summaryrefslogtreecommitdiff
path: root/python/samba/tests
diff options
context:
space:
mode:
Diffstat (limited to 'python/samba/tests')
-rw-r--r--python/samba/tests/common.py4
-rwxr-xr-xpython/samba/tests/dcerpc/raw_protocol.py40
-rw-r--r--python/samba/tests/dcerpc/raw_testcase.py4
-rw-r--r--python/samba/tests/dcerpc/rpcecho.py4
-rw-r--r--python/samba/tests/docs.py6
-rw-r--r--python/samba/tests/dsdb_lock.py4
-rw-r--r--python/samba/tests/dsdb_schema_attributes.py2
-rw-r--r--python/samba/tests/hostconfig.py4
-rw-r--r--python/samba/tests/password_hash_fl2003.py2
-rw-r--r--python/samba/tests/password_hash_fl2008.py4
-rw-r--r--python/samba/tests/posixacl.py74
-rw-r--r--python/samba/tests/samba3sam.py10
-rw-r--r--python/samba/tests/samba_tool/dnscmd.py22
-rw-r--r--python/samba/tests/samba_tool/forest.py4
-rw-r--r--python/samba/tests/samba_tool/fsmo.py2
-rw-r--r--python/samba/tests/samba_tool/group.py4
-rw-r--r--python/samba/tests/samba_tool/join.py2
-rw-r--r--python/samba/tests/samba_tool/ntacl.py46
-rw-r--r--python/samba/tests/samba_tool/rodc.py2
-rw-r--r--python/samba/tests/samba_tool/schema.py12
-rw-r--r--python/samba/tests/samba_tool/user.py22
-rw-r--r--python/samba/tests/security.py6
-rw-r--r--python/samba/tests/smb.py4
-rw-r--r--python/samba/tests/upgradeprovisionneeddc.py2
24 files changed, 143 insertions, 143 deletions
diff --git a/python/samba/tests/common.py b/python/samba/tests/common.py
index 49ae2b07a78..146c6a8de9d 100644
--- a/python/samba/tests/common.py
+++ b/python/samba/tests/common.py
@@ -50,13 +50,13 @@ class CommonTests(samba.tests.TestCaseInTempDir):
dn4 = dsdb_Dn(sam, "B:8:00000000:<GUID=ffffffff-17f4-452a-b002-963e1909d101>;OU=dn4,DC=samba,DC=example,DC=com")
dn5 = dsdb_Dn(sam, "<GUID=ffffffff-27f4-452a-b002-963e1909d101>;OU=dn5,DC=samba,DC=example,DC=com")
dn6 = dsdb_Dn(sam, "<GUID=00000000-27f4-452a-b002-963e1909d101>;OU=dn6,DC=samba,DC=example,DC=com")
- unsorted_links14 = [dn1,dn2,dn3,dn4]
+ unsorted_links14 = [dn1, dn2, dn3, dn4]
sorted_vals14 = [str(dn) for dn in sorted(unsorted_links14)]
self.assertEquals(sorted_vals14[0], str(dn3))
self.assertEquals(sorted_vals14[1], str(dn2))
self.assertEquals(sorted_vals14[2], str(dn1))
self.assertEquals(sorted_vals14[3], str(dn4))
- unsorted_links56 = [dn5,dn6]
+ unsorted_links56 = [dn5, dn6]
sorted_vals56 = [str(dn) for dn in sorted(unsorted_links56)]
self.assertEquals(sorted_vals56[0], str(dn6))
self.assertEquals(sorted_vals56[1], str(dn5))
diff --git a/python/samba/tests/dcerpc/raw_protocol.py b/python/samba/tests/dcerpc/raw_protocol.py
index 3f6e05b0ae0..2659b755ef7 100755
--- a/python/samba/tests/dcerpc/raw_protocol.py
+++ b/python/samba/tests/dcerpc/raw_protocol.py
@@ -800,7 +800,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
# With a known but wrong syntax we get a protocol error
# see test_no_auth_presentation_ctx_valid2
- tsf1b_list = [zero_syntax,samba.dcerpc.epmapper.abstract_syntax(),ndr64]
+ tsf1b_list = [zero_syntax, samba.dcerpc.epmapper.abstract_syntax(), ndr64]
ctx1b = dcerpc.ctx_list()
ctx1b.context_id = 1
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
@@ -862,7 +862,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
# With a unknown but wrong syntaxes we get NO protocol error
# see test_no_auth_presentation_ctx_invalid4
- tsf1b_list = [zero_syntax,samba.dcerpc.epmapper.abstract_syntax()]
+ tsf1b_list = [zero_syntax, samba.dcerpc.epmapper.abstract_syntax()]
ctx1b = dcerpc.ctx_list()
ctx1b.context_id = 1
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
@@ -977,7 +977,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
self.assertEquals(rep.u.cancel_count, 0)
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
- tsf1_list = [zero_syntax,ndr32]
+ tsf1_list = [zero_syntax, ndr32]
ctx1 = dcerpc.ctx_list()
ctx1.context_id = 1
ctx1.num_transfer_syntaxes = len(tsf1_list)
@@ -1016,7 +1016,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
self.assertEquals(rep.u.cancel_count, 0)
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
- tsf2_list = [ndr32,ndr32]
+ tsf2_list = [ndr32, ndr32]
ctx2 = dcerpc.ctx_list()
ctx2.context_id = 2
ctx2.num_transfer_syntaxes = len(tsf2_list)
@@ -1069,7 +1069,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx4.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
ctx4.transfer_syntaxes = tsf4_list
- req = self.generate_alter(call_id=34, ctx_list=[ctx3,ctx4])
+ req = self.generate_alter(call_id=34, ctx_list=[ctx3, ctx4])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
@@ -1106,7 +1106,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
self.assertEquals(rep.u.cancel_count, 0)
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
- req = self.generate_alter(call_id=43, ctx_list=[ctx4,ctx3])
+ req = self.generate_alter(call_id=43, ctx_list=[ctx4, ctx3])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
@@ -1156,7 +1156,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
self.assertEquals(rep.u.cancel_count, 0)
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
- req = self.generate_alter(call_id=44, ctx_list=[ctx4,ctx4])
+ req = self.generate_alter(call_id=44, ctx_list=[ctx4, ctx4])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
@@ -1220,7 +1220,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx5epm.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
ctx5epm.transfer_syntaxes = tsf5epm_list
- req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt,ctx5epm])
+ req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt, ctx5epm])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
@@ -1257,7 +1257,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
self.assertEquals(rep.u.cancel_count, 0)
self.assertGreaterEqual(len(rep.u.stub_and_verifier), rep.u.alloc_hint)
- req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt,ctx5epm])
+ req = self.generate_alter(call_id=55, ctx_list=[ctx5mgmt, ctx5epm])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_ALTER_RESP, req.call_id,
@@ -1337,7 +1337,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
zero_syntax = misc.ndr_syntax_id()
ndr64 = base.transfer_syntax_ndr64()
- tsf1_list = [btf1,btf2,zero_syntax]
+ tsf1_list = [btf1, btf2, zero_syntax]
ctx1 = dcerpc.ctx_list()
ctx1.context_id = 1
ctx1.num_transfer_syntaxes = len(tsf1_list)
@@ -1372,7 +1372,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
zero_syntax = misc.ndr_syntax_id()
- tsf1_list = [zero_syntax,btf1,btf2,zero_syntax]
+ tsf1_list = [zero_syntax, btf1, btf2, zero_syntax]
ctx1 = dcerpc.ctx_list()
ctx1.context_id = 1
ctx1.num_transfer_syntaxes = len(tsf1_list)
@@ -1422,7 +1422,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx2.abstract_syntax = zero_syntax
ctx2.transfer_syntaxes = tsf2_list
- req = self.generate_bind(call_id=0, ctx_list=[ctx1,ctx2])
+ req = self.generate_bind(call_id=0, ctx_list=[ctx1, ctx2])
self.send_pdu(req)
rep = self.recv_pdu()
self.verify_pdu(rep, dcerpc.DCERPC_PKT_BIND_NAK, req.call_id,
@@ -1482,7 +1482,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
zero_syntax = misc.ndr_syntax_id()
ndr64 = base.transfer_syntax_ndr64()
- tsf1_list = [btf1,btf2,zero_syntax]
+ tsf1_list = [btf1, btf2, zero_syntax]
ctx1 = dcerpc.ctx_list()
ctx1.context_id = 1
ctx1.num_transfer_syntaxes = len(tsf1_list)
@@ -1760,8 +1760,8 @@ class TestDCERPC_BIND(RawDCERPCTest):
opnum=0,
alloc_hint=0xffffffff,
stub="\00" * chunk_size)
- self.send_pdu(req,ndr_print=True,hexdump=True)
- rep = self.recv_pdu(ndr_print=True,hexdump=True)
+ self.send_pdu(req, ndr_print=True, hexdump=True)
+ rep = self.recv_pdu(ndr_print=True, hexdump=True)
self.verify_pdu(rep, dcerpc.DCERPC_PKT_RESPONSE, req.call_id,
auth_length=0)
self.assertNotEquals(rep.u.alloc_hint, 0)
@@ -1985,7 +1985,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
alloc_hint -= thistime
else:
alloc_hint = 0
- self.send_pdu(req,hexdump=False)
+ self.send_pdu(req, hexdump=False)
if fault_first is not None:
rep = self.recv_pdu()
# We get a fault back
@@ -3545,7 +3545,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
ctx1.transfer_syntaxes = tsf1_list
- tsf1b_list = [ndr32,ndr64]
+ tsf1b_list = [ndr32, ndr64]
ctx1b = dcerpc.ctx_list()
ctx1b.context_id = 1
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
@@ -3714,7 +3714,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
ctx1.transfer_syntaxes = tsf1_list
- tsf1b_list = [ndr32,ndr64]
+ tsf1b_list = [ndr32, ndr64]
ctx1b = dcerpc.ctx_list()
ctx1b.context_id = 1
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
@@ -3802,7 +3802,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
ctx1.abstract_syntax = samba.dcerpc.mgmt.abstract_syntax()
ctx1.transfer_syntaxes = tsf1_list
- tsf1b_list = [ndr32,ndr64]
+ tsf1b_list = [ndr32, ndr64]
ctx1b = dcerpc.ctx_list()
ctx1b.context_id = 1
ctx1b.num_transfer_syntaxes = len(tsf1b_list)
@@ -4935,7 +4935,7 @@ class TestDCERPC_BIND(RawDCERPCTest):
time.sleep(0.5)
self.connect()
- ack2 = self.do_generic_bind(ctx=ctx,assoc_group_id=ack.u.assoc_group_id,
+ ack2 = self.do_generic_bind(ctx=ctx, assoc_group_id=ack.u.assoc_group_id,
nak_reason=dcerpc.DCERPC_BIND_NAK_REASON_NOT_SPECIFIED)
return
diff --git a/python/samba/tests/dcerpc/raw_testcase.py b/python/samba/tests/dcerpc/raw_testcase.py
index c7809ee2bc0..b6bba02bbb7 100644
--- a/python/samba/tests/dcerpc/raw_testcase.py
+++ b/python/samba/tests/dcerpc/raw_testcase.py
@@ -478,7 +478,7 @@ class RawDCERPCTest(TestCase):
floor5.lhs = lhs5
floor5.rhs.ipaddr = "0.0.0.0"
- floors = [floor1,floor2,floor3,floor4,floor5]
+ floors = [floor1, floor2, floor3, floor4, floor5]
req_tower = samba.dcerpc.epmapper.epm_tower()
req_tower.num_floors = len(floors)
req_tower.floors = floors
@@ -572,7 +572,7 @@ class RawDCERPCTest(TestCase):
try:
rep_pdu = self.recv_raw(hexdump=hexdump, timeout=timeout)
if rep_pdu is None:
- return (None,None)
+ return (None, None)
rep = ndr_unpack(samba.dcerpc.dcerpc.ncacn_packet, rep_pdu, allow_remaining=True)
if ndr_print:
sys.stderr.write("recv_pdu: %s" % samba.ndr.ndr_print(rep))
diff --git a/python/samba/tests/dcerpc/rpcecho.py b/python/samba/tests/dcerpc/rpcecho.py
index 33cb867f09c..0711ae41546 100644
--- a/python/samba/tests/dcerpc/rpcecho.py
+++ b/python/samba/tests/dcerpc/rpcecho.py
@@ -40,7 +40,7 @@ class RpcEchoTests(RpcInterfaceTestCase):
self.assertEquals(2, self.conn.AddOne(1))
def test_echodata(self):
- self.assertEquals([1,2,3], self.conn.EchoData([1, 2, 3]))
+ self.assertEquals([1, 2, 3], self.conn.EchoData([1, 2, 3]))
def test_call(self):
self.assertEquals(u"foobar", self.conn.TestCall(u"foobar"))
@@ -48,7 +48,7 @@ class RpcEchoTests(RpcInterfaceTestCase):
def test_surrounding(self):
surrounding_struct = echo.Surrounding()
surrounding_struct.x = 4
- surrounding_struct.surrounding = [1,2,3,4]
+ surrounding_struct.surrounding = [1, 2, 3, 4]
y = self.conn.TestSurrounding(surrounding_struct)
self.assertEquals(8 * [0], y.surrounding)
diff --git a/python/samba/tests/docs.py b/python/samba/tests/docs.py
index e02ed8b7a4b..7dacfb2cbc3 100644
--- a/python/samba/tests/docs.py
+++ b/python/samba/tests/docs.py
@@ -103,7 +103,7 @@ class SmbDotConfTests(TestCase):
'panic action', 'homedir map', 'NIS homedir',
'server string', 'netbios name', 'socket options', 'use mmap',
'ctdbd socket', 'printing', 'printcap name', 'queueresume command',
- 'queuepause command','lpresume command', 'lppause command',
+ 'queuepause command', 'lpresume command', 'lppause command',
'lprm command', 'lpq command', 'print command', 'template homedir',
'max open files',
'include system krb5 conf', 'rpc server dynamic port range',
@@ -258,14 +258,14 @@ class SmbDotConfTests(TestCase):
'bytes': '10',
'octal': '0123',
'ustring': 'ustring',
- 'enum':'', 'boolean-auto': '', 'char': 'a', 'list': 'a, b, c'}
+ 'enum': '', 'boolean-auto': '', 'char': 'a', 'list': 'a, b, c'}
opposite_arbitrary = {'string': 'string2', 'boolean': 'no', 'integer': '6',
'boolean-rev': 'no',
'cmdlist': 'd e f',
'bytes': '11',
'octal': '0567',
'ustring': 'ustring2',
- 'enum':'', 'boolean-auto': '', 'char': 'b', 'list': 'd, e, f'}
+ 'enum': '', 'boolean-auto': '', 'char': 'b', 'list': 'd, e, f'}
failset = set()
count = 0
diff --git a/python/samba/tests/dsdb_lock.py b/python/samba/tests/dsdb_lock.py
index cd3851e2f40..332526ed795 100644
--- a/python/samba/tests/dsdb_lock.py
+++ b/python/samba/tests/dsdb_lock.py
@@ -235,7 +235,7 @@ class DsdbLockTestCase(SamDBTestCase):
backenddb.transaction_start()
- backenddb.add({"dn":"@DSDB_LOCK_TEST"})
+ backenddb.add({"dn": "@DSDB_LOCK_TEST"})
backenddb.delete("@DSDB_LOCK_TEST")
# Obtain a write lock
@@ -335,7 +335,7 @@ class DsdbLockTestCase(SamDBTestCase):
os.write(w1, b"started")
self.assertEqual(os.read(r2, 3), b"add")
- backenddb.add({"dn":"@DSDB_LOCK_TEST"})
+ backenddb.add({"dn": "@DSDB_LOCK_TEST"})
backenddb.delete("@DSDB_LOCK_TEST")
os.write(w1, b"added")
diff --git a/python/samba/tests/dsdb_schema_attributes.py b/python/samba/tests/dsdb_schema_attributes.py
index dbfafc4122d..d5ad336b13c 100644
--- a/python/samba/tests/dsdb_schema_attributes.py
+++ b/python/samba/tests/dsdb_schema_attributes.py
@@ -74,7 +74,7 @@ objectClass: attributeSchema
adminDescription: """ + attr_name + """
adminDisplayName: """ + attr_name + """
cn: """ + attr_name + """
-attributeId: 1.3.6.1.4.1.7165.4.6.1.8.%d.""" % sub_oid + str(random.randint(1,100000)) + """
+attributeId: 1.3.6.1.4.1.7165.4.6.1.8.%d.""" % sub_oid + str(random.randint(1, 100000)) + """
attributeSyntax: 2.5.5.12
omSyntax: 64
instanceType: 4
diff --git a/python/samba/tests/hostconfig.py b/python/samba/tests/hostconfig.py
index 526dc0fe4e3..94f511ccf3f 100644
--- a/python/samba/tests/hostconfig.py
+++ b/python/samba/tests/hostconfig.py
@@ -56,10 +56,10 @@ class ShareTests(TestCase):
def test_iter(self):
self.assertEquals([], list(self._get_shares({})))
- self.assertEquals([], list(self._get_shares({"global":{}})))
+ self.assertEquals([], list(self._get_shares({"global": {}})))
self.assertEquals(
["bla"],
- list(self._get_shares({"global":{}, "bla":{}})))
+ list(self._get_shares({"global": {}, "bla": {}})))
def test_len(self):
shares = self._get_shares({"global": {}})
diff --git a/python/samba/tests/password_hash_fl2003.py b/python/samba/tests/password_hash_fl2003.py
index e1a7ec94452..bcf17f8f227 100644
--- a/python/samba/tests/password_hash_fl2003.py
+++ b/python/samba/tests/password_hash_fl2003.py
@@ -197,5 +197,5 @@ class PassWordHashFl2003Tests(PassWordHashTests):
#
up = ndr_unpack(drsblobs.package_PrimaryUserPasswordBlob,
binascii.a2b_hex(up_package.data))
- self.checkUserPassword(up, [("{CRYPT}", "6",10000)])
+ self.checkUserPassword(up, [("{CRYPT}", "6", 10000)])
self.checkNtHash(USER_PASS, up.current_nt_hash.hash)
diff --git a/python/samba/tests/password_hash_fl2008.py b/python/samba/tests/password_hash_fl2008.py
index 70455a6e9d8..91064b4f11b 100644
--- a/python/samba/tests/password_hash_fl2008.py
+++ b/python/samba/tests/password_hash_fl2008.py
@@ -112,7 +112,7 @@ class PassWordHashFl2008Tests(PassWordHashTests):
#
up = ndr_unpack(drsblobs.package_PrimaryUserPasswordBlob,
binascii.a2b_hex(up_package.data))
- self.checkUserPassword(up, [("{CRYPT}", "6",None)])
+ self.checkUserPassword(up, [("{CRYPT}", "6", None)])
self.checkNtHash(USER_PASS, up.current_nt_hash.hash)
def test_supplementalCredentials_cleartext(self):
@@ -206,5 +206,5 @@ class PassWordHashFl2008Tests(PassWordHashTests):
#
up = ndr_unpack(drsblobs.package_PrimaryUserPasswordBlob,
binascii.a2b_hex(up_package.data))
- self.checkUserPassword(up, [("{CRYPT}", "5",100)])
+ self.checkUserPassword(up, [("{CRYPT}", "5", 100)])
self.checkNtHash(USER_PASS, up.current_nt_hash.hash)
diff --git a/python/samba/tests/posixacl.py b/python/samba/tests/posixacl.py
index 97ce6bb4a6f..5926c11b158 100644
--- a/python/samba/tests/posixacl.py
+++ b/python/samba/tests/posixacl.py
@@ -80,7 +80,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
facl = getntacl(self.lp, self.tempf, direct_db_access=True)
anysid = security.dom_sid(security.SID_NT_SELF)
- self.assertEquals(facl.as_sddl(anysid),acl)
+ self.assertEquals(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_setposixacl_getntacl(self):
acl = ACL
@@ -147,7 +147,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
facl = getntacl(self.lp, self.tempf, direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
- self.assertEquals(facl.as_sddl(anysid),acl)
+ self.assertEquals(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_getntacl_smbd(self):
acl = ACL
@@ -155,7 +155,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
facl = getntacl(self.lp, self.tempf, direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
- self.assertEquals(facl.as_sddl(anysid),acl)
+ self.assertEquals(facl.as_sddl(anysid), acl)
def test_setntacl_smbd_setposixacl_getntacl_smbd(self):
acl = ACL
@@ -176,11 +176,11 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
# This invalidates the hash of the NT acl just set because there is a hook in the posix ACL set code
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
smbd.set_simple_acl(self.tempf, 0o640, BA_gid)
# This should re-calculate an ACL based on the posix details
- facl = getntacl(self.lp,self.tempf, direct_db_access=False)
+ facl = getntacl(self.lp, self.tempf, direct_db_access=False)
anysid = security.dom_sid(security.SID_NT_SELF)
self.assertEquals(simple_acl_from_posix, facl.as_sddl(anysid))
@@ -190,7 +190,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
facl = getntacl(self.lp, self.tempf, direct_db_access=False)
domsid = security.dom_sid(DOM_SID)
- self.assertEquals(facl.as_sddl(domsid),acl)
+ self.assertEquals(facl.as_sddl(domsid), acl)
def test_setntacl_getposixacl(self):
acl = ACL
@@ -198,7 +198,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
session_info=self.get_session_info())
facl = getntacl(self.lp, self.tempf)
anysid = security.dom_sid(security.SID_NT_SELF)
- self.assertEquals(facl.as_sddl(anysid),acl)
+ self.assertEquals(facl.as_sddl(anysid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS)
def test_setposixacl_getntacl(self):
@@ -221,10 +221,10 @@ class PosixAclMappingTests(TestCaseInTempDir):
user_SID = s4_passdb.uid_to_sid(os.stat(self.tempdir).st_uid)
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
- (BA_id,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_id, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
SO_sid = security.dom_sid(security.SID_BUILTIN_SERVER_OPERATORS)
- (SO_id,SO_type) = s4_passdb.sid_to_id(SO_sid)
+ (SO_id, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
smbd.chown(self.tempdir, BA_id, SO_id)
smbd.set_simple_acl(self.tempdir, 0o750)
@@ -237,7 +237,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
def test_setposixacl_group_getntacl_smbd(self):
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
group_SID = s4_passdb.gid_to_sid(os.stat(self.tempf).st_gid)
user_SID = s4_passdb.uid_to_sid(os.stat(self.tempf).st_uid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
@@ -285,7 +285,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
def test_setposixacl_group_getposixacl(self):
BA_sid = security.dom_sid(security.SID_BUILTIN_ADMINISTRATORS)
s4_passdb = passdb.PDB(self.lp.get("passdb backend"))
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
smbd.set_simple_acl(self.tempf, 0o670, BA_gid)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS)
@@ -315,7 +315,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
setntacl(self.lp, self.tempf, acl, str(domsid), use_ntvfs=False,
session_info=session_info)
facl = getntacl(self.lp, self.tempf)
- self.assertEquals(facl.as_sddl(domsid),acl)
+ self.assertEquals(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS)
nwrap_module_so_path = os.getenv('NSS_WRAPPER_MODULE_SO_PATH')
@@ -335,15 +335,15 @@ class PosixAclMappingTests(TestCaseInTempDir):
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
- (LA_uid,LA_type) = s4_passdb.sid_to_id(LA_sid)
+ (LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEquals(LA_type, idmap.ID_TYPE_UID)
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
- (SO_gid,SO_type) = s4_passdb.sid_to_id(SO_sid)
+ (SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (SY_gid,SY_type) = s4_passdb.sid_to_id(SY_sid)
+ (SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (AU_gid,AU_type) = s4_passdb.sid_to_id(AU_sid)
+ (AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEquals(AU_type, idmap.ID_TYPE_BOTH)
self.assertEquals(posix_acl.count, 13, self.print_posix_acl(posix_acl))
@@ -463,7 +463,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
setntacl(self.lp, self.tempdir, acl, str(domsid), use_ntvfs=False,
session_info=session_info)
facl = getntacl(self.lp, self.tempdir)
- self.assertEquals(facl.as_sddl(domsid),acl)
+ self.assertEquals(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempdir, smb_acl.SMB_ACL_TYPE_ACCESS)
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
@@ -477,15 +477,15 @@ class PosixAclMappingTests(TestCaseInTempDir):
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
- (LA_uid,LA_type) = s4_passdb.sid_to_id(LA_sid)
+ (LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEquals(LA_type, idmap.ID_TYPE_UID)
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
- (SO_gid,SO_type) = s4_passdb.sid_to_id(SO_sid)
+ (SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (SY_gid,SY_type) = s4_passdb.sid_to_id(SY_sid)
+ (SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (AU_gid,AU_type) = s4_passdb.sid_to_id(AU_sid)
+ (AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEquals(AU_type, idmap.ID_TYPE_BOTH)
self.assertEquals(posix_acl.count, 13, self.print_posix_acl(posix_acl))
@@ -558,7 +558,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
setntacl(self.lp, self.tempdir, acl, str(domsid), use_ntvfs=False,
session_info=session_info)
facl = getntacl(self.lp, self.tempdir)
- self.assertEquals(facl.as_sddl(domsid),acl)
+ self.assertEquals(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempdir, smb_acl.SMB_ACL_TYPE_ACCESS)
LA_sid = security.dom_sid(str(domsid) + "-" + str(security.DOMAIN_RID_ADMINISTRATOR))
@@ -573,17 +573,17 @@ class PosixAclMappingTests(TestCaseInTempDir):
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
- (LA_uid,LA_type) = s4_passdb.sid_to_id(LA_sid)
+ (LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEquals(LA_type, idmap.ID_TYPE_UID)
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
- (SO_gid,SO_type) = s4_passdb.sid_to_id(SO_sid)
+ (SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (SY_gid,SY_type) = s4_passdb.sid_to_id(SY_sid)
+ (SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (AU_gid,AU_type) = s4_passdb.sid_to_id(AU_sid)
+ (AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEquals(AU_type, idmap.ID_TYPE_BOTH)
- (PA_gid,PA_type) = s4_passdb.sid_to_id(PA_sid)
+ (PA_gid, PA_type) = s4_passdb.sid_to_id(PA_sid)
self.assertEquals(PA_type, idmap.ID_TYPE_BOTH)
self.assertEquals(posix_acl.count, 15, self.print_posix_acl(posix_acl))
@@ -667,7 +667,7 @@ class PosixAclMappingTests(TestCaseInTempDir):
setntacl(self.lp, self.tempf, acl, str(domsid), use_ntvfs=False,
session_info=session_info)
facl = getntacl(self.lp, self.tempf)
- self.assertEquals(facl.as_sddl(domsid),acl)
+ self.assertEquals(facl.as_sddl(domsid), acl)
posix_acl = smbd.get_sys_acl(self.tempf, smb_acl.SMB_ACL_TYPE_ACCESS)
nwrap_module_so_path = os.getenv('NSS_WRAPPER_MODULE_SO_PATH')
@@ -688,17 +688,17 @@ class PosixAclMappingTests(TestCaseInTempDir):
# These assertions correct for current ad_dc selftest
# configuration. When other environments have a broad range of
# groups mapped via passdb, we can relax some of these checks
- (LA_uid,LA_type) = s4_passdb.sid_to_id(LA_sid)
+ (LA_uid, LA_type) = s4_passdb.sid_to_id(LA_sid)
self.assertEquals(LA_type, idmap.ID_TYPE_UID)
- (BA_gid,BA_type) = s4_passdb.sid_to_id(BA_sid)
+ (BA_gid, BA_type) = s4_passdb.sid_to_id(BA_sid)
self.assertEquals(BA_type, idmap.ID_TYPE_BOTH)
- (SO_gid,SO_type) = s4_passdb.sid_to_id(SO_sid)
+ (SO_gid, SO_type) = s4_passdb.sid_to_id(SO_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (SY_gid,SY_type) = s4_passdb.sid_to_id(SY_sid)
+ (SY_gid, SY_type) = s4_passdb.sid_to_id(SY_sid)
self.assertEquals(SO_type, idmap.ID_TYPE_BOTH)
- (AU_gid,AU_type) = s4_passdb.sid_to_id(AU_sid)
+ (AU_gid, AU_type) = s4_passdb.sid_to_id(AU_sid)
self.assertEquals(AU_type, idmap.ID_TYPE_BOTH)
- (PA_gid,PA_type) = s4_passdb.sid_to_id(PA_sid)
+ (PA_gid, PA_type) = s4_passdb.sid_to_id(PA_sid)
self.assertEquals(PA_type, idmap.ID_TYPE_BOTH)
self.assertEquals(posix_acl.count, 15, self.print_posix_acl(posix_acl))
diff --git a/python/samba/tests/samba3sam.py b/python/samba/tests/samba3sam.py
index a5e39eebe59..1221435fcbc 100644
--- a/python/samba/tests/samba3sam.py
+++ b/python/samba/tests/samba3sam.py
@@ -203,7 +203,7 @@ class Samba3SamTestCase(MapBaseTestCase):
#
msg = self.ldb.search(expression="(cn=Foo)", base="cn=Foo",
scope=SCOPE_BASE,
- attrs=['foo','blah','cn','showInAdvancedViewOnly'])
+ attrs=['foo', 'blah', 'cn', 'showInAdvancedViewOnly'])
self.assertEquals(len(msg), 1)
self.assertEquals(str(msg[0]["showInAdvancedViewOnly"]), "TRUE")
self.assertEquals(str(msg[0]["foo"]), "bar")
@@ -218,14 +218,14 @@ class Samba3SamTestCase(MapBaseTestCase):
# Checking for existence of record (remote)
msg = self.ldb.search(expression="(unixName=bin)",
- attrs=['unixName','cn','dn', 'sambaUnicodePwd'])
+ attrs=['unixName', 'cn', 'dn', 'sambaUnicodePwd'])
self.assertEquals(len(msg), 1)
self.assertEquals(str(msg[0]["cn"]), "Niemand")
self.assertEquals(str(msg[0]["sambaUnicodePwd"]), "geheim")
# Checking for existence of record (local && remote)
msg = self.ldb.search(expression="(&(unixName=bin)(sambaUnicodePwd=geheim))",
- attrs=['unixName','cn','dn', 'sambaUnicodePwd'])
+ attrs=['unixName', 'cn', 'dn', 'sambaUnicodePwd'])
self.assertEquals(len(msg), 1) # TODO: should check with more records
self.assertEquals(str(msg[0]["cn"]), "Niemand")
self.assertEquals(str(msg[0]["unixName"]), "bin")
@@ -233,7 +233,7 @@ class Samba3SamTestCase(MapBaseTestCase):
# Checking for existence of record (local || remote)
msg = self.ldb.search(expression="(|(unixName=bin)(sambaUnicodePwd=geheim))",
- attrs=['unixName','cn','dn', 'sambaUnicodePwd'])
+ attrs=['unixName', 'cn', 'dn', 'sambaUnicodePwd'])
#print "got %d replies" % len(msg)
self.assertEquals(len(msg), 1) # TODO: should check with more records
self.assertEquals(str(msg[0]["cn"]), "Niemand")
@@ -806,7 +806,7 @@ objectSid: S-1-5-21-4231626423-2410014848-2360679739-1052
self.assertEquals(str(res[4]["lastLogon"]), "z")
# Clean up
- dns = [self.samba4.dn("cn=%s" % n) for n in ["A","B","C","X","Y","Z"]]
+ dns = [self.samba4.dn("cn=%s" % n) for n in ["A", "B", "C", "X", "Y", "Z"]]
for dn in dns:
self.ldb.delete(dn)
diff --git a/python/samba/tests/samba_tool/dnscmd.py b/python/samba/tests/samba_tool/dnscmd.py
index 5c27c80f783..bc0e133c81c 100644
--- a/python/samba/tests/samba_tool/dnscmd.py
+++ b/python/samba/tests/samba_tool/dnscmd.py
@@ -88,12 +88,12 @@ class DnsCmdTestCase(SambaToolCmdTest):
"::1",
"::",
"1:1:1:1:1:1:1:1"],
- "PTR":good_dns,
- "CNAME":good_dns,
- "NS":good_dns,
- "MX":good_mx,
- "SRV":good_srv,
- "TXT":["text", "", "@#!", "\n"]
+ "PTR": good_dns,
+ "CNAME": good_dns,
+ "NS": good_dns,
+ "MX": good_mx,
+ "SRV": good_srv,
+ "TXT": ["text", "", "@#!", "\n"]
}
self.bad_records = {
@@ -105,11 +105,11 @@ class DnsCmdTestCase(SambaToolCmdTest):
"1234:5678:9ABC:DEF0:1234:5678:9ABC:DEF0:1234",
"1234:5678:9ABC:DEF0:1234:5678:9ABC",
"1111::1111::1111"],
- "PTR":bad_dns,
- "CNAME":bad_dns,
- "NS":bad_dns,
- "MX":bad_mx,
- "SRV":bad_srv
+ "PTR": bad_dns,
+ "CNAME": bad_dns,
+ "NS": bad_dns,
+ "MX": bad_mx,
+ "SRV": bad_srv
}
def tearDown(self):
diff --git a/python/samba/tests/samba_tool/forest.py b/python/samba/tests/samba_tool/forest.py
index 1f2194671e9..11c77e6105e 100644
--- a/python/samba/tests/samba_tool/forest.py
+++ b/python/samba/tests/samba_tool/forest.py
@@ -49,7 +49,7 @@ class ForestCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("dsheuristics: <NO VALUE>", out)
def test_modify_dsheuristics(self):
@@ -62,5 +62,5 @@ class ForestCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("set dsheuristics: 0000002", out)
diff --git a/python/samba/tests/samba_tool/fsmo.py b/python/samba/tests/samba_tool/fsmo.py
index dcef4e5209b..51b735ebcfb 100644
--- a/python/samba/tests/samba_tool/fsmo.py
+++ b/python/samba/tests/samba_tool/fsmo.py
@@ -26,7 +26,7 @@ class FsmoCmdTestCase(SambaToolCmdTest):
(result, out, err) = self.runsubcmd("fsmo", "show")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
# Check that the output is sensible
samdb = self.getSamDB("-H", "ldap://%s" % os.environ["SERVER"],
diff --git a/python/samba/tests/samba_tool/group.py b/python/samba/tests/samba_tool/group.py
index bc966ff3e22..8b6fc889cf1 100644
--- a/python/samba/tests/samba_tool/group.py
+++ b/python/samba/tests/samba_tool/group.py
@@ -88,7 +88,7 @@ class GroupCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","There shouldn't be any error message")
+ self.assertEquals(err, "", "There shouldn't be any error message")
self.assertIn("Added group %s" % group["name"], out)
found = self._find_group(group["name"])
@@ -177,7 +177,7 @@ class GroupCmdTestCase(SambaToolCmdTest):
"-U%s%%%s" % (os.environ["DC_USERNAME"],
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("dn: CN=Domain Users,CN=Users,DC=samba,DC=example,DC=com", out)
def _randomGroup(self, base={}):
diff --git a/python/samba/tests/samba_tool/join.py b/python/samba/tests/samba_tool/join.py
index 1cc688f75dd..bfb534cd297 100644
--- a/python/samba/tests/samba_tool/join.py
+++ b/python/samba/tests/samba_tool/join.py
@@ -26,4 +26,4 @@ class JoinCmdTestCase(SambaToolCmdTest):
(result, out, err) = self.runsubcmd("domain", "join", os.environ["REALM"], "dc", "-U%s%%%s" % (os.environ["USERNAME"], os.environ["PASSWORD"]))
self.assertCmdFail(result)
- self.assertTrue("Not removing account" in err,"Should fail with exception")
+ self.assertTrue("Not removing account" in err, "Should fail with exception")
diff --git a/python/samba/tests/samba_tool/ntacl.py b/python/samba/tests/samba_tool/ntacl.py
index 3da75065548..4078c271d98 100644
--- a/python/samba/tests/samba_tool/ntacl.py
+++ b/python/samba/tests/samba_tool/ntacl.py
@@ -32,7 +32,7 @@ class NtACLCmdSysvolTestCase(SambaToolCmdTest):
(result, out, err) = self.runsubcmd("ntacl", "sysvolreset",
"--use-ntvfs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
self.assertIn("Please note that POSIX permissions have NOT been changed, only the stored NT ACL", err)
def test_s3fs(self):
@@ -40,34 +40,34 @@ class NtACLCmdSysvolTestCase(SambaToolCmdTest):
"--use-s3fs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
def test_ntvfs_check(self):
(result, out, err) = self.runsubcmd("ntacl", "sysvolreset",
"--use-ntvfs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
self.assertIn("Please note that POSIX permissions have NOT been changed, only the stored NT ACL", err)
# Now check they were set correctly
(result, out, err) = self.runsubcmd("ntacl", "sysvolcheck")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
def test_s3fs_check(self):
(result, out, err) = self.runsubcmd("ntacl", "sysvolreset",
"--use-s3fs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
# Now check they were set correctly
(result, out, err) = self.runsubcmd("ntacl", "sysvolcheck")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
class NtACLCmdGetSetTestCase(SambaToolCmdTest):
"""Tests for samba-tool ntacl get/set subcommands"""
@@ -77,59 +77,59 @@ class NtACLCmdGetSetTestCase(SambaToolCmdTest):
def test_ntvfs(self):
path = os.environ['SELFTEST_PREFIX']
- tempf = os.path.join(path,"pytests" +str(int(100000 * random.random())))
+ tempf = os.path.join(path, "pytests" + str(int(100000 * random.random())))
open(tempf, 'w').write("empty")
(result, out, err) = self.runsubcmd("ntacl", "set", self.acl, tempf,
"--use-ntvfs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
self.assertIn("Please note that POSIX permissions have NOT been changed, only the stored NT ACL", err)
def test_s3fs(self):
path = os.environ['SELFTEST_PREFIX']
- tempf = os.path.join(path,"pytests" +str(int(100000 * random.random())))
+ tempf = os.path.join(path, "pytests" + str(int(100000 * random.random())))
open(tempf, 'w').write("empty")
(result, out, err) = self.runsubcmd("ntacl", "set", self.acl, tempf,
"--use-s3fs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
def test_ntvfs_check(self):
path = os.environ['SELFTEST_PREFIX']
- tempf = os.path.join(path,"pytests" +str(int(100000 * random.random())))
+ tempf = os.path.join(path, "pytests" + str(int(100000 * random.random())))
open(tempf, 'w').write("empty")
(result, out, err) = self.runsubcmd("ntacl", "set", self.acl, tempf,
"--use-ntvfs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(out,"","Shouldn't be any output messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
self.assertIn("Please note that POSIX permissions have NOT been changed, only the stored NT ACL", err)
# Now check they were set correctly
(result, out, err) = self.runsubcmd("ntacl", "get", tempf,
"--use-ntvfs", "--as-sddl")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertEquals(self.acl + "\n", out, "Output should be the ACL")
def test_s3fs_check(self):
path = os.environ['SELFTEST_PREFIX']
- tempf = os.path.join(path,"pytests" + str(int(100000 *random.random())))
+ tempf = os.path.join(path, "pytests" + str(int(100000 * random.random())))
open(tempf, 'w').write("empty")
(result, out, err) = self.runsubcmd("ntacl", "set", self.acl, tempf,
"--use-s3fs")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(out,"","Shouldn't be any output messages")
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(out, "", "Shouldn't be any output messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
# Now check they were set correctly
(result, out, err) = self.runsubcmd("ntacl", "get", tempf,
"--use-s3fs", "--as-sddl")
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
- self.assertEquals(self.acl + "\n", out,"Output should be the ACL")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
+ self.assertEquals(self.acl + "\n", out, "Output should be the ACL")
diff --git a/python/samba/tests/samba_tool/rodc.py b/python/samba/tests/samba_tool/rodc.py
index 3ae52449890..2259f06aa7d 100644
--- a/python/samba/tests/samba_tool/rodc.py
+++ b/python/samba/tests/samba_tool/rodc.py
@@ -35,7 +35,7 @@ class RodcCmdTestCase(SambaToolCmdTest):
self.creds.guess(self.lp)
self.session = system_session()
self.ldb = SamDB("ldap://" + os.environ["DC_SERVER"],
- session_info=self.session, credentials=self.creds,lp=self.lp)
+ session_info=self.session, credentials=self.creds, lp=self.lp)
self.base_dn = self.ldb.domain_dn()
diff --git a/python/samba/tests/samba_tool/schema.py b/python/samba/tests/samba_tool/schema.py
index 56d09a78de7..ae095994e53 100644
--- a/python/samba/tests/samba_tool/schema.py
+++ b/python/samba/tests/samba_tool/schema.py
@@ -40,7 +40,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("dn: CN=uid,CN=Schema,CN=Configuration,DC=samba,DC=example,DC=com", out)
def test_modify_attribute_searchflags(self):
@@ -60,7 +60,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("modified cn=uid,CN=Schema,CN=Configuration,DC=samba,DC=example,DC=com", out)
(result, out, err) = self.runsublevelcmd("schema", ("attribute",
@@ -71,7 +71,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("modified cn=uid,CN=Schema,CN=Configuration,DC=samba,DC=example,DC=com", out)
(result, out, err) = self.runsublevelcmd("schema", ("attribute",
@@ -82,7 +82,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("modified cn=uid,CN=Schema,CN=Configuration,DC=samba,DC=example,DC=com", out)
def test_show_oc_attribute(self):
@@ -94,7 +94,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("--- MAY contain ---", out)
self.assertIn("--- MUST contain ---", out)
@@ -107,7 +107,7 @@ class SchemaCmdTestCase(SambaToolCmdTest):
os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("dn: CN=Person,CN=Schema,CN=Configuration,DC=samba,DC=example,DC=com", out)
diff --git a/python/samba/tests/samba_tool/user.py b/python/samba/tests/samba_tool/user.py
index 4d264b4027d..4d39e822720 100644
--- a/python/samba/tests/samba_tool/user.py
+++ b/python/samba/tests/samba_tool/user.py
@@ -52,7 +52,7 @@ class UserCmdTestCase(SambaToolCmdTest):
(result, out, err) = user["createUserFn"](user)
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("User '%s' created successfully" % user["name"], out)
user["checkUserFn"](user)
@@ -94,7 +94,7 @@ class UserCmdTestCase(SambaToolCmdTest):
"-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("User '%s' created successfully" % user["name"], out)
found = self._find_user(user["name"])
@@ -194,7 +194,7 @@ class UserCmdTestCase(SambaToolCmdTest):
"-H", "ldap://%s" % os.environ["DC_SERVER"],
"-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
- self.assertEquals(err,"","setpassword with url")
+ self.assertEquals(err, "", "setpassword with url")
self.assertMatch(out, "Changed password OK", "setpassword with url")
attributes = "sAMAccountName,unicodePwd,supplementalCredentials,virtualClearTextUTF8,virtualClearTextUTF16,virtualSSHA,virtualSambaGPG"
@@ -203,7 +203,7 @@ class UserCmdTestCase(SambaToolCmdTest):
"--attributes=%s" % attributes,
"--decrypt-samba-gpg")
self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --cache-ldb-initialize runs")
- self.assertEqual(err,"","getpassword without url")
+ self.assertEqual(err, "", "getpassword without url")
cache_attrs = {
"objectClass": {"value": "userSyncPasswords"},
"samdbUrl": {},
@@ -221,7 +221,7 @@ class UserCmdTestCase(SambaToolCmdTest):
(result, out, err) = self.runsubcmd("user", "syncpasswords", "--no-wait")
self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --no-wait runs")
- self.assertEqual(err,"","syncpasswords --no-wait")
+ self.assertEqual(err, "", "syncpasswords --no-wait")
self.assertMatch(out, "dirsync_loop(): results 0",
"syncpasswords --no-wait: 'dirsync_loop(): results 0': out[%s]" % (out))
for user in self.users:
@@ -242,12 +242,12 @@ class UserCmdTestCase(SambaToolCmdTest):
user["name"],
"--newpassword=%s" % newpasswd)
self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
- self.assertEquals(err,"","setpassword without url")
+ self.assertEquals(err, "", "setpassword without url")
self.assertMatch(out, "Changed password OK", "setpassword without url")
(result, out, err) = self.runsubcmd("user", "syncpasswords", "--no-wait")
self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --no-wait runs")
- self.assertEqual(err,"","syncpasswords --no-wait")
+ self.assertEqual(err, "", "syncpasswords --no-wait")
self.assertMatch(out, "dirsync_loop(): results 0",
"syncpasswords --no-wait: 'dirsync_loop(): results 0': out[%s]" % (out))
self.assertMatch(out, "sAMAccountName: %s" % (user["name"]),
@@ -273,7 +273,7 @@ class UserCmdTestCase(SambaToolCmdTest):
"--attributes=%s" % attributes,
"--decrypt-samba-gpg")
self.assertCmdSuccess(result, out, err, "Ensure getpassword runs")
- self.assertEqual(err,"","getpassword without url")
+ self.assertEqual(err, "", "getpassword without url")
self.assertMatch(out, "Got password OK", "getpassword without url")
self.assertMatch(out, "sAMAccountName: %s" % (user["name"]),
"getpassword: 'sAMAccountName': %s out[%s]" % (user["name"], out))
@@ -299,7 +299,7 @@ class UserCmdTestCase(SambaToolCmdTest):
"-H", "ldap://%s" % os.environ["DC_SERVER"],
"-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
- self.assertEquals(err,"","setpassword with forced change")
+ self.assertEquals(err, "", "setpassword with forced change")
self.assertMatch(out, "Changed password OK", "setpassword with forced change")
@@ -464,7 +464,7 @@ sAMAccountName: %s
"-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("User '%s' created successfully" % user["name"], out)
self._check_posix_user(user)
@@ -493,7 +493,7 @@ sAMAccountName: %s
"-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
self.assertCmdSuccess(result, out, err)
- self.assertEquals(err,"","Shouldn't be any error messages")
+ self.assertEquals(err, "", "Shouldn't be any error messages")
self.assertIn("User '%s' created successfully" % user["name"], out)
self._check_posix_user(user)
diff --git a/python/samba/tests/security.py b/python/samba/tests/security.py
index 02c1e8897f6..ed959ee5499 100644
--- a/python/samba/tests/security.py
+++ b/python/samba/tests/security.py
@@ -66,10 +66,10 @@ class SecurityDescriptorTests(samba.tests.TestCase):
self.assertEquals(desc.type, 0x8004)
def test_from_sddl_invalidsddl(self):
- self.assertRaises(TypeError,security.descriptor.from_sddl, "foo",security.dom_sid("S-2-0-0"))
+ self.assertRaises(TypeError, security.descriptor.from_sddl, "foo", security.dom_sid("S-2-0-0"))
def test_from_sddl_invalidtype1(self):
- self.assertRaises(TypeError, security.descriptor.from_sddl, security.dom_sid('S-2-0-0-512'),security.dom_sid("S-2-0-0"))
+ self.assertRaises(TypeError, security.descriptor.from_sddl, security.dom_sid('S-2-0-0-512'), security.dom_sid("S-2-0-0"))
def test_from_sddl_invalidtype2(self):
sddl = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
@@ -90,7 +90,7 @@ class SecurityDescriptorTests(samba.tests.TestCase):
text = "O:AOG:DAD:(A;;RPWPCCDCLCSWRCWDWOGA;;;S-1-0-0)"
dom = security.dom_sid("S-2-0-0")
desc1 = security.descriptor.from_sddl(text, dom)
- self.assertRaises(TypeError, desc1.as_sddl,text)
+ self.assertRaises(TypeError, desc1.as_sddl, text)
def test_as_sddl_no_domainsid(self):
diff --git a/python/samba/tests/smb.py b/python/samba/tests/smb.py
index 296815f3a97..59fd6ed9d41 100644
--- a/python/samba/tests/smb.py
+++ b/python/samba/tests/smb.py
@@ -25,7 +25,7 @@ utf_contents = u'Süßigkeiten Äpfel ' * 128
test_literal_bytes_embed_nulls = b'\xff\xfe\x14\x61\x00\x00\x62\x63\x64' * 256
binary_contents = b'\xff\xfe'
binary_contents = binary_contents + "Hello cruel world of python3".encode('utf8') * 128
-test_dir = os.path.join(addom, 'testing_%d' % random.randint(0,0xFFFF))
+test_dir = os.path.join(addom, 'testing_%d' % random.randint(0, 0xFFFF))
test_file = os.path.join(test_dir, 'testing').replace('/', '\\')
class SMBTests(samba.tests.TestCase):
@@ -50,7 +50,7 @@ class SMBTests(samba.tests.TestCase):
ls = [f['name'] for f in self.conn.list(addom)]
self.assertIn('scripts', ls,
msg='"scripts" directory not found in sysvol')
- self.assertIn('Policies',ls,
+ self.assertIn('Policies', ls,
msg='"Policies" directory not found in sysvol')
def test_unlink(self):
diff --git a/python/samba/tests/upgradeprovisionneeddc.py b/python/samba/tests/upgradeprovisionneeddc.py
index 9e523961691..73a3152ca46 100644
--- a/python/samba/tests/upgradeprovisionneeddc.py
+++ b/python/samba/tests/upgradeprovisionneeddc.py
@@ -24,7 +24,7 @@ import shutil
from samba import param
from samba.credentials import Credentials
from samba.auth import system_session
-from samba.provision import getpolicypath,find_provision_key_parameters
+from samba.provision import getpolicypath, find_provision_key_parameters
from samba.upgradehelpers import (get_paths, get_ldbs,
identic_rename,
updateOEMInfo, getOEMInfo, update_gpo,