URL: https://github.com/SSSD/sssd/pull/379
Author: fidencio
 Title: #379: CI: Enable pep8 check
Action: synchronized

To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/379/head:pr379
git checkout pr379
From f026f574d89ad8af1e463b11ade8b8922eff2fc6 Mon Sep 17 00:00:00 2001
From: Jakub Hrozek <jhro...@redhat.com>
Date: Sun, 10 Sep 2017 00:24:36 +0200
Subject: [PATCH 01/14] TESTS: Fix pep8 issues in test_session_recording.py

---
 src/tests/intg/test_session_recording.py | 198 +++++++++++++++++++------------
 1 file changed, 122 insertions(+), 76 deletions(-)

diff --git a/src/tests/intg/test_session_recording.py b/src/tests/intg/test_session_recording.py
index 56a056a15..f9d3af022 100644
--- a/src/tests/intg/test_session_recording.py
+++ b/src/tests/intg/test_session_recording.py
@@ -287,20 +287,28 @@ def all(request, ldap_conn, users_and_groups):
 def test_all_nam(all):
     """Test "all" scope with getpwnam"""
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-        user4=dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user2=dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user3=dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user4=dict(name="user4", uid=1004,
+                   shell=config.SESSION_RECORDING_SHELL),
     ))
 
 
 def test_all_uid(all):
     """Test "all" scope with getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-        1004:dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1003: dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1004: dict(name="user4", uid=1004,
+                   shell=config.SESSION_RECORDING_SHELL),
     })
 
 
@@ -308,10 +316,14 @@ def test_all_ent(all):
     """Test "all" scope with getpwent"""
     ent.assert_passwd_list(
         ent.contains_only(
-            dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-            dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-            dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-            dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user1", uid=1001,
+                 shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user2", uid=1002,
+                 shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user3", uid=1003,
+                 shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user4", uid=1004,
+                 shell=config.SESSION_RECORDING_SHELL),
         )
     )
 
@@ -362,8 +374,10 @@ def some_users(request, ldap_conn, users_and_groups):
 def test_some_users_nam(some_users):
     """Test "some" scope with user list and getpwnam"""
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user2=dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
     ))
@@ -372,10 +386,12 @@ def test_some_users_nam(some_users):
 def test_some_users_uid(some_users):
     """Test "some" scope with user list and getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -434,12 +450,12 @@ def test_some_users_overridden_uid(some_users_overridden):
     overridden users, requested with getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="overridden_user1", uid=1001,
-                  shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="overridden_user2", uid=1002,
-                  shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="overridden_user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="overridden_user2", uid=1002,
+                   shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -529,8 +545,10 @@ def some_groups4(request, ldap_conn, users_and_groups):
 def test_some_groups1_nam(some_groups1):
     """Test "some" scope with group list and getpwnam"""
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user2=dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
     ))
@@ -539,10 +557,12 @@ def test_some_groups1_nam(some_groups1):
 def test_some_groups1_uid(some_groups1):
     """Test "some" scope with group list and getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -561,9 +581,12 @@ def test_some_groups1_ent(some_groups1):
 def test_some_groups2_nam(some_groups2):
     """Test "some" scope with group list and getpwnam"""
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        user2=dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user2=dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        user3=dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
     ))
 
@@ -571,10 +594,13 @@ def test_some_groups2_nam(some_groups2):
 def test_some_groups2_uid(some_groups2):
     """Test "some" scope with group list and getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell=config.SESSION_RECORDING_SHELL),
-        1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1003: dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -596,17 +622,19 @@ def test_some_groups3_nam(some_groups3):
         user1=dict(name="user1", uid=1001, shell="/bin/sh1"),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
-        user4=dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL),
+        user4=dict(name="user4", uid=1004,
+                   shell=config.SESSION_RECORDING_SHELL),
     ))
 
 
 def test_some_groups3_uid(some_groups3):
     """Test "some" scope with group list and getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell="/bin/sh1"),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell=config.SESSION_RECORDING_SHELL),
+        1001: dict(name="user1", uid=1001, shell="/bin/sh1"),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004,
+                   shell=config.SESSION_RECORDING_SHELL),
     })
 
 
@@ -625,9 +653,11 @@ def test_some_groups3_ent(some_groups3):
 def test_some_groups4_nam(some_groups4):
     """Test "some" scope with group list and getpwnam"""
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
-        user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
+        user3=dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
     ))
 
@@ -635,10 +665,12 @@ def test_some_groups4_nam(some_groups4):
 def test_some_groups4_uid(some_groups4):
     """Test "some" scope with group list and getpwuid"""
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -682,7 +714,8 @@ def test_some_groups_overridden1_nam(some_groups_overridden1):
     overridden groups, and users requested with getpwnam.
     """
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -695,10 +728,11 @@ def test_some_groups_overridden1_uid(some_groups_overridden1):
     overridden groups, and users requested with getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -709,7 +743,8 @@ def test_some_groups_overridden1_ent(some_groups_overridden1):
     """
     ent.assert_passwd_list(
         ent.contains_only(
-            dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user1", uid=1001,
+                 shell=config.SESSION_RECORDING_SHELL),
             dict(name="user2", uid=1002, shell="/bin/sh2"),
             dict(name="user3", uid=1003, shell="/bin/sh3"),
             dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -745,7 +780,8 @@ def test_some_groups_overridden2_nam(some_groups_overridden2):
     overridden groups, and users requested with getpwnam.
     """
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -758,10 +794,11 @@ def test_some_groups_overridden2_uid(some_groups_overridden2):
     overridden groups, and users requested with getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -772,7 +809,8 @@ def test_some_groups_overridden2_ent(some_groups_overridden2):
     """
     ent.assert_passwd_list(
         ent.contains_only(
-            dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+            dict(name="user1", uid=1001,
+                 shell=config.SESSION_RECORDING_SHELL),
             dict(name="user2", uid=1002, shell="/bin/sh2"),
             dict(name="user3", uid=1003, shell="/bin/sh3"),
             dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -808,7 +846,8 @@ def test_some_groups_overridden3_nam(some_groups_overridden3):
     overridden group, and users requested with getpwnam.
     """
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -821,10 +860,11 @@ def test_some_groups_overridden3_uid(some_groups_overridden3):
     overridden group, and users requested with getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -871,7 +911,8 @@ def test_some_groups_overridden4_nam(some_groups_overridden3):
     overridden group, and users requested with getpwnam.
     """
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
         user3=dict(name="user3", uid=1003, shell="/bin/sh3"),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
@@ -884,10 +925,11 @@ def test_some_groups_overridden4_uid(some_groups_overridden3):
     overridden group, and users requested with getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell="/bin/sh3"),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003, shell="/bin/sh3"),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 
@@ -928,9 +970,11 @@ def test_some_users_and_groups_nam(some_users_and_groups):
     Test "some" scope with user and group lists and getpwnam.
     """
     ent.assert_each_passwd_by_name(dict(
-        user1=dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
+        user1=dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
         user2=dict(name="user2", uid=1002, shell="/bin/sh2"),
-        user3=dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
+        user3=dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
         user4=dict(name="user4", uid=1004, shell="/bin/sh4"),
     ))
 
@@ -940,10 +984,12 @@ def test_some_users_and_groups_uid(some_users_and_groups):
     Test "some" scope with user and group lists and getpwuid.
     """
     ent.assert_each_passwd_by_uid({
-        1001:dict(name="user1", uid=1001, shell=config.SESSION_RECORDING_SHELL),
-        1002:dict(name="user2", uid=1002, shell="/bin/sh2"),
-        1003:dict(name="user3", uid=1003, shell=config.SESSION_RECORDING_SHELL),
-        1004:dict(name="user4", uid=1004, shell="/bin/sh4"),
+        1001: dict(name="user1", uid=1001,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1002: dict(name="user2", uid=1002, shell="/bin/sh2"),
+        1003: dict(name="user3", uid=1003,
+                   shell=config.SESSION_RECORDING_SHELL),
+        1004: dict(name="user4", uid=1004, shell="/bin/sh4"),
     })
 
 

From 3ac99a97c4e8469bf095c0084f232e8a4835dbdc Mon Sep 17 00:00:00 2001
From: Jakub Hrozek <jhro...@redhat.com>
Date: Wed, 13 Sep 2017 15:33:13 +0200
Subject: [PATCH 02/14] TESTS: Fix pep8 issues in test_ldap.py

---
 src/tests/intg/test_ldap.py | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/src/tests/intg/test_ldap.py b/src/tests/intg/test_ldap.py
index f2467f1ff..0b221e6f3 100644
--- a/src/tests/intg/test_ldap.py
+++ b/src/tests/intg/test_ldap.py
@@ -998,11 +998,10 @@ def test_zero_nesting_level(ldap_conn, rfc2307bis_no_nesting):
     assert res == sssd_id.NssReturnCode.SUCCESS, \
         "Could not find groups for user1, %d" % errno
 
-    ## test nestedgroup is not returned in group list
+    # test nestedgroup is not returned in group list
     assert sorted(grp_list) == sorted(["primarygroup", "parentgroup"])
 
 
-
 @pytest.fixture
 def sanity_nss_filter(request, ldap_conn):
     ent_list = ldap_ent.List(ldap_conn.ds_inst.base_dn)

From 0128aa4dc3b2ae3bba10c67a9cbaae10f740b1c9 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 14:56:20 +0200
Subject: [PATCH 03/14] CONTRIB: Fix pep8 issues in update_debug_levels.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 contrib/rhel/update_debug_levels.py | 12 ++++++++----
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/contrib/rhel/update_debug_levels.py b/contrib/rhel/update_debug_levels.py
index a260ec1e8..7a6d23562 100644
--- a/contrib/rhel/update_debug_levels.py
+++ b/contrib/rhel/update_debug_levels.py
@@ -29,15 +29,18 @@ def parse_options():
                       help="Be verbose")
     (options, args) = parser.parse_args()
     if len(args) > 0:
-        print("Stray arguments: %s" % ' '.join([a for a in args]), file=sys.stderr)
+        print("Stray arguments: %s" % ' '.join([a for a in args]),
+              file=sys.stderr)
         return None
 
     return options
 
+
 def verbose(msg, verbosity):
     if verbosity:
         print(msg)
 
+
 def main():
     options = parse_options()
     if not options:
@@ -57,7 +60,7 @@ def main():
     # Check the [sssd] section for debug_level
     sssd_service = sssdconfig.get_service('sssd')
 
-    if not 'debug_level' in sssd_service.options.keys():
+    if 'debug_level' not in sssd_service.options.keys():
         # Nothing to do, just return success
         verbose("No changes required, no backup necessary",
                 options.verbose)
@@ -70,7 +73,7 @@ def main():
     # Loop through services
     for service in sssdconfig.list_services():
         svc = sssdconfig.get_service(service)
-        if not 'debug_level' in svc.options.keys():
+        if 'debug_level' not in svc.options.keys():
             # Not explicitly set, so add it
             svc.set_option('debug_level', debug_level)
             sssdconfig.save_service(svc)
@@ -78,7 +81,7 @@ def main():
     # Loop through domains (active AND inactive)
     for domain in sssdconfig.list_domains():
         dom = sssdconfig.get_domain(domain)
-        if not 'debug_level' in dom.options.keys():
+        if 'debug_level' not in dom.options.keys():
             # Not explicitly set, so add it
             dom.set_option('debug_level', debug_level)
             sssdconfig.save_domain(dom)
@@ -95,6 +98,7 @@ def main():
     # Save the changes
     sssdconfig.write()
 
+
 if __name__ == "__main__":
     ret = main()
     sys.exit(ret)

From 5be5356d22b2d4c1207f02f9d0c226cecbd72cf5 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 15:04:00 +0200
Subject: [PATCH 04/14] CONTRIB: Fix pep8 issues on sssd_gdb_plugin.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 contrib/gdb/sssd_gdb_plugin.py | 16 +++++++++++-----
 1 file changed, 11 insertions(+), 5 deletions(-)

diff --git a/contrib/gdb/sssd_gdb_plugin.py b/contrib/gdb/sssd_gdb_plugin.py
index 730c7e894..deb8ddba5 100644
--- a/contrib/gdb/sssd_gdb_plugin.py
+++ b/contrib/gdb/sssd_gdb_plugin.py
@@ -15,7 +15,8 @@ def gdb_printer_decorator(fn):
 
 
 def indent_string(s, indent):
-    return '\n'.join(["%s%s" % ("\t" * indent, part) for part in s.split('\n')])
+    return '\n'.join(["%s%s" %
+                      ("\t" * indent, part) for part in s.split('\n')])
 
 
 class StringPrinter(object):
@@ -31,7 +32,8 @@ class LdbDnPrinter(StringPrinter):
     " print an ldb dn "
 
     def as_string(self, indent=0):
-        ret = "{ <%s>\tlinearized:%s }" % (self.val.type, self.val['linearized'])
+        ret = "{ <%s>\tlinearized:%s }" % (self.val.type,
+                                           self.val['linearized'])
         return indent_string(ret, indent)
 
 
@@ -47,7 +49,8 @@ class LdbMessageElementPrinter(StringPrinter):
     " print a ldb message element "
 
     def as_string(self, indent=0):
-        ret = "flags = %(flags)s, name = %(name)s, num_values = %(num_values)s" % self.val
+        ret = "flags = %(flags)s, name = %(name)s, \
+                num_values = %(num_values)s" % self.val
         try:
             nvals = int(self.val['num_values'])
         except ValueError:
@@ -70,7 +73,8 @@ def as_string(self, indent=0):
             return "num_elements is not numeric?"
 
         dn = LdbDnPrinter(self.val['dn'])
-        ret = "num_elements:\t%s\ndn:\t%s\nelements:\t" % (nels, dn.as_string(indent))
+        ret = "num_elements:\t%s\ndn:\t%s\nelements:\t" % \
+              (nels, dn.as_string(indent))
 
         for i in range(nels):
             el = LdbMessageElementPrinter(self.val['elements'][i])
@@ -83,7 +87,8 @@ class LdbResultPrinter(StringPrinter):
     " print a ldb message element "
 
     def as_string(self, indent=0):
-        ret = "count = %(count)s, extended = %(extended)s, controls = %(controls)s, refs = %(refs)s" % self.val
+        ret = "count = %(count)s, extended = %(extended)s, \
+                controls = %(controls)s, refs = %(refs)s" % self.val
         try:
             count = int(self.val['count'])
         except ValueError:
@@ -193,4 +198,5 @@ def invoke(self, arg, from_tty):
 
         b = gdb.Breakpoint("*%s" % fnaddr)
 
+
 TeventBreak()

From 700312a5d074ab03f593ccc0d2d365b7ac38e60d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 15:55:07 +0200
Subject: [PATCH 05/14] TESTS: Fix pep8 issues in pyhbac-test.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/pyhbac-test.py | 96 +++++++++++++++++++++++++++---------------------
 1 file changed, 54 insertions(+), 42 deletions(-)

diff --git a/src/tests/pyhbac-test.py b/src/tests/pyhbac-test.py
index e34f05596..b31a0cd21 100755
--- a/src/tests/pyhbac-test.py
+++ b/src/tests/pyhbac-test.py
@@ -23,11 +23,13 @@ def compat_assertIsInstance(this, obj, cls, msg=None):
 def compat_assertItemsEqual(this, expected_seq, actual_seq, msg=None):
     return this.assertEqual(sorted(expected_seq), sorted(actual_seq))
 
+
 # add compat assertIsInstance for old unittest.TestCase versions
 # (python < 2.7, RHEL6 for instance)
 if not hasattr(unittest.TestCase, "assertIsInstance"):
     setattr(unittest.TestCase, "assertIsInstance", compat_assertIsInstance)
 
+
 # Python3 renamed assertItemsEqual to assertCountEqual but at the same time
 # Python2 doesn't have assertCountEqual, see http://bugs.python.org/issue17866
 if not hasattr(unittest.TestCase, "assertCountEqual"):
@@ -44,7 +46,7 @@ class PyHbacImport(unittest.TestCase):
     def setUp(self):
         " Make sure we load the in-tree module "
         self.system_path = sys.path[:]
-        sys.path = [ MODPATH ]
+        sys.path = [MODPATH]
 
     def tearDown(self):
         " Restore the system path "
@@ -65,7 +67,8 @@ def testImport(self):
 
             import pyhbac
         except ImportError as e:
-            print("Could not load the pyhbac module. Please check if it is compiled", file=sys.stderr)
+            print("Could not load the pyhbac module. Please check if it \
+                    is compiled", file=sys.stderr)
             raise e
         self.assertEqual(pyhbac.__file__, MODPATH + "/pyhbac.so")
 
@@ -118,7 +121,8 @@ def testCategory(self):
         assert pyhbac.HBAC_CATEGORY_ALL in el.category
 
         # negative tests
-        self.assertRaises(TypeError, el.__setattr__, "category", [pyhbac.HBAC_CATEGORY_ALL])
+        self.assertRaises(TypeError, el.__setattr__, "category",
+                          [pyhbac.HBAC_CATEGORY_ALL])
         self.assertRaises(TypeError, el.__setattr__, "category", None)
         self.assertRaises(TypeError, el.__setattr__, "category", 1)
 
@@ -143,7 +147,9 @@ def testRepr(self):
         el.category.add(pyhbac.HBAC_CATEGORY_ALL)
         el.names = ['foo']
         el.groups = ['bar, baz']
-        self.assertEquals(el.__repr__(), u'<category 1 names [foo] groups [bar, baz]>')
+        self.assertEquals(el.__repr__(),
+                          u'<category 1 names [foo] groups [bar, baz]>')
+
 
 class PyHbacRuleTest(unittest.TestCase):
     def testRuleGetSetName(self):
@@ -221,10 +227,11 @@ def testRuleElementInRule(self):
         self.assertCountEqual(rule.users.groups, user_groups)
 
     def testRuleElementInRuleReference(self):
-        " Test that references to RuleElement are kept even if element goes out of scope "
+        " Test that references to RuleElement are kept even if element goes \
+            out of scope "
         def _get_rule():
-            users = [ "foo", "bar" ]
-            user_groups = [ "abc", "def" ]
+            users = ["foo", "bar"]
+            user_groups = ["abc", "def"]
             el = pyhbac.HbacRuleElement(names=users, groups=user_groups)
             rule = pyhbac.HbacRule("testRuleElement")
             rule.users = el
@@ -236,28 +243,30 @@ def _get_rule():
 
     def testRepr(self):
         r = pyhbac.HbacRule('foo')
-        self.assertEqual(r.__repr__(), u"<name foo enabled 0 "
-                                        "users <category 0 names [] groups []> "
-                                        "services <category 0 names [] groups []> "
-                                        "targethosts <category 0 names [] groups []> "
-                                        "srchosts <category 0 names [] groups []>>")
+        self.assertEqual(r.__repr__(),
+                         u"<name foo enabled 0 "
+                         "users <category 0 names [] groups []> "
+                         "services <category 0 names [] groups []> "
+                         "targethosts <category 0 names [] groups []> "
+                         "srchosts <category 0 names [] groups []>>")
 
         name = "someuser"
         service = "ssh"
         srchost = "host1"
         targethost = "host2"
 
-        r.users.names = [ name ]
-        r.services.names = [ service ]
-        r.srchosts.names = [ srchost ]
-        r.targethosts.names = [ targethost ]
+        r.users.names = [name]
+        r.services.names = [service]
+        r.srchosts.names = [srchost]
+        r.targethosts.names = [targethost]
 
-        self.assertEqual(r.__repr__(), u"<name foo enabled 0 "
-                                        "users <category 0 names [%s] groups []> "
-                                        "services <category 0 names [%s] groups []> "
-                                        "targethosts <category 0 names [%s] groups []> "
-                                        "srchosts <category 0 names [%s] groups []>>" %
-                                        (name, service, targethost, srchost))
+        self.assertEqual(r.__repr__(),
+                         u"<name foo enabled 0 "
+                         "users <category 0 names [%s] groups []> "
+                         "services <category 0 names [%s] groups []> "
+                         "targethosts <category 0 names [%s] groups []> "
+                         "srchosts <category 0 names [%s] groups []>>" %
+                         (name, service, targethost, srchost))
 
     def testValidate(self):
         r = pyhbac.HbacRule('valid_rule')
@@ -331,6 +340,7 @@ def testRepr(self):
         r.groups = ['bar', 'baz']
         self.assertEqual(r.__repr__(), u"<name foo groups [bar,baz]>")
 
+
 class PyHbacRequestTest(unittest.TestCase):
     def testRequestElementHandling(self):
         name = "req_name"
@@ -365,7 +375,8 @@ def testRuleName(self):
         req = pyhbac.HbacRequest()
         self.assertEqual(req.rule_name, None)
         # python 2.4 raises TypError, 2.7 raises AttributeError
-        self.assertRaises((TypeError, AttributeError), req.__setattr__, "rule_name", "foo")
+        self.assertRaises((TypeError, AttributeError), req.__setattr__,
+                          "rule_name", "foo")
 
     def testEvaluate(self):
         name = "someuser"
@@ -374,10 +385,10 @@ def testEvaluate(self):
         targethost = "host2"
 
         allow_rule = pyhbac.HbacRule("allowRule", enabled=True)
-        allow_rule.users.names = [ name ]
-        allow_rule.services.names = [ service ]
-        allow_rule.srchosts.names = [ srchost ]
-        allow_rule.targethosts.names = [ targethost ]
+        allow_rule.users.names = [name]
+        allow_rule.services.names = [service]
+        allow_rule.srchosts.names = [srchost]
+        allow_rule.targethosts.names = [targethost]
 
         req = pyhbac.HbacRequest()
         req.user.name = name
@@ -433,10 +444,10 @@ def testEvaluateNegative(self):
         targethost = "host2"
 
         allow_rule = pyhbac.HbacRule("allowRule", enabled=True)
-        allow_rule.users.names = [ name ]
-        allow_rule.services.names = [ service ]
-        allow_rule.srchosts.names = [ srchost ]
-        allow_rule.targethosts.names = [ targethost ]
+        allow_rule.users.names = [name]
+        allow_rule.services.names = [service]
+        allow_rule.srchosts.names = [srchost]
+        allow_rule.targethosts.names = [targethost]
 
         req = pyhbac.HbacRequest()
         req.service.name = service
@@ -445,7 +456,7 @@ def testEvaluateNegative(self):
         req.user.name = name
 
         saveuser = req.user
-        req.user = None # need to catch this
+        req.user = None  # need to catch this
 
         # catch invalid category value
         savecat = copy.copy(allow_rule.users.category)
@@ -457,12 +468,13 @@ def testEvaluateNegative(self):
         self.assertRaises(TypeError, req.evaluate, (allow_rule,))
 
         req.user = saveuser
-        allow_rule.users = None # need to catch this
+        allow_rule.users = None  # need to catch this
         self.assertRaises(TypeError, req.evaluate, (allow_rule,))
 
         # catch invalid rule type
         self.assertRaises(TypeError, req.evaluate, (allow_rule, None))
 
+
 class PyHbacModuleTest(unittest.TestCase):
     @classmethod
     def tearDownClass(cls):
@@ -492,19 +504,19 @@ def testHasRuleElementTypes(self):
         assert hasattr(pyhbac, "HBAC_RULE_ELEMENT_SOURCEHOSTS")
 
     def testHbacResultString(self):
-        results = [ pyhbac.HBAC_EVAL_ALLOW, pyhbac.HBAC_EVAL_DENY,
-                    pyhbac.HBAC_EVAL_ERROR ]
+        results = [pyhbac.HBAC_EVAL_ALLOW, pyhbac.HBAC_EVAL_DENY,
+                   pyhbac.HBAC_EVAL_ERROR]
         for r in results:
             s = pyhbac.hbac_result_string(r)
             self.assertIsInstance(s, unicode)
             assert len(s) > 0
 
     def testHbacErrorString(self):
-        errors = [ pyhbac.HBAC_ERROR_UNKNOWN,
-                   pyhbac.HBAC_SUCCESS,
-                   pyhbac.HBAC_ERROR_NOT_IMPLEMENTED,
-                   pyhbac.HBAC_ERROR_OUT_OF_MEMORY,
-                   pyhbac.HBAC_ERROR_UNPARSEABLE_RULE ]
+        errors = [pyhbac.HBAC_ERROR_UNKNOWN,
+                  pyhbac.HBAC_SUCCESS,
+                  pyhbac.HBAC_ERROR_NOT_IMPLEMENTED,
+                  pyhbac.HBAC_ERROR_OUT_OF_MEMORY,
+                  pyhbac.HBAC_ERROR_UNPARSEABLE_RULE]
         for e in errors:
             s = pyhbac.hbac_error_string(e)
             self.assertIsInstance(s, unicode)
@@ -536,7 +548,8 @@ def testHbacErrorString(self):
     if not res.wasSuccessful():
         error |= 0x3
 
-    suite = unittest.TestLoader().loadTestsFromTestCase(PyHbacRequestElementTest)
+    suite = \
+        unittest.TestLoader().loadTestsFromTestCase(PyHbacRequestElementTest)
     res = unittest.TextTestRunner().run(suite)
     if not res.wasSuccessful():
         error |= 0x4
@@ -552,4 +565,3 @@ def testHbacErrorString(self):
         error |= 0x6
 
     sys.exit(error)
-

From 86951d0946539521e5b49dcdb092c14d15aa06c2 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 15:59:54 +0200
Subject: [PATCH 06/14] TESTS: Fix pep8 issues in pysss_murmur-test.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/pysss_murmur-test.py | 11 +++++++----
 1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/src/tests/pysss_murmur-test.py b/src/tests/pysss_murmur-test.py
index 7237c95b0..afebcc2e6 100755
--- a/src/tests/pysss_murmur-test.py
+++ b/src/tests/pysss_murmur-test.py
@@ -33,8 +33,8 @@ class PySssMurmurImport(unittest.TestCase):
     def setUp(self):
         " Make sure we load the in-tree module "
         self.system_path = sys.path[:]
-        sys.path = [ MODPATH ]
-        print (os.getcwd())
+        sys.path = [MODPATH]
+        print(os.getcwd())
         print(MODPATH)
 
     def tearDown(self):
@@ -56,10 +56,12 @@ def testImport(self):
 
             import pysss_murmur
         except ImportError as e:
-            print("Could not load the pysss_murmur module. Please check if it is compiled", file=sys.stderr)
+            print("Could not load the pysss_murmur module. \
+                    Please check if it is compiled", file=sys.stderr)
             raise e
         self.assertEqual(pysss_murmur.__file__, MODPATH + "/pysss_murmur.so")
 
+
 class PySssMurmurTest(unittest.TestCase):
     @classmethod
     def tearDownClass(cls):
@@ -67,7 +69,8 @@ def tearDownClass(cls):
         os.rmdir(MODPATH)
 
     def testExpectedHash(self):
-        hash = pysss_murmur.murmurhash3("S-1-5-21-2153326666-2176343378-3404031434", 41, 0xdeadbeef)
+        sid = "S-1-5-21-2153326666-2176343378-3404031434"
+        hash = pysss_murmur.murmurhash3(sid, 41, 0xdeadbeef)
         self.assertEqual(hash, 93103853)
 
     def testInvalidArguments(self):

From 5bd39e70a4f1f2ed7909ecdc1e5f46c07b2e3ad1 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 16:21:42 +0200
Subject: [PATCH 07/14] TESTS: Fix pep8 issues in python-test.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/python-test.py | 80 +++++++++++++++++++++++++++++++-----------------
 1 file changed, 52 insertions(+), 28 deletions(-)

diff --git a/src/tests/python-test.py b/src/tests/python-test.py
index 08ac5973f..ff313a999 100644
--- a/src/tests/python-test.py
+++ b/src/tests/python-test.py
@@ -1,5 +1,5 @@
 #!/usr/bin/env python
-#coding=utf-8
+# coding=utf-8
 
 # Authors:
 #   Jakub Hrozek <jhro...@redhat.com>
@@ -27,9 +27,11 @@
 import subprocess
 import errno
 
+
 # module under test
 import pysss
 
+
 class LocalTest(unittest.TestCase):
     local_path = "/var/lib/sss/db/sssd.ldb"
 
@@ -43,14 +45,16 @@ def _run_and_check(self, runme):
     def _get_object_info(self, name, subtree, domain):
         search_dn = "dn=name=%s,cn=%s,cn=%s,cn=sysdb" % (name, subtree, domain)
         try:
-            output = subprocess.check_call("ldbsearch -H %s %s" % (self.local_path,search_dn),
+            output = subprocess.check_call("ldbsearch -H %s %s" %
+                                           (self.local_path, search_dn),
                                            shell=True)
             output = output.decode('utf-8')
         except subprocess.CalledProcessError:
             return {}
 
         kw = {}
-        for key, value in [ l.split(':') for l in output.split('\n') if ":" in l ]:
+        for key, value in \
+                [l.split(':') for l in output.split('\n') if ":" in l]:
             kw[key] = value.strip()
 
         del kw['asq']
@@ -63,15 +67,19 @@ def get_group_info(self, name, domain="LOCAL"):
         return self._get_object_info(name, "groups", domain)
 
     def _validate_object(self, kw, name, **kwargs):
-        if kw == {}: self.fail("Could not get %s info" % name)
+        if kw == {}:
+            self.fail("Could not get %s info" % name)
         for key in kwargs.keys():
-            self.assert_(str(kwargs[key]) == str(kw[key]), "%s %s != %s %s" % (key, kwargs[key], key, kw[key]))
+            self.assert_(str(kwargs[key]) == str(kw[key]),
+                         "%s %s != %s %s" % (key, kwargs[key], key, kw[key]))
 
     def validate_user(self, username, **kwargs):
-        return self._validate_object(self.get_user_info(username), "user", **kwargs)
+        return self._validate_object(self.get_user_info(username), "user",
+                                     **kwargs)
 
     def validate_group(self, groupname, **kwargs):
-        return self._validate_object(self.get_group_info(groupname), "group", **kwargs)
+        return self._validate_object(self.get_group_info(groupname), "group",
+                                     **kwargs)
 
     def _validate_no_object(self, kw, name):
         if kw != {}:
@@ -81,18 +89,22 @@ def validate_no_user(self, username):
         return self._validate_no_object(self.get_user_info(username), "user")
 
     def validate_no_group(self, groupname):
-        return self._validate_no_object(self.get_group_info(groupname), "group")
+        return self._validate_no_object(self.get_group_info(groupname),
+                                        "group")
 
     def _get_object_membership(self, name, subtree, domain):
         search_dn = "dn=name=%s,cn=%s,cn=%s,cn=sysdb" % (name, subtree, domain)
         try:
-            output = subprocess.check_call("ldbsearch -H %s %s" % (self.local_path,search_dn),
+            output = subprocess.check_call("ldbsearch -H %s %s" %
+                                           (self.local_path, search_dn),
                                            shell=True)
             output = output.decode('utf-8')
         except subprocess.CalledProcessError:
             return []
 
-        members = [ value.strip() for key, value in [ l.split(':') for l in output.split('\n') if ":" in l ] if key == "memberof" ]
+        members = [value.strip() for key, value in
+                   [l.split(':') for l in output.split('\n') if ":" in l]
+                   if key == "memberof"]
         return members
 
     def _assertMembership(self, name, group_list, subtree, domain):
@@ -137,12 +149,14 @@ def remove_user(self, username):
     def remove_user_not_home(self, username):
         self._run_and_check("sss_userdel -R %s" % (username))
 
+
 class SanityTest(unittest.TestCase):
     def testInstantiate(self):
         "Test that the local backed binding can be instantiated"
         local = pysss.local()
         self.assert_(local.__class__, "<type 'sss.local'>")
 
+
 class UseraddTest(LocalTest):
     def tearDown(self):
         if self.username:
@@ -154,7 +168,8 @@ def testUseradd(self):
         self.local.useradd(self.username)
         self.validate_user(self.username)
         # check home directory was created with default name
-        self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), True)
+        self.assertEquals(os.access("/home/%s" % self.username, os.F_OK),
+                          True)
 
     def testUseraddWithParams(self):
         "Test adding a local user with modified parameters"
@@ -173,12 +188,13 @@ def testUseraddWithParams(self):
     def testUseraddNoHomedir(self):
         "Test adding a local user without creating his home dir"
         self.username = "testUseraddNoHomedir"
-        self.local.useradd(self.username, create_home = False)
+        self.local.useradd(self.username, create_home=False)
         self.validate_user(self.username)
         # check home directory was not created
-        self.assertEquals(os.access("/home/%s" % self.username, os.F_OK), False)
-        self.local.userdel(self.username, remove = False)
-        self.username = None # fool tearDown into not removing the user
+        self.assertEquals(os.access("/home/%s" % self.username, os.F_OK),
+                          False)
+        self.local.userdel(self.username, remove=False)
+        self.username = None  # fool tearDown into not removing the user
 
     def testUseraddAlternateSkeldir(self):
         "Test adding a local user and init his homedir from a custom location"
@@ -193,9 +209,11 @@ def testUseraddAlternateSkeldir(self):
         filename = os.path.basename(path)
 
         try:
-            self.local.useradd(self.username, skel = skeldir)
+            self.local.useradd(self.username, skel=skeldir)
             self.validate_user(self.username)
-            self.assertEquals(os.access("/home/%s/%s"%(self.username,filename), os.F_OK), True)
+            self.assertEquals(os.access("/home/%s/%s" % (self.username,
+                                                         filename), os.F_OK),
+                              True)
         finally:
             shutil.rmtree(skeldir)
 
@@ -206,9 +224,9 @@ def testUseraddToGroups(self):
         self.add_group("gr2")
         try:
             self.local.useradd(self.username,
-                               groups=["gr1","gr2"])
+                               groups=["gr1", "gr2"])
             self.assertUserMembership(self.username,
-                                      ["gr1","gr2"])
+                                      ["gr1", "gr2"])
         finally:
             self.remove_group("gr1")
             self.remove_group("gr2")
@@ -221,6 +239,7 @@ def testUseraddWithUID(self):
         self.validate_user(self.username,
                            uidNumber=1024)
 
+
 class UseraddTestNegative(LocalTest):
     def testUseraddNoParams(self):
         "Test that local.useradd() requires the username parameter"
@@ -252,6 +271,7 @@ def testUseraddUIDAlreadyExists(self):
         finally:
             self.remove_user(self.username)
 
+
 class UserdelTest(LocalTest):
     def testUserdel(self):
         self.add_user("testUserdel")
@@ -280,6 +300,7 @@ def testUserdelNegative(self):
         else:
             fail("Was expecting exception")
 
+
 class UsermodTest(LocalTest):
     def setUp(self):
         self.local = pysss.local()
@@ -314,9 +335,9 @@ def testUsermodGroupMembership(self):
 
         try:
             self.local.usermod(self.username,
-                               addgroups=["gr1","gr2"])
+                               addgroups=["gr1", "gr2"])
             self.assertUserMembership(self.username,
-                                      ["gr1","gr2"])
+                                      ["gr1", "gr2"])
             self.local.usermod(self.username,
                                rmgroups=["gr2"])
             self.assertUserMembership(self.username,
@@ -340,6 +361,7 @@ def testUsermodLockUnlock(self):
         self.validate_user(self.username,
                            disabled="false")
 
+
 class GroupaddTest(LocalTest):
     def tearDown(self):
         if self.groupname:
@@ -355,9 +377,10 @@ def testGroupaddWithGID(self):
         "Test adding a local group with a custom GID"
         self.groupname = "testUseraddWithGID"
         self.local.groupadd(self.groupname,
-                           gid=1024)
+                            gid=1024)
         self.validate_group(self.groupname,
-                           gidNumber=1024)
+                            gidNumber=1024)
+
 
 class GroupaddTestNegative(LocalTest):
     def testGroupaddNoParams(self):
@@ -390,6 +413,7 @@ def testGroupaddGIDAlreadyExists(self):
         finally:
             self.remove_group(self.groupname)
 
+
 class GroupdelTest(LocalTest):
     def testGroupdel(self):
         self.add_group("testGroupdel")
@@ -419,9 +443,9 @@ def tearDown(self):
     def testGroupmodGID(self):
         "Test modifying UID"
         self.local.groupmod(self.groupname,
-                           gid=1024)
+                            gid=1024)
         self.validate_group(self.groupname,
-                           gidNumber=1024)
+                            gidNumber=1024)
 
     def testGroupmodGroupMembership(self):
         "Test adding to groups"
@@ -429,9 +453,9 @@ def testGroupmodGroupMembership(self):
         self.add_group("gr2")
         try:
             self.local.groupmod(self.groupname,
-                                addgroups=["gr1","gr2"])
+                                addgroups=["gr1", "gr2"])
             self.assertGroupMembership(self.groupname,
-                                       ["gr1","gr2"])
+                                       ["gr1", "gr2"])
             self.local.groupmod(self.groupname,
                                 rmgroups=["gr2"])
             self.assertGroupMembership(self.groupname,
@@ -444,7 +468,7 @@ def testGroupmodGroupMembership(self):
             self.remove_group("gr1")
             self.remove_group("gr2")
 
+
 # -------------- run the test suite -------------- #
 if __name__ == "__main__":
     unittest.main()
-

From a3936398957385a284594ef21775525a8cc7ec76 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 21:48:20 +0200
Subject: [PATCH 08/14] TESTS: Fix pep8 issues in sssd_group.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/intg/sssd_group.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/tests/intg/sssd_group.py b/src/tests/intg/sssd_group.py
index 32d12cfae..adfdc6721 100644
--- a/src/tests/intg/sssd_group.py
+++ b/src/tests/intg/sssd_group.py
@@ -83,7 +83,7 @@ def set_group_dict(res, result_p):
     group_dict['mem'] = list()
 
     i = 0
-    while result_p[0].gr_mem[i] != None:
+    while result_p[0].gr_mem[i] is not None:
         grp_name = result_p[0].gr_mem[i].decode('utf-8')
         group_dict['mem'].append(grp_name)
         i = i+1

From 363c692ec90dea0128de581e93791c375dc5aa2c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 22:02:26 +0200
Subject: [PATCH 09/14] TESTS: Fix pep8 issues in test_ts_cache.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/intg/test_ts_cache.py | 83 +++++++++++++++++++++++------------------
 1 file changed, 46 insertions(+), 37 deletions(-)

diff --git a/src/tests/intg/test_ts_cache.py b/src/tests/intg/test_ts_cache.py
index 703e3b255..c06602292 100644
--- a/src/tests/intg/test_ts_cache.py
+++ b/src/tests/intg/test_ts_cache.py
@@ -212,12 +212,12 @@ def get_attrs(ldb_conn, type, name, domain, attr_list):
     ts_attrs = dict()
 
     for attr in attr_list:
-        sysdb_attrs[attr] = ldb_conn.get_entry_attr(
-                                     sssd_ldb.CacheType.sysdb,
-                                     type, name, domain, attr)
-        ts_attrs[attr] = ldb_conn.get_entry_attr(
-                                     sssd_ldb.CacheType.timestamps,
-                                     type, name, domain, attr)
+        sysdb_attrs[attr] = \
+            ldb_conn.get_entry_attr(sssd_ldb.CacheType.sysdb,
+                                    type, name, domain, attr)
+        ts_attrs[attr] = \
+            ldb_conn.get_entry_attr(sssd_ldb.CacheType.timestamps,
+                                    type, name, domain, attr)
     return (sysdb_attrs, ts_attrs)
 
 
@@ -232,13 +232,13 @@ def get_user_attrs(ldb_conn, name, domain, attr_list):
 
 
 def assert_same_attrval(adict1, adict2, attr_name):
-    assert adict1.get(attr_name) is not None and \
-           adict1.get(attr_name) == adict2.get(attr_name)
+    assert (adict1.get(attr_name) is not None and
+            adict1.get(attr_name) == adict2.get(attr_name))
 
 
 def assert_diff_attrval(adict1, adict2, attr_name):
-    assert adict1.get(attr_name) is not None and \
-           adict1.get(attr_name) != adict2.get(attr_name)
+    assert (adict1.get(attr_name) is not None and
+            adict1.get(attr_name) != adict2.get(attr_name))
 
 
 def prime_cache_group(ldb_conn, name, members):
@@ -284,9 +284,10 @@ def test_group_2307bis_update_same_modstamp(ldap_conn,
     sysdb cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     ent.assert_group_by_name(
         "group1",
@@ -310,9 +311,10 @@ def test_group_2307bis_update_same_attrs(ldap_conn,
     attrs does not trigger sysdb cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     # modify an argument we don't save to the cache. This will bump the
     # modifyTimestamp attribute, but the attributes themselves will be the same
@@ -343,9 +345,10 @@ def test_group_2307bis_update_diff_attrs(ldap_conn,
     Test that a group update with different attribute triggers cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     user_dn = "uid=user1,ou=Users," + ldap_conn.ds_inst.base_dn
     ldap_conn.modify_s("cn=group1,ou=Groups," + ldap_conn.ds_inst.base_dn,
@@ -374,9 +377,10 @@ def test_group_2307bis_delete_group(ldap_conn,
     Test that deleting a group removes it from both caches
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group1", 2001)
     ldap_conn.delete_s(e[0])
@@ -402,9 +406,10 @@ def test_group_2307_update_same_modstamp(ldap_conn,
     sysdb cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     ent.assert_group_by_name(
         "group1",
@@ -428,9 +433,10 @@ def test_group_2307_update_same_attrs(ldap_conn,
     attrs does not trigger sysdb cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     # modify an argument we don't save to the cache. This will bump the
     # modifyTimestamp attribute, but the attributes themselves will be the same
@@ -461,9 +467,10 @@ def test_group_2307_update_diff_attrs(ldap_conn,
     Test that a group update with different attribute triggers cache update
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     ldap_conn.modify_s("cn=group1,ou=Groups," + ldap_conn.ds_inst.base_dn,
                        [(ldap.MOD_DELETE, "memberUid", b"user1")])
@@ -491,9 +498,10 @@ def test_group_2307_delete_group(ldap_conn,
     Test that deleting a group removes it from both caches
     """
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group1", 2001)
     ldap_conn.delete_s(e[0])
@@ -652,9 +660,10 @@ def test_sss_cache_invalidate_group(ldap_conn,
     """
 
     ldb_conn = ldb_examine
-    old_sysdb_attrs, old_ts_attrs = prime_cache_group(
-                                                ldb_conn, "group1",
-                                                ("user1", "user11", "user21"))
+    old_sysdb_attrs, old_ts_attrs = prime_cache_group(ldb_conn, "group1",
+                                                      ("user1",
+                                                       "user11",
+                                                       "user21"))
 
     subprocess.call(["sss_cache", "-g", "group1"])
 

From c62fff944084d5216aed69e8477cb6ec16c89c7d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 22:16:21 +0200
Subject: [PATCH 10/14] TESTS: Fix pep8 issues on test_kcm.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/intg/test_kcm.py | 10 ++++------
 1 file changed, 4 insertions(+), 6 deletions(-)

diff --git a/src/tests/intg/test_kcm.py b/src/tests/intg/test_kcm.py
index b65e1d530..c1e36fa8e 100644
--- a/src/tests/intg/test_kcm.py
+++ b/src/tests/intg/test_kcm.py
@@ -355,9 +355,8 @@ def exercise_kswitch(testenv):
     assert len(cc_coll) == 2
     assert set(cc_coll['alice@KCMTEST']) == set(['krbtgt/KCMTEST@KCMTEST',
                                                  'host/somehostname@KCMTEST'])
-    assert set(cc_coll['bob@KCMTEST']) == set([
-                                    'krbtgt/KCMTEST@KCMTEST',
-                                    'host/differenthostname@KCMTEST'])
+    assert set(cc_coll['bob@KCMTEST']) == set(
+        ['krbtgt/KCMTEST@KCMTEST', 'host/differenthostname@KCMTEST'])
 
 
 def test_kcm_mem_kswitch(setup_for_kcm_mem):
@@ -410,9 +409,8 @@ def exercise_subsidiaries(testenv):
     assert len(cc_coll) == 2
     assert set(cc_coll['alice@KCMTEST']) == set(['krbtgt/KCMTEST@KCMTEST',
                                                  'host/somehostname@KCMTEST'])
-    assert set(cc_coll['bob@KCMTEST']) == set([
-                                            'krbtgt/KCMTEST@KCMTEST',
-                                            'host/differenthostname@KCMTEST'])
+    assert set(cc_coll['bob@KCMTEST']) == set(
+        ['krbtgt/KCMTEST@KCMTEST', 'host/differenthostname@KCMTEST'])
 
 
 def test_kcm_mem_subsidiaries(setup_for_kcm_mem):

From 7474e792c6ca5a5c1b401be8ef64184dd486cf86 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Thu, 14 Sep 2017 07:43:16 +0200
Subject: [PATCH 11/14] TESTS: Fix pep8 issues on sssd_netgroup.py
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/intg/sssd_netgroup.py | 1 +
 1 file changed, 1 insertion(+)

diff --git a/src/tests/intg/sssd_netgroup.py b/src/tests/intg/sssd_netgroup.py
index 162c5aac8..4d1d5e2f4 100644
--- a/src/tests/intg/sssd_netgroup.py
+++ b/src/tests/intg/sssd_netgroup.py
@@ -47,6 +47,7 @@ class Idx(Union):
 class NameList(Structure):
     pass
 
+
 NameList._fields_ = [("next", POINTER(NameList)),
                      ("name", POINTER(c_char))]
 

From 257c69ae2f5f691ade8686ce8cbc2bd317c082b9 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Wed, 13 Sep 2017 15:27:48 +0200
Subject: [PATCH 12/14] Revert "intg: Disable add_remove tests"
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

This reverts commit a24e735d33b788fec32acba70f30709eff44ebdf as it
introduced some pep8 warnings, which would need another patch to fix
those instead of just reverting this one.

So, let's get everything back to what it was before so we can disable
the tests in a way that we do not introduce pep8 issues and, later on,
just revert a single patch enabling the tests again.

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 src/tests/intg/test_enumeration.py | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/src/tests/intg/test_enumeration.py b/src/tests/intg/test_enumeration.py
index fdb8d3768..47772dea2 100644
--- a/src/tests/intg/test_enumeration.py
+++ b/src/tests/intg/test_enumeration.py
@@ -403,7 +403,7 @@ def user_and_groups_rfc2307_bis(request, ldap_conn):
     return None
 
 
-def _test_add_remove_user(ldap_conn, blank_rfc2307):
+def test_add_remove_user(ldap_conn, blank_rfc2307):
     """Test user addition and removal are reflected by SSSD"""
     e = ldap_ent.user(ldap_conn.ds_inst.base_dn, "user", 2001, 2000)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -418,7 +418,7 @@ def _test_add_remove_user(ldap_conn, blank_rfc2307):
     ent.assert_passwd(ent.contains_only())
 
 
-def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
+def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
     """Test RFC2307 group addition and removal are reflected by SSSD"""
     e = ldap_ent.group(ldap_conn.ds_inst.base_dn, "group", 2001)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -433,7 +433,7 @@ def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
     ent.assert_group(ent.contains_only())
 
 
-def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
+def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
     """Test RFC2307bis group addition and removal are reflected by SSSD"""
     e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group", 2001)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -448,7 +448,7 @@ def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
     ent.assert_group(ent.contains_only())
 
 
-def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
+def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
     """Test user membership addition and removal are reflected by SSSD"""
     time.sleep(INTERACTIVE_TIMEOUT/2)
     # Add user to group
@@ -464,7 +464,7 @@ def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
     ent.assert_group_by_name("group", dict(mem=ent.contains_only()))
 
 
-def _test_add_remove_membership_rfc2307_bis(ldap_conn,
+def test_add_remove_membership_rfc2307_bis(ldap_conn,
                                            user_and_groups_rfc2307_bis):
     """
     Test user and group membership addition and removal are reflected by SSSD,

From f6ad9ec5827c902d3d264d16920d2f5387200dfb Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lsleb...@redhat.com>
Date: Wed, 13 Sep 2017 15:31:09 +0200
Subject: [PATCH 13/14] intg: Disable add_remove tests

add_remove fails quite often in enumeration test. The reason of failures
is not obvious and will take some time to investigate it.
Failures blocks testing of other patches therefore its better to disable
tests. (pytest run functions/methods which start with "test")

Temporary workaround for:
https://pagure.io/SSSD/sssd/issue/3463
---
 src/tests/intg/test_enumeration.py | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/src/tests/intg/test_enumeration.py b/src/tests/intg/test_enumeration.py
index 47772dea2..54d10f8bf 100644
--- a/src/tests/intg/test_enumeration.py
+++ b/src/tests/intg/test_enumeration.py
@@ -403,7 +403,7 @@ def user_and_groups_rfc2307_bis(request, ldap_conn):
     return None
 
 
-def test_add_remove_user(ldap_conn, blank_rfc2307):
+def _test_add_remove_user(ldap_conn, blank_rfc2307):
     """Test user addition and removal are reflected by SSSD"""
     e = ldap_ent.user(ldap_conn.ds_inst.base_dn, "user", 2001, 2000)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -418,7 +418,7 @@ def test_add_remove_user(ldap_conn, blank_rfc2307):
     ent.assert_passwd(ent.contains_only())
 
 
-def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
+def _test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
     """Test RFC2307 group addition and removal are reflected by SSSD"""
     e = ldap_ent.group(ldap_conn.ds_inst.base_dn, "group", 2001)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -433,7 +433,7 @@ def test_add_remove_group_rfc2307(ldap_conn, blank_rfc2307):
     ent.assert_group(ent.contains_only())
 
 
-def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
+def _test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
     """Test RFC2307bis group addition and removal are reflected by SSSD"""
     e = ldap_ent.group_bis(ldap_conn.ds_inst.base_dn, "group", 2001)
     time.sleep(INTERACTIVE_TIMEOUT/2)
@@ -448,7 +448,7 @@ def test_add_remove_group_rfc2307_bis(ldap_conn, blank_rfc2307_bis):
     ent.assert_group(ent.contains_only())
 
 
-def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
+def _test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
     """Test user membership addition and removal are reflected by SSSD"""
     time.sleep(INTERACTIVE_TIMEOUT/2)
     # Add user to group
@@ -464,8 +464,8 @@ def test_add_remove_membership_rfc2307(ldap_conn, user_and_group_rfc2307):
     ent.assert_group_by_name("group", dict(mem=ent.contains_only()))
 
 
-def test_add_remove_membership_rfc2307_bis(ldap_conn,
-                                           user_and_groups_rfc2307_bis):
+def _test_add_remove_membership_rfc2307_bis(ldap_conn,
+                                            user_and_groups_rfc2307_bis):
     """
     Test user and group membership addition and removal are reflected by SSSD,
     with RFC2307bis schema

From 99744fab321333478fc9fec6895446dff427c673 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fiden...@redhat.com>
Date: Sat, 9 Sep 2017 20:08:52 +0200
Subject: [PATCH 14/14] CI: Enable pep8 check
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

CI can now check pep8 issues for all .py files but the ones under
src/config (for those, there's an issue already filed[0]).

[0]: https://pagure.io/SSSD/sssd/issue/3514

Signed-off-by: Fabiano Fidêncio <fiden...@redhat.com>
---
 contrib/ci/deps.sh | 2 ++
 contrib/ci/run     | 2 ++
 2 files changed, 4 insertions(+)

diff --git a/contrib/ci/deps.sh b/contrib/ci/deps.sh
index 4467e117c..80f307606 100644
--- a/contrib/ci/deps.sh
+++ b/contrib/ci/deps.sh
@@ -49,6 +49,7 @@ if [[ "$DISTRO_BRANCH" == -redhat-* ]]; then
         curl-devel
         krb5-server
         krb5-workstation
+        python-pep8
     )
     _DEPS_LIST_SPEC=`
         sed -e 's/@PACKAGE_VERSION@/0/g' \
@@ -128,6 +129,7 @@ if [[ "$DISTRO_BRANCH" == -debian-* ]]; then
         krb5-admin-server
         krb5-user
         uuid-dev
+        pep8
     )
     DEPS_INTGCHECK_SATISFIED=true
 fi
diff --git a/contrib/ci/run b/contrib/ci/run
index aa6d35abe..0bc84c032 100755
--- a/contrib/ci/run
+++ b/contrib/ci/run
@@ -378,6 +378,8 @@ export V=1
 if "$DEPS"; then
     stage install-deps  deps_install
 fi
+stage pep8          find . -path ./src/config -prune -o \
+                           -name \*.py -exec pep8 {} +
 stage autoreconf    autoreconf --install --force
 run_build debug     build_debug
 if "$RIGOROUS"; then
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to