Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[6.16.z] Remove the test, the BZ has been closed WONTFIX #17145

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
66 changes: 0 additions & 66 deletions tests/foreman/ui/test_ldap_authentication.py
Original file line number Diff line number Diff line change
Expand Up @@ -1043,72 +1043,6 @@ def test_timeout_and_cac_card_ejection():
"""


@pytest.mark.parametrize('ldap_auth_source', ['AD', 'IPA', 'OPENLDAP'], indirect=True)
@pytest.mark.tier2
def test_verify_attribute_of_users_are_updated(
session, ldap_auth_source, ldap_tear_down, target_sat
):
"""Verify if attributes of LDAP user are updated upon first login when
onthefly is disabled

:id: 163b346c-03be-11eb-acb9-0c7a158cbff4

:customerscenario: true

:steps:
1. Create authsource with onthefly disabled
2. Create a user manually and select the authsource created
3. Attributes of the user (like names and email) should be synced.

:BZ: 1670397

:CaseImportance: Medium

:expectedresults: The attributes should be synced.

:parametrized: yes
"""
ldap_data, auth_source = ldap_auth_source
ldap_auth_name = gen_string('alphanumeric')
auth_source_name = f'LDAP-{auth_source.name}'
with session:
session.ldapauthentication.create(
{
'ldap_server.name': ldap_auth_name,
'ldap_server.host': ldap_data['ldap_hostname'],
'ldap_server.server_type': ldap_data['server_type'],
'account.account_name': ldap_data['ldap_user_name'],
'account.password': ldap_data['ldap_user_passwd'],
'account.base_dn': ldap_data['base_dn'],
'account.onthefly_register': False,
'account.groups_base_dn': ldap_data['group_base_dn'],
'attribute_mappings.login': ldap_data['attr_login'],
'attribute_mappings.first_name': LDAP_ATTR['firstname'],
'attribute_mappings.last_name': LDAP_ATTR['surname'],
'attribute_mappings.mail': LDAP_ATTR['mail'],
}
)
session.user.create(
{
'user.login': ldap_data['ldap_user_name'],
'user.auth': auth_source_name,
'roles.admin': True,
}
)
with target_sat.ui_session(
user=ldap_data['ldap_user_name'], password=ldap_data['ldap_user_passwd']
) as ldapsession:
with pytest.raises(NavigationTriesExceeded) as error:
ldapsession.user.search('')
assert error.typename == 'NavigationTriesExceeded'
with session:
user_values = session.user.read(ldap_data['ldap_user_name'])
assert ldap_data['ldap_user_name'] == user_values['user']['login']
assert ldap_data['ldap_user_name'] in user_values['user']['firstname']
assert ldap_data['ldap_user_name'] in user_values['user']['lastname']
assert ldap_data['ldap_user_name'] in user_values['user']['mail']


@pytest.mark.parametrize('ldap_auth_source', ['AD', 'IPA', 'OPENLDAP'], indirect=True)
@pytest.mark.tier2
def test_login_failure_if_internal_user_exist(
Expand Down
Loading