self.samdb.domain_dn()))
computerlist = self.samdb.search(base=self.samdb.domain_dn(),
scope=ldb.SCOPE_SUBTREE,
- expression=search_filter, attrs=[])
+ expression=search_filter)
if computerlist:
return computerlist[0]
else:
self.samdb.domain_dn()))
grouplist = self.samdb.search(base=self.samdb.domain_dn(),
scope=ldb.SCOPE_SUBTREE,
- expression=search_filter,
- attrs=[])
+ expression=search_filter)
if grouplist:
return grouplist[0]
else:
self.samdb.domain_dn()))
oulist = self.samdb.search(base=self.samdb.domain_dn(),
scope=ldb.SCOPE_SUBTREE,
- expression=search_filter,
- attrs=[])
+ expression=search_filter)
if oulist:
return oulist[0]
else:
search_filter = "(&(sAMAccountName=%s)(objectCategory=%s,%s))" % (ldb.binary_encode(name), "CN=Person,CN=Schema,CN=Configuration", self.samdb.domain_dn())
userlist = self.samdb.search(base=self.samdb.domain_dn(),
scope=ldb.SCOPE_SUBTREE,
- expression=search_filter, attrs=[])
+ expression=search_filter)
if userlist:
return userlist[0]
else:
self.assertFalse("nTSecurityDescriptor" in res[0])
res = self.ldb_admin.search(self.base_dn, SCOPE_BASE, None,
- [], controls=["sd_flags:1:%d" % (sd_flags)])
+ controls=["sd_flags:1:%d" % (sd_flags)])
self.assertTrue("nTSecurityDescriptor" in res[0])
tmp = res[0]["nTSecurityDescriptor"][0]
sd = ndr_unpack(security.descriptor, tmp)