Skip to content

Commit

Permalink
Tests: alltests/test_sss_cache.py converted to multihost/test_sssctl.py
Browse files Browse the repository at this point in the history
  • Loading branch information
patriki01 committed Oct 5, 2023
1 parent 66c0a2d commit 409e555
Show file tree
Hide file tree
Showing 2 changed files with 44 additions and 0 deletions.
1 change: 1 addition & 0 deletions src/tests/multihost/alltests/test_sss_cache.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@
@pytest.mark.usefixtures('setup_sssd_krb', 'create_posix_usersgroups')
@pytest.mark.sss_cache
class TestSssCache(object):
@pytest.mark.converted('test_sssctl.py', 'test_sssctl__reset_cached_timestamps')
@pytest.mark.tier1_2
def test_sss_cache_reset(self, multihost, backupsssdconf):
"""
Expand Down
43 changes: 43 additions & 0 deletions src/tests/system/tests/test_sssctl.py
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@

import pytest
from sssd_test_framework.roles.client import Client
from sssd_test_framework.roles.ldap import LDAP
from sssd_test_framework.topology import KnownTopology


Expand Down Expand Up @@ -140,3 +141,45 @@ def test_sssctl__handle_implicit_domain(client: Client):
cmd = client.sssctl.user_show(user=user)
assert cmd.rc == 0
assert "Cache entry creation date" in cmd.stdout


@pytest.mark.ticket(bz=1902280)
@pytest.mark.topology(KnownTopology.LDAP)
def test_sssctl__reset_cached_timestamps(client: Client, ldap: LDAP):
"""
:title: fix sssctl cache-expire to also reset cached timestamp
:setup:
1. Add user to LDAP
2. Add group to LDAP
3. Set proper domain config options in sssd.conf file
4. Start SSSD
:steps:
1. Call getent group
2. Modify group entry in LDAP
3. Call 'sssctl cache-expire -E'
4. Call getent group
:expectedresults:
1. Group is properly cached, user is its member
2. Member of group is removed, group entry changed
3. Whole cache is invalidated
4. User is not member of group anymore
:customerscenario: True
"""
u = ldap.user("user1").add()
ldap.group("group1", rfc2307bis=True).add().add_member(u)

client.sssd.domain["ldap_schema"] = "rfc2307bis"
client.sssd.domain["ldap_group_member"] = "member"

client.sssd.start()

res1 = client.tools.getent.group("group1")
assert res1 is not None
assert "user1" in res1.members

ldap.group("group1", rfc2307bis=True).remove_member(ldap.user("user1"))
client.sssctl.cache_expire(everything=True)

res1 = client.tools.getent.group("group1")
assert res1 is not None
assert "user1" not in res1.members

0 comments on commit 409e555

Please sign in to comment.