diff options
author | Christian Heimes <cheimes@redhat.com> | 2016-11-17 17:48:06 +0100 |
---|---|---|
committer | Martin Basti <mbasti@redhat.com> | 2016-11-24 16:35:43 +0100 |
commit | a8376a244758494db31341442bc2163e1807b7ac (patch) | |
tree | 4661dc8c4d334e9d3c5e848392cc1c40b1e8c1f4 /daemons | |
parent | 6409abf1a60f3548203e6607a2b157ff72af2c89 (diff) | |
download | freeipa-a8376a244758494db31341442bc2163e1807b7ac.tar.gz freeipa-a8376a244758494db31341442bc2163e1807b7ac.tar.xz freeipa-a8376a244758494db31341442bc2163e1807b7ac.zip |
Add main guards to a couple of Python scripts
Signed-off-by: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Martin Basti <mbasti@redhat.com>
Diffstat (limited to 'daemons')
-rw-r--r-- | daemons/ipa-otpd/test.py | 36 |
1 files changed, 21 insertions, 15 deletions
diff --git a/daemons/ipa-otpd/test.py b/daemons/ipa-otpd/test.py index 0ccd8b0e4..ea55f9b2a 100644 --- a/daemons/ipa-otpd/test.py +++ b/daemons/ipa-otpd/test.py @@ -41,22 +41,28 @@ ATTRIBUTE User-Password 2 string ATTRIBUTE NAS-Identifier 32 string """ -dct = Dictionary(StringIO(DICTIONARY)) -proc = subprocess.Popen(["./ipa-otpd", sys.argv[1]], - stdin=subprocess.PIPE, stdout=subprocess.PIPE) +def main(): + dct = Dictionary(StringIO(DICTIONARY)) -pkt = packet.AuthPacket(secret="", dict=dct) -pkt["User-Name"] = sys.argv[2] -pkt["User-Password"] = pkt.PwCrypt(sys.argv[3]) -pkt["NAS-Identifier"] = "localhost" -proc.stdin.write(pkt.RequestPacket()) + proc = subprocess.Popen(["./ipa-otpd", sys.argv[1]], + stdin=subprocess.PIPE, + stdout=subprocess.PIPE) -rsp = packet.Packet(secret="", dict=dict) -buf = proc.stdout.read(4) -buf += proc.stdout.read(struct.unpack("!BBH", buf)[2] - 4) -rsp.DecodePacket(buf) -pkt.VerifyReply(rsp) + pkt = packet.AuthPacket(secret="", dict=dct) + pkt["User-Name"] = sys.argv[2] + pkt["User-Password"] = pkt.PwCrypt(sys.argv[3]) + pkt["NAS-Identifier"] = "localhost" + proc.stdin.write(pkt.RequestPacket()) -proc.terminate() #pylint: disable=E1101 -proc.wait() + rsp = packet.Packet(secret="", dict=dict) + buf = proc.stdout.read(4) + buf += proc.stdout.read(struct.unpack("!BBH", buf)[2] - 4) + rsp.DecodePacket(buf) + pkt.VerifyReply(rsp) + + proc.terminate() # pylint: disable=E1101 + proc.wait() + +if __name__ == '__main__': + main() |