summaryrefslogtreecommitdiffstats
path: root/ipatests
diff options
context:
space:
mode:
authorTomas Babej <tbabej@redhat.com>2013-11-01 13:59:16 +0100
committerMartin Kosek <mkosek@redhat.com>2013-11-01 16:25:54 +0100
commitddfc34f4bf8a0d5a018481f3662523f95beddd7a (patch)
treeaf4e1c4102f91d608d4bf65636925c21704c7a96 /ipatests
parent13a0f8694c55114f5ff224aa69bc28492419ebb1 (diff)
downloadfreeipa.git-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.tar.gz
freeipa.git-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.tar.xz
freeipa.git-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.zip
ipatests: test_trust: use domain name instead of realm for user lookups
Diffstat (limited to 'ipatests')
-rw-r--r--ipatests/test_integration/test_trust.py9
1 files changed, 6 insertions, 3 deletions
diff --git a/ipatests/test_integration/test_trust.py b/ipatests/test_integration/test_trust.py
index c5167301..68fc0285 100644
--- a/ipatests/test_integration/test_trust.py
+++ b/ipatests/test_integration/test_trust.py
@@ -86,7 +86,8 @@ class TestBasicADTrust(ADTrustBase):
def test_user_gid_uid_resolution_in_nonposix_trust(self):
"""Check that user has SID-generated UID"""
- testuser = 'testuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ testuser = 'testuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', testuser])
# This regex checks that Test User does not have UID 10042 nor belongs
@@ -124,7 +125,8 @@ class TestPosixADTrust(ADTrustBase):
def test_user_uid_gid_resolution_in_posix_trust(self):
# Check that user has AD-defined UID
- testuser = 'testuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ testuser = 'testuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', testuser])
testuser_stdout = "testuser@%s:*:10042:10047:"\
@@ -136,7 +138,8 @@ class TestPosixADTrust(ADTrustBase):
def test_user_without_posix_attributes_not_visible(self):
# Check that user has AD-defined UID
- nonposixuser = 'nonposixuser@%s' % self.ad.domain.realm
+ # Using domain name since it is lowercased realm name for AD domains
+ nonposixuser = 'nonposixuser@%s' % self.ad.domain.name
result = self.master.run_command(['getent', 'passwd', nonposixuser],
raiseonerr=False)