summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLenka Doudova <ldoudova@redhat.com>2016-08-22 12:08:04 +0200
committerMartin Basti <mbasti@redhat.com>2016-08-24 16:00:25 +0200
commit9021b649661ed135a4ee18ffe3728d661e6674a6 (patch)
tree0af73e22e76e5e726e7c43c2ea90246bc8e4a3f7
parent3a555ece7978a863ed4cbb9a8c73eb489f58a876 (diff)
downloadfreeipa-9021b649661ed135a4ee18ffe3728d661e6674a6.tar.gz
freeipa-9021b649661ed135a4ee18ffe3728d661e6674a6.tar.xz
freeipa-9021b649661ed135a4ee18ffe3728d661e6674a6.zip
Tests: Service tracker and tests don't recognize 'ipakrboktoauthasdelegate' attribute
Due to [1] being implemented, retrieve and search tests with --all option specified fail due to extra attribute. [1] https://fedorahosted.org/freeipa/ticket/5764 Ticket: https://fedorahosted.org/freeipa/ticket/6240 Reviewed-By: Ganna Kaihorodova <gkaihoro@redhat.com>
-rw-r--r--ipatests/test_xmlrpc/test_service_plugin.py2
-rw-r--r--ipatests/test_xmlrpc/tracker/service_plugin.py5
2 files changed, 5 insertions, 2 deletions
diff --git a/ipatests/test_xmlrpc/test_service_plugin.py b/ipatests/test_xmlrpc/test_service_plugin.py
index 56e2c7a7a..0e8c8ea30 100644
--- a/ipatests/test_xmlrpc/test_service_plugin.py
+++ b/ipatests/test_xmlrpc/test_service_plugin.py
@@ -256,6 +256,7 @@ class test_service(Declarative):
has_keytab=False,
ipakrbrequirespreauth=True,
ipakrbokasdelegate=False,
+ ipakrboktoauthasdelegate=False,
),
),
),
@@ -319,6 +320,7 @@ class test_service(Declarative):
managedby_host=[fqdn1],
ipakrbrequirespreauth=True,
ipakrbokasdelegate=False,
+ ipakrboktoauthasdelegate=False,
),
],
),
diff --git a/ipatests/test_xmlrpc/tracker/service_plugin.py b/ipatests/test_xmlrpc/tracker/service_plugin.py
index 3b970b989..fe34390e2 100644
--- a/ipatests/test_xmlrpc/tracker/service_plugin.py
+++ b/ipatests/test_xmlrpc/tracker/service_plugin.py
@@ -44,7 +44,7 @@ class ServiceTracker(KerberosAliasMixin, Tracker):
u'ipaKrbPrincipalAlias', u'ipaUniqueID', u'krbExtraData',
u'krbLastPwdChange', u'krbLoginFailedCount', u'memberof',
u'objectClass', u'ipakrbrequirespreauth',
- u'ipakrbokasdelegate'}
+ u'ipakrbokasdelegate', u'ipakrboktoauthasdelegate'}
create_keys = (retrieve_keys | {u'objectclass', u'ipauniqueid'}) - {
u'usercertificate', u'has_keytab'}
@@ -94,7 +94,8 @@ class ServiceTracker(KerberosAliasMixin, Tracker):
u'ipauniqueid': [fuzzy_uuid],
u'managedby_host': [self.host_fqdn],
u'krbcanonicalname': [u'{0}'.format(self.name)],
- u'has_keytab': False
+ u'has_keytab': False,
+ u'ipakrboktoauthasdelegate': False,
}
for key in self.options: