diff options
author | Tomas Babej <tbabej@redhat.com> | 2013-11-01 13:59:16 +0100 |
---|---|---|
committer | Martin Kosek <mkosek@redhat.com> | 2013-11-01 16:25:54 +0100 |
commit | ddfc34f4bf8a0d5a018481f3662523f95beddd7a (patch) | |
tree | af4e1c4102f91d608d4bf65636925c21704c7a96 /ipatests | |
parent | 13a0f8694c55114f5ff224aa69bc28492419ebb1 (diff) | |
download | freeipa-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.tar.gz freeipa-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.tar.xz freeipa-ddfc34f4bf8a0d5a018481f3662523f95beddd7a.zip |
ipatests: test_trust: use domain name instead of realm for user lookups
Diffstat (limited to 'ipatests')
-rw-r--r-- | ipatests/test_integration/test_trust.py | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/ipatests/test_integration/test_trust.py b/ipatests/test_integration/test_trust.py index c51673015..68fc0285c 100644 --- a/ipatests/test_integration/test_trust.py +++ b/ipatests/test_integration/test_trust.py @@ -86,7 +86,8 @@ class TestBasicADTrust(ADTrustBase): def test_user_gid_uid_resolution_in_nonposix_trust(self): """Check that user has SID-generated UID""" - testuser = 'testuser@%s' % self.ad.domain.realm + # Using domain name since it is lowercased realm name for AD domains + testuser = 'testuser@%s' % self.ad.domain.name result = self.master.run_command(['getent', 'passwd', testuser]) # This regex checks that Test User does not have UID 10042 nor belongs @@ -124,7 +125,8 @@ class TestPosixADTrust(ADTrustBase): def test_user_uid_gid_resolution_in_posix_trust(self): # Check that user has AD-defined UID - testuser = 'testuser@%s' % self.ad.domain.realm + # Using domain name since it is lowercased realm name for AD domains + testuser = 'testuser@%s' % self.ad.domain.name result = self.master.run_command(['getent', 'passwd', testuser]) testuser_stdout = "testuser@%s:*:10042:10047:"\ @@ -136,7 +138,8 @@ class TestPosixADTrust(ADTrustBase): def test_user_without_posix_attributes_not_visible(self): # Check that user has AD-defined UID - nonposixuser = 'nonposixuser@%s' % self.ad.domain.realm + # Using domain name since it is lowercased realm name for AD domains + nonposixuser = 'nonposixuser@%s' % self.ad.domain.name result = self.master.run_command(['getent', 'passwd', nonposixuser], raiseonerr=False) |