Ñò KUc @soddkZddkZddkZddkZddkZddkZeiZddkl Z l Z ddk Z e i e i dƒd„ZedƒoddkZnde fd„ƒYZde fd „ƒYZd fd „ƒYZd efd „ƒYZedjo]eieieiƒeidƒedƒo eƒZn eƒZeieiƒƒndS(iÿÿÿÿN(t OptionParsertIndentedHelpFormattertcCstidi|ƒdjS(Ni(tsystargvtfind(tname((s'/usr/share/authconfig/authconfig-tui.pytrunsAs#ssauthconfig-tuitUnihelpOptionParsercBseZdd„ZRS(cCsƒ|djo ti}ntiƒ}t|ddƒ}| p |djo |}n|i|iƒi|ƒi |dƒƒdS(Ntencodingtasciitreplace( tNoneRtstdouttlocaletgetpreferredencodingtgetattrtwritet format_helptdecodetencode(tselftfilet srcencodingR ((s'/usr/share/authconfig/authconfig-tui.pyt print_help*s    N(t__name__t __module__R R(((s'/usr/share/authconfig/authconfig-tui.pyR)stNonWrapFormattercBseZd„ZRS(cCsg}|i|}|i|id}t|ƒ|jo#d|id|f}|i}n9d|id||f}d|id||f}d}|i|ƒ|io-|i|ƒ}|id|d|fƒn#|ddjo|idƒndi|ƒS(Nis%*s%s Rs %*s%-*s iiÿÿÿÿs (toption_stringst help_positiontcurrent_indenttlentappendthelptexpand_defaulttjoin(Rtoptiontresulttoptst opt_widtht indent_firstt help_text((s'/usr/share/authconfig/authconfig-tui.pyt format_option4s     (RRR*(((s'/usr/share/authconfig/authconfig-tui.pyR3st AuthconfigcBs}eZd„Zd„Zd„Zd„Zd„Zd„Zd„Zd„Z d„Z d „Z d „Z d „Z d „ZRS( cCsCt|_t|_t|_t|_t|_t|_d|_dS(Ni(tFalset nis_availtkerberos_availt ldap_availt sssd_availt cache_availt fprintd_availtretval(R((s'/usr/share/authconfig/authconfig-tui.pyt__init__Xs      cCsdS(Nt authconfig((R((s'/usr/share/authconfig/authconfig-tui.pytmoduleascCs$tiid|iƒ|fƒdS(Ns%s: %s (RtstderrRR6(Rterror((s'/usr/share/authconfig/authconfig-tui.pyt printErrordscCsyd}d}x\|D]T}|djo|d7}n|o|t|ƒd7}n||7}|d7}qW|d7}|S(Nit(tstr(RtltaddidxtidxR!titem((s'/usr/share/authconfig/authconfig-tui.pytlistHelpgs   c Cstdƒ|iƒ}|iƒdjo|d7}nt|dtdtƒƒ}|idddd d td ƒƒ|id d dd d tdƒƒ|iddd d tdƒƒ|idddd d tdƒƒ|iddd d tdƒƒ|idd|ititƒd tdƒƒ|iddd d tdƒƒ|iddd d tdƒƒ|iddtdƒd tdƒƒ|id dtd!ƒd td"ƒƒ|id#dd d td$ƒƒ|id%dd d td&ƒƒ|id'dd d td(ƒƒ|id)dd d td*ƒƒ|id+dtd!ƒd td,ƒƒ|id-dtd.ƒd td/ƒƒ|id0d1dd d td2ƒƒ|id3d4dd d td5ƒƒ|id6dd d td7ƒƒ|id8dd d td9ƒƒ|id:dtd;ƒd td<ƒƒ|id=dd d td>ƒƒ|id?dd d td@ƒƒ|idAdd d tdBƒƒ|idCdd d tdDƒƒ|idEdtdFƒd tdGƒƒ|iti ƒt ƒ}|idHd|d tdIƒƒ|idJdd d tdKƒƒ|idLdd d tdMƒƒ|idNdd d tdOƒƒ|idPdd d tdQƒƒ|idRdtd!ƒd tdSƒƒ|idTdtd!ƒd tdUƒƒ|idVdtdWƒd tdXƒƒ|idYdd d tdZƒƒ|id[dd d td\ƒƒ|id]dd d td^ƒƒ|id_dd d td`ƒƒ|idadd d tdbƒƒ|idcdd d tddƒƒ|idedd d tdfƒƒ|idgdd d tdhƒƒ|ididdjd tdkƒƒ|idldtdWƒd tdmƒƒ|idndtdoƒd tdpƒƒ|idqdtdrƒd tdsƒƒ|idtdudvdtdwƒd tdxƒƒ|idyddzd td{ƒƒ|id|dd}d td~ƒƒ|iddd€d tdƒƒ|id‚ddƒd td„ƒƒ|id…dd d td†ƒƒ|id‡dd d tdˆƒƒ|id‰dd d tdŠƒƒ|id‹dd d tdŒƒƒ|idddŽd tdƒƒ|iddd d td‘ƒƒ|id’dd d td“ƒƒ|id”dtdƒd td•ƒƒ|id–dtdWƒd td—ƒƒ|id˜dtdoƒd td™ƒƒ|idšdd d td›ƒƒ|idœdd d tdƒƒ|idžddŸd td ƒƒ|id¡dd d td¢ƒƒ|id£dd d td¤ƒƒ|id¥dd d td¦ƒƒ|id§dd d td¨ƒƒ|id©dd d tdªƒƒ|id«dd d td¬ƒƒ|id­dd®d td¯ƒƒ|id°dd±d td²ƒƒ|id³dd d td´ƒƒ|idµdd d td¶ƒƒ|id·dd d td¸ƒƒ|id¹dd d tdºƒƒ|id»dd d td¼ƒƒ|id½dd d td¾ƒƒ|id¿dd d tdÀƒƒ|idÁdd d tdƒƒ|idÃdd d tdăƒ|idÅdd d tdƃƒ|idÇdd d tdȃƒ|idÉdd d tdʃƒ|idËdd d td̃ƒ|idÍdd d td΃ƒ|idÏdd d tdЃƒ|idÑdd d tdÒƒƒ|idÓdd d tdÔƒƒ|idÕdd d tdÖƒƒ|id×dd d td؃ƒ|idÙdd d tdÚƒƒ|iƒdÛjoB|idÜdd d td݃ƒ|idÞdd d td߃ƒn#|idàdÞdd d tdჃ|idâdd d tdッ|idädd d td僃|idædtdçƒd td胃|idédtdçƒd tdꃃ|idëdd d td샃|i ƒ\|_ }|o$|i td탃tidîƒn|iƒdÛj o}|i i oo|i i oa|i i oS|i i oE|i i o7|i i o)|i i o|iƒtidîƒndS(ïNsusage: %s [options]R5se {--update|--updateall|--test|--probe|--restorebackup |--savebackup |--restorelastbackup}tadd_help_optiont formatters-hs--helptactionR!sshow this help message and exits--enableshadows --useshadowt store_trues$enable shadowed passwords by defaults--disableshadows%disable shadowed passwords by defaults --enablemd5s--usemd5senable MD5 passwords by defaults --disablemd5s disable MD5 passwords by defaults --passalgotmetavars&hash/crypt algorithm for new passwordss --enableniss*enable NIS for user information by defaults --disableniss+disable NIS for user information by defaults --nisdomainssdefault NIS domains --nisserverssdefault NIS servers --enableldaps+enable LDAP for user information by defaults --disableldaps,disable LDAP for user information by defaults--enableldapauths)enable LDAP for authentication by defaults--disableldapauths*disable LDAP for authentication by defaults --ldapservers#default LDAP server hostname or URIs --ldapbasednssdefault LDAP base DNs--enableldaptlss--enableldapstarttlss&enable use of TLS with LDAP (RFC-2830)s--disableldaptlss--disableldapstarttlss'disable use of TLS with LDAP (RFC-2830)s--enablerfc2307bissBenable use of RFC-2307bis schema for LDAP user information lookupss--disablerfc2307bissCdisable use of RFC-2307bis schema for LDAP user information lookupss--ldaploadcacertss load CA certificate from the URLs--enablesmartcards0enable authentication with smart card by defaults--disablesmartcards1disable authentication with smart card by defaults--enablerequiresmartcards0require smart card for authentication by defaults--disablerequiresmartcards7do not require smart card for authentication by defaults--smartcardmoduless default smart card module to uses--smartcardactions(action to be taken on smart card removals--enablefingerprints9enable authentication with fingerprint readers by defaults--disablefingerprints:disable authentication with fingerprint readers by defaults --enablekrb5s)enable kerberos authentication by defaults --disablekrb5s*disable kerberos authentication by defaults --krb5kdcsdefault kerberos KDCs--krb5adminserversdefault kerberos admin servers --krb5realmssdefault kerberos realms--enablekrb5kdcdnss'enable use of DNS to find kerberos KDCss--disablekrb5kdcdnss(disable use of DNS to find kerberos KDCss--enablekrb5realmdnss)enable use of DNS to find kerberos realmss--disablekrb5realmdnss*disable use of DNS to find kerberos realmss--enablewinbinds.enable winbind for user information by defaults--disablewinbinds/disable winbind for user information by defaults--enablewinbindauths,enable winbind for authentication by defaults--disablewinbindauths-disable winbind for authentication by defaults --smbsecurityss*security mode to use for samba and winbinds --smbrealms5default realm for samba and winbind when security=adss --smbserverss s(names of servers to authenticate againsts--smbworkgroups s'workgroup authentication servers are ins--smbidmapranges --smbidmapuids --smbidmapgidss4uid range winbind will assign to domain or ads userss--winbindseparators<\>sthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enableds--winbindtemplatehomedirs sGthe directory which winbind-created users will have as home directoriess--winbindtemplateprimarygroupssFthe group which winbind-created users will have as their primary groups--winbindtemplateshells sDthe shell which winbind-created users will have as their login shells--enablewinbindusedefaultdomains[configures winbind to assume that users with no domain in their user names are domain userss --disablewinbindusedefaultdomains_configures winbind to assume that users with no domain in their user names are not domain userss--enablewinbindofflines)configures winbind to allow offline logins--disablewinbindofflines+configures winbind to prevent offline logins --winbindjoinss>join the winbind domain or ads realm now as this administrators --enableipav2s?enable IPAv2 for user information and authentication by defaults--disableipav2s@disable IPAv2 for user information and authentication by defaults --ipav2domains-the IPAv2 domain the system should be part ofs --ipav2realmsthe realm for the IPAv2 domains --ipav2serversthe server for the IPAv2 domains--enableipav2nontps-do not setup the NTP against the IPAv2 domains--disableipav2nontps0setup the NTP against the IPAv2 domain (default)s --ipav2joins s%join the IPAv2 domain as this accounts --enablewinss#enable wins for hostname resolutions --disablewinss$disable wins for hostname resolutions--enablepreferdnss3prefer dns over wins or nis for hostname resolutions--disablepreferdnss:do not prefer dns over wins or nis for hostname resolutions--enablehesiods-enable hesiod for user information by defaults--disablehesiods.disable hesiod for user information by defaults --hesiodlhsssdefault hesiod LHSs --hesiodrhsssdefault hesiod RHSs --enablesssdsOenable SSSD for user information by default with manually managed configurations --disablesssdsVdisable SSSD for user information by default (still used for supported configurations)s--enablesssdauthsMenable SSSD for authentication by default with manually managed configurations--disablesssdauthsSdisable SSSD for authentication by default (still used for supported configurationss--enableforcelegacys;never use SSSD implicitly even for supported configurationss--disableforcelegacys4use SSSD implicitly if it supports the configurations--enablecachecredss5enable caching of user credentials in SSSD by defaults--disablecachecredss6disable caching of user credentials in SSSD by defaults --enablecachesXenable caching of user information by default (automatically disabled when SSSD is used)s--disablecaches.disable caching of user information by defaults--enablelocauthorizes1local authorization is sufficient for local userss--disablelocauthorizes1authorize local users also through remote services--enablepamaccesss.check access.conf during account authorizations--disablepamaccesss5do not check access.conf during account authorizations--enablesysnetauths0authenticate system accounts by network servicess--disablesysnetauths0authenticate system accounts by local files onlys--enablemkhomedirs6create home directories for users on their first logins--disablemkhomedirs=do not create home directories for users on their first logins --nostarts+do not start/stop portmap, ypbind, and nscds--tests>do not update the configuration files, only print new settingssauthconfig-tuis--backs<display Back instead of Cancel in the main dialog of the TUIs --kickstarts1do not display the deprecated text user interfaces--updatesDopposite of --test, update configuration files with changed settingss --updateallsupdate all configuration filess--probes)probe network for defaults and print thems --savebackupss(save a backup of all configuration filess--restorebackups)restore the backup of configuration filess--restorelastbackupsXrestore the backup of configuration files saved before the previous configuration changesunexpected argumenti(t_R6RR,Rt add_optionRCtauthinfotpassword_algorithmstgetSmartcardActionstTruet parse_argstoptionsR9Rtexittprobettesttupdatet updateallt savebackupt restorebackuptrestorelastbackupR(Rtusagetparsertactshelptargs((s'/usr/share/authconfig/authconfig-tui.pyt parseOptionsts²                                                                                                    "* cCs±ti|iƒ}|iƒ|io#|iod|i|ifGHn|io#|iod|i|ifGHn|io-d|i|i pd|i pdfGHndS(Ns hesiod %s/%ss ldap %s/%s skrb5 %s/%s/%s R( RKtAuthInfoR9RRt hesiodLHSt hesiodRHSt ldapServert ldapBaseDNt kerberosRealmt kerberosKDCtkerberosAdminServer(Rtinfo((s'/usr/share/authconfig/authconfig-tui.pyRRps     cCsNti|iƒ|_|iiƒ|_|iidjot|i_ndS(N( RKtreadR9Rftcopyt pristineinfotenableLocAuthorizeR RN(R((s'/usr/share/authconfig/authconfig-tui.pyt readAuthInfo}scCsñtititiƒotititiƒ|_tititiƒ|_titi tiƒotiti tiƒ|_ titi tiƒotiti tiƒ|_tititiƒ|_tititiƒ|_dS(N(tostaccessRKt PATH_YPBINDtX_OKtPATH_LIBNSS_NISR-t PATH_PAM_KRB5R.t PATH_PAM_LDAPtPATH_LIBNSS_LDAPR/t PATH_PAM_SSStPATH_LIBNSS_SSSR0t PATH_NSCDR1tPATH_PAM_FPRINTDR2(R((s'/usr/share/authconfig/authconfig-tui.pyttestAvailableSubsys„sc Csšhdd6dd6dd6dd6d d 6d d 6d d6dd6dd6dd6dd6dd6dd6dd6dd6dd 6d!d"6d#d$6d%d&6d'd(6d)d*6d+d,6d-d.6d/d06d1d26d3d46d5d66d7d86d9d:6d;d<6}hd=d>6d?d@6dAdB6dCdD6dEdF6dGdH6dIdJ6dKdL6dMdN6dOdP6dQdR6dSdT6dUdV6dWdX6dYdZ6d[d\6d]d^6d_d`6dadb6dcdd6dedf6dgdh6didj6dkdl6dmdn6}xv|iƒD]h\}}t|ido|ƒot|i|tƒnt|idp|ƒot|i|tƒqšqšWy-|iiod|i_n dq|i_Wnt j onX|ii oY|ii |ii jo@|ii |ii ƒ|i_ |ii|ii ƒ|i_nxV|iƒD]H\}}t|i|ƒdjo#t|i|t|i|ƒƒq¼q¼W|iioS|iiidrdsƒ}|dt|i_t|ƒdsjo|ds|i_qhn|iidjo|ii|i_n|iioky,t|iiƒ}tiƒ||i_Wq ttfj o&|itduƒƒdq|i_q Xn|ii p>|ii!odv|i_"n|ii#odw|i_"q–nC|ii ti$jo,|itdxƒƒdy|i_"dz|_%ndS({Nt enableShadowtshadowRjt locauthorizetenablePAMAccesst pamaccesstenableSysNetAutht sysnetauthtenableMkHomeDirt mkhomedirt enableCachetcachet enableHesiodthesiodt enableLDAPtldapt enableLDAPStldaptlstenableRFC2307bist rfc2307bistenableLDAPAuthtldapauthtenableKerberostkrb5t enableNIStnistkerberosKDCviaDNSt krb5kdcdnstkerberosRealmviaDNSt krb5realmdnstenableSmartcardt smartcardt enableFprintdt fingerprinttforceSmartcardtrequiresmartcardt enableWinbindtwinbindtenableWinbindAutht winbindauthtwinbindUseDefaultDomaintwinbindusedefaultdomaintwinbindOfflinetwinbindofflinet enableIPAv2tipav2t ipav2NoNTPt ipav2nontpt enableWINStwinst enableSSSDtsssdtenableSSSDAuthtsssdauthtenableForceLegacyt forcelegacytenableCacheCredst cachecredstpreferDNSinHostst preferdnstpasswordAlgorithmtpassalgoR_t hesiodlhsR`t hesiodrhsRat ldapserverRbt ldapbasednt ldapCacertURLtldaploadcacertRct krb5realmRdtkrb5kdcRetkrb5adminservertsmartcardModuletsmartcardmoduletsmartcardActiontsmartcardactiont nisDomaint nisdomaint nisServert nisservert smbWorkgroupt smbworkgroupt smbServerst smbserverst smbSecurityt smbsecuritytsmbRealmtsmbrealmt smbIdmapRanget smbidmaprangetwinbindSeparatortwinbindseparatortwinbindTemplateHomedirtwinbindtemplatehomedirtwinbindTemplatePrimaryGrouptwinbindtemplateprimarygrouptwinbindTemplateShelltwinbindtemplateshellt ipav2Domaint ipav2domaint ipav2Realmt ipav2realmt ipav2Servert ipav2servertenabletdisableRt%iis(Bad smart card removal action specified.tmd5tdescrypts;Unknown password hashing algorithm specified, using sha256.tsha256i(&t iteritemsRRPtsetattrRfRNR,RŠt ldapSchematAttributeErrorR¼RctgetKerberosKDCRdtgetKerberosAdminServerReR t winbindjointsplittjoinUserRt joinPasswordt ipav2joinRÂtintRKRMRÁt ValueErrort IndexErrorR9RIRµt enablemd5R´t disablemd5RLR3(Rt bool_settingststring_settingstopttaivaltlstRA((s'/usr/share/authconfig/authconfig-tui.pytoverrideSettingss      &" '      cCstS(N(RN(R((s'/usr/share/authconfig/authconfig-tui.pytdoUIúscCsnt}|iio|iitƒ}n|iidjo.|iitƒo|iiƒqjt }n|S(N( RNRPRëRft joinDomainRïR t joinIPADomaintwriteSysconfigR,(Rtret((s'/usr/share/authconfig/authconfig-tui.pyRüýs  cCsÍ|iiƒ|iio!|iiƒp d|_q;n|iiƒ|iio!|iiƒp d|_q™n$|ii |i ƒp d|_n|i ƒp d|_n|ii |ii ƒdS(Niii(RfttestLDAPCACertsRºtdownloadLDAPCACertR3trehashLDAPCACertsRPRURt writeChangedRiRütposttnostart(R((s'/usr/share/authconfig/authconfig-tui.pyt writeAuthInfo s       cCs´|iƒ|iio|iƒtidƒn|ii o7tiƒdjo$|it dƒƒtidƒn|i ƒ|ii o'|i i ƒ}tit| ƒƒn|iio0|i i|iiƒ}tit| ƒƒn|iio0|i i|iiƒ}tit| ƒƒn|iƒ|iƒ|iƒp5|iio|it dƒƒntidƒn|iio|i iƒn |iƒ|iS(Niscan only be run as rootisdialog was cancelledi(R]RPRRRRQRSRltgetuidR9RIRkRXRft restoreLastRðRWt restoreBackupRVt saveBackupRxRúRût printInfoRR3(Rtrv((s'/usr/share/authconfig/authconfig-tui.pytruns6   !          (RRR4R6R9RCR]RRRkRxRúRûRüRR (((s'/usr/share/authconfig/authconfig-tui.pyR+Ws   ü  k   t AuthconfigTUIcBs•eZd„Zd„Zd„Zd„Zddd„Zd„Zd„Z d„Z d„Z d „Z d „Z d „Zd „Zd „Zd„ZRS(cCsdS(Nsauthconfig-tui((R((s'/usr/share/authconfig/authconfig-tui.pyR6;scCs2|iio!|iio|iitƒndS(N(RPt kickstartRëRfRüRN(R((s'/usr/share/authconfig/authconfig-tui.pyRü>scCsï|pdSxÜ|oÔ|d}|d}t|ƒtjo@|iiƒo|d}|d}q}|d}|d}nti|tiƒpItdƒ||d|f}ti |i tdƒ|tdƒgƒn|d}qWdS(Niiis€The %s file was not found, but it is required for %s support to work properly. Install the %s package, which provides this file.tWarningtOki( ttypettupleRft sssdSupportedRlRmtR_OKRItsnacktButtonChoiceWindowtscreen(Rttoggletwarningtpathtpackagettext((s'/usr/share/authconfig/authconfig-tui.pytwarnCs"     ,c# CsMtitdƒddg}titdƒddg}titiftdƒd6dg}titiftdƒd7dg}titi ftd ƒd8dg}ti td ƒd dg}ti tdƒddg}ti tdƒddg}ti tdƒd|g} titdƒd| g} tiddƒ} titdƒƒ} | i| ddddddƒtitdƒt|iiƒƒ} }| i|ddddddƒtitdƒt|iiƒƒ}}| i|ddddddƒtitdƒt|iiƒƒ}}| i|ddddddƒtitdƒt|iiƒƒ}}| i|dd ddddƒtitd!ƒt|iiƒƒ}}| i|dd"ddddƒtidd#ƒ}titd$ƒƒ} |i| ddddddƒtitd%ƒt|iid&jƒƒ}}|i|ddddddƒtitd'ƒt|iiƒƒ}}|i|ddddddƒtitd(ƒt|iiƒƒ}}|i|ddddddƒtitd)ƒt|iiƒƒ}}|i|dd ddddƒtitd*ƒt|iiƒƒ}}|i|dd"ddddƒtitd+ƒt|ii ƒƒ}}|i|ddddddƒtitd,ƒt|ii!ƒƒ}}|i|dd-ddddƒtiddƒ}|i| ddddd.dd/d9ƒ|i|ddd0dd.dd/d:ƒtiddƒ}ti"|i#i$o td1ƒp td2ƒƒ}ti"td3ƒƒ}|i|ddƒ|i|ddƒtiddƒ}|i|ddddƒ|i|ddddƒti%ƒ} |i&i'|td4ƒƒ| i(|ƒ| i)ƒ} | |joÀ| i*ƒ|i_|i*ƒ|i_|i*ƒ|i_|i*ƒ|i_|i*ƒ|i_|i*ƒ|i_|i*ƒod&|i_n$|iid&jod5|i_n|i*ƒ|i_|i*ƒ|i_|i*ƒ|i_ |i*ƒ|i_!|i*ƒ|i_|ii|f|ii|f|ii|f|ii| f|ii|f|ii|f|ii|f|ii|f|ii | fg }!x*|!D]}"|i+|"d|"dƒqWn|i&i,ƒ| |jS(;NtcachingtnscdsFingerprint readert pam_fprintdtKerberostpam_krb5s sssd-clientsLDAP authenticationtpam_ldaptLDAPs nss-pam-ldapdtNIStypbindsshadow passwords shadow-utilstWinbinds samba-clientsWinbind authentications samba-commoniisUser Informationit anchorLefttgrowxsCache InformationsUse LDAPisUse NISis Use IPAv2is Use WinbindiitAuthenticationsUse MD5 PasswordsRâsUse Shadow PasswordssUse LDAP Authentications Use KerberossUse Fingerprint readersUse Winbind Authentications!Local authorization is sufficientit anchorToptpaddingt anchorRighttBacktCanceltNextsAuthentication ConfigurationRã(R#s sssd-client(R$s sssd-client(s nss-pam-ldapds sssd-client(iiii(iiii(-RKRvRIR RwRqRtRrRsRuRnt PATH_PWCONVtPATH_WINBIND_NETtPATH_PAM_WINBINDtPATH_LIBNSS_WINBINDRtGridtLabeltsetFieldtCheckboxtboolRfR‚R†RR¤RœR´RyRŒRŽR˜RžRjtButtonRPtbacktFormRtgridWrappedWindowtaddR tselectedRt popWindow(#Rt warnCachet warnFprintdt warnKerberost warnLDAPAuthtwarnLDAPtwarnNISt warnShadowtwarnWinbindNettwarnWinbindAutht warnWinbindtinfoGridtcompRƒtcbR‡R‘R¥RtauthGridRâRztldapaRtfprintdRŸR{tmechGridt buttonGridtcanceltoktmainGridtformt allwarningsR((s'/usr/share/authconfig/authconfig-tui.pytgetMainChoicesWs¢$$$(((((.((((((%%/       c Cst|ƒ}tid|ƒ}d} g} xx|D]p\} } } }| djopti| tt|i| ƒƒƒ}| i|ƒ|iti dƒd| ddƒ|i|d| ddƒnØ| djo|ti | ƒ}|i|d| d dddƒti d t|i| ƒd |ƒ}| i|ƒ|i|d| d dƒnO| d joìti | ƒ}|i|d| d dddddƒy#t|i| ƒ}|i |ƒWnt j o|d}nXd}g}x*|D]"}|i||||jfƒqàWtid|ƒ}| i|ƒ|i|d| ddƒnV| djoHtid| ddddƒ}| i|ƒ|i|d| ddƒn| d7} q1Wti|odpddƒ}ti|ƒ}ti|ƒ}|oti|ƒpd}|i|ddƒ|o|i|ddƒn|i||odpddƒtiddƒ}|i|ddd dd dƒ|i|ddd dd dƒtiƒ}|ii||ƒ|i|ƒx)to!|iƒ}||joPn| }xÑ|D]É\} } } }| djo&t|i| |idƒiƒƒq| djo&t|i| |idƒiƒƒq| d jo&t|i| |idƒiƒƒq| djo|idƒqqW||joPn|o |ƒqÑqÑW|iiƒ||jS(NiittfvalueRR.iR)tsvalueR-i(thiddenR*trvalueR,tlvaluei2tflexDowntflexUpi(iiii(iiii(iiii(iiii(RRR6R9R:RRfR R8R7tEntrytindexRñR tRadioBartTextboxReflowedR;R=RR>R?RNR RætpopR@tvaluet getSelectionRA(Rtdtitletitemst canceltxttoktxtt anothertxtt anothercbtrowst questionGridtrowtwidgetstttdesctattrtvalRNRMtselt buttonlisttvtradioBarRSRTRUtanotherRVRWtwcopy((s'/usr/share/authconfig/authconfig-tui.pytgetGenericChoicesÉs”  $ " $  %     !     & & &   c Cs–dtdƒddfdtdƒddfdtdƒddfg}|itd ƒ|td ƒ|o td ƒp td ƒd tdƒd|iƒS(NR[sDomain:RÙisRealm:RÛsServer:RÝsIPAv2 SettingsR/R1RRls Join DomainRm(RIR|tmaybeGetJoinSettings(Rtnextt questions((s'/usr/share/authconfig/authconfig-tui.pytgetIPAv2Settings(s ,cCsdtdƒddfdtdƒddfdtdƒd dfg}|itd ƒ|td ƒ|o td ƒp td ƒƒS(NRZsUse TLSRˆR[sServer:RaisBase DN:Rbs LDAP SettingsR/R1R(RIR R|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetLDAPSettings0s cCsldtdƒddfdtdƒddfg}|itdƒ|tdƒ|o td ƒp td ƒƒS( NR[sDomain:RÃisServer:RÅs NIS SettingsR/R1R(RIR|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetNISSettings7scCs«dtdƒddfdtdƒddfdtdƒddfd td ƒd dfd td ƒd dfg}|itdƒ|tdƒ|o tdƒp tdƒƒS(NR[sRealm:RcisKDC:Rds Admin Server:ReRZs"Use DNS to resolve hosts to realmsR”s!Use DNS to locate KDCs for realmsR’sKerberos SettingsR/R1R(RIR R|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetKerberosSettings=scCsédtdƒddfdtdƒddfg}|iipd|i_n|itd ƒ|td ƒtd ƒƒom|iiƒ|iiƒ|iio|iit ƒn"|ii o|ii t ƒn|ii ƒnt S( NR[sDomain Administrator:Ríis Password:Rîit Administrators Join SettingsR0R( RIRfRíR|RtsuspendRTRœRüRNR¤Rýtresume(RR((s'/usr/share/authconfig/authconfig-tui.pytgetJoinSettingsFs     cCs±dtdƒddfg}ti|iƒ}|iƒ|iiƒt}|ii|ƒo.|i tdƒ|tdƒtdƒƒ}n|o|ii ƒn|i ƒt S(NR^s°Some of the configuration changes you've made should be saved to disk before continuing. If you do not save them, then your attempt to join the domain may fail. Save changes?s Save SettingstNotYes( RIR RKRgR9RTRfR,tdiffersR|RR‡RN(RRt orig_infoRÿ((s'/usr/share/authconfig/authconfig-tui.pyR}Vs    c Csüddg}ddddddg}d „}t||ƒ}d td ƒd |fd tdƒddfd tdƒddfd tdƒddfd tdƒd|fg}|itdƒ|tdƒ|o tdƒp tdƒdtdƒd|iƒS(Ntadstdomains /sbin/nologins/bin/shs /bin/bashs /bin/tcshs/bin/kshs/bin/zshcSsti|tiƒS(N(RlRmRo(tshell((s'/usr/share/authconfig/authconfig-tui.pyt shellexistsksR]sSecurity Model:RËR[sDomain:RÇisDomain Controllers:RÉs ADS Realm:RÍsTemplate Shell:R×sWinbind SettingsR/R1RRls Join DomainRm(tfilterRIR|R}(RR~tsecuritytshellsRR((s'/usr/share/authconfig/authconfig-tui.pytgetWinbindSettingsfs   ,cCsbd}t}xI|djo;|djo.|iiƒ|djo|iƒ}nÕ|djoq|iio`|iip>|iip1|iip$|iip|ii p |ii }|i |ƒ}q'nW|djod|iip |iioF|iip$|iip|ii p |ii }|i |ƒ}q'næ|djoJ|iio9|iip|ii p |ii }|i |ƒ}q'n|djo=|iio,|ii p |ii }|i|ƒ}q'nE|djo7|ii p |ii ot}|i|ƒ}q'n|iiƒ|o|d7}q|d8}qW|djS( Niiiiiiii(R,RfRTRYR¤R†RŒRŽRRœRžR€RR‚RƒR“(RR~trctmore((s'/usr/share/authconfig/authconfig-tui.pyt getChoices{sV                          cCsBtdƒ|ii}ti|itdƒ|tdƒgƒdS(NsÄTo connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory. Then press OK.RR(RIRft ldapCacertDirRRR(RR((s'/usr/share/authconfig/authconfig-tui.pytdisplayCACertsMessage¨s  cCsÀ|iiotSz™tiƒ|_|iƒ}|iitdƒƒ|ii dd|dƒ|i ƒp|ii ƒt S|i io|i iƒo|iƒnWd|ii ƒXtS(NsN / between elements | selects | next screenis - (c) 1999-2005 Red Hat, Inc.(RPRRNRt SnackScreenRR6t pushHelpLineRIt drawRootTextR–tfinishR,RfRˆRR˜(Rtpackageversion((s'/usr/share/authconfig/authconfig-tui.pyRû°s    N(RRR6RüRRYR R|R€RR‚RƒR‡R}R“R–R˜Rû(((s'/usr/share/authconfig/authconfig-tui.pyR:s    r_       - t__main__R5(RKtacutiltgettextRltsignalRtlgettextRItoptparseRRRt setlocaletLC_ALLRRRRR+RRtSIGINTtSIG_DFLt textdomainR6RQR (((s'/usr/share/authconfig/authconfig-tui.pyts*0     $ÿäÿ‹