e57a97aa67
- Resolves: RHEL-12589 ipa: Invalid CSRF protection - Resolves: RHEL-19748 ipa hbac-test did not report that it hit an arbitrary search limit - Resolves: RHEL-21059 'DogtagCertsConfigCheck' fails, displaying the error message 'Malformed directive: ca.signing.certnickname=caSigningCert cert-pki-ca' - Resolves: RHEL-21804 ipa client 4.10.2 - Failed to obtain host TGT - Resolves: RHEL-21809 CA less servers are failing to be added in topology segment for domain suffix - Resolves: RHEL-21810 ipa-client-install --automount-location does not work - Resolves: RHEL-21811 Handle change in behavior of pki-server ca-config-show in pki 11.5.0 - Resolves: RHEL-21812 Backport latest test fixes in ipa - Resolves: RHEL-21813 krb5kdc fails to start when pkinit and otp auth type is enabled in ipa - Resolves: RHEL-21815 IPA 389ds plugins need to have better logging and tracing - Resolves: RHEL-21937 Make sure a default NetBIOS name is set if not passed in by ADTrust instance constructor Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
47 lines
1.8 KiB
Diff
47 lines
1.8 KiB
Diff
From 8bdfbe8d2b203c64444390985011b2372f3bc08e Mon Sep 17 00:00:00 2001
|
|
From: Sudhir Menon <sumenon@redhat.com>
|
|
Date: Wed, 20 Dec 2023 18:42:25 +0530
|
|
Subject: [PATCH] ipatests: Skip ds_encryption tests on RHEL9 SUT.
|
|
|
|
test_ipahealthcheck_ds_encryption tests are failing
|
|
in RHEL9 SUT because in this test tls protocol version
|
|
is set to TLS1.0 using the below command, but its
|
|
reset to TLS1.2 causing the test to fail.
|
|
|
|
'dsconf', 'slapd-TESTREALM-TEST', 'security', 'set', '--tls-protocol-min=TLS1.0'
|
|
|
|
Hence the test is skipped to be run on RHEL9.0 SUT.
|
|
|
|
Signed-off-by: Sudhir Menon <sumenon@redhat.com>
|
|
Reviewed-By: Florence Blanc-Renaud <frenaud@redhat.com>
|
|
---
|
|
ipatests/test_integration/test_ipahealthcheck.py | 5 ++++-
|
|
1 file changed, 4 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/ipatests/test_integration/test_ipahealthcheck.py b/ipatests/test_integration/test_ipahealthcheck.py
|
|
index 785e9abbae3b807f100a3d875e0c0b23f868be83..40c84898894681d8daf386b522118a6a7f793227 100644
|
|
--- a/ipatests/test_integration/test_ipahealthcheck.py
|
|
+++ b/ipatests/test_integration/test_ipahealthcheck.py
|
|
@@ -158,7 +158,6 @@ TOMCAT_CONFIG_FILES = (
|
|
paths.CA_CS_CFG_PATH,
|
|
)
|
|
|
|
-
|
|
def run_healthcheck(host, source=None, check=None, output_type="json",
|
|
failures_only=False, config=None):
|
|
"""
|
|
@@ -1262,6 +1261,10 @@ class TestIpaHealthCheck(IntegrationTest):
|
|
)
|
|
self.master.run_command(cmd)
|
|
|
|
+ @pytest.mark.skipif((osinfo.id == 'rhel'
|
|
+ and osinfo.version_number >= (9,0)),
|
|
+ reason=" TLS versions below 1.2 are not "
|
|
+ "supported anymore in RHEL9.0 and above.")
|
|
def test_ipahealthcheck_ds_encryption(self, modify_tls):
|
|
"""
|
|
This testcase modifies the default TLS version of
|
|
--
|
|
2.43.0
|
|
|