summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--tests/test_install/test_updates.py15
-rw-r--r--tests/test_xmlrpc/test_automount_plugin.py86
-rw-r--r--tests/test_xmlrpc/test_cert.py7
-rw-r--r--tests/test_xmlrpc/test_hbac_plugin.py103
-rw-r--r--tests/test_xmlrpc/test_passwd_plugin.py9
-rw-r--r--tests/test_xmlrpc/test_sudorule_plugin.py74
6 files changed, 105 insertions, 189 deletions
diff --git a/tests/test_install/test_updates.py b/tests/test_install/test_updates.py
index eb376f191..8b9ac28eb 100644
--- a/tests/test_install/test_updates.py
+++ b/tests/test_install/test_updates.py
@@ -24,7 +24,8 @@ import os
import sys
import ldap
import nose
-from tests.util import raises, PluginTester
+from nose.tools import raises
+from tests.util import PluginTester
from tests.data import unicode_str
from ipalib import api
from ipalib import errors
@@ -182,20 +183,16 @@ class test_update(object):
assert(modified == True)
+ @raises(BadSyntax)
def test_8_badsyntax(self):
"""
Test the updater with an unknown keyword
"""
- try:
- modified = self.updater.update([self.testdir + "8_badsyntax.update"])
- except BadSyntax:
- pass
+ modified = self.updater.update([self.testdir + "8_badsyntax.update"])
+ @raises(BadSyntax)
def test_9_badsyntax(self):
"""
Test the updater with an incomplete line
"""
- try:
- modified = self.updater.update([self.testdir + "9_badsyntax.update"])
- except BadSyntax:
- pass
+ modified = self.updater.update([self.testdir + "9_badsyntax.update"])
diff --git a/tests/test_xmlrpc/test_automount_plugin.py b/tests/test_xmlrpc/test_automount_plugin.py
index cfea61270..dedd2346a 100644
--- a/tests/test_xmlrpc/test_automount_plugin.py
+++ b/tests/test_xmlrpc/test_automount_plugin.py
@@ -22,6 +22,8 @@ Test the `ipalib/plugins/automount.py' module.
"""
import sys
+from nose.tools import raises, assert_raises # pylint: disable=E0611
+
from xmlrpc_test import XMLRPC_test, assert_attr_equal
from ipalib import api
from ipalib import errors
@@ -77,16 +79,12 @@ class test_automount(XMLRPC_test):
assert res
assert_attr_equal(res, 'automountkey', self.keyname)
+ @raises(errors.DuplicateEntry)
def test_4_automountkey_add(self):
"""
Test adding a duplicate key using `xmlrpc.automountkey_add` method.
"""
- try:
- api.Command['automountkey_add'](self.locname, self.mapname, **self.key_kw)
- except errors.DuplicateEntry:
- pass
- else:
- assert False
+ res = api.Command['automountkey_add'](self.locname, self.mapname, **self.key_kw)
def test_5_automountmap_show(self):
"""
@@ -153,12 +151,8 @@ class test_automount(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountkey_show'](self.locname, self.mapname, **delkey_kw)
- except errors.NotFound:
- pass
- else:
- assert False
def test_c_automountlocation_del(self):
"""
@@ -169,12 +163,8 @@ class test_automount(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountlocation_show'](self.locname)
- except errors.NotFound:
- pass
- else:
- assert False
def test_d_automountmap_del(self):
"""
@@ -182,12 +172,8 @@ class test_automount(XMLRPC_test):
"""
# Verify that the second key we added is gone
key_kw = {'automountkey': self.keyname2, 'automountinformation': self.info, 'raw': True}
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountkey_show'](self.locname, self.mapname, **key_kw)
- except errors.NotFound:
- pass
- else:
- assert False
class test_automount_direct(XMLRPC_test):
"""
@@ -214,16 +200,12 @@ class test_automount_direct(XMLRPC_test):
assert res
assert_attr_equal(res, 'automountmapname', self.mapname)
+ @raises(errors.DuplicateEntry)
def test_2_automountmap_add_duplicate(self):
"""
Test adding a duplicate direct map.
"""
- try:
- res = api.Command['automountmap_add_indirect'](self.locname, self.mapname, **self.direct_kw)['result']
- except errors.DuplicateEntry:
- pass
- else:
- assert False
+ res = api.Command['automountmap_add_indirect'](self.locname, self.mapname, **self.direct_kw)['result']
def test_3_automountlocation_del(self):
"""
@@ -234,12 +216,8 @@ class test_automount_direct(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verity that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountlocation_show'](self.locname)
- except errors.NotFound:
- pass
- else:
- assert False
class test_automount_indirect(XMLRPC_test):
"""
@@ -269,16 +247,12 @@ class test_automount_indirect(XMLRPC_test):
assert res
assert_attr_equal(res, 'automountmapname', self.mapname)
+ @raises(errors.DuplicateEntry)
def test_1a_automountmap_add_indirect(self):
"""
Test adding a duplicate indirect map.
"""
- try:
- api.Command['automountmap_add_indirect'](self.locname, self.mapname, **self.map_kw)['result']
- except errors.DuplicateEntry:
- pass
- else:
- assert False
+ api.Command['automountmap_add_indirect'](self.locname, self.mapname, **self.map_kw)['result']
def test_2_automountmap_show(self):
"""
@@ -297,12 +271,8 @@ class test_automount_indirect(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountkey_show'](self.locname, self.parentmap, **self.key_kw)
- except errors.NotFound:
- pass
- else:
- assert False
def test_4_automountmap_del(self):
"""
@@ -313,12 +283,8 @@ class test_automount_indirect(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountmap_show'](self.locname, self.mapname)
- except errors.NotFound:
- pass
- else:
- assert False
def test_5_automountlocation_del(self):
"""
@@ -329,12 +295,8 @@ class test_automount_indirect(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verity that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountlocation_show'](self.locname)
- except errors.NotFound:
- pass
- else:
- assert False
class test_automount_indirect_no_parent(XMLRPC_test):
@@ -382,12 +344,8 @@ class test_automount_indirect_no_parent(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountkey_show'](self.locname, self.parentmap, **delkey_kw)
- except errors.NotFound:
- pass
- else:
- assert False
def test_4_automountmap_del(self):
"""
@@ -398,12 +356,8 @@ class test_automount_indirect_no_parent(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountmap_show'](self.locname, self.mapname)
- except errors.NotFound:
- pass
- else:
- assert False
def test_5_automountlocation_del(self):
"""
@@ -414,9 +368,5 @@ class test_automount_indirect_no_parent(XMLRPC_test):
assert_attr_equal(res, 'failed', '')
# Verity that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['automountlocation_show'](self.locname)
- except errors.NotFound:
- pass
- else:
- assert False
diff --git a/tests/test_xmlrpc/test_cert.py b/tests/test_xmlrpc/test_cert.py
index 20aba1652..253373a2a 100644
--- a/tests/test_xmlrpc/test_cert.py
+++ b/tests/test_xmlrpc/test_cert.py
@@ -23,6 +23,8 @@ Test the `ipalib/plugins/cert.py` module against the selfsign plugin.
import sys
import os
import shutil
+from nose.tools import assert_raises # pylint: disable=E0611
+
from xmlrpc_test import XMLRPC_test, assert_attr_equal
from ipalib import api
from ipalib import errors
@@ -105,11 +107,8 @@ class test_cert(XMLRPC_test):
res = api.Command['host_add'](self.host_fqdn, force= True)['result']
csr = unicode(self.generateCSR(str(self.subject)))
- try:
+ with assert_raises(errors.NotFound):
res = api.Command['cert_request'](csr, principal=self.service_princ)
- assert False
- except errors.NotFound:
- pass
def test_2_cert_add(self):
"""
diff --git a/tests/test_xmlrpc/test_hbac_plugin.py b/tests/test_xmlrpc/test_hbac_plugin.py
index ef61d68fc..268c8d9d2 100644
--- a/tests/test_xmlrpc/test_hbac_plugin.py
+++ b/tests/test_xmlrpc/test_hbac_plugin.py
@@ -20,6 +20,8 @@
Test the `ipalib/plugins/hbacrule.py` module.
"""
+from nose.tools import raises, assert_raises # pylint: disable=E0611
+
from xmlrpc_test import XMLRPC_test, assert_attr_equal
from ipalib import api
from ipalib import errors
@@ -63,18 +65,14 @@ class test_hbac(XMLRPC_test):
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
assert_attr_equal(entry, 'description', self.rule_desc)
+ @raises(errors.DuplicateEntry)
def test_1_hbacrule_add(self):
"""
Test adding an existing HBAC rule using `xmlrpc.hbacrule_add'.
"""
- try:
- api.Command['hbacrule_add'](
+ api.Command['hbacrule_add'](
self.rule_name, accessruletype=self.rule_type
)
- except errors.DuplicateEntry:
- pass
- else:
- assert False
def test_2_hbacrule_show(self):
"""
@@ -400,20 +398,6 @@ class test_hbac(XMLRPC_test):
assert not failed['sourcehost']['hostgroup']
entry = ret['result']
- def test_c_hbacrule_zap_testing_data(self):
- """
- Clear data for HBAC plugin testing.
- """
- api.Command['hbacrule_remove_host'](self.rule_name, host=self.test_host)
- api.Command['hbacrule_remove_host'](self.rule_name, hostgroup=self.test_hostgroup)
- api.Command['user_del'](self.test_user)
- api.Command['group_del'](self.test_group)
- api.Command['host_del'](self.test_host)
- api.Command['hostgroup_del'](self.test_hostgroup)
- api.Command['host_del'](self.test_sourcehost)
- api.Command['hostgroup_del'](self.test_sourcehostgroup)
- api.Command['hbacsvc_del'](self.test_service)
-
def test_d_hbacrule_disable(self):
"""
Test disabling HBAC rule using `xmlrpc.hbacrule_disable`.
@@ -433,6 +417,7 @@ class test_hbac(XMLRPC_test):
# FIXME: Should this be 'enabled' or 'TRUE'?
assert_attr_equal(entry, 'ipaenabledflag', 'TRUE')
+ @raises(errors.MutuallyExclusiveError)
def test_f_hbacrule_exclusiveuser(self):
"""
Test adding a user to an HBAC rule when usercat='all'
@@ -440,22 +425,21 @@ class test_hbac(XMLRPC_test):
api.Command['hbacrule_mod'](self.rule_name, usercategory=u'all')
try:
api.Command['hbacrule_add_user'](self.rule_name, users='admin')
- except errors.MutuallyExclusiveError:
- pass
- api.Command['hbacrule_mod'](self.rule_name, usercategory=u'')
+ finally:
+ api.Command['hbacrule_mod'](self.rule_name, usercategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_g_hbacrule_exclusiveuser(self):
"""
Test setting usercat='all' in an HBAC rule when there are users
"""
- api.Command['hbacrule_add_user'](self.rule_name, users='admin')
+ api.Command['hbacrule_add_user'](self.rule_name, user='admin')
try:
api.Command['hbacrule_mod'](self.rule_name, usercategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
- api.Command['hbacrule_remove_user'](self.rule_name, users='admin')
+ api.Command['hbacrule_remove_user'](self.rule_name, user='admin')
+ @raises(errors.MutuallyExclusiveError)
def test_h_hbacrule_exclusivehost(self):
"""
Test adding a host to an HBAC rule when hostcat='all'
@@ -463,10 +447,10 @@ class test_hbac(XMLRPC_test):
api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'all')
try:
api.Command['hbacrule_add_host'](self.rule_name, host=self.test_host)
- except errors.MutuallyExclusiveError:
- pass
- api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'')
+ finally:
+ api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_i_hbacrule_exclusivehost(self):
"""
Test setting hostcat='all' in an HBAC rule when there are hosts
@@ -474,22 +458,21 @@ class test_hbac(XMLRPC_test):
api.Command['hbacrule_add_host'](self.rule_name, host=self.test_host)
try:
api.Command['hbacrule_mod'](self.rule_name, hostcategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
api.Command['hbacrule_remove_host'](self.rule_name, host=self.test_host)
+ @raises(errors.MutuallyExclusiveError)
def test_j_hbacrule_exclusiveservice(self):
"""
Test adding a service to an HBAC rule when servicecat='all'
"""
api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'all')
try:
- api.Command['hbacrule_add_host'](self.rule_name, hbacsvc=self.test_service)
- except errors.MutuallyExclusiveError:
- pass
- api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'')
+ api.Command['hbacrule_add_service'](self.rule_name, hbacsvc=self.test_service)
+ finally:
+ api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_k_hbacrule_exclusiveservice(self):
"""
Test setting servicecat='all' in an HBAC rule when there are services
@@ -497,35 +480,43 @@ class test_hbac(XMLRPC_test):
api.Command['hbacrule_add_service'](self.rule_name, hbacsvc=self.test_service)
try:
api.Command['hbacrule_mod'](self.rule_name, servicecategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
api.Command['hbacrule_remove_service'](self.rule_name, hbacsvc=self.test_service)
+ @raises(errors.ValidationError)
def test_l_hbacrule_add(self):
"""
Test adding a new HBAC rule with a deny type.
"""
- try:
- api.Command['hbacrule_add'](
- u'denyrule',
- accessruletype=u'deny',
- description=self.rule_desc,
- )
- except errors.ValidationError:
- pass
+ api.Command['hbacrule_add'](
+ u'denyrule',
+ accessruletype=u'deny',
+ description=self.rule_desc,
+ )
+ @raises(errors.ValidationError)
def test_m_hbacrule_add(self):
"""
Test changing an HBAC rule to the deny type
"""
- try:
- api.Command['hbacrule_mod'](
- self.rule_name,
- accessruletype=u'deny',
- )
- except errors.ValidationError:
- pass
+ api.Command['hbacrule_mod'](
+ self.rule_name,
+ accessruletype=u'deny',
+ )
+
+ def test_y_hbacrule_zap_testing_data(self):
+ """
+ Clear data for HBAC plugin testing.
+ """
+ api.Command['hbacrule_remove_host'](self.rule_name, host=self.test_host)
+ api.Command['hbacrule_remove_host'](self.rule_name, hostgroup=self.test_hostgroup)
+ api.Command['user_del'](self.test_user)
+ api.Command['group_del'](self.test_group)
+ api.Command['host_del'](self.test_host)
+ api.Command['hostgroup_del'](self.test_hostgroup)
+ api.Command['host_del'](self.test_sourcehost)
+ api.Command['hostgroup_del'](self.test_sourcehostgroup)
+ api.Command['hbacsvc_del'](self.test_service)
def test_z_hbacrule_del(self):
"""
@@ -533,9 +524,5 @@ class test_hbac(XMLRPC_test):
"""
api.Command['hbacrule_del'](self.rule_name)
# verify that it's gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['hbacrule_show'](self.rule_name)
- except errors.NotFound:
- pass
- else:
- assert False
diff --git a/tests/test_xmlrpc/test_passwd_plugin.py b/tests/test_xmlrpc/test_passwd_plugin.py
index 32e75acbe..2a44da711 100644
--- a/tests/test_xmlrpc/test_passwd_plugin.py
+++ b/tests/test_xmlrpc/test_passwd_plugin.py
@@ -21,6 +21,9 @@ Test the `ipalib/plugins/passwd.py` module.
"""
import sys
+
+from nose.tools import assert_raises # pylint: disable=E0611
+
from xmlrpc_test import XMLRPC_test, assert_attr_equal
from ipalib import api
from ipalib import errors
@@ -62,9 +65,5 @@ class test_passwd(XMLRPC_test):
api.Command['user_del'](self.uid)
# Verify that it is gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['user_show'](self.uid)
- except errors.NotFound:
- pass
- else:
- assert False
diff --git a/tests/test_xmlrpc/test_sudorule_plugin.py b/tests/test_xmlrpc/test_sudorule_plugin.py
index bddf00c4f..2a597c37b 100644
--- a/tests/test_xmlrpc/test_sudorule_plugin.py
+++ b/tests/test_xmlrpc/test_sudorule_plugin.py
@@ -21,6 +21,8 @@
Test the `ipalib/plugins/sudorule.py` module.
"""
+from nose.tools import raises, assert_raises # pylint: disable=E0611
+
from xmlrpc_test import XMLRPC_test, assert_attr_equal
from ipalib import api
from ipalib import errors
@@ -63,18 +65,14 @@ class test_sudorule(XMLRPC_test):
assert_attr_equal(entry, 'cn', self.rule_name)
assert_attr_equal(entry, 'description', self.rule_desc)
+ @raises(errors.DuplicateEntry)
def test_1_sudorule_add(self):
"""
Test adding an duplicate Sudo rule using `xmlrpc.sudorule_add'.
"""
- try:
- api.Command['sudorule_add'](
- self.rule_name
- )
- except errors.DuplicateEntry:
- pass
- else:
- assert False
+ api.Command['sudorule_add'](
+ self.rule_name
+ )
def test_2_sudorule_show(self):
"""
@@ -521,29 +519,29 @@ class test_sudorule(XMLRPC_test):
assert 'memberdenycmd_sudocmd' not in entry
assert 'memberdenycmd_sudocmdgroup' not in entry
+ @raises(errors.MutuallyExclusiveError)
def test_c_sudorule_exclusiveuser(self):
"""
Test adding a user to an Sudo rule when usercat='all'
"""
api.Command['sudorule_mod'](self.rule_name, usercategory=u'all')
try:
- api.Command['sudorule_add_user'](self.rule_name, users='admin')
- except errors.MutuallyExclusiveError:
- pass
- api.Command['sudorule_mod'](self.rule_name, usercategory=u'')
+ api.Command['sudorule_add_user'](self.rule_name, user=u'admin')
+ finally:
+ api.Command['sudorule_mod'](self.rule_name, usercategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_d_sudorule_exclusiveuser(self):
"""
Test setting usercat='all' in an Sudo rule when there are users
"""
- api.Command['sudorule_add_user'](self.rule_name, users='admin')
+ api.Command['sudorule_add_user'](self.rule_name, user=u'admin')
try:
api.Command['sudorule_mod'](self.rule_name, usercategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
- api.Command['sudorule_remove_user'](self.rule_name, users='admin')
+ api.Command['sudorule_remove_user'](self.rule_name, user=u'admin')
+ @raises(errors.MutuallyExclusiveError)
def test_e_sudorule_exclusivehost(self):
"""
Test adding a host to an Sudo rule when hostcat='all'
@@ -551,10 +549,10 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_mod'](self.rule_name, hostcategory=u'all')
try:
api.Command['sudorule_add_host'](self.rule_name, host=self.test_host)
- except errors.MutuallyExclusiveError:
- pass
- api.Command['sudorule_mod'](self.rule_name, hostcategory=u'')
+ finally:
+ api.Command['sudorule_mod'](self.rule_name, hostcategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_f_sudorule_exclusivehost(self):
"""
Test setting hostcat='all' in an Sudo rule when there are hosts
@@ -562,11 +560,10 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_add_host'](self.rule_name, host=self.test_host)
try:
api.Command['sudorule_mod'](self.rule_name, hostcategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
api.Command['sudorule_remove_host'](self.rule_name, host=self.test_host)
+ @raises(errors.MutuallyExclusiveError)
def test_g_sudorule_exclusivecommand(self):
"""
Test adding a command to an Sudo rule when cmdcategory='all'
@@ -574,10 +571,10 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_mod'](self.rule_name, cmdcategory=u'all')
try:
api.Command['sudorule_add_allow_command'](self.rule_name, sudocmd=self.test_command)
- except errors.MutuallyExclusiveError:
- pass
- api.Command['sudorule_mod'](self.rule_name, cmdcategory=u'')
+ finally:
+ api.Command['sudorule_mod'](self.rule_name, cmdcategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_h_sudorule_exclusivecommand(self):
"""
Test setting cmdcategory='all' in an Sudo rule when there are commands
@@ -585,11 +582,10 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_add_allow_command'](self.rule_name, sudocmd=self.test_command)
try:
api.Command['sudorule_mod'](self.rule_name, cmdcategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
api.Command['sudorule_remove_allow_command'](self.rule_name, sudocmd=self.test_command)
+ @raises(errors.MutuallyExclusiveError)
def test_i_sudorule_exclusiverunas(self):
"""
Test adding a runasuser to an Sudo rule when ipasudorunasusercategory='all'
@@ -597,10 +593,10 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_mod'](self.rule_name, ipasudorunasusercategory=u'all')
try:
api.Command['sudorule_add_runasuser'](self.rule_name, sudocmd=self.test_user)
- except errors.MutuallyExclusiveError:
- pass
- api.Command['sudorule_mod'](self.rule_name, ipasudorunasusercategory=u'')
+ finally:
+ api.Command['sudorule_mod'](self.rule_name, ipasudorunasusercategory=u'')
+ @raises(errors.MutuallyExclusiveError)
def test_j_sudorule_exclusiverunas(self):
"""
Test setting ipasudorunasusercategory='all' in an Sudo rule when there are runas users
@@ -608,8 +604,6 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_add_runasuser'](self.rule_name, user=self.test_user)
try:
api.Command['sudorule_mod'](self.rule_name, ipasudorunasusercategory=u'all')
- except errors.MutuallyExclusiveError:
- pass
finally:
api.Command['sudorule_remove_runasuser'](self.rule_name, user=self.test_command)
@@ -644,24 +638,18 @@ class test_sudorule(XMLRPC_test):
api.Command['sudorule_del'](self.rule_name2)
# add a new rule with a duplicate order
- try:
+ with assert_raises(errors.ValidationError):
api.Command['sudorule_add'](self.rule_name2, sudoorder=1)
- except errors.ValidationError:
- pass
# add a new rule with a unique order
api.Command['sudorule_add'](self.rule_name2, sudoorder=2)
- try:
+ with assert_raises(errors.ValidationError):
api.Command['sudorule_mod'](self.rule_name2, sudoorder=1)
- except errors.ValidationError:
- pass
# Try setting both to 0
api.Command['sudorule_mod'](self.rule_name2, sudoorder=0)
- try:
+ with assert_raises(errors.ValidationError):
api.Command['sudorule_mod'](self.rule_name, sudoorder=0)
- except errors.ValidationError:
- pass
def test_m_sudorule_del(self):
@@ -670,10 +658,6 @@ class test_sudorule(XMLRPC_test):
"""
api.Command['sudorule_del'](self.rule_name)
# verify that it's gone
- try:
+ with assert_raises(errors.NotFound):
api.Command['sudorule_show'](self.rule_name)
- except errors.NotFound:
- pass
- else:
- assert False
api.Command['sudorule_del'](self.rule_name2)