Skip to content

Commit 8a9e9d9

Browse files
spoore1danlavu
authored andcommitted
Disabling AD CA until containers ready
The AD CA functionality will cause failures in initializing the AD role until the sssd-ci-containers ansible role for AD is updated to configure the system properly for CA functionality. For now, commenting out the CA initializzation from the AD Role.
1 parent d0837b2 commit 8a9e9d9

1 file changed

Lines changed: 56 additions & 50 deletions

File tree

  • sssd_test_framework/roles

sssd_test_framework/roles/ad.py

Lines changed: 56 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -153,18 +153,21 @@ def test_example_autofs(client: Client, ad: AD, nfs: NFS):
153153
}
154154
"""
155155

156-
self._ca = ADCertificateAuthority(self.host)
157-
"""
158-
AD Certificate Authority server management.
159-
160-
Provides certificate operations:
161-
- Request certificates using templates
162-
- Request smartcard certificates with Enrollment Agent
163-
- Revoke certificates with configurable reasons
164-
- Manage certificate holds
165-
- Export certificates as PFX
166-
- Retrieve certificate and template details
167-
"""
156+
#
157+
# Disabling CA functionality until sssd-ci-container updated
158+
#
159+
# self._ca = ADCertificateAuthority(self.host)
160+
# """
161+
# AD Certificate Authority server management.
162+
#
163+
# Provides certificate operations:
164+
# - Request certificates using templates
165+
# - Request smartcard certificates with Enrollment Agent
166+
# - Revoke certificates with configurable reasons
167+
# - Manage certificate holds
168+
# - Export certificates as PFX
169+
# - Retrieve certificate and template details
170+
# """
168171

169172
@property
170173
def password_policy(self) -> ADPasswordPolicy:
@@ -184,44 +187,47 @@ def test_example(client: Client, ad: AD):
184187
"""
185188
return self._password_policy
186189

187-
@property
188-
def ca(self) -> ADCertificateAuthority:
189-
"""
190-
AD Certificate Authority management.
191-
192-
Provides certificate operations:
193-
194-
- Request certificates using templates
195-
- Request smartcard certificates with Enrollment Agent
196-
- Revoke certificates with configurable reasons
197-
- Manage certificate holds
198-
- Export certificates as PFX
199-
- Retrieve certificate and template details
200-
201-
.. code-block:: python
202-
:caption: Example usage
203-
204-
@pytest.mark.topology(KnownTopology.AD)
205-
def test_example(client: Client, ad: AD):
206-
# Request smartcard certificate
207-
cert, key, csr = ad.ca.request(
208-
template="SmartcardLogon",
209-
subject="CN=testuser"
210-
)
211-
212-
# Get certificate details
213-
cert_details = ad.ca.get(cert)
214-
215-
# Place certificate on hold (temporary revocation)
216-
ad.ca.revoke_hold(cert)
217-
218-
# Remove hold (restore certificate)
219-
ad.ca.revoke_hold_remove(cert)
220-
221-
# Permanently revoke certificate
222-
ad.ca.revoke(cert, reason="key_compromise")
223-
"""
224-
return self._ca
190+
#
191+
# Disabling CA functionality until sssd-ci-container updated
192+
#
193+
# @property
194+
# def ca(self) -> ADCertificateAuthority:
195+
# """
196+
# AD Certificate Authority management.
197+
#
198+
# Provides certificate operations:
199+
#
200+
# - Request certificates using templates
201+
# - Request smartcard certificates with Enrollment Agent
202+
# - Revoke certificates with configurable reasons
203+
# - Manage certificate holds
204+
# - Export certificates as PFX
205+
# - Retrieve certificate and template details
206+
#
207+
# .. code-block:: python
208+
# :caption: Example usage
209+
#
210+
# @pytest.mark.topology(KnownTopology.AD)
211+
# def test_example(client: Client, ad: AD):
212+
# # Request smartcard certificate
213+
# cert, key, csr = ad.ca.request(
214+
# template="SmartcardLogon",
215+
# subject="CN=testuser"
216+
# )
217+
#
218+
# # Get certificate details
219+
# cert_details = ad.ca.get(cert)
220+
#
221+
# # Place certificate on hold (temporary revocation)
222+
# ad.ca.revoke_hold(cert)
223+
#
224+
# # Remove hold (restore certificate)
225+
# ad.ca.revoke_hold_remove(cert)
226+
#
227+
# # Permanently revoke certificate
228+
# ad.ca.revoke(cert, reason="key_compromise")
229+
# """
230+
# return self._ca
225231

226232
@property
227233
def naming_context(self) -> str:

0 commit comments

Comments
 (0)