diff options
author | Petr Viktorin <pviktori@redhat.com> | 2014-10-03 10:55:48 +0200 |
---|---|---|
committer | Martin Kosek <mkosek@redhat.com> | 2014-10-03 14:19:42 +0200 |
commit | 98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6 (patch) | |
tree | 37f93a017e2b0b9af042154fc5cd8b300c85a589 | |
parent | 26116d4cd307d78d45ee919e758a4297b7d711e9 (diff) | |
download | freeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.tar.gz freeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.tar.xz freeipa-98e0a4e13c101d3ea1f6f8968b3f4e71624af1e6.zip |
sudo integration test: Remove the local user test
SSSD does not support sudo rules for local users;
these should be added in a local sudoers file.
https://fedorahosted.org/freeipa/ticket/4608
Reviewed-By: Martin Kosek <mkosek@redhat.com>
-rw-r--r-- | ipatests/test_integration/test_sudo.py | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/ipatests/test_integration/test_sudo.py b/ipatests/test_integration/test_sudo.py index 2c4116c4d..f26a10032 100644 --- a/ipatests/test_integration/test_sudo.py +++ b/ipatests/test_integration/test_sudo.py @@ -199,29 +199,6 @@ class TestSudo(IntegrationTest): 'testrule', '--groups', 'testgroup2']) - def test_sudo_rule_restricted_to_one_local_user_setup(self): - # Add the localuser to the rule - self.master.run_command(['ipa', 'sudorule-add-user', - 'testrule', - '--users', 'localuser']) - - def test_sudo_rule_restricted_to_one_local_user(self): - result1 = self.list_sudo_commands("localuser") - assert "(ALL : ALL) NOPASSWD: ALL" in result1.stdout_text - - result2 = self.list_sudo_commands("testuser1", raiseonerr=False) - assert result2.returncode != 0 - - def test_setting_category_to_all_with_valid_entries_user_local(self): - result = self.reset_rule_categories(safe_delete=False) - assert result.returncode != 0 - - def test_sudo_rule_restricted_to_one_local_user_teardown(self): - # Remove the testuser1 from the rule - self.master.run_command(['ipa', 'sudorule-remove-user', - 'testrule', - '--users', 'localuser']) - def test_sudo_rule_restricted_to_one_host_negative_setup(self): # Reset testrule configuration self.reset_rule_categories() |