View | Details | Raw Unified | Return to bug 33263
Collapse All | Expand All

(-)modules/univention/s4connector/s4/password.py (-2 / +2 lines)
 Lines 361-370    Link Here 
361
		if ctr3.num_old_keys != 0 and ctr3.num_old_keys != ctr3.num_keys:
361
		if ctr3.num_old_keys != 0 and ctr3.num_old_keys != ctr3.num_keys:
362
			# TODO: Recommended policy is to fill up old_keys to match num_keys, this will result in a traceback, can we do something better?
362
			# TODO: Recommended policy is to fill up old_keys to match num_keys, this will result in a traceback, can we do something better?
363
			ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: Primary:Kerberos num_keys = %s" % ctr3.num_keys)
363
			ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: Primary:Kerberos num_keys = %s" % ctr3.num_keys)
364
			for k in ctr4.keys:
364
			for k in ctr3.keys:
365
				ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: ctr3.key.keytype: %s" % k.keytype)
365
				ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: ctr3.key.keytype: %s" % k.keytype)
366
			ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: Primary:Kerberos num_old_keys = %s" % ctr3.num_old_keys)
366
			ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: Primary:Kerberos num_old_keys = %s" % ctr3.num_old_keys)
367
			for k in ctr4.old_keys:
367
			for k in ctr3.old_keys:
368
				ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: ctr3.old_key.keytype: %s" % k.keytype)
368
				ud.debug(ud.LDAP, ud.WARN, "calculate_supplementalCredentials: ctr3.old_key.keytype: %s" % k.keytype)
369
369
370
		krb = drsblobs.package_PrimaryKerberosBlob()
370
		krb = drsblobs.package_PrimaryKerberosBlob()

Return to bug 33263