lst = tg.tasks
for task in lst:
try:
- cmd = task.last_cmd
+ task.last_cmd
except AttributeError:
continue
if isinstance(task, task_classes):
dns_conn = dnsserver.dnsserver(binding_str, lp, creds)
print("querying a NS record")
- res = dns_conn.DnssrvEnumRecords2(0x00070000,
- 0,
- server,
- dnszone,
- newname,
- None,
- dnsp.DNS_TYPE_NS,
- 0x0f,
- None,
- None)
+ dns_conn.DnssrvEnumRecords2(0x00070000,
+ 0,
+ server,
+ dnszone,
+ newname,
+ None,
+ dnsp.DNS_TYPE_NS,
+ 0x0f,
+ None,
+ None)
print("adding a NS glue record")
name = dnsserver.DNS_RPC_NAME()
addrecbuf = dnsserver.DNS_RPC_RECORD_BUF()
addrecbuf.rec = addrec
- res = dns_conn.DnssrvUpdateRecord2(0x00070000,
- 0,
- server,
- dnszone,
- newname,
- addrecbuf,
- None)
+ dns_conn.DnssrvUpdateRecord2(0x00070000,
+ 0,
+ server,
+ dnszone,
+ newname,
+ addrecbuf,
+ None)
print("querying the NS record")
- res = dns_conn.DnssrvEnumRecords2(0x00070000,
- 0,
- server,
- dnszone,
- newname,
- None,
- dnsp.DNS_TYPE_NS,
- 0x0f,
- None,
- None)
+ dns_conn.DnssrvEnumRecords2(0x00070000,
+ 0,
+ server,
+ dnszone,
+ newname,
+ None,
+ dnsp.DNS_TYPE_NS,
+ 0x0f,
+ None,
+ None)
fault_setup = _glue.fault_setup
set_debug_level = _glue.set_debug_level
get_debug_level = _glue.get_debug_level
-unix2nttime = _glue.unix2nttime
float2nttime = _glue.float2nttime
nttime2float = _glue.nttime2float
nttime2string = _glue.nttime2string
zone_create_info.fLoadExisting = 1
zone_create_info.dwDpFlags = dnsserver.DNS_DP_DOMAIN_DEFAULT
- res = dns_conn.DnssrvOperation2(client_version, 0, server, None,
- 0, 'ZoneCreate', typeid,
- zone_create_info)
+ dns_conn.DnssrvOperation2(client_version, 0, server, None,
+ 0, 'ZoneCreate', typeid,
+ zone_create_info)
typeid = dnsserver.DNSSRV_TYPEID_NAME_AND_PARAM
name_and_param = dnsserver.DNS_RPC_NAME_AND_PARAM()
name_and_param.dwParam = dnsp.DNS_ZONE_UPDATE_SECURE
try:
- res = dns_conn.DnssrvOperation2(client_version, 0, server, zone,
- 0, 'ResetDwordProperty', typeid,
- name_and_param)
+ dns_conn.DnssrvOperation2(client_version, 0, server, zone,
+ 0, 'ResetDwordProperty', typeid,
+ name_and_param)
except WERRORError as e:
if e.args[0] == werror.WERR_DNS_ERROR_ZONE_ALREADY_EXISTS:
self.outf.write('Zone already exists.')
# Check if valid GPO DN
try:
- msg = get_gpo_info(self.samdb, gpo=gpo)[0]
+ get_gpo_info(self.samdb, gpo=gpo)[0]
except Exception:
raise CommandError("GPO '%s' does not exist" % gpo)
gpo_dn = str(get_gpo_dn(self.samdb, gpo))
continue
# Attribute values that are list that contain DN based values that may differ
elif x.upper() in self.dn_attributes:
- m = p
- n = q
- if not p and not q:
- m = self.attributes[x]
- n = other.attributes[x]
+ m = self.attributes[x]
+ n = other.attributes[x]
p = [self.fix_dn(j) for j in m]
q = [other.fix_dn(j) for j in n]
if p == q:
try:
import hashlib
- h = hashlib.sha1()
- h = None
+ hashlib.sha1()
virtual_attributes["virtualSSHA"] = {
}
except ImportError as e:
for (alg, attr) in [("5", "virtualCryptSHA256"), ("6", "virtualCryptSHA512")]:
try:
import crypt
- v = get_crypt_value(alg, "")
- v = None
+ get_crypt_value(alg, "")
virtual_attributes[attr] = {
}
except ImportError as e:
for s in msg['uPNSuffixes']:
upn_suffixes.append(str(s).lower())
- upn_suffix = upn.split('@')[-1].lower()
upn_split = upn.split('@')
if (len(upn_split) < 2):
return False
"SECDESC": b64encode(descriptor).decode('utf8')
})
- domainzone_guid = get_domainguid(samdb, domainzone_dn)
domainzone_guid = str(uuid.uuid4())
domainzone_dns = ldb.Dn(samdb, domainzone_dn).canonical_ex_str().strip()
})
if fill_level != FILL_SUBDOMAIN:
- forestzone_guid = get_domainguid(samdb, forestzone_dn)
forestzone_guid = str(uuid.uuid4())
forestzone_dns = ldb.Dn(samdb, forestzone_dn).canonical_ex_str().strip()
user_dn = res[0].dn
userAccountControl = int(res[0]["userAccountControl"][0])
- accountExpires = int(res[0]["accountExpires"][0])
if no_expiry_req:
userAccountControl = userAccountControl | 0x10000
accountExpires = 0
for entry in listMissing:
reference = newsecrets_ldb.search(expression="distinguishedName=%s" % entry,
base="", scope=SCOPE_SUBTREE)
- current = secrets_ldb.search(expression="distinguishedName=%s" % entry,
- base="", scope=SCOPE_SUBTREE)
delta = secrets_ldb.msg_diff(empty, reference[0])
for att in hashAttrNotCopied:
delta.remove(att)
rfile = open(opts.use_file, 'r+')
except IOError:
# Perhaps create it
- rfile = open(opts.use_file, 'w+')
+ open(opts.use_file, 'w+')
# Open it for reading again, in case someone else got to it first
rfile = open(opts.use_file, 'r+')
fcntl.lockf(rfile, fcntl.LOCK_EX)
cfile = open(dns_update_cache, 'r+')
except IOError:
# Perhaps create it
- cfile = open(dns_update_cache, 'w+')
+ open(dns_update_cache, 'w+')
# Open it for reading again, in case someone else got to it first
cfile = open(dns_update_cache, 'r+')
fcntl.lockf(cfile, fcntl.LOCK_EX)
(msgs, ctrls) = remote_ldb.searchex(expression="(samaccountname=*)", base=base, attrs=["objectClass"], controls=controls)
if (len(ctrls)):
for ctl in ctrls:
- cookie = printdirsync(ctl)
+ printdirsync(ctl)
print("Returned %d entries" % len(msgs))
cookie = savedcookie