|
|
6d47df |
BEGIN EXCERPT from 8182ebc6c3ca636276fc277186cfbff4ea9cf5c6 to have user_add
|
|
|
6d47df |
in ipatests/pytest_ipa/integration/tasks.py to be able to apply the patch set.
|
|
|
6d47df |
|
|
|
6d47df |
commit 8182ebc6c3ca636276fc277186cfbff4ea9cf5c6
|
|
|
6d47df |
Author: Sergey Orlov <sorlov@redhat.com>
|
|
|
6d47df |
Date: Wed Nov 7 11:23:05 2018 +0100
|
|
|
6d47df |
|
|
|
6d47df |
ipatests: add test for ipa-restore in multi-master configuration
|
|
|
6d47df |
|
|
|
6d47df |
Test ensures that after ipa-restore on the master, the replica can be
|
|
|
6d47df |
re-synchronized and a new replica can be created.
|
|
|
6d47df |
|
|
|
6d47df |
https://pagure.io/freeipa/issue/7455
|
|
|
6d47df |
|
|
|
6d47df |
Reviewed-By: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Reviewed-By: Tibor Dudlak <tdudlak@redhat.com>
|
|
|
6d47df |
|
|
|
6d47df |
diff --git a/ipatests/pytest_ipa/integration/tasks.py b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
index 814141b83..90da8fa62 100644
|
|
|
6d47df |
--- a/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
+++ b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
@@ -1555,3 +1561,11 @@ def strip_cert_header(pem):
|
|
|
6d47df |
return s.group(1)
|
|
|
6d47df |
else:
|
|
|
6d47df |
return pem
|
|
|
6d47df |
+
|
|
|
6d47df |
+
|
|
|
6d47df |
+def user_add(host, login):
|
|
|
6d47df |
+ host.run_command([
|
|
|
6d47df |
+ "ipa", "user-add", login,
|
|
|
6d47df |
+ "--first", "test",
|
|
|
6d47df |
+ "--last", "user"
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
END EXCERPT
|
|
|
6d47df |
From 5e6cb0ca034c711fe81fcfe7c651c5af3c65aa40 Mon Sep 17 00:00:00 2001
|
|
|
6d47df |
From: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Date: Dec 07 2018 15:06:13 +0000
|
|
|
6d47df |
Subject: Resolve user/group names in idoverride*-find
|
|
|
6d47df |
|
|
|
6d47df |
|
|
|
6d47df |
ipa idoverrideuser-find and ...group-find have an --anchor argument. The
|
|
|
6d47df |
anchor argument used to support only anchor UUIDs like
|
|
|
6d47df |
':IPA:domain:UUID' or ':SID:S-sid'. The find commands now detect regular
|
|
|
6d47df |
user or group names and translate them to anchors.
|
|
|
6d47df |
|
|
|
6d47df |
Fixes: https://pagure.io/freeipa/issue/6594
|
|
|
6d47df |
Signed-off-by: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
|
|
|
6d47df |
|
|
|
6d47df |
---
|
|
|
6d47df |
|
|
|
6d47df |
diff --git a/ipaserver/plugins/idviews.py b/ipaserver/plugins/idviews.py
|
|
|
6d47df |
index 3252982..5213486 100644
|
|
|
6d47df |
--- a/ipaserver/plugins/idviews.py
|
|
|
6d47df |
+++ b/ipaserver/plugins/idviews.py
|
|
|
6d47df |
@@ -766,6 +766,40 @@ class baseidoverride(LDAPObject):
|
|
|
6d47df |
error=_('Default Trust View cannot contain IPA users')
|
|
|
6d47df |
)
|
|
|
6d47df |
|
|
|
6d47df |
+ def filter_for_anchor(self, ldap, filter, options, obj_type):
|
|
|
6d47df |
+ """Modify filter to support user and group names
|
|
|
6d47df |
+
|
|
|
6d47df |
+ Allow users to pass in an IPA user/group name and resolve it to an
|
|
|
6d47df |
+ anchor name.
|
|
|
6d47df |
+
|
|
|
6d47df |
+ :param ldap: ldap connection
|
|
|
6d47df |
+ :param filter: pre_callback filter
|
|
|
6d47df |
+ :param options: option dict
|
|
|
6d47df |
+ :param obj_type: 'user' or 'group'
|
|
|
6d47df |
+ :return: modified or same filter
|
|
|
6d47df |
+ """
|
|
|
6d47df |
+ anchor = options.get('ipaanchoruuid', None)
|
|
|
6d47df |
+ # return original filter if anchor is absent or correct
|
|
|
6d47df |
+ if anchor is None or ANCHOR_REGEX.match(anchor):
|
|
|
6d47df |
+ return filter
|
|
|
6d47df |
+ try:
|
|
|
6d47df |
+ resolved_anchor = resolve_object_to_anchor(
|
|
|
6d47df |
+ ldap, obj_type, anchor,
|
|
|
6d47df |
+ options.get('fallback_to_ldap', False)
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ except (errors.NotFound, errors.ValidationError):
|
|
|
6d47df |
+ # anchor cannot be resolved, let it pass through
|
|
|
6d47df |
+ return filter
|
|
|
6d47df |
+ else:
|
|
|
6d47df |
+ return ldap.make_filter(
|
|
|
6d47df |
+ {
|
|
|
6d47df |
+ 'objectClass': self.object_class,
|
|
|
6d47df |
+ 'ipaanchoruuid': resolved_anchor,
|
|
|
6d47df |
+ },
|
|
|
6d47df |
+ rules=ldap.MATCH_ALL
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+
|
|
|
6d47df |
+
|
|
|
6d47df |
class baseidoverride_add(LDAPCreate):
|
|
|
6d47df |
__doc__ = _('Add a new ID override.')
|
|
|
6d47df |
msg_summary = _('Added ID override "%(value)s"')
|
|
|
6d47df |
@@ -1128,6 +1162,15 @@ class idoverrideuser_find(baseidoverride_find):
|
|
|
6d47df |
msg_summary = ngettext('%(count)d User ID override matched',
|
|
|
6d47df |
'%(count)d User ID overrides matched', 0)
|
|
|
6d47df |
|
|
|
6d47df |
+ def pre_callback(self, ldap, filter, attrs_list, base_dn, scope, *args,
|
|
|
6d47df |
+ **options):
|
|
|
6d47df |
+ result = super(idoverrideuser_find, self).pre_callback(
|
|
|
6d47df |
+ ldap, filter, attrs_list, base_dn, scope, *args, **options
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ filter, base_dn, scope = result
|
|
|
6d47df |
+ filter = self.obj.filter_for_anchor(ldap, filter, options, 'user')
|
|
|
6d47df |
+ return filter, base_dn, scope
|
|
|
6d47df |
+
|
|
|
6d47df |
def post_callback(self, ldap, entries, truncated, *args, **options):
|
|
|
6d47df |
truncated = super(idoverrideuser_find, self).post_callback(
|
|
|
6d47df |
ldap, entries, truncated, *args, **options)
|
|
|
6d47df |
@@ -1173,6 +1216,15 @@ class idoverridegroup_find(baseidoverride_find):
|
|
|
6d47df |
msg_summary = ngettext('%(count)d Group ID override matched',
|
|
|
6d47df |
'%(count)d Group ID overrides matched', 0)
|
|
|
6d47df |
|
|
|
6d47df |
+ def pre_callback(self, ldap, filter, attrs_list, base_dn, scope, *args,
|
|
|
6d47df |
+ **options):
|
|
|
6d47df |
+ result = super(idoverridegroup_find, self).pre_callback(
|
|
|
6d47df |
+ ldap, filter, attrs_list, base_dn, scope, *args, **options
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ filter, base_dn, scope = result
|
|
|
6d47df |
+ filter = self.obj.filter_for_anchor(ldap, filter, options, 'group')
|
|
|
6d47df |
+ return filter, base_dn, scope
|
|
|
6d47df |
+
|
|
|
6d47df |
|
|
|
6d47df |
@register()
|
|
|
6d47df |
class idoverridegroup_show(baseidoverride_show):
|
|
|
6d47df |
|
|
|
6d47df |
From 11b06d24a94c5e92a0275df759bc81f0fc81d802 Mon Sep 17 00:00:00 2001
|
|
|
6d47df |
From: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Date: Dec 07 2018 15:06:13 +0000
|
|
|
6d47df |
Subject: Add integration tests for idviews
|
|
|
6d47df |
|
|
|
6d47df |
|
|
|
6d47df |
Add several tests to verify new anchor override and general idview
|
|
|
6d47df |
override functionality.
|
|
|
6d47df |
|
|
|
6d47df |
Fixes: https://pagure.io/freeipa/issue/6594
|
|
|
6d47df |
Signed-off-by: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
|
|
|
6d47df |
|
|
|
6d47df |
---
|
|
|
6d47df |
|
|
|
6d47df |
diff --git a/ipatests/pytest_ipa/integration/tasks.py b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
index 36178e8..3548f2b 100644
|
|
|
6d47df |
--- a/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
+++ b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
6d47df |
@@ -1576,9 +1576,19 @@ def strip_cert_header(pem):
|
|
|
6d47df |
return pem
|
|
|
6d47df |
|
|
|
6d47df |
|
|
|
6d47df |
-def user_add(host, login):
|
|
|
6d47df |
- host.run_command([
|
|
|
6d47df |
+def user_add(host, login, first='test', last='user', extra_args=()):
|
|
|
6d47df |
+ cmd = [
|
|
|
6d47df |
"ipa", "user-add", login,
|
|
|
6d47df |
- "--first", "test",
|
|
|
6d47df |
- "--last", "user"
|
|
|
6d47df |
- ])
|
|
|
6d47df |
+ "--first", first,
|
|
|
6d47df |
+ "--last", last
|
|
|
6d47df |
+ ]
|
|
|
6d47df |
+ cmd.extend(extra_args)
|
|
|
6d47df |
+ return host.run_command(cmd)
|
|
|
6d47df |
+
|
|
|
6d47df |
+
|
|
|
6d47df |
+def group_add(host, groupname, extra_args=()):
|
|
|
6d47df |
+ cmd = [
|
|
|
6d47df |
+ "ipa", "group-add", groupname,
|
|
|
6d47df |
+ ]
|
|
|
6d47df |
+ cmd.extend(extra_args)
|
|
|
6d47df |
+ return host.run_command(cmd)
|
|
|
6d47df |
diff --git a/ipatests/test_integration/test_idviews.py b/ipatests/test_integration/test_idviews.py
|
|
|
6d47df |
index 9a8f379..6ede4d0 100644
|
|
|
6d47df |
--- a/ipatests/test_integration/test_idviews.py
|
|
|
6d47df |
+++ b/ipatests/test_integration/test_idviews.py
|
|
|
6d47df |
@@ -165,6 +165,7 @@ class TestRulesWithServicePrincipals(IntegrationTest):
|
|
|
6d47df |
|
|
|
6d47df |
topology = 'star'
|
|
|
6d47df |
num_replicas = 0
|
|
|
6d47df |
+ num_clients = 0
|
|
|
6d47df |
service_certprofile = 'caIPAserviceCert'
|
|
|
6d47df |
caacl = 'test_caacl'
|
|
|
6d47df |
keytab = "replica.keytab"
|
|
|
6d47df |
@@ -238,3 +239,133 @@ EOF
|
|
|
6d47df |
raiseonerr=False)
|
|
|
6d47df |
assert(result.returncode == 0), (
|
|
|
6d47df |
'Failed to add a cert to custom certprofile')
|
|
|
6d47df |
+
|
|
|
6d47df |
+
|
|
|
6d47df |
+class TestIDViews(IntegrationTest):
|
|
|
6d47df |
+ topology = 'star'
|
|
|
6d47df |
+ num_replicas = 0
|
|
|
6d47df |
+ num_clients = 1
|
|
|
6d47df |
+
|
|
|
6d47df |
+ user1 = 'testuser1'
|
|
|
6d47df |
+ user1_uid = 10001
|
|
|
6d47df |
+ user1_gid = 10001
|
|
|
6d47df |
+ user1_uid_override = 5001
|
|
|
6d47df |
+ user1_gid_override = 6001
|
|
|
6d47df |
+
|
|
|
6d47df |
+ user2 = 'testuser2'
|
|
|
6d47df |
+ user2_uid = 10002
|
|
|
6d47df |
+ user2_gid = 10002
|
|
|
6d47df |
+
|
|
|
6d47df |
+ group1 = 'testgroup1'
|
|
|
6d47df |
+ group1_gid = 11001
|
|
|
6d47df |
+ group1_gid_override = 7001
|
|
|
6d47df |
+
|
|
|
6d47df |
+ idview = 'testview'
|
|
|
6d47df |
+
|
|
|
6d47df |
+ @classmethod
|
|
|
6d47df |
+ def install(cls, mh):
|
|
|
6d47df |
+ super(TestIDViews, cls).install(mh)
|
|
|
6d47df |
+ master = cls.master
|
|
|
6d47df |
+ client = cls.clients[0]
|
|
|
6d47df |
+ tasks.kinit_admin(master)
|
|
|
6d47df |
+
|
|
|
6d47df |
+ tasks.user_add(
|
|
|
6d47df |
+ master, cls.user1, first='Test1',
|
|
|
6d47df |
+ extra_args=[
|
|
|
6d47df |
+ '--uid', str(cls.user1_uid),
|
|
|
6d47df |
+ '--gidnumber', str(cls.user1_gid),
|
|
|
6d47df |
+ ]
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ tasks.user_add(
|
|
|
6d47df |
+ master, cls.user2, first='Test2',
|
|
|
6d47df |
+ extra_args=[
|
|
|
6d47df |
+ '--uid', str(cls.user2_uid),
|
|
|
6d47df |
+ '--gidnumber', str(cls.user2_gid),
|
|
|
6d47df |
+ ]
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ tasks.group_add(
|
|
|
6d47df |
+ master, cls.group1, extra_args=['--gid', str(cls.group1_gid)]
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+
|
|
|
6d47df |
+ master.run_command(['ipa', 'idview-add', cls.idview])
|
|
|
6d47df |
+
|
|
|
6d47df |
+ # add overrides for user1 and its default user group
|
|
|
6d47df |
+ master.run_command([
|
|
|
6d47df |
+ 'ipa', 'idoverrideuser-add', cls.idview, cls.user1,
|
|
|
6d47df |
+ '--uid', str(cls.user1_uid_override),
|
|
|
6d47df |
+ '--gid', str(cls.user1_gid_override),
|
|
|
6d47df |
+ '--homedir', '/special-home/{}'.format(cls.user1),
|
|
|
6d47df |
+ '--shell', '/bin/special'
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
+ master.run_command([
|
|
|
6d47df |
+ 'ipa', 'idoverridegroup-add', cls.idview, cls.group1,
|
|
|
6d47df |
+ '--gid', str(cls.group1_gid_override),
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
+
|
|
|
6d47df |
+ # ID view overrides don't work on IPA masters
|
|
|
6d47df |
+ master.run_command([
|
|
|
6d47df |
+ 'ipa', 'idview-apply', cls.idview,
|
|
|
6d47df |
+ '--hosts', client.hostname
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
+ # finally restart SSSD to materialize idviews
|
|
|
6d47df |
+ client.run_command(['systemctl', 'restart', 'sssd.service'])
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_useroverride(self):
|
|
|
6d47df |
+ result = self.clients[0].run_command(['id', self.user1])
|
|
|
6d47df |
+ assert 'uid={}'.format(self.user1_uid_override) in result.stdout_text
|
|
|
6d47df |
+ assert 'gid={}'.format(self.user1_gid_override) in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ result = self.clients[0].run_command(
|
|
|
6d47df |
+ ['getent', 'passwd', str(self.user1_uid_override)]
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ expected = '{}:*:{}:{}'.format(
|
|
|
6d47df |
+ self.user1, self.user1_uid_override, self.user1_gid_override
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ assert expected in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ result = self.master.run_command(['id', self.user1])
|
|
|
6d47df |
+ assert 'uid={}'.format(self.user1_uid) in result.stdout_text
|
|
|
6d47df |
+ assert 'gid={}'.format(self.user1_gid) in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_useroverride_original_uid(self):
|
|
|
6d47df |
+ # It's still possible to request the user with its original UID. In
|
|
|
6d47df |
+ # this case the getent command returns the user with override uid.
|
|
|
6d47df |
+ result = self.clients[0].run_command(
|
|
|
6d47df |
+ ['getent', 'passwd', str(self.user1_uid)]
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ expected = '{}:*:{}:{}'.format(
|
|
|
6d47df |
+ self.user1, self.user1_uid_override, self.user1_gid_override
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ assert expected in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_anchor_username(self):
|
|
|
6d47df |
+ result = self.master.run_command([
|
|
|
6d47df |
+ 'ipa', 'idoverrideuser-find', self.idview, '--anchor', self.user1
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
+ expected = "Anchor to override: {}".format(self.user1)
|
|
|
6d47df |
+ assert expected in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_groupoverride(self):
|
|
|
6d47df |
+ result = self.clients[0].run_command(['getent', 'group', self.group1])
|
|
|
6d47df |
+ assert ':{}:'.format(self.group1_gid_override) in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ result = self.master.run_command(['getent', 'group', self.group1])
|
|
|
6d47df |
+ assert ':{}:'.format(self.group1_gid) in result.stdout_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_groupoverride_system_objects(self):
|
|
|
6d47df |
+ # group override for user group should fail
|
|
|
6d47df |
+ result = self.master.run_command(
|
|
|
6d47df |
+ ['ipa', 'idoverridegroup-add', self.idview, self.user1,
|
|
|
6d47df |
+ '--gid', str(self.user1_gid_override)],
|
|
|
6d47df |
+ raiseonerr=False
|
|
|
6d47df |
+ )
|
|
|
6d47df |
+ assert result.returncode == 1
|
|
|
6d47df |
+ assert "cannot be overridden" in result.stderr_text
|
|
|
6d47df |
+
|
|
|
6d47df |
+ def test_anchor_groupname(self):
|
|
|
6d47df |
+ result = self.master.run_command([
|
|
|
6d47df |
+ 'ipa', 'idoverridegroup-find', self.idview,
|
|
|
6d47df |
+ '--anchor', self.group1
|
|
|
6d47df |
+ ])
|
|
|
6d47df |
+ expected = "Anchor to override: {}".format(self.group1)
|
|
|
6d47df |
+ assert expected in result.stdout_text
|
|
|
6d47df |
|
|
|
6d47df |
ONLY APPLYING TO ipatests/prci_definitions/nightly_rawhide.yaml, other
|
|
|
6d47df |
files are not available or compatible
|
|
|
6d47df |
|
|
|
6d47df |
From e86498ea2f8259118025e622cc5f1cf2c26f2757 Mon Sep 17 00:00:00 2001
|
|
|
6d47df |
From: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Date: Dec 07 2018 15:06:13 +0000
|
|
|
6d47df |
Subject: Run idviews integration tests in nightly
|
|
|
6d47df |
|
|
|
6d47df |
|
|
|
6d47df |
See: https://pagure.io/freeipa/issue/6594
|
|
|
6d47df |
Signed-off-by: Christian Heimes <cheimes@redhat.com>
|
|
|
6d47df |
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
|
|
|
6d47df |
|
|
|
6d47df |
---
|
|
|
6d47df |
|
|
|
6d47df |
#diff --git a/ipatests/prci_definitions/nightly_f28.yaml b/ipatests/prci_definitions/nightly_f28.yaml
|
|
|
6d47df |
#index 8462c14..ac792f1 100644
|
|
|
6d47df |
#--- a/ipatests/prci_definitions/nightly_f28.yaml
|
|
|
6d47df |
#+++ b/ipatests/prci_definitions/nightly_f28.yaml
|
|
|
6d47df |
#@@ -195,6 +195,18 @@ jobs:
|
|
|
6d47df |
# timeout: 10800
|
|
|
6d47df |
# topology: *master_1repl
|
|
|
6d47df |
#
|
|
|
6d47df |
#+ fedora-28/test_idviews:
|
|
|
6d47df |
#+ requires: [fedora-28/build]
|
|
|
6d47df |
#+ priority: 50
|
|
|
6d47df |
#+ job:
|
|
|
6d47df |
#+ class: RunPytest
|
|
|
6d47df |
#+ args:
|
|
|
6d47df |
#+ build_url: '{fedora-28/build_url}'
|
|
|
6d47df |
#+ test_suite: test_integration/test_idviews.py::TestIDViews
|
|
|
6d47df |
#+ template: *ci-master-f28
|
|
|
6d47df |
#+ timeout: 3600
|
|
|
6d47df |
#+ topology: *master_1repl_1client
|
|
|
6d47df |
#+
|
|
|
6d47df |
# fedora-28/test_caless_TestServerInstall:
|
|
|
6d47df |
# requires: [fedora-28/build]
|
|
|
6d47df |
# priority: 50
|
|
|
6d47df |
#diff --git a/ipatests/prci_definitions/nightly_master.yaml b/ipatests/prci_definitions/nightly_master.yaml
|
|
|
6d47df |
#index 3f2b346..953a60e 100644
|
|
|
6d47df |
#--- a/ipatests/prci_definitions/nightly_master.yaml
|
|
|
6d47df |
#+++ b/ipatests/prci_definitions/nightly_master.yaml
|
|
|
6d47df |
#@@ -195,6 +195,18 @@ jobs:
|
|
|
6d47df |
# timeout: 10800
|
|
|
6d47df |
# topology: *master_1repl
|
|
|
6d47df |
#
|
|
|
6d47df |
#+ fedora-28/test_idviews:
|
|
|
6d47df |
#+ requires: [fedora-29/build]
|
|
|
6d47df |
#+ priority: 50
|
|
|
6d47df |
#+ job:
|
|
|
6d47df |
#+ class: RunPytest
|
|
|
6d47df |
#+ args:
|
|
|
6d47df |
#+ build_url: '{fedora-29/build_url}'
|
|
|
6d47df |
#+ test_suite: test_integration/test_idviews.py::TestIDViews
|
|
|
6d47df |
#+ template: *ci-master-f29
|
|
|
6d47df |
#+ timeout: 3600
|
|
|
6d47df |
#+ topology: *master_1repl_1client
|
|
|
6d47df |
#+
|
|
|
6d47df |
# fedora-29/test_caless_TestServerInstall:
|
|
|
6d47df |
# requires: [fedora-29/build]
|
|
|
6d47df |
# priority: 50
|
|
|
6d47df |
diff --git a/ipatests/prci_definitions/nightly_rawhide.yaml b/ipatests/prci_definitions/nightly_rawhide.yaml
|
|
|
6d47df |
index bdc34d2..e74e5f6 100644
|
|
|
6d47df |
--- a/ipatests/prci_definitions/nightly_rawhide.yaml
|
|
|
6d47df |
+++ b/ipatests/prci_definitions/nightly_rawhide.yaml
|
|
|
6d47df |
@@ -195,6 +195,18 @@ jobs:
|
|
|
6d47df |
timeout: 10800
|
|
|
6d47df |
topology: *master_1repl
|
|
|
6d47df |
|
|
|
6d47df |
+ fedora-28/test_idviews:
|
|
|
6d47df |
+ requires: [fedora-rawhide/build]
|
|
|
6d47df |
+ priority: 50
|
|
|
6d47df |
+ job:
|
|
|
6d47df |
+ class: RunPytest
|
|
|
6d47df |
+ args:
|
|
|
6d47df |
+ build_url: '{fedora-rawhide/build_url}'
|
|
|
6d47df |
+ test_suite: test_integration/test_idviews.py::TestIDViews
|
|
|
6d47df |
+ template: *ci-master-frawhide
|
|
|
6d47df |
+ timeout: 3600
|
|
|
6d47df |
+ topology: *master_1repl_1client
|
|
|
6d47df |
+
|
|
|
6d47df |
fedora-rawhide/test_caless_TestServerInstall:
|
|
|
6d47df |
requires: [fedora-rawhide/build]
|
|
|
6d47df |
priority: 50
|
|
|
6d47df |
|