user's last name (required if --firstname is given, """ """overriden by GECOS).""") user.add_option("--no-create-home", action="store_true", dest="no_create_home", default = False, help="") user.add_option("--disabled-password", action="store_true", dest="disabled_password", default = False, help="") user.add_option("--disabled-login", action="store_true", dest="disabled_login", default = False, help="") parser.add_option_group(user) return parser.parse_args() |
'--primary-gid', action="store", type="string", dest="primary_gid", default = None, | '--primary-gid', '--group', action="store", type="string", dest="primary_gid", default=None, | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % ( stylize(ST_APPNAME, "%prog"), stylize(ST_APPNAME, "%prog")) parser = OptionParser(usage=usage_text, version=build_version_string(app, version)) # common behaviour group parser.add_option_group(common_behaviour_group(app, parser, 'add_user')) user = OptionGroup(parser, stylize(ST_OPTION, "Add user options ")) user.add_option('-l', "--login", "--name", action="store", type="string", dest="login", default = None, help="""Specify user's login (%s).""" % stylize( ST_IMPORTANT, "one of login or firstname+lastname arguments is required")) user.add_option('-e', "--gecos", action="store", type="string", dest="gecos", default = None, help="""Specify user's GECOS field. If given, GECOS takes precedence """ """on --firstname and --lastname, which will be silently """ """discarded. Default: autogenerated from firstname & lastname """ """if given, else from login.""") user.add_option('-p', "--password", action="store", type="string", dest="password", default = None, help="""Specify user's password (else will be autogenerated, %d """ """chars long).""" % configuration.users.min_passwd_size) user.add_option('-g', '--in-group', '--primary-group', '--gid', '--primary-gid', action="store", type="string", dest="primary_gid", default = None, help="""Specify user's future primary group (at your preference as """ """a group name or a GID). This parameter is overriden by the """ """profile argument if you specify both. Default: %s.""" % configuration.users.default_gid) user.add_option('-G', '--in-groups', '--auxilliary-groups', '--add-to-groups', action="store", type="string", dest="in_groups", default=None, help='''Specify future user's auxilliary groups (at your preference ''' '''as groupnames or GIDs, which can be mixed, and separated by ''' '''commas without spaces). These supplemental groups are added ''' '''to the list of groups defined by the profile, if you specify ''' '''both. Default: None.''') user.add_option('-s', "--system", action="store_true", dest="system", default = False, help="Create a system account instead of a standard user (root only).") user.add_option('-r', "--profile", action="store", type="string", dest="profile", default = None, help="""Profile which will be applied to the user. Default: None, """ """overrides primary group / GID.""") user.add_option('-u', "--uid", '--desired-uid', action="store", type="int", dest="uid", default = None, help="""manually specify an UID for the new user. This UID must be """ """free and inside the range %s - %s for a standard user, and """ """outside the range for a system account, else it will be """ """rejected and the user account won't be created. Default: """ """next free UID in the selected range.""" % ( stylize(ST_DEFAULT, configuration.users.uid_min), stylize(ST_DEFAULT, configuration.users.uid_max))) user.add_option('-H', "--home", action="store", type="string", dest="home", default = None, help="""Specify the user's home directory. Only valid for a system """ """account, else discarded because standard accounts have a """ """fixed home dir %s/<login>""" % configuration.users.base_path) user.add_option("-S", "--shell", action="store", type="string", dest="shell", default = None, help="""Specify user's shell, from the ones given by command """ """`get config shells`. Default: %s""" % configuration.users.default_shell) user.add_option('-K', "--skel", action="store", type="string", dest="skel", default = None, help="""Specify a particular skeleton to apply to home dir after """ """creation, instead of the profile or the primary-group """ """implicit skel. Default: the profile skel if profile given, """ """else %s.""" % configuration.users.default_skel) user.add_option("--firstname", action="store", type="string", dest="firstname", default = None, help="""Specify user's first name (required if --lastname is given,""" """overriden by GECOS).""") user.add_option("--lastname", action="store", type="string", dest="lastname", default = None, help="""Specify user's last name (required if --firstname is given, """ """overriden by GECOS).""") user.add_option("--no-create-home", action="store_true", dest="no_create_home", default = False, help="") user.add_option("--disabled-password", action="store_true", dest="disabled_password", default = False, help="") user.add_option("--disabled-login", action="store_true", dest="disabled_login", default = False, help="") parser.add_option_group(user) return parser.parse_args() |
'--add-to-groups', | '--add-to-groups', '--aux-groups', '--secondary-groups', '--groups', | def add_user_parse_arguments(app, configuration): """Integrated help and options / arguments for « add user ».""" usage_text = """ %s user [--login] <login> %s user --firstname <firstname> --lastname <lastname> [--system] [--password "<password>"] [--gid=<primary_gid>] [--profile=<profile>] [--skel=<skel>] [--gecos=<given name>] [--home=<home_dir>] […]""" % ( stylize(ST_APPNAME, "%prog"), stylize(ST_APPNAME, "%prog")) parser = OptionParser(usage=usage_text, version=build_version_string(app, version)) # common behaviour group parser.add_option_group(common_behaviour_group(app, parser, 'add_user')) user = OptionGroup(parser, stylize(ST_OPTION, "Add user options ")) user.add_option('-l', "--login", "--name", action="store", type="string", dest="login", default = None, help="""Specify user's login (%s).""" % stylize( ST_IMPORTANT, "one of login or firstname+lastname arguments is required")) user.add_option('-e', "--gecos", action="store", type="string", dest="gecos", default = None, help="""Specify user's GECOS field. If given, GECOS takes precedence """ """on --firstname and --lastname, which will be silently """ """discarded. Default: autogenerated from firstname & lastname """ """if given, else from login.""") user.add_option('-p', "--password", action="store", type="string", dest="password", default = None, help="""Specify user's password (else will be autogenerated, %d """ """chars long).""" % configuration.users.min_passwd_size) user.add_option('-g', '--in-group', '--primary-group', '--gid', '--primary-gid', action="store", type="string", dest="primary_gid", default = None, help="""Specify user's future primary group (at your preference as """ """a group name or a GID). This parameter is overriden by the """ """profile argument if you specify both. Default: %s.""" % configuration.users.default_gid) user.add_option('-G', '--in-groups', '--auxilliary-groups', '--add-to-groups', action="store", type="string", dest="in_groups", default=None, help='''Specify future user's auxilliary groups (at your preference ''' '''as groupnames or GIDs, which can be mixed, and separated by ''' '''commas without spaces). These supplemental groups are added ''' '''to the list of groups defined by the profile, if you specify ''' '''both. Default: None.''') user.add_option('-s', "--system", action="store_true", dest="system", default = False, help="Create a system account instead of a standard user (root only).") user.add_option('-r', "--profile", action="store", type="string", dest="profile", default = None, help="""Profile which will be applied to the user. Default: None, """ """overrides primary group / GID.""") user.add_option('-u', "--uid", '--desired-uid', action="store", type="int", dest="uid", default = None, help="""manually specify an UID for the new user. This UID must be """ """free and inside the range %s - %s for a standard user, and """ """outside the range for a system account, else it will be """ """rejected and the user account won't be created. Default: """ """next free UID in the selected range.""" % ( stylize(ST_DEFAULT, configuration.users.uid_min), stylize(ST_DEFAULT, configuration.users.uid_max))) user.add_option('-H', "--home", action="store", type="string", dest="home", default = None, help="""Specify the user's home directory. Only valid for a system """ """account, else discarded because standard accounts have a """ """fixed home dir %s/<login>""" % configuration.users.base_path) user.add_option("-S", "--shell", action="store", type="string", dest="shell", default = None, help="""Specify user's shell, from the ones given by command """ """`get config shells`. Default: %s""" % configuration.users.default_shell) user.add_option('-K', "--skel", action="store", type="string", dest="skel", default = None, help="""Specify a particular skeleton to apply to home dir after """ """creation, instead of the profile or the primary-group """ """implicit skel. Default: the profile skel if profile given, """ """else %s.""" % configuration.users.default_skel) user.add_option("--firstname", action="store", type="string", dest="firstname", default = None, help="""Specify user's first name (required if --lastname is given,""" """overriden by GECOS).""") user.add_option("--lastname", action="store", type="string", dest="lastname", default = None, help="""Specify user's last name (required if --firstname is given, """ """overriden by GECOS).""") user.add_option("--no-create-home", action="store_true", dest="no_create_home", default = False, help="") user.add_option("--disabled-password", action="store_true", dest="disabled_password", default = False, help="") user.add_option("--disabled-login", action="store_true", dest="disabled_login", default = False, help="") parser.add_option_group(user) return parser.parse_args() |
gid = self.groups.name_to_gid(group) | if self.groups.is_standard_group(group): raise exceptions.BadArgumentError( '''The group %s(%s) is not a system group. It cannot be ''' '''added as primary group of a profile.''' % ( styles.stylize(styles.ST_NAME, group), styles.stylize(styles.ST_UGID, self.groups.name_to_gid(group)))) else: gid = self.groups.name_to_gid(group) | def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """ |
elif e.errno == 2: pass | def initialize(self, enabled=True): """ try to start it without any tests (it should work if it's installed) and become available. If that fails, try to guess a little and help user resolving issue. else, just fail miserably. |
|
logging.warning("Home dir %s does not exist, can't delete it !" % styles.stylize(styles.ST_PATH, homedir)) if not no_archive : | logging.warning("Problem deleting home dir %s (was: %s)" % (styles.stylize(styles.ST_PATH, homedir), e)) else : | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) |
logging.warning("Home dir %s does not exist, can't archive it !" % styles.stylize(styles.ST_PATH, homedir)) | logging.warning("Home dir %s doesn't exist, thus not archived." % styles.stylize(styles.ST_PATH, homedir)) | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) |
del(UsersController.login_cache[login]) del(UsersController.users[uid]) logging.info(logging.SYSU_DELETED_USER % styles.stylize(styles.ST_LOGIN, login)) if not batch : self.WriteConf() | def DeleteUser(self, login=None, no_archive=False, uid=None, batch=False) : """ Delete a user """ if login is None and uid is None : raise exceptions.BadArgumentError(logging.SYSU_SPECIFY_LGN_OR_UID) |
|
"The profile '%s' already exists." % group) | '''Please choose another one.''' % ( group, self.group_to_name(group))) | def AddProfile(self, name, group, profileQuota=1024, groups=[], description='', profileShell=None, profileSkel=None, force_existing=False): """ Add a user profile (self.groups is an instance of GroupsController and is needed to create the profile group). """ |
if system and self.is_system_gid(existing_gid): | if system and self.is_system_gid(existing_gid) \ or not system and self.is_standard_gid(existing_gid): | def __add_group(self, name, system, manual_gid=None, description = "", groupSkel = "", batch=False, force=False): """ Add a POSIX group, write the system data files. Return the gid of the group created.""" |
f = self.send_head() if f: f.close() | try: f = self.send_head() if f: f.close() except socket.error, e: logging.warning('%s: harmless exception in do_HEAD(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0])) | def do_HEAD(self): f = self.send_head() if f: f.close() |
f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) | try: f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: | def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() |
f.close() | while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() except socket.error, e: logging.warning('%s: harmless exception in do_GET(): %s. ' 'Full traceback follows:' % ( current_thread().name, str(e).splitlines()[0])) | def do_GET(self): f = self.send_head() if f: if type(f) in (type(""), type(u'')): self.wfile.write(f) else: buf = f.read(LMC.configuration.licornd.buffer_size) while buf: self.wfile.write(buf) buf = f.read(LMC.configuration.licornd.buffer_size) f.close() |
for member in groups.groups[g]['members']: if member == entry[0]: | for member in groups.groups[g]['memberUid']: if member == temp_user_dict['login']: | def account_lock(value, tmp_entry=temp_user_dict): try: # get around an error where password is not base64 encoded. password = decodestring(value.split('}',1)[1]) except Exception: password = value |
for name in GroupsController.configuration.groups.privileges_whitelist: | for name in \ GroupsController.configuration.groups.privileges_whitelist: | def Select(self, filter_string): """ Filter group accounts on different criteria: - 'system groups': show only «system» groups (root, bin, daemon, apache...), not normal group account. - 'normal groups': keep only «normal» groups, which includes Licorn administrators The criteria values are defined in /etc/{login.defs,adduser.conf} """ |
data += " <group>\n" \ + " <name>" + group['name'] + "</name>\n" \ + " <userPassword>" + group['userPassword'] + "</userPassword>\n" \ + " <gid>" + str(gid) + "</gid>\n" \ + " <description>" + group['description'] + "</description>\n" if not self.is_system_gid(gid): data += " <groupSkel>" + group['groupSkel'] + "</groupSkel>\n" if group['permissive'] is None: data += " <permissive>[unknown]</permissive>\n" else: data += " <permissive>" + str(group['permissive']) + "</permissive>\n" if group['memberUid'] != set(): data += " <memberUid>" + ", ".join(group['memberUid']) + "</memberUid>\n" if long: data += " <backend>%s</backend>\n" % group['backend'] data += " </group>\n" | data += ''' <group> <name>%s</name> <gid>%s</gid>%s%s <permissive>%s</permissive>\n%s%s%s</group>\n''' % ( group['name'], str(gid), '\n <userPassword>%s</userPassword>' % group['userPassword'] \ if group.has_key('userPassword') else '', '\n <description>%s</description>' % group['description'] \ if group.has_key('description') else '', 'unknown' if group['permissive'] is None \ else str(group['permissive']), '' if self.is_system_gid(gid) \ else ' <groupSkel>%s</groupSkel>\n' % group['groupSkel'], ' <memberUid>%s</memberUid>\n' % \ ", ".join(group['memberUid']) if group['memberUid'] != set() \ else '', " <backend>%s</backend>\n" % group['backend'] if long else '' ) | def ExportXML(self, long): """ Export the groups list to XML. """ |
raise exceptions.BadArgumentError, "You must specify a name or a GID." | raise exceptions.BadArgumentError( "You must specify a name or a GID.") | def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID." |
if not del_users: if prim_memb != set(): raise exceptions.BadArgumentError, "The group still has members. You must delete them first, or force their automatic deletion with an option." home = '%s/%s/%s' % (GroupsController.configuration.defaults.home_base_path, GroupsController.configuration.groups.names['plural'], name) | if prim_memb != set() and not del_users: raise exceptions.BadArgumentError('''The group still has ''' '''members. You must delete them first, or force their ''' '''automatic deletion with the --del-users option. WARNING: ''' '''this is a bad idea, use with caution.''') home = '%s/%s/%s' % ( GroupsController.configuration.defaults.home_base_path, GroupsController.configuration.groups.names['plural'], name) | def DeleteGroup(self, name, del_users, no_archive, bygid = None, batch=False): """ Delete an Licorn group """ if name is None and bygid is None: raise exceptions.BadArgumentError, "You must specify a name or a GID." |
tmpname = GroupsController.configuration.groups.resp_prefix + name | tmpname = GroupsController.configuration.groups.resp_prefix \ + name | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
tmpname = GroupsController.configuration.groups.guest_prefix + name | tmpname = GroupsController.configuration.groups.guest_prefix \ + name | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
raise exceptions.AlreadyExistsError("the new name you have choosen, %s, is already taken by another group !" % styles.stylize(styles.ST_NAME, new_name)) | raise exceptions.AlreadyExistsError( '''the new name you have choosen, %s, is already taken by ''' '''another group !''' % \ styles.stylize(styles.ST_NAME, new_name)) | def RenameGroup(self, profilelist, name, new_name): """ Modify the name of a group.""" |
raise exceptions.BadArgumentError("The skel you specified doesn't exist on this system. Valid skels are: %s." % str(GroupsController.configuration.users.skels)) | raise exceptions.BadArgumentError('''The skel you specified ''' '''doesn't exist on this system. Valid skels are: %s.''' % \ str(GroupsController.configuration.users.skels)) | def ChangeGroupSkel(self, name, groupSkel): """ Change the description of a group """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if groupSkel is None: raise exceptions.BadArgumentError, "You must specify a groupSkel" |
raise exceptions.BadArgumentError, "You must specify a group name to add." | raise exceptions.BadArgumentError( 'You must specify a group name to add.') | def AddGrantedProfiles(self, users, profiles, name): """ Allow the users of the profiles given to access to the shared dir Warning: Don't give [] for profiles, but [""] """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name to add." |
raise exceptions.BadArgumentError, "You must specify a name" | raise exceptions.BadArgumentError,("You must specify a name") | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
if p in profiles.profiles: if name in profiles.profiles[p]['memberGid']: print "Delete group '" + name + "' from the groups list of the profile '" + p + "'" profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles.profiles[p]['groupName']) self.RemoveUsersFromGroup(name, _users_to_del, users) else: print "The group '" + name + "' is not present in groups list of the profile '" + p + "'" | if name in profiles.profiles[p]['memberGid']: logging.notice("Deleting group '%s' from the profile '%s'." % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p))) profiles.DeleteGroupsFromProfile([name]) _users_to_del = self.__find_group_members(users, profiles[p]['groupName']) self.RemoveUsersFromGroup(name, _users_to_del, users) | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
print "Profile '" + str(p) + "' doesn't exist, it's ignored" | logging.info('Group %s already absent from profile %s.' % ( styles.stylize(styles.ST_NAME, name), styles.stylize(styles.ST_NAME, p))) | def DeleteGrantedProfiles(self, users, profiles, name): """ Disallow the users of the profiles given to access to the shared dir. """ |
link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith(GroupsController.configuration.groups.guest_prefix): link_basename = GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1) | link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.resp_prefix, "", 1) elif name.startswith( GroupsController.configuration.groups.guest_prefix): link_basename = \ GroupsController.groups[gid]['name'].replace( GroupsController.configuration.groups.guest_prefix, "", 1) | def AddUsersInGroup(self, name, users_to_add, batch = False): """ Add a user list in the group 'name'. """ |
logging.progress("User %s is already not a member of %s, skipped." % (styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name))) | logging.info( "User %s is already not a member of %s, skipped." % ( styles.stylize(styles.ST_LOGIN, u), styles.stylize(styles.ST_NAME, name))) | def RemoveUsersFromGroup(self, name, users_to_remove, batch=False): """ Delete a users list in the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a name" if users_to_remove is None: raise exceptions.BadArgumentError, "You must specify a users list" |
def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. the "@GE" and "@UE" strings will be later replaced by individual execution bits of certain files which must be kept executable. | def BuildGroupACL(self, gid, path=""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path \ in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ]. the "@GE" and "@UE" strings will be later replaced by individual execution bits of certain files which must be kept executable. | def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. |
file_acl_base = "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \ | file_acl_base = \ "u::rw@UE,g::---,o:---,g:%s:rw@GE,g:%s:r-@GE,g:%s:rw@GE" \ | def BuildGroupACL(self, gid, path = ""): """ Return an ACL triolet (a dict) that will be used to check something in the group shared dir. path must be the name of a file/dir, relative from group_home (this will help affining the ACL). EG: path in [ 'toto.odt', 'somedir', 'public_html/images/logo.img' ], etc. |
if os.path.exists(group_home) and os.path.isdir(os.path.realpath(group_home)): | if os.path.exists(group_home) \ and os.path.isdir(os.path.realpath(group_home)): | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
logging.progress("Checking shared group dir %s..." % \ | logging.progress("Checking shared group dir %s..." % | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
logging.warning("Shared group dir %s is missing, please repair this first." \ % styles.stylize(styles.ST_PATH, group_home)) | logging.warning( "Shared group dir %s is missing, please repair this first." % styles.stylize(styles.ST_PATH, group_home)) | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
"Checking %s symlinks in members homes, this can take a while..." \ % styles.stylize(styles.ST_NAME, group)) | "Checking %s symlinks in members homes, this can be long…" % styles.stylize(styles.ST_NAME, group)) | def __check_group(self, group, minimal=True, batch=False, auto_answer=None, force=False): |
link_basename = GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1) | link_basename = \ GroupsController.groups[gid]['name'].replace(strip_prefix, '', 1) | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to the old group name if it is set.""" |
logging.info("Deleted symlink %s." % \ | logging.info("Deleted symlink %s." % | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to the old group name if it is set.""" |
"Unable to delete symlink %s (was: %s)." \ % (styles.stylize(styles.ST_LINK, link), str(e)) ) | "Unable to delete symlink %s (was: %s)." % ( styles.stylize(styles.ST_LINK, link), str(e))) | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to the old group name if it is set.""" |
if e.errno == 2 and link_src_old and link_src_old == os.readlink(link): | if e.errno == 2 and link_src_old \ and link_src_old == os.readlink(link): | def CheckGroupSymlinks(self, gid=None, group=None, oldname=None, delete=False, strip_prefix=None, batch=False, auto_answer=None): """For each member of a group, verify member has a symlink to the shared group dir inside his home (or under level 2 directory). If not, create the link. Eventually delete links pointing to the old group name if it is set.""" |
logging.progress("Group %s is already%s permissive." % (styles.stylize(styles.ST_NAME, name), qualif) ) | logging.info("Group %s is already%s permissive." % ( styles.stylize(styles.ST_NAME, name), qualif) ) | def SetSharedDirPermissiveness(self, name=None, permissive=True): """ Set permissive or not permissive the shared directory of the group 'name'. """ if name is None: raise exceptions.BadArgumentError, "You must specify a group name." |
raise exceptions.BadArgumentError, "You must specify a group name or a GID." | raise exceptions.BadArgumentError( "You must specify a group name or a GID.") | def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive.""" |
logging.warning('''Shared dir %s doesn't exist, please run "licorn-check group --name %s" to fix.''' % (styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once = True) | logging.warning('''Shared dir %s doesn't exist, please ''' '''run "licorn-check group --name %s" to fix.''' % ( styles.stylize(styles.ST_PATH, home), styles.stylize(styles.ST_NAME, name)), once=True) | def is_permissive(self, name = None, gid = None): """ Return True if the shared dir of the group is permissive.""" |
return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max | return gid < GroupsController.configuration.groups.gid_min \ or gid > GroupsController.configuration.groups.gid_max | def is_system_gid(gid): """ Return true if gid is system. """ return gid < GroupsController.configuration.groups.gid_min or gid > GroupsController.configuration.groups.gid_max |
logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.groups.gid_max | return gid >= GroupsController.configuration.groups.gid_min \ and gid <= GroupsController.configuration.groups.gid_max | def is_standard_gid(gid): """ Return true if gid is system. """ logging.debug2("filtering %d against %d and %d." % (gid, GroupsController.configuration.groups.gid_min, GroupsController.configuration.groups.gid_max)) return gid >= GroupsController.configuration.groups.gid_min and gid <= GroupsController.configuration.groups.gid_max |
Subsets and Splits