summaryrefslogtreecommitdiffstats
path: root/source4/scripting/python
Commit message (Collapse)AuthorAgeFilesLines
* samba.tests.provision: Remove broken become_dc test.Jelmer Vernooij2009-09-261-25/+1
|
* Add init file for DCE/RPC tests.Jelmer Vernooij2009-09-241-0/+20
|
* PEP8Jelmer Vernooij2009-09-246-3/+6
|
* Revert "s4:python fixed subunit tests of dcerpc"Jelmer Vernooij2009-09-246-0/+0
| | | | This reverts commit ffd48a79ee34dc90c0f6f16564c3a0de8b53d3d2.
* Initial Implementation of the DS objects access checks.Nadezhda Ivanova2009-09-211-0/+1
| | | | | Currently disabled. The search will be greatly modified, also the object tree stuff will be simplified.
* Merge branch 'master' of git://git.samba.org/sambaNadezhda Ivanova2009-09-212-29/+92
|\
| * s4:kerberos Fix the salt to match Windows 2008.Andrew Bartlett2009-09-211-1/+1
| | | | | | | | | | | | | | The previous commit changed the wrong end - we must fix our server, not our client. Andrew Bartlett
| * s4:provision Make our default salt match our server behaviourAndrew Bartlett2009-09-211-1/+1
| | | | | | | | | | | | We need to look into salting algorithms further. Andrew Bartlett
| * s4:provision - Fix up ProvisioningError class as suggested by JelmerMatthias Dieter Wallnöfer2009-09-211-5/+5
| |
| * s4:samdb/tools - That should fix now the last failuresMatthias Dieter Wallnöfer2009-09-211-2/+2
| |
| * s4:provision Make us Windows 2008 level by defualt againAndrew Bartlett2009-09-201-4/+5
| | | | | | | | | | | | | | | | | | Also add a note to clarify that this should not be changed without discussion and consensus. We don't want this bouncing around. Paramater support to allow optional selection of Win2003 mode welcomed. Andrew Bartlett
| * s4:provision Use code to store domain join in 'net join' as wellAndrew Bartlett2009-09-201-23/+80
| | | | | | | | | | | | | | | | This ensures we only have one codepath to store the secret, and therefore that we have a single choke point for setting the saltPrincipal, which we were previously skipping. Andrew Bartlett
| * s4:provision split provision of DNS zone and self join keytabAndrew Bartlett2009-09-201-4/+10
| |
* | Merge branch 'master' of git://git.samba.org/sambaNadezhda Ivanova2009-09-201-12/+14
|\|
| * s4:python tools - try to fix some test problemsMatthias Dieter Wallnöfer2009-09-201-12/+14
| |
* | Initial implementation of security descriptor creation in DSNadezhda Ivanova2009-09-201-5/+44
|/ | | | | TODO's: ACE sorting and clarifying the inheritance of object specific ace's.
* Fixed a difference in domain sid type when SID is provided by user.Nadezhda Ivanova2009-09-201-1/+4
|
* s4:provision: add the 'resolve_oids' on the top of the module stackStefan Metzmacher2009-09-201-1/+2
| | | | metze
* s4:samdb.py - further reworkMatthias Dieter Wallnöfer2009-09-191-12/+9
| | | | | | | | | - I added a comment to the "new user" operation to point out that this works only on s4, since we add also ID mapping entries for winbind there - The "new user" operation adds now the password through the "set password" operation which I find better due to the re-use principle - Remove the word "DC" after "SAMBA 4" in the comment over the "set password" operation since this note and operation applies also to s4 in standalone mode
* s4:samdb.py - Unification of the interfacesMatthias Dieter Wallnöfer2009-09-182-38/+54
| | | | | | | | | - When a user account is requested by a call always the search filter will be passed as argument. This helps us to unify the API - Add/fix some comments; in particular new comments inform the developer which requirements exist if he wants to use calls which manipulate the "userPassword" attribute (On s4 no problem - but on certain domain levels on Windows Server)
* s4:provision - Bump down the domain and forest level to Windows 2000Matthias Dieter Wallnöfer2009-09-181-3/+3
| | | | | | | | | | | | - The DC level we keep on Windows Server 2008 R2 (we should call ourself always the newest server type) - The domain/forest level we set to the minimum (Windows 2000 native) to allow all AD DC types (from Windows 2000 on) in our domain - the NT4 "mixed" mode isn't supported by us (discussed on mailing list) -> "nTMixedDomain" is set always to 0 - I'll add a script which allows to bump the DC level (basically sets the "msDS-Behaviour-Version" attributes on the "Partitions/Configuration/DC" and on the "DC" object)
* s4:provision - Some rework (continuation)Matthias Dieter Wallnöfer2009-09-171-3/+4
| | | | | | | | | | | - Fix up "servicePrincipalNames" attributes on the DC object - Add some informative comments (most in "provision_self_join.ldif") - Add also comments where objects are missing which we may add later when we support the feature (mainly for FRS) - Add "domain updates" objects also under "CN=Configuration" (they exist twice) - Add the default services under "Services" to allow interoperability with some MS client tools - Smaller changes
* s4:provision - Some reworkMatthias Dieter Wallnöfer2009-09-171-3/+4
| | | | | | | | | | - Add/change "wellKnownObjects" attributes - Order entries in "provision_basedn_modify.ldif" - Add/change "delete entries" object under BASEDN and CONFIGDN - Fix default version number of "Default domain policy" group policy - Add "domain updates" objects for interoperability with MS AD maintaining tools - Show version number in the "oEMInformation" attribute (suggested by ekacnet) - Smaller fixups
* s4/domain behaviour flags: Fix them up in various locationsMatthias Dieter Wallnöfer2009-09-171-5/+6
| | | | | | | | | | Additional notes: - Bump the level to Windows Server 2008 R2 (we should support always the latest version - if we provision ourself) - In "descriptor.c" the check for the "domainFunctionality" level shouldn't be needed: ACL owner groups (not owner user) are supported since Windows 2000 Server (first AD edition) - I took the argument from: http://support.microsoft.com/kb/329194
* s4/python: flagsMatthias Dieter Wallnöfer2009-09-172-9/+83
| | | | | - Introduce the "userAccountControl", "groupType" and "sAMAccountType" flags - Corrects the "domain/forestFunctionality" and "domainControllerFunctionality" flags
* Owner and group defaulting.Nadezhda Ivanova2009-09-161-0/+1
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:provision Prevent some invalid combinations of realm and domainAndrew Bartlett2009-09-141-0/+9
| | | | | | | | We don't do well (even just trying to create duplicate servicePrincipalName values) with some of these combinations, so kill it off early before the administrator thinks it's going to work. Andrew Bartlett
* s4:group policies - upcase directory names of default group policiesMatthias Dieter Wallnöfer2009-09-121-4/+8
| | | | | | The directory names (MACHINE, USER) are upcased to help locating the default group policies under the SYSVOL dir (the additional ones have only the first letter upcased of those directory names).
* s4:group policies - add the domain controller group policyMatthias Dieter Wallnöfer2009-09-111-8/+28
| | | | | | | | | This patches fixes the last difference between s4 and Windows Server regarding group policy objects: we hadn't the domain controller policy. - Adds the domain controller policy as it is found in the "original" AD - Adds also the right version number in the GPT.INI file for the domain group policy (was missing)
* s4-provision: use DNS name, not domain nameAndrew Tridgell2009-09-111-0/+1
| | | | The SPNs end in the DNS domain name
* s4/provision: add the nTDSDSA GUID based DNS entries and SPNsAndrew Tridgell2009-09-111-9/+19
| | | | | | The DNS entries and SPNs are needed for samba<->samba DRS replication. This patch adds them for a standalone DC configure. A separate patch will add them for the vampire configure
* Revert "s4: Let the "setpassword" script finally use the ↵Matthias Dieter Wallnöfer2009-09-102-70/+9
| | | | | | | | | "samdb_set_password" routine" This reverts commit fdd62e9699b181a140292689fcd88a559bc26211. abartlet and I agreed that this isn't the right way to enforce the password policies. Sooner or later we've to control them anyway on the directory level.
* s4:provision Only delete SASL mappings with Fedora DS, not OpenLDAPAndrew Bartlett2009-09-101-31/+30
| | | | | | | | We need to be more careful to do the cleanup functions for the right backend. In future, these perhaps should be provided by the ProvisionBackend class. Andrew Bartlett
* s4: kludge_acl needs to be above repl_meta_dataAndrew Tridgell2009-09-101-2/+2
| | | | | We have to bypass kludge_acl in replication as otherwise we aren't allowed access to the password entries
* s4/provision: another fix for breakage from b1dabb1133Andrew Tridgell2009-09-101-6/+8
|
* s4:provision Don't reference provision_backend when using LDBAndrew Bartlett2009-09-101-1/+3
| | | | | | This broke in Endi's patch for Fedora DS support Andrew Bartlett
* s4: Use SASL authentication against Fedora DS.Endi Sukma Dewata2009-09-101-5/+68
| | | | | | | | | | | | | | | | | | | | | | | | | | | 1. During instance creation the provisioning script will import the SASL mapping for samba-admin. It's done here due to missing config schema preventing adding the mapping via ldapi. 2. After that it will use ldif2db to import the cn=samba-admin user as the target of SASL mapping. 3. Then it will start FDS and continue to do provisioning using the Directory Manager with simple bind. 4. The SASL credentials will be stored in secrets.ldb, so when Samba server runs later it will use the SASL credentials. 5. After the provisioning is done (just before stopping the slapd) it will use the DM over direct ldapi to delete the default SASL mappings included automatically by FDS, leaving just the new samba-admin mapping. 6. Also before stopping slapd it will use the DM over direct ldapi to set the ACL on the root entries of the user, configuration, and schema partitions. The ACL will give samba-admin the full access to these partitions. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* Added "admin_session" method.Nadezhda Ivanova2009-09-091-1/+5
| | | | | | The purpose of admin_session is to be able to execute parts of provisioning as the user Administrator in order to have the correct group and owner in the security descriptors. To be used for provisioning and tests only.
* s4:setpassword script - Passwords set by this script are set by the ↵Matthias Dieter Wallnöfer2009-09-081-1/+1
| | | | administrator not the user
* s4:provision - Cosmetic: Indent the parameters betterMatthias Dieter Wallnöfer2009-09-081-36/+60
|
* s4: Let the "setpassword" script finally use the "samdb_set_password" routineMatthias Dieter Wallnöfer2009-09-072-9/+70
| | | | | | The "setpassword" script should use the "samdb_set_password" call to change the NT user password. Windows Server tests show that "userPassword" is not the right place to save the NT password and does not inherit the password complexity.
* s4: Exceptions in "provision.py"Michael Ströder2009-09-071-11/+15
| | | | | This looks much nicer than "normal" string exceptions - and fits better in the OO programming style.
* s4:Foreign security principals - Fix them upMatthias Dieter Wallnöfer2009-09-071-19/+0
| | | | | | I fixed them up to match with Windows Server 2003. I don't think that the creation of them in the provision script is needed so I put them in the "provision_users.ldif" file.
* s4:provision - Change the module order to match Windows ServerMatthias Dieter Wallnöfer2009-09-071-1/+1
| | | | Tests show that Windows Server seems to do the access checks on the very last moment.
* s4:samldb - Major reworkMatthias Dieter Wallnöfer2009-09-071-32/+0
| | | | | | | | | | | | | | | | | | This fixes up the change of the primary group of a user when using the ADUC console: - When the "primaryGroupId" attribute changes, we have to delete the "member"/"memberOf" attribute reference of the new primary group and add one for the old primary group. - Deny deletion of primary groups according to Windows Server (so we cannot have invalid "primaryGroupID" attributes in our AD). - We cannot add a primary group directly before it isn't a secondary one of a user account. - We cannot add a secondary reference ("member" attribute) when the group has been chosen as primary one. This also removes the LDB templates which are basically overhead now. This should also fix bug #6599.
* s4:provision - Add a new delete function only for users and computersMatthias Dieter Wallnöfer2009-09-071-0/+25
| | | | | | We need this new function to delete users and computers before other objects on reprovisioning. Otherwise primary groups could be deleted before user/computer accounts (which isn't allowed anymore by the reworked "samldb" module).
* s4:setup: Use ms_display_specifiers script for provision.Andrew Kroeger2009-09-071-2/+5
| | | | | Changed the provisioning to use the new script to parse the Microsoft-provided DisplaySpecifiers LDIF file.
* s4:setup: Added script to parse Microsoft DisplaySpecifiers document.Andrew Kroeger2009-09-071-0/+189
| | | | | | | | | | Created this script based on the existing ms_schema.py script. - Removed some unnecessary transformations that are only necessary for schema processing. - Added capability to parse and properly output base64-encoded values. - Removed unnecessary attributes based on what attributes were present (and also what were explicitly removed) from display_specifiers.ldif.
* s4:python fixed subunit tests of dcerpcAndrew Tridgell2009-09-046-0/+0
| | | | | | The version of the unitest python module in Ubuntu Jaunty doesn't seem to support this many level of subdirectories. Moving the tests up one level solves the problem.
* allow setting of the debug level in python from CAndrew Tridgell2009-09-032-1/+14
|