Changeset 988 for vendor/current/source4/setup
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- Location:
- vendor/current/source4/setup
- Files:
-
- 13 added
- 9 deleted
- 25 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source4/setup/cn=samba.ldif
r414 r988 3 3 objectClass: container 4 4 cn: Samba 5 structuralObjectClass: container 6 entryUUID: b1d4823a-e58c-102c-9f74-51b6d59a1b68 7 creatorsName: 8 createTimestamp: 20080714010529Z 9 entryCSN: 20080714010529.194412Z#000000#000#000000 10 modifiersName: 11 modifyTimestamp: 20080714010529Z 5 6 dn: cn=samba-admin,cn=samba 7 objectClass: top 8 objectClass: person 9 cn: samba-admin 10 userPassword: ${LDAPADMINPASS} 11 12 ${MMR}dn: cn=replicator,cn=samba 13 ${MMR}objectClass: top 14 ${MMR}objectClass: person 15 ${MMR}cn: replicator 16 ${MMR}userPassword: ${MMR_PASSWORD} -
vendor/current/source4/setup/dns_update_list
r740 r988 1 1 # this is a list of DNS entries which will be put into DNS using 2 2 # dynamic DNS update. It is processed by the samba_dnsupdate script 3 A ${DNSDOMAIN} $IP 4 A ${HOSTNAME} $IP 5 CNAME ${NTDSGUID}._msdcs.${DNSDOMAIN} ${HOSTNAME} 6 SRV _kerberos._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 88 7 SRV _ldap._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 8 SRV _kerberos._tcp.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 88 9 SRV _ldap._tcp.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 10 SRV _ldap._tcp.${DOMAINGUID}.domains._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 11 SRV _ldap._tcp.${SITE}._sites.gc._msdcs.${DNSDOMAIN} ${HOSTNAME} 3268 12 SRV _ldap._tcp.gc._msdcs.${DNSDOMAIN} ${HOSTNAME} 3268 13 SRV _ldap._tcp.pdc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 14 SRV _gc._tcp.${SITE}._sites.${DNSDOMAIN} ${HOSTNAME} 3268 15 SRV _kerberos._tcp.${SITE}._sites.${DNSDOMAIN} ${HOSTNAME} 88 16 SRV _ldap._tcp.${SITE}._sites.${DNSDOMAIN} ${HOSTNAME} 389 17 SRV _gc._tcp.${DNSDOMAIN} ${HOSTNAME} 3268 18 SRV _kerberos._tcp.${DNSDOMAIN} ${HOSTNAME} 88 19 SRV _kpasswd._tcp.${DNSDOMAIN} ${HOSTNAME} 464 20 SRV _ldap._tcp.${DNSDOMAIN} ${HOSTNAME} 389 21 SRV _kerberos._udp.${DNSDOMAIN} ${HOSTNAME} 88 22 SRV _kpasswd._udp.${DNSDOMAIN} ${HOSTNAME} 464 3 A ${HOSTNAME} $IP 4 AAAA ${HOSTNAME} $IP 5 6 # RW domain controller 7 ${IF_RWDC}A ${DNSDOMAIN} $IP 8 ${IF_RWDC}AAAA ${DNSDOMAIN} $IP 9 ${IF_RWDC}SRV _ldap._tcp.${DNSDOMAIN} ${HOSTNAME} 389 10 ${IF_RWDC}SRV _ldap._tcp.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 11 ${IF_RWDC}SRV _ldap._tcp.${DOMAINGUID}.domains._msdcs.${DNSFOREST} ${HOSTNAME} 389 12 ${IF_RWDC}SRV _kerberos._tcp.${DNSDOMAIN} ${HOSTNAME} 88 13 ${IF_RWDC}SRV _kerberos._udp.${DNSDOMAIN} ${HOSTNAME} 88 14 ${IF_RWDC}SRV _kerberos._tcp.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 88 15 ${IF_RWDC}SRV _kpasswd._tcp.${DNSDOMAIN} ${HOSTNAME} 464 16 ${IF_RWDC}SRV _kpasswd._udp.${DNSDOMAIN} ${HOSTNAME} 464 17 # RW and RO domain controller 18 ${IF_DC}CNAME ${NTDSGUID}._msdcs.${DNSFOREST} ${HOSTNAME} 19 ${IF_DC}SRV _ldap._tcp.${SITE}._sites.${DNSDOMAIN} ${HOSTNAME} 389 20 ${IF_DC}SRV _ldap._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 21 ${IF_DC}SRV _kerberos._tcp.${SITE}._sites.${DNSDOMAIN} ${HOSTNAME} 88 22 ${IF_DC}SRV _kerberos._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN} ${HOSTNAME} 88 23 24 # The PDC emulator 25 ${IF_PDC}SRV _ldap._tcp.pdc._msdcs.${DNSDOMAIN} ${HOSTNAME} 389 26 27 # RW GC servers 28 ${IF_RWGC}A gc._msdcs.${DNSFOREST} $IP 29 ${IF_RWGC}AAAA gc._msdcs.${DNSFOREST} $IP 30 ${IF_RWGC}SRV _gc._tcp.${DNSFOREST} ${HOSTNAME} 3268 31 ${IF_RWGC}SRV _ldap._tcp.gc._msdcs.${DNSFOREST} ${HOSTNAME} 3268 32 # RW and RO GC servers 33 ${IF_GC}SRV _gc._tcp.${SITE}._sites.${DNSFOREST} ${HOSTNAME} 3268 34 ${IF_GC}SRV _ldap._tcp.${SITE}._sites.gc._msdcs.${DNSFOREST} ${HOSTNAME} 3268 35 36 # RW DNS servers 37 ${IF_RWDNS_DOMAIN}A DomainDnsZones.${DNSDOMAIN} $IP 38 ${IF_RWDNS_DOMAIN}AAAA DomainDnsZones.${DNSDOMAIN} $IP 39 ${IF_RWDNS_DOMAIN}SRV _ldap._tcp.DomainDnsZones.${DNSDOMAIN} ${HOSTNAME} 389 40 # RW and RO DNS servers 41 ${IF_DNS_DOMAIN}SRV _ldap._tcp.${SITE}._sites.DomainDnsZones.${DNSDOMAIN} ${HOSTNAME} 389 42 43 # RW DNS servers 44 ${IF_RWDNS_FOREST}A ForestDnsZones.${DNSFOREST} $IP 45 ${IF_RWDNS_FOREST}AAAA ForestDnsZones.${DNSFOREST} $IP 46 ${IF_RWDNS_FOREST}SRV _ldap._tcp.ForestDnsZones.${DNSFOREST} ${HOSTNAME} 389 47 # RW and RO DNS servers 48 ${IF_DNS_FOREST}SRV _ldap._tcp.${SITE}._sites.ForestDnsZones.${DNSFOREST} ${HOSTNAME} 389 49 -
vendor/current/source4/setup/named.conf
r740 r988 33 33 # Note that the reverse zone file is not created during the provision process. 34 34 35 # The most recent BIND versions (9. 7.2or later) support secure GSS-TSIG35 # The most recent BIND versions (9.8 or later) support secure GSS-TSIG 36 36 # updates. If you are running an earlier version of BIND, or if you do not wish 37 37 # to use secure GSS-TSIG updates, you may remove the update-policy sections in -
vendor/current/source4/setup/named.txt
r414 r988 1 1 # Additional informations for DNS setup using BIND 2 2 3 # If you are running a capable version of BIND and you wish to support secure 4 # GSS-TSIG updates, you must make the following configuration changes: 3 # If you are running a capable version of BIND and you wish to support 4 # secure GSS-TSIG updates, you must make the following configuration 5 # changes: 5 6 6 # - Insert the following lines into the options {} section of your named.conf 7 # file: 8 tkey-gssapi-credential "DNS/${DNSDOMAIN}"; 9 tkey-domain "${REALM}"; 7 # 8 # Steps for BIND 9.8.x and 9.9.x ----------------------------------------- 9 # 10 10 11 # - Modify BIND init scripts to pass the location of the generated keytab file. 12 # Fedora 8 & later provide a variable named KEYTAB_FILE in /etc/sysconfig/named 13 # for this purpose: 14 KEYTAB_FILE="${DNS_KEYTAB_ABS}" 15 # Note that the Fedora scripts translate KEYTAB_FILE behind the scenes into a 16 # variable named KRB5_KTNAME, which is ultimately passed to the BIND daemon. If 17 # your distribution does not provide a variable like KEYTAB_FILE to pass a 18 # keytab file to the BIND daemon, a workaround is to place the following line in 19 # BIND's sysconfig file or in the init script for BIND: 20 export KRB5_KTNAME="${DNS_KEYTAB_ABS}" 11 # 1. Insert following lines into the options {} section of your named.conf 12 # file: 13 tkey-gssapi-keytab "${DNS_KEYTAB_ABS}"; 21 14 22 # - Set appropriate ownership and permissions on the ${DNS_KEYTAB} file. Note 23 # that most distributions have BIND configured to run under a non-root user 24 # account. For example, Fedora 9 runs BIND as the user "named" once the daemon 25 # relinquishes its rights. Therefore, the file ${DNS_KEYTAB} must be readable 26 # by the user that BIND run as. If BIND is running as a non-root user, the 27 # "${DNS_KEYTAB}" file must have its permissions altered to allow the daemon to 28 # read it. Under Fedora 9, execute the following commands: 29 chgrp named ${DNS_KEYTAB_ABS} 30 chmod g+r ${DNS_KEYTAB_ABS} 15 # 2. If SELinux is enabled, ensure that all files have the appropriate 16 # SELinux file contexts. The ${DNS_KEYTAB} file must be accessible by the 17 # BIND daemon and should have a SELinux type of named_conf_t. This can be 18 # set with the following command: 19 chcon -t named_conf_t ${DNS_KEYTAB_ABS} 31 20 32 # - Ensure the BIND zone file(s) that will be dynamically updated are in a 33 # directory where the BIND daemon can write. When BIND performs dynamic 34 # updates, it not only needs to update the zone file itself but it must also 35 # create a journal (.jnl) file to track the dynamic updates as they occur. 36 # Under Fedora 9, the /var/named directory can not be written to by the "named" 37 # user. However, the directory /var/named/dynamic directory does provide write 38 # access. Therefore the zone files were placed under the /var/named/dynamic 39 # directory. The file directives in both example zone statements at the 40 # beginning of this file were changed by prepending the directory "dynamic/". 21 # Even if not using SELinux, do confirm (only) BIND can access this file as the 22 # user it becomes (generally not root). 41 23 42 # - If SELinux is enabled, ensure that all files have the appropriate SELinux 43 # file contexts. The ${DNS_KEYTAB} file must be accessible by the BIND daemon 44 # and should have a SELinux type of named_conf_t. This can be set with the 45 # following command: 46 chcon -t named_conf_t ${DNS_KEYTAB_ABS} 24 # 25 # Steps for BIND 9.x.x using BIND9_DLZ ------------------------------ 26 # 27 28 # 3. Disable chroot support in BIND. 29 # BIND is often configured to run in a chroot, but this is not 30 # compatible with access to the dns/sam.ldb files that database 31 # access and updates require. Additionally, the DLZ plugin is 32 # linked to a large number of Samba shared libraries and loads 33 # additonal plugins. 34 35 # 36 # Steps for BIND 9.x.x using BIND9_FLATFILE ------------------------------ 37 # 38 39 # 3. Ensure the BIND zone file(s) that will be dynamically updated are in 40 # a directory where the BIND daemon can write. When BIND performs 41 # dynamic updates, it not only needs to update the zone file itself but 42 # it must also create a journal (.jnl) file to track the dynamic updates 43 # as they occur. Under Fedora 9, the /var/named directory can not be 44 # written to by the "named" user. However, the directory /var/named/dynamic 45 # directory does provide write access. Therefore the zone files were 46 # placed under the /var/named/dynamic directory. The file directives in 47 # both example zone statements at the beginning of this file were changed 48 # by prepending the directory "dynamic/". 49 -
vendor/current/source4/setup/provision.ldif
r740 r988 25 25 systemFlags: -1946157056 26 26 uASCompat: 1 27 nTSecurityDescriptor:: ${BUILTIN_DESCRIPTOR} 27 28 28 29 dn: CN=Deleted Objects,${DOMAINDN} … … 46 47 showInAdvancedViewOnly: FALSE 47 48 gPLink: [LDAP://CN={${POLICYGUID_DC}},CN=Policies,CN=System,${DOMAINDN};0] 49 nTSecurityDescriptor:: ${DOMAIN_CONTROLLERS_DESCRIPTOR} 48 50 49 51 # Joined DC located in "provision_self_join.ldif" … … 64 66 systemFlags: -1946157056 65 67 isCriticalSystemObject: TRUE 68 nTSecurityDescriptor:: ${INFRASTRUCTURE_DESCRIPTOR} 66 69 67 70 dn: CN=LostAndFound,${DOMAINDN} … … 71 74 systemFlags: -1946157056 72 75 isCriticalSystemObject: TRUE 76 nTSecurityDescriptor:: ${LOSTANDFOUND_DESCRIPTOR} 73 77 74 78 dn: CN=NTDS Quotas,${DOMAINDN} … … 96 100 systemFlags: -1946157056 97 101 isCriticalSystemObject: TRUE 102 nTSecurityDescriptor:: ${SYSTEM_DESCRIPTOR} 98 103 99 104 dn: CN=AdminSDHolder,CN=System,${DOMAINDN} -
vendor/current/source4/setup/provision_basedn_modify.ldif
r740 r988 83 83 pwdHistoryLength: 24 84 84 - 85 replace: rIDManagerReference86 rIDManagerReference: CN=RID Manager$,CN=System,${DOMAINDN}87 -88 85 replace: serverState 89 86 serverState: 1 90 -91 replace: subRefs92 subRefs: ${CONFIGDN}93 87 - 94 88 replace: systemFlags -
vendor/current/source4/setup/provision_computers_add.ldif
r414 r988 2 2 objectClass: top 3 3 objectClass: container 4 nTSecurityDescriptor:: ${COMPUTERS_DESCRIPTOR} -
vendor/current/source4/setup/provision_configuration.ldif
r740 r988 22 22 objectClass: container 23 23 systemFlags: -2147483648 24 nTSecurityDescriptor:: ${EXTENDEDRIGHTS_DESCRIPTOR} 24 25 25 26 dn: CN=Change-Rid-Master,CN=Extended-Rights,${CONFIGDN} … … 707 708 objectClass: top 708 709 objectClass: container 710 nTSecurityDescriptor:: ${FORESTUPDATES_DESCRIPTOR} 709 711 710 712 dn: CN=ActiveDirectoryRodcUpdate,CN=ForestUpdates,${CONFIGDN} … … 1002 1004 objectClass: lostAndFound 1003 1005 systemFlags: -2147483648 1006 nTSecurityDescriptor:: ${LOSTANDFOUND_DESCRIPTOR} 1004 1007 1005 1008 dn: CN=NTDS Quotas,${CONFIGDN} … … 1010 1013 msDS-TombstoneQuotaFactor: 100 1011 1014 systemFlags: -2147483648 1015 nTSecurityDescriptor:: ${NTDSQUOTAS_DESCRIPTOR} 1012 1016 1013 1017 # Partitions … … 1019 1023 msDS-Behavior-Version: ${FOREST_FUNCTIONALITY} 1020 1024 showInAdvancedViewOnly: TRUE 1021 1022 # Partitions for DNS are missing since we don't support AD DNS 1025 nTSecurityDescriptor:: ${PARTITIONS_DESCRIPTOR} 1026 1027 # Partitions for DNS are missing here, they are added from provision_dnszones.ldif 1023 1028 1024 1029 dn: CN=Enterprise Configuration,CN=Partitions,${CONFIGDN} … … 1053 1058 objectClass: physicalLocation 1054 1059 l: Physical Locations tree root 1060 nTSecurityDescriptor:: ${PHYSICALLOCATIONS_DESCRIPTOR} 1055 1061 1056 1062 # Schema located in "ad-schema/*.txt" … … 1062 1068 objectClass: container 1063 1069 systemFlags: -2147483648 1070 nTSecurityDescriptor:: ${SERVICES_DESCRIPTOR} 1064 1071 1065 1072 dn: CN=MsmqServices,CN=Services,${CONFIGDN} … … 1195 1202 objectClass: sitesContainer 1196 1203 systemFlags: -2113929216 1197 n TSecurityDescriptor:: ${SITES_DESCRIPTOR}1204 ntSecurityDescriptor:: ${SITES_DESCRIPTOR} 1198 1205 1199 1206 dn: CN=${DEFAULTSITE},CN=Sites,${CONFIGDN} -
vendor/current/source4/setup/provision_init.ldif
r740 r988 18 18 passwordAttribute: initialAuthOutgoing 19 19 passwordAttribute: initialAuthIncoming 20 passwordAttribute: pekList 21 passwordAttribute: msDS-ExecuteScriptPassword 20 22 21 23 dn: @OPTIONS 22 24 checkBaseOnSearch: TRUE 25 disallowDNFilter: TRUE 23 26 24 27 dn: @SAMBA_DSDB -
vendor/current/source4/setup/provision_rootdse_modify.ldif
r414 r988 4 4 replace: isSynchronized 5 5 isSynchronized: TRUE 6 replace: dsServiceName 7 dsServiceName: <GUID=${NTDSGUID}> -
vendor/current/source4/setup/provision_self_join.ldif
r740 r988 22 22 objectSid: ${DOMAINSID}-${DCRID} 23 23 24 # Here are missing the objects for the NTFRS subscription since we don't 25 # support this technique yet. 26 27 # Objects under "Configuration/Sites/<Default sitename>/Servers" 28 29 dn: ${SERVERDN} 30 objectClass: top 31 objectClass: server 32 systemFlags: 1375731712 33 dNSHostName: ${DNSNAME} 34 serverReference: CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN} 35 36 dn: CN=NTDS Settings,${SERVERDN} 37 objectClass: top 38 objectClass: applicationSettings 39 objectClass: nTDSDSA 40 dMDLocation: ${SCHEMADN} 41 hasMasterNCs: ${CONFIGDN} 42 hasMasterNCs: ${SCHEMADN} 43 hasMasterNCs: ${DOMAINDN} 44 invocationId: ${INVOCATIONID} 45 msDS-Behavior-Version: ${DOMAIN_CONTROLLER_FUNCTIONALITY} 46 msDS-HasDomainNCs: ${DOMAINDN} 47 # "msDS-HasInstantiatedNCs"s for DNS don't exist since we don't support AD DNS 48 msDS-HasInstantiatedNCs: B:8:0000000D:${CONFIGDN} 49 msDS-HasInstantiatedNCs: B:8:0000000D:${SCHEMADN} 50 msDS-HasInstantiatedNCs: B:8:00000005:${DOMAINDN} 51 # "msDS-hasMasterNCs"s for DNS don't exist since we don't support AD DNS 52 msDS-hasMasterNCs: ${CONFIGDN} 53 msDS-hasMasterNCs: ${SCHEMADN} 54 msDS-hasMasterNCs: ${DOMAINDN} 55 options: 1 56 systemFlags: 33554432 57 ${NTDSGUID} 24 dn: CN=RID Set,CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN} 25 objectClass: rIDSet 26 rIDAllocationPool: ${RIDALLOCATIONSTART}-${RIDALLOCATIONEND} 27 rIDPreviousAllocationPool: ${RIDALLOCATIONSTART}-${RIDALLOCATIONEND} 28 rIDUsedPool: 0 29 rIDNextRID: ${RIDALLOCATIONSTART} -
vendor/current/source4/setup/provision_self_join_modify.ldif
r740 r988 3 3 replace: fSMORoleOwner 4 4 fSMORoleOwner: CN=NTDS Settings,${SERVERDN} 5 6 dn: ${SCHEMADN} 7 changetype: modify 8 replace: fSMORoleOwner 9 fSMORoleOwner: CN=NTDS Settings,${SERVERDN} 5 replace: rIDManagerReference 6 rIDManagerReference: CN=RID Manager$,CN=System,${DOMAINDN} 10 7 11 8 dn: CN=Infrastructure,${DOMAINDN} … … 19 16 fSMORoleOwner: CN=NTDS Settings,${SERVERDN} 20 17 21 dn: CN=Partitions,${CONFIGDN}22 changetype: modify23 replace: fSMORoleOwner24 fSMORoleOwner: CN=NTDS Settings,${SERVERDN}25 26 dn: CN=NTDS Site Settings,CN=${DEFAULTSITE},CN=Sites,${CONFIGDN}27 changetype: modify28 replace: interSiteTopologyGenerator29 interSiteTopologyGenerator: CN=NTDS Settings,${SERVERDN}30 31 dn: CN=RID Set,CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN}32 changetype: add33 objectClass: rIDSet34 rIDAllocationPool: ${RIDALLOCATIONSTART}-${RIDALLOCATIONEND}35 rIDPreviousAllocationPool: ${RIDALLOCATIONSTART}-${RIDALLOCATIONEND}36 rIDUsedPool: 037 rIDNextRID: ${RIDALLOCATIONSTART}38 39 18 dn: CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN} 40 19 changetype: modify 41 20 add: rIDSetReferences 42 21 rIDSetReferences: CN=RID Set,CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN} 22 23 dn: ${SERVERDN} 24 changetype: modify 25 add: serverReference 26 serverReference: CN=${NETBIOSNAME},OU=Domain Controllers,${DOMAINDN} -
vendor/current/source4/setup/provision_users.ldif
r740 r988 433 433 isCriticalSystemObject: TRUE 434 434 435 # Add well known security principals436 437 dn: CN=WellKnown Security Principals,${CONFIGDN}438 objectClass: top439 objectClass: container440 systemFlags: -2147483648441 442 dn: CN=Anonymous Logon,CN=WellKnown Security Principals,${CONFIGDN}443 objectClass: top444 objectClass: foreignSecurityPrincipal445 objectSid: S-1-5-7446 447 dn: CN=Authenticated Users,CN=WellKnown Security Principals,${CONFIGDN}448 objectClass: top449 objectClass: foreignSecurityPrincipal450 objectSid: S-1-5-11451 452 dn: CN=Batch,CN=WellKnown Security Principals,${CONFIGDN}453 objectClass: top454 objectClass: foreignSecurityPrincipal455 objectSid: S-1-5-3456 457 dn: CN=Creator Group,CN=WellKnown Security Principals,${CONFIGDN}458 objectClass: top459 objectClass: foreignSecurityPrincipal460 objectSid: S-1-3-1461 462 dn: CN=Creator Owner,CN=WellKnown Security Principals,${CONFIGDN}463 objectClass: top464 objectClass: foreignSecurityPrincipal465 objectSid: S-1-3-0466 467 dn: CN=Dialup,CN=WellKnown Security Principals,${CONFIGDN}468 objectClass: top469 objectClass: foreignSecurityPrincipal470 objectSid: S-1-5-1471 472 dn: CN=Digest Authentication,CN=WellKnown Security Principals,${CONFIGDN}473 objectClass: top474 objectClass: foreignSecurityPrincipal475 objectSid: S-1-5-64-21476 477 dn: CN=Enterprise Domain Controllers,CN=WellKnown Security Principals,${CONFIGDN}478 objectClass: top479 objectClass: foreignSecurityPrincipal480 objectSid: S-1-5-9481 482 dn: CN=Everyone,CN=WellKnown Security Principals,${CONFIGDN}483 objectClass: top484 objectClass: foreignSecurityPrincipal485 objectSid: S-1-1-0486 487 dn: CN=Interactive,CN=WellKnown Security Principals,${CONFIGDN}488 objectClass: top489 objectClass: foreignSecurityPrincipal490 objectSid: S-1-5-4491 492 dn: CN=IUSR,CN=WellKnown Security Principals,${CONFIGDN}493 objectClass: top494 objectClass: foreignSecurityPrincipal495 objectSid: S-1-5-17496 497 dn: CN=Local Service,CN=WellKnown Security Principals,${CONFIGDN}498 objectClass: top499 objectClass: foreignSecurityPrincipal500 objectSid: S-1-5-19501 502 dn: CN=Network,CN=WellKnown Security Principals,${CONFIGDN}503 objectClass: top504 objectClass: foreignSecurityPrincipal505 objectSid: S-1-5-2506 507 dn: CN=Network Service,CN=WellKnown Security Principals,${CONFIGDN}508 objectClass: top509 objectClass: foreignSecurityPrincipal510 objectSid: S-1-5-20511 512 dn: CN=NTLM Authentication,CN=WellKnown Security Principals,${CONFIGDN}513 objectClass: top514 objectClass: foreignSecurityPrincipal515 objectSid: S-1-5-64-10516 517 dn: CN=Other Organization,CN=WellKnown Security Principals,${CONFIGDN}518 objectClass: top519 objectClass: foreignSecurityPrincipal520 objectSid: S-1-5-1000521 522 dn: CN=Owner Rights,CN=WellKnown Security Principals,${CONFIGDN}523 objectClass: top524 objectClass: foreignSecurityPrincipal525 objectSid: S-1-3-4526 527 dn: CN=Proxy,CN=WellKnown Security Principals,${CONFIGDN}528 objectClass: top529 objectClass: foreignSecurityPrincipal530 objectSid: S-1-5-8531 532 dn: CN=Remote Interactive Logon,CN=WellKnown Security Principals,${CONFIGDN}533 objectClass: top534 objectClass: foreignSecurityPrincipal535 objectSid: S-1-5-14536 537 dn: CN=Restricted,CN=WellKnown Security Principals,${CONFIGDN}538 objectClass: top539 objectClass: foreignSecurityPrincipal540 objectSid: S-1-5-12541 542 dn: CN=SChannel Authentication,CN=WellKnown Security Principals,${CONFIGDN}543 objectClass: top544 objectClass: foreignSecurityPrincipal545 objectSid: S-1-5-64-14546 547 dn: CN=Self,CN=WellKnown Security Principals,${CONFIGDN}548 objectClass: top549 objectClass: foreignSecurityPrincipal550 objectSid: S-1-5-10551 552 dn: CN=Service,CN=WellKnown Security Principals,${CONFIGDN}553 objectClass: top554 objectClass: foreignSecurityPrincipal555 objectSid: S-1-5-6556 557 dn: CN=System,CN=WellKnown Security Principals,${CONFIGDN}558 objectClass: top559 objectClass: foreignSecurityPrincipal560 objectSid: S-1-5-18561 562 dn: CN=Terminal Server User,CN=WellKnown Security Principals,${CONFIGDN}563 objectClass: top564 objectClass: foreignSecurityPrincipal565 objectSid: S-1-5-13566 567 dn: CN=This Organization,CN=WellKnown Security Principals,${CONFIGDN}568 objectClass: top569 objectClass: foreignSecurityPrincipal570 objectSid: S-1-5-15 -
vendor/current/source4/setup/provision_users_add.ldif
r414 r988 2 2 objectClass: top 3 3 objectClass: container 4 nTSecurityDescriptor:: ${USERS_DESCRIPTOR} -
vendor/current/source4/setup/schema_samba4.ldif
r740 r988 12 12 ## 1.3.6.1.4.1.7165.4.4.x - LDB/LDAP Extended Operations 13 13 ### see dsdb/samdb/samdb.h 14 15 ## 1.3.6.1.4.1.7165.4.5.x - ldap extended matches 14 16 15 17 ## 1.3.6.1.4.1.7165.4.255.x - mapped OIDs due to conflicts between AD and standards-track … … 190 192 #Allocated: (not used anymore) DSDB_CONTROL_SEARCH_APPLY_ACCESS 1.3.6.1.4.1.7165.4.3.15 191 193 #Allocated: LDB_CONTROL_PROVISION_OID 1.3.6.1.4.1.7165.4.3.16 194 #Allocated: DSDB_CONTROL_NO_GLOBAL_CATALOG 1.3.6.1.4.1.7165.4.3.17 195 #Allocated: DSDB_CONTROL_PARTIAL_REPLICA 1.3.6.1.4.1.7165.4.3.18 196 #Allocated: DSDB_CONTROL_DBCHECK 1.3.6.1.4.1.7165.4.3.19 197 #Allocated: DSDB_CONTROL_DBCHECK_MODIFY_RO_REPLICA 1.3.6.1.4.1.7165.4.3.19.1 198 #Allocated: DSDB_CONTROL_PASSWORD_BYPASS_LAST_SET_OID 1.3.6.1.4.1.7165.4.3.20 199 #Allocated: DSDB_CONTROL_SEC_DESC_PROPAGATION_OID 1.3.6.1.4.1.7165.4.3.21 200 #Allocated: DSDB_CONTROL_PERMIT_INTERDOMAIN_TRUST_UAC_OID 1.3.6.1.4.1.7165.4.3.23 201 #Allocated: DSDB_CONTROL_RESTORE_TOMBSTONE_OID 1.3.6.1.4.1.7165.4.3.24 202 #Allocated: DSDB_CONTROL_CHANGEREPLMETADATA_RESORT_OID 1.3.6.1.4.1.7165.4.3.25 192 203 193 204 # Extended 1.3.6.1.4.1.7165.4.4.x … … 197 208 #Allocated: DSDB_EXTENDED_CREATE_PARTITION_OID 1.3.6.1.4.1.7165.4.4.4 198 209 #Allocated: DSDB_EXTENDED_ALLOCATE_RID_POOL 1.3.6.1.4.1.7165.4.4.5 210 #Allocated: DSDB_EXTENDED_SCHEMA_UPGRADE_IN_PROGRESS_OID 1.3.6.1.4.1.7165.4.4.6 211 #Allocated: DSDB_EXTENDED_SEC_DESC_PROPAGATION_OID 1.3.6.1.4.1.7165.4.4.7 212 213 214 ############ 215 # ldap extended matches 216 #Allocated: SAMBA_LDAP_MATCH_ALWAYS_FALSE 1.3.6.1.4.1.7165.4.5.1 217 199 218 200 219 #Allocated: (middleName) attributeID: 1.3.6.1.4.1.7165.4.255.1 -
vendor/current/source4/setup/secrets_dns.ldif
r740 r988 5 5 objectClass: kerberosSecret 6 6 realm: ${REALM} 7 s ervicePrincipalName: DNS/${DNSDOMAIN}7 saltPrincipal: dns-${HOSTNAME}@${REALM} 8 8 servicePrincipalName: DNS/${DNSNAME} 9 msDS-KeyVersionNumber: 19 msDS-KeyVersionNumber: ${KEY_VERSION_NUMBER} 10 10 privateKeytab: ${DNS_KEYTAB} 11 11 secret:: ${DNSPASS_B64} -
vendor/current/source4/setup/slapd.conf
r740 r988 29 29 uid=([^,]*),cn=([^,]*),cn=ntlm,cn=auth 30 30 ldap:///cn=samba??one?(cn=\$1) 31 32 authz-regexp 33 gidNumber=.*\\\+uidNumber=${ADMIN_UID},cn=peercred,cn=external,cn=auth 34 cn=samba-admin,cn=samba 31 35 32 36 access to dn.base="" … … 62 66 moduleload syncprov 63 67 64 database ldif68 database mdb 65 69 suffix cn=Samba 66 70 directory ${LDAPDIR}/db/samba … … 82 86 ######################################## 83 87 ### cn=schema ### 84 database hdb88 database mdb 85 89 suffix ${SCHEMADN} 86 90 rootdn cn=Manager,${SCHEMADN} … … 88 92 ${NOSYNC} 89 93 ${INDEX_CONFIG} 94 maxsize 1073741824 90 95 91 96 #syncprov is stable in OpenLDAP 2.3, and available in 2.2. … … 103 108 ######################################### 104 109 ### cn=config ### 105 database hdb110 database mdb 106 111 suffix ${CONFIGDN} 107 112 rootdn cn=Manager,${CONFIGDN} … … 109 114 ${NOSYNC} 110 115 ${INDEX_CONFIG} 116 maxsize 1073741824 111 117 112 118 #syncprov is stable in OpenLDAP 2.3, and available in 2.2. … … 123 129 124 130 ######################################## 131 ### domaindns 132 database mdb 133 suffix dc=domaindnszones,${DOMAINDN} 134 rootdn cn=Manager,${DOMAINDN} 135 directory ${LDAPDIR}/db/domaindns 136 ${NOSYNC} 137 ${INDEX_CONFIG} 138 maxsize 1073741824 139 140 #syncprov is stable in OpenLDAP 2.3, and available in 2.2. 141 #We need this for the contextCSN attribute and mmr. 142 overlay syncprov 143 syncprov-sessionlog 100 144 syncprov-checkpoint 100 10 145 146 overlay rdnval 147 148 ### Multimaster-Replication of domainDNS context ### 149 ${MMR_SYNCREPL_DOMAINDNS_CONFIG} 150 ${MIRRORMODE} 151 152 ######################################## 153 ### forestdns ### 154 database mdb 155 suffix dc=forestdnszones,${DOMAINDN} 156 rootdn cn=Manager,${DOMAINDN} 157 directory ${LDAPDIR}/db/forestdns 158 ${NOSYNC} 159 ${INDEX_CONFIG} 160 maxsize 1073741824 161 162 #syncprov is stable in OpenLDAP 2.3, and available in 2.2. 163 #We need this for the contextCSN attribute and mmr. 164 overlay syncprov 165 syncprov-sessionlog 100 166 syncprov-checkpoint 100 10 167 168 overlay rdnval 169 170 ### Multimaster-Replication of forestDNS context ### 171 ${MMR_SYNCREPL_FORESTDNS_CONFIG} 172 ${MIRRORMODE} 173 174 ######################################## 125 175 ### cn=users /base-dn ### 126 database hdb176 database mdb 127 177 suffix ${DOMAINDN} 128 178 rootdn cn=Manager,${DOMAINDN} … … 130 180 ${NOSYNC} 131 181 ${INDEX_CONFIG} 182 maxsize 1073741824 132 183 133 184 #syncprov is stable in OpenLDAP 2.3, and available in 2.2. -
vendor/current/source4/setup/spn_update_list
r740 r988 6 6 HOST/${HOSTNAME}/${WORKGROUP} 7 7 ldap/${HOSTNAME}/${WORKGROUP} 8 GC/${HOSTNAME}/${DNS DOMAIN}8 GC/${HOSTNAME}/${DNSFOREST} 9 9 ldap/${HOSTNAME} 10 10 HOST/${HOSTNAME}/${DNSDOMAIN} … … 12 12 HOST/${NETBIOSNAME} 13 13 E3514235-4B06-11D1-AB04-00C04FC2DCD2/${NTDSGUID}/${DNSDOMAIN} 14 ldap/${NTDSGUID}._msdcs.${DNS DOMAIN}14 ldap/${NTDSGUID}._msdcs.${DNSFOREST} 15 15 ldap/${NETBIOSNAME} 16 16 RestrictedKrbHost/${NETBIOSNAME} 17 17 RestrictedKrbHost/${HOSTNAME} 18 ldap/${HOSTNAME}/DomainDnsZones.${DNSDOMAIN} 19 ldap/${HOSTNAME}/ForestDnsZones.${DNSDOMAIN} 18 20 19 21 # These are not supported yet: 20 22 # NtFrs-88f5d2bd-b646-11d2-a6d3-00c04fc9b232/${HOSTNAME} 21 23 # Dfsr-12F9A27C-BF97-4787-9364-D31B6C55EB04/${HOSTNAME} 22 # ldap/${HOSTNAME}/DomainDnsZones.${DNSDOMAIN}23 # ldap/${HOSTNAME}/ForestDnsZones.${DNSDOMAIN}24 24 # 25 # Only used in DNS mode: 25 # Only used in DNS mode: (This is added on dns-${HOSTNAME} account, should not be added here) 26 26 # DNS/${HOSTNAME} 27 27 # -
vendor/current/source4/setup/tests/blackbox_group.sh
r740 r988 15 15 16 16 rm -rf $PREFIX/simple-dc 17 testit "simple-dc" $PYTHON $ SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc17 testit "simple-dc" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc --use-ntvfs 18 18 samba_tool="./bin/samba-tool" 19 19 … … 21 21 22 22 #creation of two test subjects 23 testit " newuser" $samba_tool newuser$CONFIG --given-name="User" --surname="Tester" --initial="UT" testuser testp@ssw0Rd24 testit " newuser" $samba_tool newuser$CONFIG --given-name="User1" --surname="Tester" --initial="UT" testuser1 testp@ssw0Rd23 testit "user add" $samba_tool user create $CONFIG --given-name="User" --surname="Tester" --initial="UT" testuser testp@ssw0Rd 24 testit "user add" $samba_tool user create $CONFIG --given-name="User1" --surname="Tester" --initial="UT" testuser1 testp@ssw0Rd 25 25 26 26 #test creation of six different groups … … 33 33 34 34 #test adding test users to all groups by their username 35 testit "group addmembers" $samba_tool group addmembers $CONFIG dsg newuser,newuser136 testit "group addmembers" $samba_tool group addmembers $CONFIG gsg newuser,newuser137 testit "group addmembers" $samba_tool group addmembers $CONFIG usg newuser,newuser138 testit "group addmembers" $samba_tool group addmembers $CONFIG ddg newuser,newuser139 testit "group addmembers" $samba_tool group addmembers $CONFIG gdg newuser,newuser140 testit "group addmembers" $samba_tool group addmembers $CONFIG udg newuser,newuser135 testit "group addmembers" $samba_tool group addmembers $CONFIG dsg testuser,testuser1 36 testit "group addmembers" $samba_tool group addmembers $CONFIG gsg testuser,testuser1 37 testit "group addmembers" $samba_tool group addmembers $CONFIG usg testuser,testuser1 38 testit "group addmembers" $samba_tool group addmembers $CONFIG ddg testuser,testuser1 39 testit "group addmembers" $samba_tool group addmembers $CONFIG gdg testuser,testuser1 40 testit "group addmembers" $samba_tool group addmembers $CONFIG udg testuser,testuser1 41 41 42 42 #test removing test users from all groups by their username 43 testit "group removemembers" $samba_tool group removemembers $CONFIG dsg newuser,newuser144 testit "group removemembers" $samba_tool group removemembers $CONFIG gsg newuser,newuser145 testit "group removemembers" $samba_tool group removemembers $CONFIG usg newuser,newuser146 testit "group removemembers" $samba_tool group removemembers $CONFIG ddg newuser,newuser147 testit "group removemembers" $samba_tool group removemembers $CONFIG gdg newuser,newuser148 testit "group removemembers" $samba_tool group removemembers $CONFIG udg newuser,newuser143 testit "group removemembers" $samba_tool group removemembers $CONFIG dsg testuser,testuser1 44 testit "group removemembers" $samba_tool group removemembers $CONFIG gsg testuser,testuser1 45 testit "group removemembers" $samba_tool group removemembers $CONFIG usg testuser,testuser1 46 testit "group removemembers" $samba_tool group removemembers $CONFIG ddg testuser,testuser1 47 testit "group removemembers" $samba_tool group removemembers $CONFIG gdg testuser,testuser1 48 testit "group removemembers" $samba_tool group removemembers $CONFIG udg testuser,testuser1 49 49 50 50 #test adding test users to all groups by their cn … … 72 72 testit "group delete" $samba_tool group delete $CONFIG udg 73 73 74 #test listing of all groups 75 testit "group list" $samba_tool group list $CONFIG 76 77 #test listing of members of a particular group 78 testit "group listmembers" $samba_tool group listmembers $CONFIG Users 79 74 80 exit $failed -
vendor/current/source4/setup/tests/blackbox_newuser.sh
r740 r988 15 15 16 16 rm -rf $PREFIX/simple-dc 17 testit "simple-dc" $PYTHON $ SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc17 testit "simple-dc" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc --use-ntvfs 18 18 samba_tool="./bin/samba-tool" 19 19 … … 23 23 #newuser account is created with cn=Given Name Initials. Surname 24 24 #newuser1 account is created using cn=username 25 testit " newuser" $samba_tool newuser$CONFIG --given-name="User" --surname="Tester" --initials="T" --profile-path="\\\\myserver\\my\\profile" --script-path="\\\\myserver\\my\\script" --home-directory="\\\\myserver\\my\\homedir" --job-title="Tester" --department="Testing" --company="Samba.org" --description="Description" --mail-address="tester@samba.org" --internet-address="http://samba.org" --telephone-number="001122334455" --physical-delivery-office="101" --home-drive="H:" NewUser testp@ssw0Rd26 testit " newuser" $samba_tool newuser$CONFIG --use-username-as-cn --given-name="User1" --surname="Tester1" --initials="UT1" --profile-path="\\\\myserver\\my\\profile" --script-path="\\\\myserver\\my\\script" --home-directory="\\\\myserver\\my\\homedir" --job-title="Tester" --department="Testing" --company="Samba.org" --description="Description" --mail-address="tester@samba.org" --internet-address="http://samba.org" --telephone-number="001122334455" --physical-delivery-office="101" --home-drive="H:" NewUser1 testp@ssw0Rd25 testit "user add" $samba_tool user create $CONFIG --given-name="User" --surname="Tester" --initials="T" --profile-path="\\\\myserver\\my\\profile" --script-path="\\\\myserver\\my\\script" --home-directory="\\\\myserver\\my\\homedir" --job-title="Tester" --department="Testing" --company="Samba.org" --description="Description" --mail-address="tester@samba.org" --internet-address="http://samba.org" --telephone-number="001122334455" --physical-delivery-office="101" --home-drive="H:" NewUser testp@ssw0Rd 26 testit "user add" $samba_tool user create $CONFIG --use-username-as-cn --given-name="User1" --surname="Tester1" --initials="UT1" --profile-path="\\\\myserver\\my\\profile" --script-path="\\\\myserver\\my\\script" --home-directory="\\\\myserver\\my\\homedir" --job-title="Tester" --department="Testing" --company="Samba.org" --description="Description" --mail-address="tester@samba.org" --internet-address="http://samba.org" --telephone-number="001122334455" --physical-delivery-office="101" --home-drive="H:" NewUser1 testp@ssw0Rd 27 27 28 28 # check the enable account script 29 testit "enableaccount" $samba_tool enableaccount$CONFIG NewUser30 testit "enableaccount" $samba_tool enableaccount$CONFIG NewUser129 testit "enableaccount" $samba_tool user enable $CONFIG NewUser 30 testit "enableaccount" $samba_tool user enable $CONFIG NewUser1 31 31 32 32 # check the enable account script 33 testit "setpassword" $samba_tool setpassword $CONFIG NewUser --newpassword=testp@ssw0Rd234 testit "setpassword" $samba_tool setpassword $CONFIG NewUser1 --newpassword=testp@ssw0Rd233 testit "setpassword" $samba_tool user setpassword $CONFIG NewUser --newpassword=testp@ssw0Rd2 34 testit "setpassword" $samba_tool user setpassword $CONFIG NewUser1 --newpassword=testp@ssw0Rd2 35 35 36 36 # check the setexpiry script 37 testit "noexpiry" $samba_tool setexpiry $CONFIG NewUser --noexpiry38 testit "noexpiry" $samba_tool setexpiry $CONFIG NewUser1 --noexpiry39 testit "expiry" $samba_tool setexpiry $CONFIG NewUser --days=740 testit "expiry" $samba_tool setexpiry $CONFIG NewUser1 --days=737 testit "noexpiry" $samba_tool user setexpiry $CONFIG NewUser --noexpiry 38 testit "noexpiry" $samba_tool user setexpiry $CONFIG NewUser1 --noexpiry 39 testit "expiry" $samba_tool user setexpiry $CONFIG NewUser --days=7 40 testit "expiry" $samba_tool user setexpiry $CONFIG NewUser1 --days=7 41 41 42 42 exit $failed -
vendor/current/source4/setup/tests/blackbox_provision-backend.sh
r740 r988 9 9 10 10 PREFIX="$1" 11 export TEST_LDAP="yes" 11 12 shift 1 12 13 13 . `dirname $0`/../../../testprogs/blackbox/subunit.sh 14 14 15 testit "openldap-backend" $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend --ldap-dryrun-mode --slapd-path=/dev/null16 testit "openldap-mmr-backend" $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-mmr-backend --ol-mmr-urls="ldap://s4dc1.test:9000,ldap://s4dc2.test:9000" --ldap-dryrun-mode --slapd-path=/dev/null --username=samba-admin --password=linux --adminpass=linux --ldapadminpass=linux17 testit "fedora-ds-backend" $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend --ldap-dryrun-mode --slapd-path=/dev/null15 testit "openldap-backend" $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend --slapd-path=/dev/null --use-ntvfs --ldap-dryrun-mode 16 testit "openldap-mmr-backend" $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-mmr-backend --ol-mmr-urls="ldap://s4dc1.test:9000,ldap://s4dc2.test:9000" --adminpass=linux --ldapadminpass=linux --slapd-path=/dev/null --use-ntvfs --ldap-dryrun-mode 17 testit "fedora-ds-backend" $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend --slapd-path=/dev/null --use-ntvfs --ldap-dryrun-mode 18 18 19 19 reprovision() { 20 $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend-reprovision--ldap-dryrun-mode --slapd-path=/dev/null21 $PYTHON $SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend-reprovision--ldap-dryrun-mode --slapd-path=/dev/null20 $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend-reprovision --use-ntvfs --ldap-dryrun-mode --slapd-path=/dev/null 21 $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --ldap-backend-type=openldap --targetdir=$PREFIX/openldap-backend-reprovision --use-ntvfs --ldap-dryrun-mode --slapd-path=/dev/null 22 22 } 23 23 -
vendor/current/source4/setup/tests/blackbox_provision.sh
r740 r988 17 17 mkdir -p $PREFIX/simple-default/etc 18 18 touch $PREFIX/simple-default/etc/smb.conf 19 testit "simple-default" $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-default19 testit "simple-default" $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-default --use-ntvfs 20 20 #And try with just whitespace 21 21 rm -rf $PREFIX/simple-dc 22 22 mkdir -p $PREFIX/simple-dc/etc 23 23 echo " " > $PREFIX/simple-dc/etc/smb.conf 24 testit "simple-dc" $PYTHON $ SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc24 testit "simple-dc" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc --use-ntvfs 25 25 #The rest of these tests are with no smb.conf file present 26 26 27 27 rm -rf $PREFIX/simple-dc 28 testit "simple-dc-guids" $PYTHON $ SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --domain-guid=6054d36d-2bfd-44f1-a9cd-32cfbb06480b --ntds-guid=b838f255-c8aa-4fe8-9402-b7d61ca3bd1b --invocationid=6d4cff9a-2bbf-4b4c-98a2-36242ddb0bd6 --targetdir=$PREFIX/simple-dc28 testit "simple-dc-guids" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --domain-guid=6054d36d-2bfd-44f1-a9cd-32cfbb06480b --ntds-guid=b838f255-c8aa-4fe8-9402-b7d61ca3bd1b --invocationid=6d4cff9a-2bbf-4b4c-98a2-36242ddb0bd6 --targetdir=$PREFIX/simple-dc --use-ntvfs 29 29 rm -rf $PREFIX/simple-member 30 testit "simple-member" $PYTHON $ SRCDIR/source4/setup/provision --server-role="member" --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-member30 testit "simple-member" $PYTHON $BINDIR/samba-tool domain provision --server-role="member" --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-member --use-ntvfs 31 31 rm -rf $PREFIX/simple-standalone 32 testit "simple-standalone" $PYTHON $ SRCDIR/source4/setup/provision --server-role="standalone" --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-standalone32 testit "simple-standalone" $PYTHON $BINDIR/samba-tool domain provision --server-role="standalone" --domain=FOO --realm=foo.example.com --targetdir=$PREFIX/simple-standalone --use-ntvfs 33 33 rm -rf $PREFIX/blank-dc 34 testit "blank-dc" $PYTHON $SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/blank-dc --blank 35 rm -rf $PREFIX/partitions-only-dc 36 testit "partitions-only-dc" $PYTHON $SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/partitions-only-dc --partitions-only 34 testit "blank-dc" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/blank-dc --blank --use-ntvfs 37 35 38 36 reprovision() { 39 rm -rf $PREFIX/reprovision 40 $PYTHON $SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/reprovision" 41 $PYTHON $SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/reprovision" 37 $PYTHON $BINDIR/samba-tool domain provision --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/simple-default" --use-ntvfs 42 38 } 43 39 … … 49 45 rm -rf $PREFIX/simple-standalone 50 46 rm -rf $PREFIX/partitions-only-dc 51 rm -rf $PREFIX/reprovision52 47 53 48 exit $failed -
vendor/current/source4/setup/tests/blackbox_setpassword.sh
r740 r988 16 16 17 17 rm -rf $PREFIX/simple-dc 18 testit "simple-dc" $PYTHON $SRCDIR/source4/setup/provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc18 mkdir -p $PREFIX/simple-dc 19 19 20 testit " newuser" $samba_tool newuser --configfile=$PREFIX/simple-dc/etc/smb.conf testuser testp@ssw0Rd20 testit "simple-dc" $PYTHON $BINDIR/samba-tool domain provision --server-role="dc" --domain=FOO --realm=foo.example.com --domain-sid=S-1-5-21-4177067393-1453636373-93818738 --targetdir=$PREFIX/simple-dc --use-ntvfs 21 21 22 testit " setpassword" $samba_tool setpassword --configfile=$PREFIX/simple-dc/etc/smb.conf testuser --newpassword=testp@ssw0Rd22 testit "user add" $samba_tool user create --configfile=$PREFIX/simple-dc/etc/smb.conf testuser testp@ssw0Rd 23 23 24 testit "setpassword" $samba_tool setpassword --configfile=$PREFIX/simple-dc/etc/smb.conf testuser --newpassword=testp@ssw0Rd --must-change-at-next-login24 testit "setpassword" $samba_tool user setpassword --configfile=$PREFIX/simple-dc/etc/smb.conf testuser --newpassword=testp@ssw0Rd 25 25 26 testit "pwsettings" $samba_tool pwsettings --quiet set --configfile=$PREFIX/simple-dc/etc/smb.conf --complexity=default --history-length=default --min-pwd-length=default --min-pwd-age=default --max-pwd-age=default --store-plaintext=on 26 testit "setpassword" $samba_tool user setpassword --configfile=$PREFIX/simple-dc/etc/smb.conf testuser --newpassword=testp@ssw0Rd --must-change-at-next-login 27 28 testit "passwordsettings" $samba_tool domain passwordsettings --quiet set --configfile=$PREFIX/simple-dc/etc/smb.conf --complexity=default --history-length=default --min-pwd-length=default --min-pwd-age=default --max-pwd-age=default --store-plaintext=on 27 29 28 30 exit $failed -
vendor/current/source4/setup/tests/blackbox_upgradeprovision.sh
r740 r988 13 13 . `dirname $0`/../../../testprogs/blackbox/subunit.sh 14 14 15 [ ! -d $PREFIX ] && mkdir $PREFIX 16 17 upgradeprovision_reference() { 18 if [ -d $PREFIX/upgradeprovision_reference ]; then 19 rm -fr $PREFIX/upgradeprovision_reference 20 fi 21 $PYTHON $BINDIR/samba-tool domain provision --host-name=bar --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/upgradeprovision_reference" --server-role="dc" --use-ntvfs 22 } 23 15 24 upgradeprovision() { 16 25 if [ -d $PREFIX/upgradeprovision ]; then 17 26 rm -fr $PREFIX/upgradeprovision 18 27 fi 19 $PYTHON $ SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/upgradeprovision" --server-role="dc"20 $PYTHON $ SRCDIR/source4/scripting/bin/upgradeprovision -s "$PREFIX/upgradeprovision/etc/smb.conf" --debugchange28 $PYTHON $BINDIR/samba-tool domain provision --host-name=bar --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/upgradeprovision" --server-role="dc" --use-ntvfs 29 $PYTHON $BINDIR/samba_upgradeprovision -s "$PREFIX/upgradeprovision/etc/smb.conf" --debugchange 21 30 } 22 31 … … 25 34 rm -fr $PREFIX/upgradeprovision_full 26 35 fi 27 $PYTHON $SRCDIR/source4/setup/provision --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/upgradeprovision_full" --server-role="dc" 28 $PYTHON $SRCDIR/source4/scripting/bin/upgradeprovision -s "$PREFIX/upgradeprovision_full/etc/smb.conf" --full --debugchange 36 $PYTHON $BINDIR/samba-tool domain provision --host-name=bar --domain=FOO --realm=foo.example.com --targetdir="$PREFIX/upgradeprovision_full" --server-role="dc" --use-ntvfs 37 $PYTHON $BINDIR/samba_upgradeprovision -s "$PREFIX/upgradeprovision_full/etc/smb.conf" --full --debugchange 38 } 39 40 # The ldapcmp runs here are to ensure that a 'null' run of 41 # upgradeprovision (because we did a provision with the same template) 42 # really doesn't change anything. 43 44 ldapcmp() { 45 $PYTHON $BINDIR/samba-tool ldapcmp tdb://$PREFIX/upgradeprovision/private/sam.ldb tdb://$PREFIX/upgradeprovision_reference/private/sam.ldb --two --skip-missing-dn 46 } 47 48 ldapcmp_full() { 49 $PYTHON $BINDIR/samba-tool ldapcmp tdb://$PREFIX/upgradeprovision_full/private/sam.ldb tdb://$PREFIX/upgradeprovision_reference/private/sam.ldb --two --skip-missing-dn 50 } 51 52 ldapcmp_sd() { 53 $PYTHON $BINDIR/samba-tool ldapcmp tdb://$PREFIX/upgradeprovision/private/sam.ldb tdb://$PREFIX/upgradeprovision_reference/private/sam.ldb --two --sd --skip-missing-dn 54 } 55 56 ldapcmp_full_sd() { 57 $PYTHON $BINDIR/samba-tool ldapcmp tdb://$PREFIX/upgradeprovision_full/private/sam.ldb tdb://$PREFIX/upgradeprovision_reference/private/sam.ldb --two --sd --skip-missing-dn 29 58 } 30 59 31 60 testit "upgradeprovision" upgradeprovision 32 61 testit "upgradeprovision_full" upgradeprovision_full 62 testit "upgradeprovision_reference" upgradeprovision_reference 63 testit "ldapcmp" ldapcmp 64 testit "ldapcmp_full" ldapcmp_full 65 testit "ldapcmp_sd" ldapcmp_sd 66 testit "ldapcmp_full_sd" ldapcmp_full_sd 33 67 34 68 if [ -d $PREFIX/upgradeprovision ]; then … … 40 74 fi 41 75 76 if [ -d $PREFIX/upgradeprovision_reference ]; then 77 rm -fr $PREFIX/upgradeprovision_reference 78 fi 79 42 80 exit $failed -
vendor/current/source4/setup/wscript_build
r740 r988 1 1 #!/usr/bin/env python 2 3 from samba_utils import MODE_7554 2 5 3 bld.INSTALL_WILDCARD('${SETUPDIR}', 'ad-schema/*.txt') 6 4 bld.INSTALL_WILDCARD('${SETUPDIR}', 'display-specifiers/*.txt') 7 8 bld.INSTALL_FILES('${SBINDIR}', 'provision', chmod=MODE_755, python_fixup=True)9 5 10 6 bld.INSTALL_FILES('${SETUPDIR}', 'dns_update_list') … … 12 8 13 9 for p in '''schema-map-* DB_CONFIG *.inf *.ldif *.reg *.zone *.conf *.php *.txt 14 named.conf named.conf.update provision.smb.conf.dc provision.smb.conf.member 15 provision.smb.conf.standalone'''.split(): 10 named.conf.update named.conf.dlz'''.split(): 16 11 bld.INSTALL_WILDCARD('${SETUPDIR}', p) 17 12
Note:
See TracChangeset
for help on using the changeset viewer.