summaryrefslogtreecommitdiffstats
path: root/ipatests
diff options
context:
space:
mode:
authorTomas Babej <tbabej@redhat.com>2013-11-01 13:59:16 +0100
committerMartin Kosek <mkosek@redhat.com>2013-11-01 16:24:30 +0100
commit9cbb94cd66c80b3d52f08704c1d597f98a66cbab (patch)
tree5215cf221769a86bd738457a99e6fecc3d00678f /ipatests
parent428aecec497e2d27d3901ec2caff4a68568ee2b5 (diff)
downloadfreeipa-9cbb94cd66c80b3d52f08704c1d597f98a66cbab.tar.gz
freeipa-9cbb94cd66c80b3d52f08704c1d597f98a66cbab.tar.xz
freeipa-9cbb94cd66c80b3d52f08704c1d597f98a66cbab.zip
ipatests: test_trust: use domain name instead of realm for user lookups
Diffstat (limited to 'ipatests')
-rw-r--r--ipatests/test_integration/test_trust.py9
1 files changed, 6 insertions, 3 deletions
diff --git a/ipatests/test_integration/test_trust.py b/ipatests/test_integration/test_trust.py
index c5167301..68fc0285 100644
--- a/ipatests/test_integration/test_trust.py
+++ b/ipatests/test_integration/test_trust.py
@@ -86,7 +86,8 @@ class TestBasicADTrust(ADTrustBase):
def test_user_gid_uid_resolution_in_nonposix_trust(self):
"""Check that user has SID-generated UID"""
- testuser = 'testuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ testuser = 'testuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', testuser])
# This regex checks that Test User does not have UID 10042 nor belongs
@@ -124,7 +125,8 @@ class TestPosixADTrust(ADTrustBase):
def test_user_uid_gid_resolution_in_posix_trust(self):
# Check that user has AD-defined UID
- testuser = 'testuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ testuser = 'testuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', testuser])
testuser_stdout = "testuser@%s:*:10042:10047:"\
@@ -136,7 +138,8 @@ class TestPosixADTrust(ADTrustBase):
def test_user_without_posix_attributes_not_visible(self):
# Check that user has AD-defined UID
- nonposixuser = 'nonposixuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ nonposixuser = 'nonposixuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', nonposixuser],
raiseonerr=False)