Skip to content

Commit

Permalink
touch-up test_035 (#15241)
Browse files Browse the repository at this point in the history
  • Loading branch information
yocalebo authored Dec 19, 2024
1 parent d754ffb commit 46b6f62
Showing 1 changed file with 6 additions and 14 deletions.
20 changes: 6 additions & 14 deletions tests/api2/test_035_ad_idmap.py
Original file line number Diff line number Diff line change
@@ -1,22 +1,14 @@
#!/usr/bin/env python3

# Author: Eric Turgeon
# License: BSD
# Location for tests into REST API of FreeNAS
import base64
import json
import time

import pytest
import sys
import os
import json
apifolder = os.getcwd()
sys.path.append(apifolder)

from auto_config import hostname
from base64 import b64decode
from middlewared.service_exception import ValidationErrors
from middlewared.test.integration.assets.directory_service import active_directory
from middlewared.test.integration.utils import call, ssh
from middlewared.test.integration.utils.system import reset_systemd_svcs
from time import sleep

try:
from config import AD_DOMAIN, ADPASSWORD, ADUSERNAME, AD_COMPUTER_OU
Expand Down Expand Up @@ -148,7 +140,7 @@ def test_backend_options(do_ad_connection, backend_data, backend):
# We unfortunately need to sleep here on each iteration to allow time for
# winbind to settle down before applying more idmap changes otherwise
# subsequent idmap.update call will time out.
sleep(5)
time.sleep(5)

if backend == "AUTORID":
IDMAP_CFG = "idmap config * "
Expand Down Expand Up @@ -269,7 +261,7 @@ def test_backend_options(do_ad_connection, backend_data, backend):

# Check that our secret is written and stored in secrets backup correctly
assert idmap_secret == db_secrets[f"SECRETS/GENERIC/IDMAP_LDAP_{WORKGROUP}/{LDAPBINDDN}"]
decoded_sec = b64decode(idmap_secret).rstrip(b'\x00').decode()
decoded_sec = base64.b64decode(idmap_secret).rstrip(b'\x00').decode()
assert secret == decoded_sec, idmap_secret

# Use net command via samba to rewrite secret and make sure it is same
Expand Down

0 comments on commit 46b6f62

Please sign in to comment.