All the patches from this thread were converted into github pull requests:
[1]: https://github.com/freeipa/freeipa/pull/224
[2]: https://github.com/freeipa/freeipa/pull/225
On 11/09/2016 04:43 PM, Milan Kubík wrote:
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is rea
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is ready. 2 tests:
1. Adds a cert to idoverride of a windows user
2. sssd part - looks up user by his certificate using dbus-sssd
Second and third dbus call are executed as a string insted of as array
of strings because i
Never give up pinging :)
On 11/03/2016 12:43 PM, Martin Basti wrote:
LGTM
On 03.11.2016 09:42, Oleg Fayans wrote:
One more ping for review
On 10/27/2016 02:21 PM, Oleg Fayans wrote:
ping for review
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is ready. 2 tests:
LGTM
On 03.11.2016 09:42, Oleg Fayans wrote:
One more ping for review
On 10/27/2016 02:21 PM, Oleg Fayans wrote:
ping for review
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is ready. 2 tests:
1. Adds a cert to idoverride of a windows user
2. sssd part - looks u
One more ping for review
On 10/27/2016 02:21 PM, Oleg Fayans wrote:
ping for review
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is ready. 2 tests:
1. Adds a cert to idoverride of a windows user
2. sssd part - looks up user by his certificate using dbus-sssd
Secon
ping for review
On 10/25/2016 10:24 AM, Oleg Fayans wrote:
Integration part of the tests is ready. 2 tests:
1. Adds a cert to idoverride of a windows user
2. sssd part - looks up user by his certificate using dbus-sssd
Second and third dbus call are executed as a string insted of as array
of s
Integration part of the tests is ready. 2 tests:
1. Adds a cert to idoverride of a windows user
2. sssd part - looks up user by his certificate using dbus-sssd
Second and third dbus call are executed as a string insted of as array
of strings because it just does not work otherwise. Some quote e
Added one more test, resolved the pep8 issues
On 10/19/2016 12:32 PM, Oleg Fayans wrote:
Hi Martin,
As you suggested, I've extended the
test_xmlrpc/test_add_remove_cert_cmd.py to contain basic tests for certs
in idoverrides.
The integration part still needs some polishing in the part related to
Hi Martin,
As you suggested, I've extended the
test_xmlrpc/test_add_remove_cert_cmd.py to contain basic tests for certs
in idoverrides.
The integration part still needs some polishing in the part related to
user lookup by cert
On 10/14/2016 03:57 PM, Martin Babinsky wrote:
On 10/14/2016 03:
Hi, Martin,
Right. The point is to have a test that emulates the real-world usecase
of this feature. Which is AD integration. No xmlrpc test is able to do
so. Of course we can automate testing of CLI options using XMLRPC. But
that would not mean we do not need an integration test for the "real
On 10/14/2016 03:48 PM, Oleg Fayans wrote:
So, did I understand correctly, that there would be 2 patches: one
containing test for basic idoverrides functionality without
AD-integration, and the second one - with AD-integration and an sssd
check, correct?
I guess, the
freeipa-ofayans-0050.1-Automa
So, did I understand correctly, that there would be 2 patches: one
containing test for basic idoverrides functionality without
AD-integration, and the second one - with AD-integration and an sssd
check, correct?
I guess, the
freeipa-ofayans-0050.1-Automated-test-for-certs-in-idoverrides-feature
On 15.09.2016 10:10, Oleg Fayans wrote:
Hi Martin,
The file was renamed. Did I understand correctly that for now we are
leaving the test as is and are planning to extend it later?
I would like to have there SSSD check involved, please use what Summit
recommends. No new test cases.
And th
Hi Martin,
The file was renamed. Did I understand correctly that for now we are
leaving the test as is and are planning to extend it later?
On 09/15/2016 09:49 AM, Martin Basti wrote:
On 14.09.2016 18:53, Sumit Bose wrote:
On Wed, Sep 14, 2016 at 06:03:37PM +0200, Martin Basti wrote:
On
On 14.09.2016 18:53, Sumit Bose wrote:
On Wed, Sep 14, 2016 at 06:03:37PM +0200, Martin Basti wrote:
On 14.09.2016 17:53, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
On 14.09.2016 17:41, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still do
On Wed, 14 Sep 2016, Martin Basti wrote:
On 14.09.2016 17:53, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
On 14.09.2016 17:41, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still don't see the reason why AD trust is needed. Default
trust ID
On Wed, Sep 14, 2016 at 06:03:37PM +0200, Martin Basti wrote:
>
>
> On 14.09.2016 17:53, Alexander Bokovoy wrote:
> > On Wed, 14 Sep 2016, Martin Basti wrote:
> > >
> > >
> > > On 14.09.2016 17:41, Alexander Bokovoy wrote:
> > > > On Wed, 14 Sep 2016, Martin Basti wrote:
> > > > > 1)
> > > > >
On 14.09.2016 17:53, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
On 14.09.2016 17:41, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still don't see the reason why AD trust is needed. Default trust
ID view is added just by ipa-adtrust-install,
On Wed, 14 Sep 2016, Martin Basti wrote:
On 14.09.2016 17:41, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still don't see the reason why AD trust is needed. Default trust
ID view is added just by ipa-adtrust-install, adding trust is not
needed for current implemen
On 14.09.2016 17:41, Alexander Bokovoy wrote:
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still don't see the reason why AD trust is needed. Default trust ID
view is added just by ipa-adtrust-install, adding trust is not needed
for current implementation. You don't need AD for this, IDview
On Wed, 14 Sep 2016, Martin Basti wrote:
1)
I still don't see the reason why AD trust is needed. Default trust ID
view is added just by ipa-adtrust-install, adding trust is not needed
for current implementation. You don't need AD for this, IDviews is
generic feature not just for AD. Is that us
On 06.09.2016 13:57, Oleg Fayans wrote:
The test is updated to clean up after itself
On 09/06/2016 12:57 PM, Oleg Fayans wrote:
Hi Martin,
Thanks for the review. The updated patches are attached. Please, see my
comments below
On 08/30/2016 01:58 PM, Martin Basti wrote:
On 22.08.2016 13:1
Ping for review.
On 09/06/2016 01:57 PM, Oleg Fayans wrote:
The test is updated to clean up after itself
On 09/06/2016 12:57 PM, Oleg Fayans wrote:
Hi Martin,
Thanks for the review. The updated patches are attached. Please, see my
comments below
On 08/30/2016 01:58 PM, Martin Basti wrote:
The test is updated to clean up after itself
On 09/06/2016 12:57 PM, Oleg Fayans wrote:
Hi Martin,
Thanks for the review. The updated patches are attached. Please, see my
comments below
On 08/30/2016 01:58 PM, Martin Basti wrote:
On 22.08.2016 13:18, Oleg Fayans wrote:
ping for review
On
Forgot to attach the test run output:
-bash-4.3$ ipa-run-tests test_integration/test_certs_in_idoverrides.py --pdb
WARNING: Couldn't write lextab module 'pycparser.lextab'. [Errno 13]
Permission denied: 'lextab.py'
WARNING: yacc table file version is out of date
WARNING: Couldn't create 'pycpar
Hi Martin,
Thanks for the review. The updated patches are attached. Please, see my
comments below
On 08/30/2016 01:58 PM, Martin Basti wrote:
On 22.08.2016 13:18, Oleg Fayans wrote:
ping for review
On 08/02/2016 01:11 PM, Oleg Fayans wrote:
Hi Martin,
I did! Thank you!
On 08/02/2016 12
On 22.08.2016 13:18, Oleg Fayans wrote:
ping for review
On 08/02/2016 01:11 PM, Oleg Fayans wrote:
Hi Martin,
I did! Thank you!
On 08/02/2016 12:31 PM, Martin Basti wrote:
On 01.08.2016 22:46, Oleg Fayans wrote:
The test was redesigned so that it actually tests against an AD user.
clean
ping for review
On 08/02/2016 01:11 PM, Oleg Fayans wrote:
Hi Martin,
I did! Thank you!
On 08/02/2016 12:31 PM, Martin Basti wrote:
On 01.08.2016 22:46, Oleg Fayans wrote:
The test was redesigned so that it actually tests against an AD user.
cleanly applies, passes lint and passes
https:/
Hi Martin,
I did! Thank you!
On 08/02/2016 12:31 PM, Martin Basti wrote:
On 01.08.2016 22:46, Oleg Fayans wrote:
The test was redesigned so that it actually tests against an AD user.
cleanly applies, passes lint and passes
https://paste.fedoraproject.org/399504/00843641/
Okay
Did you for
On 01.08.2016 22:46, Oleg Fayans wrote:
The test was redesigned so that it actually tests against an AD user.
cleanly applies, passes lint and passes
https://paste.fedoraproject.org/399504/00843641/
Okay
Did you forget to send patches?
Martin^2
On 06/28/2016 01:40 PM, Oleg Fayans wrote
The test was redesigned so that it actually tests against an AD user.
cleanly applies, passes lint and passes
https://paste.fedoraproject.org/399504/00843641/
On 06/28/2016 01:40 PM, Oleg Fayans wrote:
Patch-0050 rebased against latest upstream branch
On 06/28/2016 10:45 AM, Oleg Fayans wrot
Patch-0050 rebased against latest upstream branch
On 06/28/2016 10:45 AM, Oleg Fayans wrote:
> Passing test output:
>
> https://paste.fedoraproject.org/385774/71035231/
>
>
>
--
Oleg Fayans
Quality Engineer
FreeIPA team
RedHat.
From f032df3a1d58e200d0f8bf8dbc121e5f03eb041e Mon Sep 17 00:00:0
Passing test output:
https://paste.fedoraproject.org/385774/71035231/
--
Oleg Fayans
Quality Engineer
FreeIPA team
RedHat.
From 7bc97eb762c951a8bc3762d8bd23da4ee06a6edb Mon Sep 17 00:00:00 2001
From: Oleg Fayans
Date: Tue, 28 Jun 2016 10:33:13 +0200
Subject: [PATCH] Added methods to manipulate
33 matches
Mail list logo