diff options
| author | Petr Viktorin <pviktori@redhat.com> | 2014-10-03 10:55:48 +0200 |
|---|---|---|
| committer | Martin Kosek <mkosek@redhat.com> | 2014-10-03 14:19:42 +0200 |
| commit | 0cdaf2c48fa7cc44229e9e490fdad0157abdabed (patch) | |
| tree | 10628c0fa3392dca4251445d6d09e55221b20a92 | |
| parent | 81e4cac5cdd752184bd1b6ed007e4719f52b7f1d (diff) | |
| download | freeipa-0cdaf2c48fa7cc44229e9e490fdad0157abdabed.tar.gz freeipa-0cdaf2c48fa7cc44229e9e490fdad0157abdabed.tar.xz freeipa-0cdaf2c48fa7cc44229e9e490fdad0157abdabed.zip | |
sudo integration test: Remove the local user test
SSSD does not support sudo rules for local users;
these should be added in a local sudoers file.
https://fedorahosted.org/freeipa/ticket/4608
Reviewed-By: Martin Kosek <mkosek@redhat.com>
| -rw-r--r-- | ipatests/test_integration/test_sudo.py | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/ipatests/test_integration/test_sudo.py b/ipatests/test_integration/test_sudo.py index 2c4116c4d..f26a10032 100644 --- a/ipatests/test_integration/test_sudo.py +++ b/ipatests/test_integration/test_sudo.py @@ -199,29 +199,6 @@ class TestSudo(IntegrationTest): 'testrule', '--groups', 'testgroup2']) - def test_sudo_rule_restricted_to_one_local_user_setup(self): - # Add the localuser to the rule - self.master.run_command(['ipa', 'sudorule-add-user', - 'testrule', - '--users', 'localuser']) - - def test_sudo_rule_restricted_to_one_local_user(self): - result1 = self.list_sudo_commands("localuser") - assert "(ALL : ALL) NOPASSWD: ALL" in result1.stdout_text - - result2 = self.list_sudo_commands("testuser1", raiseonerr=False) - assert result2.returncode != 0 - - def test_setting_category_to_all_with_valid_entries_user_local(self): - result = self.reset_rule_categories(safe_delete=False) - assert result.returncode != 0 - - def test_sudo_rule_restricted_to_one_local_user_teardown(self): - # Remove the testuser1 from the rule - self.master.run_command(['ipa', 'sudorule-remove-user', - 'testrule', - '--users', 'localuser']) - def test_sudo_rule_restricted_to_one_host_negative_setup(self): # Reset testrule configuration self.reset_rule_categories() |
