@@ -153,18 +153,21 @@ def test_example_autofs(client: Client, ad: AD, nfs: NFS):
153153 }
154154 """
155155
156- self ._ca = ADCertificateAuthority (self .host )
157- """
158- AD Certificate Authority server management.
159-
160- Provides certificate operations:
161- - Request certificates using templates
162- - Request smartcard certificates with Enrollment Agent
163- - Revoke certificates with configurable reasons
164- - Manage certificate holds
165- - Export certificates as PFX
166- - Retrieve certificate and template details
167- """
156+ #
157+ # Disabling CA functionality until sssd-ci-container updated
158+ #
159+ # self._ca = ADCertificateAuthority(self.host)
160+ # """
161+ # AD Certificate Authority server management.
162+ #
163+ # Provides certificate operations:
164+ # - Request certificates using templates
165+ # - Request smartcard certificates with Enrollment Agent
166+ # - Revoke certificates with configurable reasons
167+ # - Manage certificate holds
168+ # - Export certificates as PFX
169+ # - Retrieve certificate and template details
170+ # """
168171
169172 @property
170173 def password_policy (self ) -> ADPasswordPolicy :
@@ -184,44 +187,47 @@ def test_example(client: Client, ad: AD):
184187 """
185188 return self ._password_policy
186189
187- @property
188- def ca (self ) -> ADCertificateAuthority :
189- """
190- AD Certificate Authority management.
191-
192- Provides certificate operations:
193-
194- - Request certificates using templates
195- - Request smartcard certificates with Enrollment Agent
196- - Revoke certificates with configurable reasons
197- - Manage certificate holds
198- - Export certificates as PFX
199- - Retrieve certificate and template details
200-
201- .. code-block:: python
202- :caption: Example usage
203-
204- @pytest.mark.topology(KnownTopology.AD)
205- def test_example(client: Client, ad: AD):
206- # Request smartcard certificate
207- cert, key, csr = ad.ca.request(
208- template="SmartcardLogon",
209- subject="CN=testuser"
210- )
211-
212- # Get certificate details
213- cert_details = ad.ca.get(cert)
214-
215- # Place certificate on hold (temporary revocation)
216- ad.ca.revoke_hold(cert)
217-
218- # Remove hold (restore certificate)
219- ad.ca.revoke_hold_remove(cert)
220-
221- # Permanently revoke certificate
222- ad.ca.revoke(cert, reason="key_compromise")
223- """
224- return self ._ca
190+ #
191+ # Disabling CA functionality until sssd-ci-container updated
192+ #
193+ # @property
194+ # def ca(self) -> ADCertificateAuthority:
195+ # """
196+ # AD Certificate Authority management.
197+ #
198+ # Provides certificate operations:
199+ #
200+ # - Request certificates using templates
201+ # - Request smartcard certificates with Enrollment Agent
202+ # - Revoke certificates with configurable reasons
203+ # - Manage certificate holds
204+ # - Export certificates as PFX
205+ # - Retrieve certificate and template details
206+ #
207+ # .. code-block:: python
208+ # :caption: Example usage
209+ #
210+ # @pytest.mark.topology(KnownTopology.AD)
211+ # def test_example(client: Client, ad: AD):
212+ # # Request smartcard certificate
213+ # cert, key, csr = ad.ca.request(
214+ # template="SmartcardLogon",
215+ # subject="CN=testuser"
216+ # )
217+ #
218+ # # Get certificate details
219+ # cert_details = ad.ca.get(cert)
220+ #
221+ # # Place certificate on hold (temporary revocation)
222+ # ad.ca.revoke_hold(cert)
223+ #
224+ # # Remove hold (restore certificate)
225+ # ad.ca.revoke_hold_remove(cert)
226+ #
227+ # # Permanently revoke certificate
228+ # ad.ca.revoke(cert, reason="key_compromise")
229+ # """
230+ # return self._ca
225231
226232 @property
227233 def naming_context (self ) -> str :
0 commit comments