summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPetr Viktorin <pviktori@redhat.com>2014-10-03 10:55:48 +0200
committerMartin Kosek <mkosek@redhat.com>2014-10-03 14:19:42 +0200
commit98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6 (patch)
tree37f93a017e2b0b9af042154fc5cd8b300c85a589
parent26116d4cd307d78d45ee919e758a4297b7d711e9 (diff)
downloadfreeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.tar.gz
freeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.tar.xz
freeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.zip
sudo integration test: Remove the local user test
SSSD does not support sudo rules for local users; these should be added in a local sudoers file. https://fedorahosted.org/freeipa/ticket/4608 Reviewed-By: Martin Kosek <mkosek@redhat.com>
-rw-r--r--ipatests/test_integration/test_sudo.py23
1 files changed, 0 insertions, 23 deletions
diff --git a/ipatests/test_integration/test_sudo.py b/ipatests/test_integration/test_sudo.py
index 2c4116c4d..f26a10032 100644
--- a/ipatests/test_integration/test_sudo.py
+++ b/ipatests/test_integration/test_sudo.py
@@ -199,29 +199,6 @@ class TestSudo(IntegrationTest):
'testrule',
'--groups', 'testgroup2'])
- def test_sudo_rule_restricted_to_one_local_user_setup(self):
- # Add the localuser to the rule
- self.master.run_command(['ipa', 'sudorule-add-user',
- 'testrule',
- '--users', 'localuser'])
-
- def test_sudo_rule_restricted_to_one_local_user(self):
- result1 = self.list_sudo_commands("localuser")
- assert "(ALL : ALL) NOPASSWD: ALL" in result1.stdout_text
-
- result2 = self.list_sudo_commands("testuser1", raiseonerr=False)
- assert result2.returncode != 0
-
- def test_setting_category_to_all_with_valid_entries_user_local(self):
- result = self.reset_rule_categories(safe_delete=False)
- assert result.returncode != 0
-
- def test_sudo_rule_restricted_to_one_local_user_teardown(self):
- # Remove the testuser1 from the rule
- self.master.run_command(['ipa', 'sudorule-remove-user',
- 'testrule',
- '--users', 'localuser'])
-
def test_sudo_rule_restricted_to_one_host_negative_setup(self):
# Reset testrule configuration
self.reset_rule_categories()