URL: https://github.com/SSSD/sssd/pull/379 Author: fidencio Title: #379: CI: Enable pep8 check Action: synchronized
To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/379/head:pr379 git checkout pr379
From f026f574d89ad8af1e463b11ade8b8922eff2fc6 Mon Sep 17 00:00:00 2001 From: Jakub Hrozek <jhro...@redhat.com> Date: Sun, 10 Sep 2017 00:24:36 +0200 Subject: [PATCH 01/14] TESTS: Fix pep8 issues in test_session_recording.py --- src/tests/intg/test_session_recording.py | 198 +++++++++++++++++++------------ 1 file changed, 122 insertions(+), 76 deletions(-) diff --git a/src/tests/intg/test_session_recording.py b/src/tests/intg/test_session_recording.py index 56a056a15..f9d3af022 100644 --- a/src/tests/intg/test_session_recording.py +++ b/src/tests/intg/test_session_recording.py @@ -287,20 +287,28 @@ def all(request, ldap_conn, users_and_groups): def test_all_nam(all): """Test "all" scope with getpwnam""" ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - user4=dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + user2=dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + user3=dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + user4=dict(name="user4", uid=1004, + shell=config.SESSION_RECORDING_SHELL), )) def test_all_uid(all): """Test "all" scope with getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - 1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - 1004:dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + 1003: dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + 1004: dict(name="user4", uid=1004, + shell=config.SESSION_RECORDING_SHELL), }) @@ -308,10 +316,14 @@ def test_all_ent(all): """Test "all" scope with getpwent""" ent.assert_passwd_list( ent.contains_only( - dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL), + dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + dict(name="user4", uid=1004, + shell=config.SESSION_RECORDING_SHELL), ) ) @@ -362,8 +374,10 @@ def some_users(request, ldap_conn, users_and_groups): def test_some_users_nam(some_users): """Test "some" scope with user list and getpwnam""" ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + user2=dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), )) @@ -372,10 +386,12 @@ def test_some_users_nam(some_users): def test_some_users_uid(some_users): """Test "some" scope with user list and getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -434,12 +450,12 @@ def test_some_users_overridden_uid(some_users_overridden): overridden users, requested with getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="overridden_user1", uid=1001, - shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="overridden_user2", uid=1002, - shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="overridden_user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="overridden_user2", uid=1002, + shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -529,8 +545,10 @@ def some_groups4(request, ldap_conn, users_and_groups): def test_some_groups1_nam(some_groups1): """Test "some" scope with group list and getpwnam""" ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + user2=dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), )) @@ -539,10 +557,12 @@ def test_some_groups1_nam(some_groups1): def test_some_groups1_uid(some_groups1): """Test "some" scope with group list and getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -561,9 +581,12 @@ def test_some_groups1_ent(some_groups1): def test_some_groups2_nam(some_groups2): """Test "some" scope with group list and getpwnam""" ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + user2=dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + user3=dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), )) @@ -571,10 +594,13 @@ def test_some_groups2_nam(some_groups2): def test_some_groups2_uid(some_groups2): """Test "some" scope with group list and getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL), - 1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, + shell=config.SESSION_RECORDING_SHELL), + 1003: dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -596,17 +622,19 @@ def test_some_groups3_nam(some_groups3): user1=dict(name="user1", uid=1001, shell="/bin/sh1"), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), - user4=dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL), + user4=dict(name="user4", uid=1004, + shell=config.SESSION_RECORDING_SHELL), )) def test_some_groups3_uid(some_groups3): """Test "some" scope with group list and getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell="/bin/sh1"), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL), + 1001: dict(name="user1", uid=1001, shell="/bin/sh1"), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, + shell=config.SESSION_RECORDING_SHELL), }) @@ -625,9 +653,11 @@ def test_some_groups3_ent(some_groups3): def test_some_groups4_nam(some_groups4): """Test "some" scope with group list and getpwnam""" ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), - user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), + user3=dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), )) @@ -635,10 +665,12 @@ def test_some_groups4_nam(some_groups4): def test_some_groups4_uid(some_groups4): """Test "some" scope with group list and getpwuid""" ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -682,7 +714,8 @@ def test_some_groups_overridden1_nam(some_groups_overridden1): overridden groups, and users requested with getpwnam. """ ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -695,10 +728,11 @@ def test_some_groups_overridden1_uid(some_groups_overridden1): overridden groups, and users requested with getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -709,7 +743,8 @@ def test_some_groups_overridden1_ent(some_groups_overridden1): """ ent.assert_passwd_list( ent.contains_only( - dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), dict(name="user2", uid=1002, shell="/bin/sh2"), dict(name="user3", uid=1003, shell="/bin/sh3"), dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -745,7 +780,8 @@ def test_some_groups_overridden2_nam(some_groups_overridden2): overridden groups, and users requested with getpwnam. """ ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -758,10 +794,11 @@ def test_some_groups_overridden2_uid(some_groups_overridden2): overridden groups, and users requested with getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -772,7 +809,8 @@ def test_some_groups_overridden2_ent(some_groups_overridden2): """ ent.assert_passwd_list( ent.contains_only( - dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), dict(name="user2", uid=1002, shell="/bin/sh2"), dict(name="user3", uid=1003, shell="/bin/sh3"), dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -808,7 +846,8 @@ def test_some_groups_overridden3_nam(some_groups_overridden3): overridden group, and users requested with getpwnam. """ ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -821,10 +860,11 @@ def test_some_groups_overridden3_uid(some_groups_overridden3): overridden group, and users requested with getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -871,7 +911,8 @@ def test_some_groups_overridden4_nam(some_groups_overridden3): overridden group, and users requested with getpwnam. """ ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), user3=dict(name="user3", uid=1003, shell="/bin/sh3"), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), @@ -884,10 +925,11 @@ def test_some_groups_overridden4_uid(some_groups_overridden3): overridden group, and users requested with getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell="/bin/sh3"), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, shell="/bin/sh3"), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) @@ -928,9 +970,11 @@ def test_some_users_and_groups_nam(some_users_and_groups): Test "some" scope with user and group lists and getpwnam. """ ent.assert_each_passwd_by_name(dict( - user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), + user1=dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), user2=dict(name="user2", uid=1002, shell="/bin/sh2"), - user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), + user3=dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), user4=dict(name="user4", uid=1004, shell="/bin/sh4"), )) @@ -940,10 +984,12 @@ def test_some_users_and_groups_uid(some_users_and_groups): Test "some" scope with user and group lists and getpwuid. """ ent.assert_each_passwd_by_uid({ - 1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL), - 1002:dict(name="user2", uid=1002, shell="/bin/sh2"), - 1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL), - 1004:dict(name="user4", uid=1004, shell="/bin/sh4"), + 1001: dict(name="user1", uid=1001, + shell=config.SESSION_RECORDING_SHELL), + 1002: dict(name="user2", uid=1002, shell="/bin/sh2"), + 1003: dict(name="user3", uid=1003, + shell=config.SESSION_RECORDING_SHELL), + 1004: dict(name="user4", uid=1004, shell="/bin/sh4"), }) From 3ac99a97c4e8469bf095c0084f232e8a4835dbdc Mon Sep 17 00:00:00 2001 From: Jakub Hrozek <jhro...@redhat.com> Date: Wed, 13 Sep 2017 15:33:13 +0200 Subject: [PATCH 02/14] TESTS: Fix pep8 issues in test_ldap.py --- src/tests/intg/test_ldap.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/src/tests/intg/test_ldap.py b/src/tests/intg/test_ldap.py index f2467f1ff..0b221e6f3 100644 --- a/src/tests/intg/test_ldap.py +++ b/src/tests/intg/test_ldap.py @@ -998,11 +998,10 @@ def test_zero_nesting_level(ldap_conn, rfc2307bis_no_nesting): assert res == sssd_id.NssReturnCode.SUCCESS, \ "Could not find groups for user1, %d" % errno - ## test nestedgroup is not returned in group list + # test nestedgroup is not returned in group list assert sorted(grp_list) == sorted(["primarygroup", "parentgroup"]) - @pytest.fixture def sanity_nss_filter(request, ldap_conn): ent_list = ldap_ent.List(ldap_conn.ds_inst.base_dn) From 0128aa4dc3b2ae3bba10c67a9cbaae10f740b1c9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 14:56:20 +0200 Subject: [PATCH 03/14] CONTRIB: Fix pep8 issues in update_debug_levels.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- contrib/rhel/update_debug_levels.py | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/contrib/rhel/update_debug_levels.py b/contrib/rhel/update_debug_levels.py index a260ec1e8..7a6d23562 100644 --- a/contrib/rhel/update_debug_levels.py +++ b/contrib/rhel/update_debug_levels.py @@ -29,15 +29,18 @@ def parse_options(): help="Be verbose") (options, args) = parser.parse_args() if len(args) > 0: - print("Stray arguments: %s" % ' '.join([a for a in args]), file=sys.stderr) + print("Stray arguments: %s" % ' '.join([a for a in args]), + file=sys.stderr) return None return options + def verbose(msg, verbosity): if verbosity: print(msg) + def main(): options = parse_options() if not options: @@ -57,7 +60,7 @@ def main(): # Check the [sssd] section for debug_level sssd_service = sssdconfig.get_service('sssd') - if not 'debug_level' in sssd_service.options.keys(): + if 'debug_level' not in sssd_service.options.keys(): # Nothing to do, just return success verbose("No changes required, no backup necessary", options.verbose) @@ -70,7 +73,7 @@ def main(): # Loop through services for service in sssdconfig.list_services(): svc = sssdconfig.get_service(service) - if not 'debug_level' in svc.options.keys(): + if 'debug_level' not in svc.options.keys(): # Not explicitly set, so add it svc.set_option('debug_level', debug_level) sssdconfig.save_service(svc) @@ -78,7 +81,7 @@ def main(): # Loop through domains (active AND inactive) for domain in sssdconfig.list_domains(): dom = sssdconfig.get_domain(domain) - if not 'debug_level' in dom.options.keys(): + if 'debug_level' not in dom.options.keys(): # Not explicitly set, so add it dom.set_option('debug_level', debug_level) sssdconfig.save_domain(dom) @@ -95,6 +98,7 @@ def main(): # Save the changes sssdconfig.write() + if __name__ == "__main__": ret = main() sys.exit(ret) From 5be5356d22b2d4c1207f02f9d0c226cecbd72cf5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 15:04:00 +0200 Subject: [PATCH 04/14] CONTRIB: Fix pep8 issues on sssd_gdb_plugin.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- contrib/gdb/sssd_gdb_plugin.py | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/contrib/gdb/sssd_gdb_plugin.py b/contrib/gdb/sssd_gdb_plugin.py index 730c7e894..deb8ddba5 100644 --- a/contrib/gdb/sssd_gdb_plugin.py +++ b/contrib/gdb/sssd_gdb_plugin.py @@ -15,7 +15,8 @@ def gdb_printer_decorator(fn): def indent_string(s, indent): - return '\n'.join(["%s%s" % ("\t" * indent, part) for part in s.split('\n')]) + return '\n'.join(["%s%s" % + ("\t" * indent, part) for part in s.split('\n')]) class StringPrinter(object): @@ -31,7 +32,8 @@ class LdbDnPrinter(StringPrinter): " print an ldb dn " def as_string(self, indent=0): - ret = "{ <%s>\tlinearized:%s }" % (self.val.type, self.val['linearized']) + ret = "{ <%s>\tlinearized:%s }" % (self.val.type, + self.val['linearized']) return indent_string(ret, indent) @@ -47,7 +49,8 @@ class LdbMessageElementPrinter(StringPrinter): " print a ldb message element " def as_string(self, indent=0): - ret = "flags = %(flags)s, name = %(name)s, num_values = %(num_values)s" % self.val + ret = "flags = %(flags)s, name = %(name)s, \ + num_values = %(num_values)s" % self.val try: nvals = int(self.val['num_values']) except ValueError: @@ -70,7 +73,8 @@ def as_string(self, indent=0): return "num_elements is not numeric?" dn = LdbDnPrinter(self.val['dn']) - ret = "num_elements:\t%s\ndn:\t%s\nelements:\t" % (nels, dn.as_string(indent)) + ret = "num_elements:\t%s\ndn:\t%s\nelements:\t" % \ + (nels, dn.as_string(indent)) for i in range(nels): el = LdbMessageElementPrinter(self.val['elements'][i]) @@ -83,7 +87,8 @@ class LdbResultPrinter(StringPrinter): " print a ldb message element " def as_string(self, indent=0): - ret = "count = %(count)s, extended = %(extended)s, controls = %(controls)s, refs = %(refs)s" % self.val + ret = "count = %(count)s, extended = %(extended)s, \ + controls = %(controls)s, refs = %(refs)s" % self.val try: count = int(self.val['count']) except ValueError: @@ -193,4 +198,5 @@ def invoke(self, arg, from_tty): b = gdb.Breakpoint("*%s" % fnaddr) + TeventBreak() From 700312a5d074ab03f593ccc0d2d365b7ac38e60d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 15:55:07 +0200 Subject: [PATCH 05/14] TESTS: Fix pep8 issues in pyhbac-test.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/pyhbac-test.py | 96 +++++++++++++++++++++++++++--------------------- 1 file changed, 54 insertions(+), 42 deletions(-) diff --git a/src/tests/pyhbac-test.py b/src/tests/pyhbac-test.py index e34f05596..b31a0cd21 100755 --- a/src/tests/pyhbac-test.py +++ b/src/tests/pyhbac-test.py @@ -23,11 +23,13 @@ def compat_assertIsInstance(this, obj, cls, msg=None): def compat_assertItemsEqual(this, expected_seq, actual_seq, msg=None): return this.assertEqual(sorted(expected_seq), sorted(actual_seq)) + # add compat assertIsInstance for old unittest.TestCase versions # (python < 2.7, RHEL6 for instance) if not hasattr(unittest.TestCase, "assertIsInstance"): setattr(unittest.TestCase, "assertIsInstance", compat_assertIsInstance) + # Python3 renamed assertItemsEqual to assertCountEqual but at the same time # Python2 doesn't have assertCountEqual, see http://bugs.python.org/issue17866 if not hasattr(unittest.TestCase, "assertCountEqual"): @@ -44,7 +46,7 @@ class PyHbacImport(unittest.TestCase): def setUp(self): " Make sure we load the in-tree module " self.system_path = sys.path[:] - sys.path = [ MODPATH ] + sys.path = [MODPATH] def tearDown(self): " Restore the system path " @@ -65,7 +67,8 @@ def testImport(self): import pyhbac except ImportError as e: - print("Could not load the pyhbac module. Please check if it is compiled", file=sys.stderr) + print("Could not load the pyhbac module. Please check if it \ + is compiled", file=sys.stderr) raise e self.assertEqual(pyhbac.__file__, MODPATH + "/pyhbac.so") @@ -118,7 +121,8 @@ def testCategory(self): assert pyhbac.HBAC_CATEGORY_ALL in el.category # negative tests - self.assertRaises(TypeError, el.__setattr__, "category", [pyhbac.HBAC_CATEGORY_ALL]) + self.assertRaises(TypeError, el.__setattr__, "category", + [pyhbac.HBAC_CATEGORY_ALL]) self.assertRaises(TypeError, el.__setattr__, "category", None) self.assertRaises(TypeError, el.__setattr__, "category", 1) @@ -143,7 +147,9 @@ def testRepr(self): el.category.add(pyhbac.HBAC_CATEGORY_ALL) el.names = ['foo'] el.groups = ['bar, baz'] - self.assertEquals(el.__repr__(), u'<category 1 names [foo] groups [bar, baz]>') + self.assertEquals(el.__repr__(), + u'<category 1 names [foo] groups [bar, baz]>') + class PyHbacRuleTest(unittest.TestCase): def testRuleGetSetName(self): @@ -221,10 +227,11 @@ def testRuleElementInRule(self): self.assertCountEqual(rule.users.groups, user_groups) def testRuleElementInRuleReference(self): - " Test that references to RuleElement are kept even if element goes out of scope " + " Test that references to RuleElement are kept even if element goes \ + out of scope " def _get_rule(): - users = [ "foo", "bar" ] - user_groups = [ "abc", "def" ] + users = ["foo", "bar"] + user_groups = ["abc", "def"] el = pyhbac.HbacRuleElement(names=users, groups=user_groups) rule = pyhbac.HbacRule("testRuleElement") rule.users = el @@ -236,28 +243,30 @@ def _get_rule(): def testRepr(self): r = pyhbac.HbacRule('foo') - self.assertEqual(r.__repr__(), u"<name foo enabled 0 " - "users <category 0 names [] groups []> " - "services <category 0 names [] groups []> " - "targethosts <category 0 names [] groups []> " - "srchosts <category 0 names [] groups []>>") + self.assertEqual(r.__repr__(), + u"<name foo enabled 0 " + "users <category 0 names [] groups []> " + "services <category 0 names [] groups []> " + "targethosts <category 0 names [] groups []> " + "srchosts <category 0 names [] groups []>>") name = "someuser" service = "ssh" srchost = "host1" targethost = "host2" - r.users.names = [ name ] - r.services.names = [ service ] - r.srchosts.names = [ srchost ] - r.targethosts.names = [ targethost ] + r.users.names = [name] + r.services.names = [service] + r.srchosts.names = [srchost] + r.targethosts.names = [targethost] - self.assertEqual(r.__repr__(), u"<name foo enabled 0 " - "users <category 0 names [%s] groups []> " - "services <category 0 names [%s] groups []> " - "targethosts <category 0 names [%s] groups []> " - "srchosts <category 0 names [%s] groups []>>" % - (name, service, targethost, srchost)) + self.assertEqual(r.__repr__(), + u"<name foo enabled 0 " + "users <category 0 names [%s] groups []> " + "services <category 0 names [%s] groups []> " + "targethosts <category 0 names [%s] groups []> " + "srchosts <category 0 names [%s] groups []>>" % + (name, service, targethost, srchost)) def testValidate(self): r = pyhbac.HbacRule('valid_rule') @@ -331,6 +340,7 @@ def testRepr(self): r.groups = ['bar', 'baz'] self.assertEqual(r.__repr__(), u"<name foo groups [bar,baz]>") + class PyHbacRequestTest(unittest.TestCase): def testRequestElementHandling(self): name = "req_name" @@ -365,7 +375,8 @@ def testRuleName(self): req = pyhbac.HbacRequest() self.assertEqual(req.rule_name, None) # python 2.4 raises TypError, 2.7 raises AttributeError - self.assertRaises((TypeError, AttributeError), req.__setattr__, "rule_name", "foo") + self.assertRaises((TypeError, AttributeError), req.__setattr__, + "rule_name", "foo") def testEvaluate(self): name = "someuser" @@ -374,10 +385,10 @@ def testEvaluate(self): targethost = "host2" allow_rule = pyhbac.HbacRule("allowRule", enabled=True) - allow_rule.users.names = [ name ] - allow_rule.services.names = [ service ] - allow_rule.srchosts.names = [ srchost ] - allow_rule.targethosts.names = [ targethost ] + allow_rule.users.names = [name] + allow_rule.services.names = [service] + allow_rule.srchosts.names = [srchost] + allow_rule.targethosts.names = [targethost] req = pyhbac.HbacRequest() req.user.name = name @@ -433,10 +444,10 @@ def testEvaluateNegative(self): targethost = "host2" allow_rule = pyhbac.HbacRule("allowRule", enabled=True) - allow_rule.users.names = [ name ] - allow_rule.services.names = [ service ] - allow_rule.srchosts.names = [ srchost ] - allow_rule.targethosts.names = [ targethost ] + allow_rule.users.names = [name] + allow_rule.services.names = [service] + allow_rule.srchosts.names = [srchost] + allow_rule.targethosts.names = [targethost] req = pyhbac.HbacRequest() req.service.name = service @@ -445,7 +456,7 @@ def testEvaluateNegative(self): req.user.name = name saveuser = req.user - req.user = None # need to catch this + req.user = None # need to catch this # catch invalid category value savecat = copy.copy(allow_rule.users.category) @@ -457,12 +468,13 @@ def testEvaluateNegative(self): self.assertRaises(TypeError, req.evaluate, (allow_rule,)) req.user = saveuser - allow_rule.users = None # need to catch this + allow_rule.users = None # need to catch this self.assertRaises(TypeError, req.evaluate, (allow_rule,)) # catch invalid rule type self.assertRaises(TypeError, req.evaluate, (allow_rule, None)) + class PyHbacModuleTest(unittest.TestCase): @classmethod def tearDownClass(cls): @@ -492,19 +504,19 @@ def testHasRuleElementTypes(self): assert hasattr(pyhbac, "HBAC_RULE_ELEMENT_SOURCEHOSTS") def testHbacResultString(self): - results = [ pyhbac.HBAC_EVAL_ALLOW, pyhbac.HBAC_EVAL_DENY, - pyhbac.HBAC_EVAL_ERROR ] + results = [pyhbac.HBAC_EVAL_ALLOW, pyhbac.HBAC_EVAL_DENY, + pyhbac.HBAC_EVAL_ERROR] for r in results: s = pyhbac.hbac_result_string(r) self.assertIsInstance(s, unicode) assert len(s) > 0 def testHbacErrorString(self): - errors = [ pyhbac.HBAC_ERROR_UNKNOWN, - pyhbac.HBAC_SUCCESS, - pyhbac.HBAC_ERROR_NOT_IMPLEMENTED, - pyhbac.HBAC_ERROR_OUT_OF_MEMORY, - pyhbac.HBAC_ERROR_UNPARSEABLE_RULE ] + errors = [pyhbac.HBAC_ERROR_UNKNOWN, + pyhbac.HBAC_SUCCESS, + pyhbac.HBAC_ERROR_NOT_IMPLEMENTED, + pyhbac.HBAC_ERROR_OUT_OF_MEMORY, + pyhbac.HBAC_ERROR_UNPARSEABLE_RULE] for e in errors: s = pyhbac.hbac_error_string(e) self.assertIsInstance(s, unicode) @@ -536,7 +548,8 @@ def testHbacErrorString(self): if not res.wasSuccessful(): error |= 0x3 - suite = unittest.TestLoader().loadTestsFromTestCase(PyHbacRequestElementTest) + suite = \ + unittest.TestLoader().loadTestsFromTestCase(PyHbacRequestElementTest) res = unittest.TextTestRunner().run(suite) if not res.wasSuccessful(): error |= 0x4 @@ -552,4 +565,3 @@ def testHbacErrorString(self): error |= 0x6 sys.exit(error) - From 86951d0946539521e5b49dcdb092c14d15aa06c2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 15:59:54 +0200 Subject: [PATCH 06/14] TESTS: Fix pep8 issues in pysss_murmur-test.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/pysss_murmur-test.py | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/src/tests/pysss_murmur-test.py b/src/tests/pysss_murmur-test.py index 7237c95b0..afebcc2e6 100755 --- a/src/tests/pysss_murmur-test.py +++ b/src/tests/pysss_murmur-test.py @@ -33,8 +33,8 @@ class PySssMurmurImport(unittest.TestCase): def setUp(self): " Make sure we load the in-tree module " self.system_path = sys.path[:] - sys.path = [ MODPATH ] - print (os.getcwd()) + sys.path = [MODPATH] + print(os.getcwd()) print(MODPATH) def tearDown(self): @@ -56,10 +56,12 @@ def testImport(self): import pysss_murmur except ImportError as e: - print("Could not load the pysss_murmur module. Please check if it is compiled", file=sys.stderr) + print("Could not load the pysss_murmur module. \ + Please check if it is compiled", file=sys.stderr) raise e self.assertEqual(pysss_murmur.__file__, MODPATH + "/pysss_murmur.so") + class PySssMurmurTest(unittest.TestCase): @classmethod def tearDownClass(cls): @@ -67,7 +69,8 @@ def tearDownClass(cls): os.rmdir(MODPATH) def testExpectedHash(self): - hash = pysss_murmur.murmurhash3("S-1-5-21-2153326666-2176343378-3404031434", 41, 0xdeadbeef) + sid = "S-1-5-21-2153326666-2176343378-3404031434" + hash = pysss_murmur.murmurhash3(sid, 41, 0xdeadbeef) self.assertEqual(hash, 93103853) def testInvalidArguments(self): From 5bd39e70a4f1f2ed7909ecdc1e5f46c07b2e3ad1 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 16:21:42 +0200 Subject: [PATCH 07/14] TESTS: Fix pep8 issues in python-test.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/python-test.py | 80 +++++++++++++++++++++++++++++++----------------- 1 file changed, 52 insertions(+), 28 deletions(-) diff --git a/src/tests/python-test.py b/src/tests/python-test.py index 08ac5973f..ff313a999 100644 --- a/src/tests/python-test.py +++ b/src/tests/python-test.py @@ -1,5 +1,5 @@ #!/usr/bin/env python -#coding=utf-8 +# coding=utf-8 # Authors: # Jakub Hrozek <jhro...@redhat.com> @@ -27,9 +27,11 @@ import subprocess import errno + # module under test import pysss + class LocalTest(unittest.TestCase): local_path = "/var/lib/sss/db/sssd.ldb" @@ -43,14 +45,16 @@ def _run_and_check(self, runme): def _get_object_info(self, name, subtree, domain): search_dn = "dn=name=%s,cn=%s,cn=%s,cn=sysdb" % (name, subtree, domain) try: - output = subprocess.check_call("ldbsearch -H %s %s" % (self.local_path,search_dn), + output = subprocess.check_call("ldbsearch -H %s %s" % + (self.local_path, search_dn), shell=True) output = output.decode('utf-8') except subprocess.CalledProcessError: return {} kw = {} - for key, value in [ l.split(':') for l in output.split('\n') if ":" in l ]: + for key, value in \ + [l.split(':') for l in output.split('\n') if ":" in l]: kw[key] = value.strip() del kw['asq'] @@ -63,15 +67,19 @@ def get_group_info(self, name, domain="LOCAL"): return self._get_object_info(name, "groups", domain) def _validate_object(self, kw, name, **kwargs): - if kw == {}: self.fail("Could not get %s info" % name) + if kw == {}: + self.fail("Could not get %s info" % name) for key in kwargs.keys(): - self.assert_(str(kwargs[key]) == str(kw[key]), "%s %s != %s %s" % (key, kwargs[key], key, kw[key])) + self.assert_(str(kwargs[key]) == str(kw[key]), + "%s %s != %s %s" % (key, kwargs[key], key, kw[key])) def validate_user(self, username, **kwargs): - return self._validate_object(self.get_user_info(username), "user", **kwargs) + return self._validate_object(self.get_user_info(username), "user", + **kwargs) def validate_group(self, groupname, **kwargs): - return self._validate_object(self.get_group_info(groupname), "group", **kwargs) + return self._validate_object(self.get_group_info(groupname), "group", + **kwargs) def _validate_no_object(self, kw, name): if kw != {}: @@ -81,18 +89,22 @@ def validate_no_user(self, username): return self._validate_no_object(self.get_user_info(username), "user") def validate_no_group(self, groupname): - return self._validate_no_object(self.get_group_info(groupname), "group") + return self._validate_no_object(self.get_group_info(groupname), + "group") def _get_object_membership(self, name, subtree, domain): search_dn = "dn=name=%s,cn=%s,cn=%s,cn=sysdb" % (name, subtree, domain) try: - output = subprocess.check_call("ldbsearch -H %s %s" % (self.local_path,search_dn), + output = subprocess.check_call("ldbsearch -H %s %s" % + (self.local_path, search_dn), shell=True) output = output.decode('utf-8') except subprocess.CalledProcessError: return [] - members = [ value.strip() for key, value in [ l.split(':') for l in output.split('\n') if ":" in l ] if key == "memberof" ] + members = [value.strip() for key, value in + [l.split(':') for l in output.split('\n') if ":" in l] + if key == "memberof"] return members def _assertMembership(self, name, group_list, subtree, domain): @@ -137,12 +149,14 @@ def remove_user(self, username): def remove_user_not_home(self, username): self._run_and_check("sss_userdel -R %s" % (username)) + class SanityTest(unittest.TestCase): def testInstantiate(self): "Test that the local backed binding can be instantiated" local = pysss.local() self.assert_(local.__class__, "<type 'sss.local'>") + class UseraddTest(LocalTest): def tearDown(self): if self.username: @@ -154,7 +168,8 @@ def testUseradd(self): self.local.useradd(self.username) self.validate_user(self.username) # check home directory was created with default name - self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), True) + self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), + True) def testUseraddWithParams(self): "Test adding a local user with modified parameters" @@ -173,12 +188,13 @@ def testUseraddWithParams(self): def testUseraddNoHomedir(self): "Test adding a local user without creating his home dir" self.username = "testUseraddNoHomedir" - self.local.useradd(self.username, create_home = False) + self.local.useradd(self.username, create_home=False) self.validate_user(self.username) # check home directory was not created - self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), False) - self.local.userdel(self.username, remove = False) - self.username = None # fool tearDown into not removing the user + self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), + False) + self.local.userdel(self.username, remove=False) + self.username = None # fool tearDown into not removing the user def testUseraddAlternateSkeldir(self): "Test adding a local user and init his homedir from a custom location" @@ -193,9 +209,11 @@ def testUseraddAlternateSkeldir(self): filename = os.path.basename(path) try: - self.local.useradd(self.username, skel = skeldir) + self.local.useradd(self.username, skel=skeldir) self.validate_user(self.username) - self.assertEquals(os.access("/home/%s/%s"%(self.username,filename), os.F_OK), True) + self.assertEquals(os.access("/home/%s/%s" % (self.username, + filename), os.F_OK), + True) finally: shutil.rmtree(skeldir) @@ -206,9 +224,9 @@ def testUseraddToGroups(self): self.add_group("gr2") try: self.local.useradd(self.username, - groups=["gr1","gr2"]) + groups=["gr1", "gr2"]) self.assertUserMembership(self.username, - ["gr1","gr2"]) + ["gr1", "gr2"]) finally: self.remove_group("gr1") self.remove_group("gr2") @@ -221,6 +239,7 @@ def testUseraddWithUID(self): self.validate_user(self.username, uidNumber=1024) + class UseraddTestNegative(LocalTest): def testUseraddNoParams(self): "Test that local.useradd() requires the username parameter" @@ -252,6 +271,7 @@ def testUseraddUIDAlreadyExists(self): finally: self.remove_user(self.username) + class UserdelTest(LocalTest): def testUserdel(self): self.add_user("testUserdel") @@ -280,6 +300,7 @@ def testUserdelNegative(self): else: fail("Was expecting exception") + class UsermodTest(LocalTest): def setUp(self): self.local = pysss.local() @@ -314,9 +335,9 @@ def testUsermodGroupMembership(self): try: self.local.usermod(self.username, - addgroups=["gr1","gr2"]) + addgroups=["gr1", "gr2"]) self.assertUserMembership(self.username, - ["gr1","gr2"]) + ["gr1", "gr2"]) self.local.usermod(self.username, rmgroups=["gr2"]) self.assertUserMembership(self.username, @@ -340,6 +361,7 @@ def testUsermodLockUnlock(self): self.validate_user(self.username, disabled="false") + class GroupaddTest(LocalTest): def tearDown(self): if self.groupname: @@ -355,9 +377,10 @@ def testGroupaddWithGID(self): "Test adding a local group with a custom GID" self.groupname = "testUseraddWithGID" self.local.groupadd(self.groupname, - gid=1024) + gid=1024) self.validate_group(self.groupname, - gidNumber=1024) + gidNumber=1024) + class GroupaddTestNegative(LocalTest): def testGroupaddNoParams(self): @@ -390,6 +413,7 @@ def testGroupaddGIDAlreadyExists(self): finally: self.remove_group(self.groupname) + class GroupdelTest(LocalTest): def testGroupdel(self): self.add_group("testGroupdel") @@ -419,9 +443,9 @@ def tearDown(self): def testGroupmodGID(self): "Test modifying UID" self.local.groupmod(self.groupname, - gid=1024) + gid=1024) self.validate_group(self.groupname, - gidNumber=1024) + gidNumber=1024) def testGroupmodGroupMembership(self): "Test adding to groups" @@ -429,9 +453,9 @@ def testGroupmodGroupMembership(self): self.add_group("gr2") try: self.local.groupmod(self.groupname, - addgroups=["gr1","gr2"]) + addgroups=["gr1", "gr2"]) self.assertGroupMembership(self.groupname, - ["gr1","gr2"]) + ["gr1", "gr2"]) self.local.groupmod(self.groupname, rmgroups=["gr2"]) self.assertGroupMembership(self.groupname, @@ -444,7 +468,7 @@ def testGroupmodGroupMembership(self): self.remove_group("gr1") self.remove_group("gr2") + # -------------- run the test suite -------------- # if __name__ == "__main__": unittest.main() - From a3936398957385a284594ef21775525a8cc7ec76 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 21:48:20 +0200 Subject: [PATCH 08/14] TESTS: Fix pep8 issues in sssd_group.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/intg/sssd_group.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/tests/intg/sssd_group.py b/src/tests/intg/sssd_group.py index 32d12cfae..adfdc6721 100644 --- a/src/tests/intg/sssd_group.py +++ b/src/tests/intg/sssd_group.py @@ -83,7 +83,7 @@ def set_group_dict(res, result_p): group_dict['mem'] = list() i = 0 - while result_p[0].gr_mem[i] != None: + while result_p[0].gr_mem[i] is not None: grp_name = result_p[0].gr_mem[i].decode('utf-8') group_dict['mem'].append(grp_name) i = i+1 From 363c692ec90dea0128de581e93791c375dc5aa2c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 22:02:26 +0200 Subject: [PATCH 09/14] TESTS: Fix pep8 issues in test_ts_cache.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/intg/test_ts_cache.py | 83 +++++++++++++++++++++++------------------ 1 file changed, 46 insertions(+), 37 deletions(-) diff --git a/src/tests/intg/test_ts_cache.py b/src/tests/intg/test_ts_cache.py index 703e3b255..c06602292 100644 --- a/src/tests/intg/test_ts_cache.py +++ b/src/tests/intg/test_ts_cache.py @@ -212,12 +212,12 @@ def get_attrs(ldb_conn, type, name, domain, attr_list): ts_attrs = dict() for attr in attr_list: - sysdb_attrs[attr] = ldb_conn.get_entry_attr( - sssd_ldb.CacheType.sysdb, - type, name, domain, attr) - ts_attrs[attr] = ldb_conn.get_entry_attr( - sssd_ldb.CacheType.timestamps, - type, name, domain, attr) + sysdb_attrs[attr] = \ + ldb_conn.get_entry_attr(sssd_ldb.CacheType.sysdb, + type, name, domain, attr) + ts_attrs[attr] = \ + ldb_conn.get_entry_attr(sssd_ldb.CacheType.timestamps, + type, name, domain, attr) return (sysdb_attrs, ts_attrs) @@ -232,13 +232,13 @@ def get_user_attrs(ldb_conn, name, domain, attr_list): def assert_same_attrval(adict1, adict2, attr_name): - assert adict1.get(attr_name) is not None and \ - adict1.get(attr_name) == adict2.get(attr_name) + assert (adict1.get(attr_name) is not None and + adict1.get(attr_name) == adict2.get(attr_name)) def assert_diff_attrval(adict1, adict2, attr_name): - assert adict1.get(attr_name) is not None and \ - adict1.get(attr_name) != adict2.get(attr_name) + assert (adict1.get(attr_name) is not None and + adict1.get(attr_name) != adict2.get(attr_name)) def prime_cache_group(ldb_conn, name, members): @@ -284,9 +284,10 @@ def test_group_2307bis_update_same_modstamp(ldap_conn, sysdb cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) ent.assert_group_by_name( "group1", @@ -310,9 +311,10 @@ def test_group_2307bis_update_same_attrs(ldap_conn, attrs does not trigger sysdb cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) # modify an argument we don't save to the cache. This will bump the # modifyTimestamp attribute, but the attributes themselves will be the same @@ -343,9 +345,10 @@ def test_group_2307bis_update_diff_attrs(ldap_conn, Test that a group update with different attribute triggers cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) user_dn = "uid=user1,ou=Users," + ldap_conn.ds_inst.base_dn ldap_conn.modify_s("cn=group1,ou=Groups," + ldap_conn.ds_inst.base_dn, @@ -374,9 +377,10 @@ def test_group_2307bis_delete_group(ldap_conn, Test that deleting a group removes it from both caches """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group1", 2001) ldap_conn.delete_s(e[0]) @@ -402,9 +406,10 @@ def test_group_2307_update_same_modstamp(ldap_conn, sysdb cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) ent.assert_group_by_name( "group1", @@ -428,9 +433,10 @@ def test_group_2307_update_same_attrs(ldap_conn, attrs does not trigger sysdb cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) # modify an argument we don't save to the cache. This will bump the # modifyTimestamp attribute, but the attributes themselves will be the same @@ -461,9 +467,10 @@ def test_group_2307_update_diff_attrs(ldap_conn, Test that a group update with different attribute triggers cache update """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) ldap_conn.modify_s("cn=group1,ou=Groups," + ldap_conn.ds_inst.base_dn, [(ldap.MOD_DELETE, "memberUid", b"user1")]) @@ -491,9 +498,10 @@ def test_group_2307_delete_group(ldap_conn, Test that deleting a group removes it from both caches """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group1", 2001) ldap_conn.delete_s(e[0]) @@ -652,9 +660,10 @@ def test_sss_cache_invalidate_group(ldap_conn, """ ldb_conn = ldb_examine - old_sysdb_attrs, old_ts_attrs = prime_cache_group( - ldb_conn, "group1", - ("user1", "user11", "user21")) + old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1", + ("user1", + "user11", + "user21")) subprocess.call(["sss_cache", "-g", "group1"]) From c62fff944084d5216aed69e8477cb6ec16c89c7d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 22:16:21 +0200 Subject: [PATCH 10/14] TESTS: Fix pep8 issues on test_kcm.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/intg/test_kcm.py | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/src/tests/intg/test_kcm.py b/src/tests/intg/test_kcm.py index b65e1d530..c1e36fa8e 100644 --- a/src/tests/intg/test_kcm.py +++ b/src/tests/intg/test_kcm.py @@ -355,9 +355,8 @@ def exercise_kswitch(testenv): assert len(cc_coll) == 2 assert set(cc_coll['alice@KCMTEST']) == set(['krbtgt/KCMTEST@KCMTEST', 'host/somehostname@KCMTEST']) - assert set(cc_coll['bob@KCMTEST']) == set([ - 'krbtgt/KCMTEST@KCMTEST', - 'host/differenthostname@KCMTEST']) + assert set(cc_coll['bob@KCMTEST']) == set( + ['krbtgt/KCMTEST@KCMTEST', 'host/differenthostname@KCMTEST']) def test_kcm_mem_kswitch(setup_for_kcm_mem): @@ -410,9 +409,8 @@ def exercise_subsidiaries(testenv): assert len(cc_coll) == 2 assert set(cc_coll['alice@KCMTEST']) == set(['krbtgt/KCMTEST@KCMTEST', 'host/somehostname@KCMTEST']) - assert set(cc_coll['bob@KCMTEST']) == set([ - 'krbtgt/KCMTEST@KCMTEST', - 'host/differenthostname@KCMTEST']) + assert set(cc_coll['bob@KCMTEST']) == set( + ['krbtgt/KCMTEST@KCMTEST', 'host/differenthostname@KCMTEST']) def test_kcm_mem_subsidiaries(setup_for_kcm_mem): From 7474e792c6ca5a5c1b401be8ef64184dd486cf86 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Thu, 14 Sep 2017 07:43:16 +0200 Subject: [PATCH 11/14] TESTS: Fix pep8 issues on sssd_netgroup.py MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/intg/sssd_netgroup.py | 1 + 1 file changed, 1 insertion(+) diff --git a/src/tests/intg/sssd_netgroup.py b/src/tests/intg/sssd_netgroup.py index 162c5aac8..4d1d5e2f4 100644 --- a/src/tests/intg/sssd_netgroup.py +++ b/src/tests/intg/sssd_netgroup.py @@ -47,6 +47,7 @@ class Idx(Union): class NameList(Structure): pass + NameList._fields_ = [("next", POINTER(NameList)), ("name", POINTER(c_char))] From 257c69ae2f5f691ade8686ce8cbc2bd317c082b9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Wed, 13 Sep 2017 15:27:48 +0200 Subject: [PATCH 12/14] Revert "intg: Disable add_remove tests" MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This reverts commit a24e735d33b788fec32acba70f30709eff44ebdf as it introduced some pep8 warnings, which would need another patch to fix those instead of just reverting this one. So, let's get everything back to what it was before so we can disable the tests in a way that we do not introduce pep8 issues and, later on, just revert a single patch enabling the tests again. Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- src/tests/intg/test_enumeration.py | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/src/tests/intg/test_enumeration.py b/src/tests/intg/test_enumeration.py index fdb8d3768..47772dea2 100644 --- a/src/tests/intg/test_enumeration.py +++ b/src/tests/intg/test_enumeration.py @@ -403,7 +403,7 @@ def user_and_groups_rfc2307_bis(request, ldap_conn): return None -def _test_add_remove_user(ldap_conn, blank_rfc2307): +def test_add_remove_user(ldap_conn, blank_rfc2307): """Test user addition and removal are reflected by SSSD""" e = ldap_ent.user(ldap_conn.ds_inst.base_dn, "user", 2001, 2000) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -418,7 +418,7 @@ def _test_add_remove_user(ldap_conn, blank_rfc2307): ent.assert_passwd(ent.contains_only()) -def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): +def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): """Test RFC2307 group addition and removal are reflected by SSSD""" e = ldap_ent.group(ldap_conn.ds_inst.base_dn, "group", 2001) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -433,7 +433,7 @@ def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): ent.assert_group(ent.contains_only()) -def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): +def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): """Test RFC2307bis group addition and removal are reflected by SSSD""" e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group", 2001) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -448,7 +448,7 @@ def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): ent.assert_group(ent.contains_only()) -def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): +def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): """Test user membership addition and removal are reflected by SSSD""" time.sleep(INTERACTIVE_TIMEOUT/2) # Add user to group @@ -464,7 +464,7 @@ def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): ent.assert_group_by_name("group", dict(mem=ent.contains_only())) -def _test_add_remove_membership_rfc2307_bis(ldap_conn, +def test_add_remove_membership_rfc2307_bis(ldap_conn, user_and_groups_rfc2307_bis): """ Test user and group membership addition and removal are reflected by SSSD, From f6ad9ec5827c902d3d264d16920d2f5387200dfb Mon Sep 17 00:00:00 2001 From: Lukas Slebodnik <lsleb...@redhat.com> Date: Wed, 13 Sep 2017 15:31:09 +0200 Subject: [PATCH 13/14] intg: Disable add_remove tests add_remove fails quite often in enumeration test. The reason of failures is not obvious and will take some time to investigate it. Failures blocks testing of other patches therefore its better to disable tests. (pytest run functions/methods which start with "test") Temporary workaround for: https://pagure.io/SSSD/sssd/issue/3463 --- src/tests/intg/test_enumeration.py | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/src/tests/intg/test_enumeration.py b/src/tests/intg/test_enumeration.py index 47772dea2..54d10f8bf 100644 --- a/src/tests/intg/test_enumeration.py +++ b/src/tests/intg/test_enumeration.py @@ -403,7 +403,7 @@ def user_and_groups_rfc2307_bis(request, ldap_conn): return None -def test_add_remove_user(ldap_conn, blank_rfc2307): +def _test_add_remove_user(ldap_conn, blank_rfc2307): """Test user addition and removal are reflected by SSSD""" e = ldap_ent.user(ldap_conn.ds_inst.base_dn, "user", 2001, 2000) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -418,7 +418,7 @@ def test_add_remove_user(ldap_conn, blank_rfc2307): ent.assert_passwd(ent.contains_only()) -def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): +def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): """Test RFC2307 group addition and removal are reflected by SSSD""" e = ldap_ent.group(ldap_conn.ds_inst.base_dn, "group", 2001) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -433,7 +433,7 @@ def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307): ent.assert_group(ent.contains_only()) -def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): +def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): """Test RFC2307bis group addition and removal are reflected by SSSD""" e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group", 2001) time.sleep(INTERACTIVE_TIMEOUT/2) @@ -448,7 +448,7 @@ def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis): ent.assert_group(ent.contains_only()) -def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): +def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): """Test user membership addition and removal are reflected by SSSD""" time.sleep(INTERACTIVE_TIMEOUT/2) # Add user to group @@ -464,8 +464,8 @@ def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307): ent.assert_group_by_name("group", dict(mem=ent.contains_only())) -def test_add_remove_membership_rfc2307_bis(ldap_conn, - user_and_groups_rfc2307_bis): +def _test_add_remove_membership_rfc2307_bis(ldap_conn, + user_and_groups_rfc2307_bis): """ Test user and group membership addition and removal are reflected by SSSD, with RFC2307bis schema From 99744fab321333478fc9fec6895446dff427c673 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com> Date: Sat, 9 Sep 2017 20:08:52 +0200 Subject: [PATCH 14/14] CI: Enable pep8 check MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit CI can now check pep8 issues for all .py files but the ones under src/config (for those, there's an issue already filed[0]). [0]: https://pagure.io/SSSD/sssd/issue/3514 Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com> --- contrib/ci/deps.sh | 2 ++ contrib/ci/run | 2 ++ 2 files changed, 4 insertions(+) diff --git a/contrib/ci/deps.sh b/contrib/ci/deps.sh index 4467e117c..80f307606 100644 --- a/contrib/ci/deps.sh +++ b/contrib/ci/deps.sh @@ -49,6 +49,7 @@ if [[ "$DISTRO_BRANCH" == -redhat-* ]]; then curl-devel krb5-server krb5-workstation + python-pep8 ) _DEPS_LIST_SPEC=` sed -e 's/@PACKAGE_VERSION@/0/g' \ @@ -128,6 +129,7 @@ if [[ "$DISTRO_BRANCH" == -debian-* ]]; then krb5-admin-server krb5-user uuid-dev + pep8 ) DEPS_INTGCHECK_SATISFIED=true fi diff --git a/contrib/ci/run b/contrib/ci/run index aa6d35abe..0bc84c032 100755 --- a/contrib/ci/run +++ b/contrib/ci/run @@ -378,6 +378,8 @@ export V=1 if "$DEPS"; then stage install-deps deps_install fi +stage pep8 find . -path ./src/config -prune -o \ + -name \*.py -exec pep8 {} + stage autoreconf autoreconf --install --force run_build debug build_debug if "$RIGOROUS"; then
_______________________________________________ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org