From 7486ead6c910d13ae4d7cbae6fae738ce2bf47eb Mon Sep 17 00:00:00 2001 From: Rob Crittenden Date: Tue, 26 Oct 2010 14:31:00 -0400 Subject: Don't allow managed groups to have group password policy. UPG cannot have members and we use memberOf in class of service to determine which policy to apply. ticket 160 --- tests/test_xmlrpc/test_pwpolicy.py | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) (limited to 'tests/test_xmlrpc/test_pwpolicy.py') diff --git a/tests/test_xmlrpc/test_pwpolicy.py b/tests/test_xmlrpc/test_pwpolicy.py index 94063c56..8a384ca5 100644 --- a/tests/test_xmlrpc/test_pwpolicy.py +++ b/tests/test_xmlrpc/test_pwpolicy.py @@ -149,7 +149,18 @@ class test_pwpolicy(XMLRPC_test): entry = api.Command['pwpolicy_mod'](self.group, krbminpwdlife=50)['result'] assert_attr_equal(entry, 'krbminpwdlife', '50') - def test_a_pwpolicy_del(self): + def test_a_pwpolicy_managed(self): + """ + Test adding password policy to a managed group. + """ + try: + entry = api.Command['pwpolicy_add'](self.user, krbminpwdlife=50, cospriority=2)['result'] + except errors.ManagedPolicyError: + pass + else: + assert False + + def test_b_pwpolicy_del(self): """ Test the `xmlrpc.pwpolicy_del` method. """ -- cgit