dirsrvtests/tests/tickets/ticket142_test.py | 32 +++--------------
dirsrvtests/tests/tickets/ticket47838_test.py | 36 +++++++++----------
dirsrvtests/tests/tickets/ticket48194_test.py | 48 +++++++-------------------
dirsrvtests/tests/tickets/ticket48294_test.py | 8 ++--
dirsrvtests/tests/tickets/ticket48295_test.py | 4 +-
dirsrvtests/tests/tickets/ticket48745_test.py | 9 ----
dirsrvtests/tests/tickets/ticket48784_test.py | 1
7 files changed, 44 insertions(+), 94 deletions(-)
New commits:
commit d193997f705a4421ac99078a63554afaf1d29d94
Author: Simon Pichugin <spichugi(a)redhat.com>
Date: Thu Jul 28 20:34:02 2016 +0200
Ticket 48832 - Fix pytest compatibility in CI tests
Description: For pytest compatibility all test suites should have test
functions starting with 'test' word. Fix it. Also clean up the tests
from old 'run_isolated' functions.
https://fedorahosted.org/389/ticket/48832
Reviewed by: mreynolds (Thanks!)
diff --git a/dirsrvtests/tests/tickets/ticket142_test.py
b/dirsrvtests/tests/tickets/ticket142_test.py
index bc4e7c0..3c9cfce 100644
--- a/dirsrvtests/tests/tickets/ticket142_test.py
+++ b/dirsrvtests/tests/tickets/ticket142_test.py
@@ -104,7 +104,7 @@ def check_attr_val(topology, dn, attr, expected):
assert False
-def _142_init(topology):
+def test_142_init(topology):
"""
Set global password policy.
Then, set fine-grained subtree level password policy to ou=People with no password
syntax.
@@ -155,7 +155,7 @@ def _142_init(topology):
'(targetattr="*")(version 3.0; acl
"pwp test"; allow (all) userdn="ldap:///%s";)' % BN)])
-def _142_run_0(topology):
+def test_142_run_0(topology):
"""
Make sure an entry added to ou=people has no password syntax restrictions.
"""
@@ -175,7 +175,7 @@ def _142_run_0(topology):
log.info('PASSED')
-def _142_run_1(topology):
+def test_142_run_1(topology):
"""
Set 'nsslapd-pwpolicy-inherit-global: on'
But passwordCheckSyntax is still off.
@@ -201,7 +201,7 @@ def _142_run_1(topology):
log.info('PASSED')
-def _142_run_2(topology):
+def test_142_run_2(topology):
"""
Set 'passwordCheckSyntax: on'
Set 'passwordMinLength: 9' for testing
@@ -244,7 +244,7 @@ def _142_run_2(topology):
log.info('PASSED')
-def _142_run_3(topology):
+def test_142_run_3(topology):
"""
Set 'passwordCheckSyntax: on'
Set 'nsslapd-pwpolicy-inherit-global: off'
@@ -271,7 +271,7 @@ def _142_run_3(topology):
log.info('PASSED')
-def _142_run_4(topology):
+def test_142_run_4(topology):
"""
Set 'passwordCheckSyntax: on'
Set 'nsslapd-pwpolicy-inherit-global: on'
@@ -300,26 +300,6 @@ def _142_run_4(topology):
log.info('PASSED')
-def test_ticket142(topology):
- '''
- run_isolated is used to run these test cases independently of a test scheduler
(xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '(a)pytest.fixture' line before
'topology' function.
- - set the installation prefix
- - run this program
- '''
- global installation_prefix
- installation_prefix = None
-
- _142_init(topology)
-
- _142_run_0(topology)
- _142_run_1(topology)
- _142_run_2(topology)
- _142_run_3(topology)
- _142_run_4(topology)
-
-
if __name__ == '__main__':
# Run isolated
# -s for DEBUG mode
diff --git a/dirsrvtests/tests/tickets/ticket47838_test.py
b/dirsrvtests/tests/tickets/ticket47838_test.py
index 109b48d..85e5166 100644
--- a/dirsrvtests/tests/tickets/ticket47838_test.py
+++ b/dirsrvtests/tests/tickets/ticket47838_test.py
@@ -96,7 +96,7 @@ def _header(topology, label):
topology.standalone.log.info("###############################################")
-def _47838_init(topology):
+def test_47838_init(topology):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
@@ -200,7 +200,7 @@ def comp_nsSSLEnableCipherCount(topology, ecount):
assert ecount == enabledciphercnt
-def _47838_run_0(topology):
+def test_47838_run_0(topology):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
@@ -240,7 +240,7 @@ def _47838_run_0(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_1(topology):
+def test_47838_run_1(topology):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
@@ -283,7 +283,7 @@ def _47838_run_1(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_2(topology):
+def test_47838_run_2(topology):
"""
Check nsSSL3Ciphers: +rsa_aes_128_sha,+rsa_aes_256_sha
rsa_aes_128_sha, tls_rsa_aes_128_sha, rsa_aes_256_sha, tls_rsa_aes_256_sha are
enabled.
@@ -315,7 +315,7 @@ def _47838_run_2(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_3(topology):
+def test_47838_run_3(topology):
"""
Check nsSSL3Ciphers: -all
All ciphers are disabled.
@@ -346,7 +346,7 @@ def _47838_run_3(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_4(topology):
+def test_47838_run_4(topology):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
@@ -385,7 +385,7 @@ def _47838_run_4(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_5(topology):
+def test_47838_run_5(topology):
"""
Check nsSSL3Ciphers: default
Default ciphers are enabled.
@@ -424,7 +424,7 @@ def _47838_run_5(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_6(topology):
+def test_47838_run_6(topology):
"""
Check nsSSL3Ciphers: +all,-rsa_rc4_128_md5
All ciphers are disabled.
@@ -458,7 +458,7 @@ def _47838_run_6(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_7(topology):
+def test_47838_run_7(topology):
"""
Check nsSSL3Ciphers: -all,+rsa_rc4_128_md5
All ciphers are disabled.
@@ -490,7 +490,7 @@ def _47838_run_7(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_8(topology):
+def test_47838_run_8(topology):
"""
Check nsSSL3Ciphers: default + allowWeakCipher: off
Strong Default ciphers are enabled.
@@ -529,7 +529,7 @@ def _47838_run_8(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_9(topology):
+def test_47838_run_9(topology):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
@@ -572,7 +572,7 @@ def _47838_run_9(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_10(topology):
+def test_47838_run_10(topology):
"""
Check nsSSL3Ciphers: -TLS_RSA_WITH_NULL_MD5,+TLS_RSA_WITH_RC4_128_MD5,
+TLS_RSA_EXPORT_WITH_RC4_40_MD5,+TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
@@ -620,7 +620,7 @@ def _47838_run_10(topology):
comp_nsSSLEnableCipherCount(topology, ecount)
-def _47838_run_11(topology):
+def test_47838_run_11(topology):
"""
Check nsSSL3Ciphers: +fortezza
SSL_GetImplementedCiphers does not return this as a secuire cipher suite
@@ -647,7 +647,7 @@ def _47838_run_11(topology):
comp_nsSSLEnableCipherCount(topology, 0)
-def _47928_run_0(topology):
+def test_47928_run_0(topology):
"""
No SSL version config parameters.
Check SSL3 (TLS1.0) is off.
@@ -682,7 +682,7 @@ def _47928_run_0(topology):
assert False
-def _47928_run_1(topology):
+def test_47928_run_1(topology):
"""
No nsSSL3, nsTLS1; sslVersionMin > sslVersionMax
Check sslVersionMax is ignored.
@@ -716,7 +716,7 @@ def _47928_run_1(topology):
assert False
-def _47928_run_2(topology):
+def test_47928_run_2(topology):
"""
nsSSL3: on; sslVersionMin: TLS1.1; sslVersionMax: TLS1.2
Conflict between nsSSL3 and range; nsSSL3 is disabled
@@ -759,7 +759,7 @@ def _47928_run_2(topology):
assert False
-def _47928_run_3(topology):
+def test_47928_run_3(topology):
"""
nsSSL3: on; nsTLS1: off; sslVersionMin: TLS1.1; sslVersionMax: TLS1.2
Conflict between nsSSL3/nsTLS1 and range; nsSSL3 is disabled; nsTLS1 is enabled.
@@ -803,7 +803,7 @@ def _47928_run_3(topology):
assert False
-def _47838_run_last(topology):
+def test_47838_run_last(topology):
"""
Check nsSSL3Ciphers: all <== invalid value
All ciphers are disabled.
diff --git a/dirsrvtests/tests/tickets/ticket48194_test.py
b/dirsrvtests/tests/tickets/ticket48194_test.py
index 897f4d0..10192c1 100644
--- a/dirsrvtests/tests/tickets/ticket48194_test.py
+++ b/dirsrvtests/tests/tickets/ticket48194_test.py
@@ -82,7 +82,7 @@ def _header(topology, label):
topology.standalone.log.info("###############################################")
-def my_test_init(topology):
+def test_init(topology):
"""
Generate self signed cert and import it to the DS cert db.
Enable SSL
@@ -204,7 +204,7 @@ def connectWithOpenssl(topology, cipher, expect):
proc.stdin.close()
assert False
-def my_test_run_0(topology):
+def test_run_0(topology):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
@@ -221,7 +221,7 @@ def my_test_run_0(topology):
connectWithOpenssl(topology, 'RC4-SHA', True)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_1(topology):
+def test_run_1(topology):
"""
Check nsSSL3Ciphers: +all
All ciphers are enabled except null.
@@ -243,7 +243,7 @@ def my_test_run_1(topology):
connectWithOpenssl(topology, 'RC4-SHA', False)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_2(topology):
+def test_run_2(topology):
"""
Check nsSSL3Ciphers: +rsa_aes_128_sha,+rsa_aes_256_sha
rsa_aes_128_sha, tls_rsa_aes_128_sha, rsa_aes_256_sha, tls_rsa_aes_256_sha are
enabled.
@@ -265,7 +265,7 @@ def my_test_run_2(topology):
connectWithOpenssl(topology, 'AES128-SHA', True)
connectWithOpenssl(topology, 'AES256-SHA', True)
-def my_test_run_3(topology):
+def test_run_3(topology):
"""
Check nsSSL3Ciphers: -all
All ciphers are disabled.
@@ -285,7 +285,7 @@ def my_test_run_3(topology):
connectWithOpenssl(topology, 'RC4-SHA', False)
connectWithOpenssl(topology, 'AES256-SHA256', False)
-def my_test_run_4(topology):
+def test_run_4(topology):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
@@ -305,7 +305,7 @@ def my_test_run_4(topology):
connectWithOpenssl(topology, 'RC4-SHA', False)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_5(topology):
+def test_run_5(topology):
"""
Check nsSSL3Ciphers: default
Default ciphers are enabled.
@@ -325,7 +325,7 @@ def my_test_run_5(topology):
connectWithOpenssl(topology, 'RC4-SHA', False)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_6(topology):
+def test_run_6(topology):
"""
Check nsSSL3Ciphers: +all,-TLS_RSA_WITH_AES_256_CBC_SHA256
All ciphers are disabled.
@@ -346,7 +346,7 @@ def my_test_run_6(topology):
connectWithOpenssl(topology, 'AES256-SHA256', False)
connectWithOpenssl(topology, 'AES128-SHA', True)
-def my_test_run_7(topology):
+def test_run_7(topology):
"""
Check nsSSL3Ciphers: -all,+rsa_rc4_128_md5
All ciphers are disabled.
@@ -367,7 +367,7 @@ def my_test_run_7(topology):
connectWithOpenssl(topology, 'AES256-SHA256', False)
connectWithOpenssl(topology, 'RC4-MD5', True)
-def my_test_run_8(topology):
+def test_run_8(topology):
"""
Check nsSSL3Ciphers: default + allowWeakCipher: off
Strong Default ciphers are enabled.
@@ -387,7 +387,7 @@ def my_test_run_8(topology):
connectWithOpenssl(topology, 'RC4-SHA', False)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_9(topology):
+def test_run_9(topology):
"""
Check no nsSSL3Ciphers
Default ciphers are enabled.
@@ -410,7 +410,7 @@ def my_test_run_9(topology):
connectWithOpenssl(topology, 'RC4-SHA', True)
connectWithOpenssl(topology, 'AES256-SHA256', True)
-def my_test_run_10(topology):
+def test_run_10(topology):
"""
Check nsSSL3Ciphers: -TLS_RSA_WITH_NULL_MD5,+TLS_RSA_WITH_RC4_128_MD5,
+TLS_RSA_EXPORT_WITH_RC4_40_MD5,+TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
@@ -439,7 +439,7 @@ def my_test_run_10(topology):
connectWithOpenssl(topology, 'RC4-MD5', True)
connectWithOpenssl(topology, 'AES256-SHA256', False)
-def my_test_run_11(topology):
+def test_run_11(topology):
"""
Check nsSSL3Ciphers: +fortezza
SSL_GetImplementedCiphers does not return this as a secuire cipher suite
@@ -459,28 +459,6 @@ def my_test_run_11(topology):
connectWithOpenssl(topology, 'AES256-SHA256', False)
-def test_ticket48194(topology):
- '''
- run_isolated is used to run these test cases independently of a test scheduler
(xunit, py.test..)
- To run isolated without py.test, you need to
- - edit this file and comment '(a)pytest.fixture' line before
'topology' function.
- - set the installation prefix
- - run this program
- '''
- my_test_init(topology)
- my_test_run_0(topology)
- my_test_run_1(topology)
- my_test_run_2(topology)
- my_test_run_3(topology)
- my_test_run_4(topology)
- my_test_run_5(topology)
- my_test_run_6(topology)
- my_test_run_7(topology)
- my_test_run_8(topology)
- my_test_run_9(topology)
- my_test_run_10(topology)
- my_test_run_11(topology)
-
if __name__ == '__main__':
# Run isolated
# -s for DEBUG mode
diff --git a/dirsrvtests/tests/tickets/ticket48294_test.py
b/dirsrvtests/tests/tickets/ticket48294_test.py
index 3cb912f..3e63759 100644
--- a/dirsrvtests/tests/tickets/ticket48294_test.py
+++ b/dirsrvtests/tests/tickets/ticket48294_test.py
@@ -135,7 +135,7 @@ def _modrdn_entry(topology=None, entry_dn=None, new_rdn=None,
del_old=0, new_sup
ent = topology.standalone.getEntry(dn, ldap.SCOPE_BASE, myfilter)
-def _48294_init(topology):
+def test_48294_init(topology):
"""
Set up Linked Attribute
"""
@@ -193,7 +193,7 @@ def _48294_init(topology):
log.info('PASSED')
-def _48294_run_0(topology):
+def test_48294_run_0(topology):
"""
Rename employee1 to employee2 and adjust the value of directReport by replace
"""
@@ -216,7 +216,7 @@ def _48294_run_0(topology):
log.info('PASSED')
-def _48294_run_1(topology):
+def test_48294_run_1(topology):
"""
Rename employee2 to employee3 and adjust the value of directReport by delete and add
"""
@@ -246,7 +246,7 @@ def _48294_run_1(topology):
log.info('PASSED')
-def _48294_run_2(topology):
+def test_48294_run_2(topology):
"""
Rename manager1 to manager2 and make sure the managed attribute value is updated
"""
diff --git a/dirsrvtests/tests/tickets/ticket48295_test.py
b/dirsrvtests/tests/tickets/ticket48295_test.py
index 4c7719d..b636730 100644
--- a/dirsrvtests/tests/tickets/ticket48295_test.py
+++ b/dirsrvtests/tests/tickets/ticket48295_test.py
@@ -113,7 +113,7 @@ def check_attr_val(topology, dn, attr, expected, revert):
assert False
-def _48295_init(topology):
+def test_48295_init(topology):
"""
Set up Linked Attribute
"""
@@ -164,7 +164,7 @@ def _48295_init(topology):
log.info('PASSED')
-def _48295_run(topology):
+def test_48295_run(topology):
"""
Add 2 linktypes - one exists, another does not
"""
diff --git a/dirsrvtests/tests/tickets/ticket48745_test.py
b/dirsrvtests/tests/tickets/ticket48745_test.py
index 6ebe31e..4c23d04 100644
--- a/dirsrvtests/tests/tickets/ticket48745_test.py
+++ b/dirsrvtests/tests/tickets/ticket48745_test.py
@@ -167,14 +167,5 @@ def test_ticket48745_extensible_search_after_index(topology):
if __name__ == '__main__':
# Run isolated
# -s for DEBUG mode
-# global installation1_prefix
-# installation1_prefix = None
-# topo = topology(True)
-# test_ticket48745_init(topo)
-#
-# test_ticket48745_homeDirectory_indexed_cis(topo)
-# test_ticket48745_homeDirectory_mixed_value(topo)
-# test_ticket48745_extensible_search_after_index(topo)
-
CURRENT_FILE = os.path.realpath(__file__)
pytest.main("-s %s" % CURRENT_FILE)
diff --git a/dirsrvtests/tests/tickets/ticket48784_test.py
b/dirsrvtests/tests/tickets/ticket48784_test.py
index e2337f1..a94415a 100644
--- a/dirsrvtests/tests/tickets/ticket48784_test.py
+++ b/dirsrvtests/tests/tickets/ticket48784_test.py
@@ -428,6 +428,7 @@ def test_ticket48784(topology):
log.info("Ticket 48784 - PASSED")
+
if __name__ == '__main__':
# Run isolated
# -s for DEBUG mode