-
Notifications
You must be signed in to change notification settings - Fork 306
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DAOS-15268 test: handle errors in add_del_user #15708
base: master
Are you sure you want to change the base?
Conversation
Ticket title is 'ftest add_del_user should fail on error' |
09ff1e4
to
d799f02
Compare
Replace security_test_base.py:add_del_user with calls to individual functions and handle errors. Test-tag: SecurityPoolACLTest SecurityPoolGroupsTest DaosContainerSecurityTest Skip-unit-tests: true Skip-fault-injection-test: true Signed-off-by: Dalton Bohning <[email protected]>
d799f02
to
e73aec1
Compare
src/tests/ftest/util/user_utils.py
Outdated
CommandResult: groups of command results from the same hosts with the same return status | ||
""" | ||
command = ' '.join(filter(None, [ | ||
'sudo -n' if sudo else None, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't you think it would make sense to standardize on using command_as_user()
in situations like this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
src/tests/ftest/util/user_utils.py
Outdated
CommandResult: groups of command results from the same hosts with the same return status | ||
""" | ||
command = ' '.join(filter(None, [ | ||
'sudo -n' if sudo else None, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same comment
new_user: root | ||
new_group: root |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this now assume that the user account is pre-existing? If so, should we at least have a comment here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's safe to assume root already exists
Test-tag: SecurityPoolACLTest SecurityPoolGroupsTest DaosContainerSecurityTest dfuse_mu Skip-unit-tests: true Skip-fault-injection-test: true Signed-off-by: Dalton Bohning <[email protected]>
Replace security_test_base.py:add_del_user with calls to individual functions and handle errors.
Test-tag: SecurityPoolACLTest SecurityPoolGroupsTest DaosContainerSecurityTest
Skip-unit-tests: true
Skip-fault-injection-test: true
Before requesting gatekeeper:
Features:
(orTest-tag*
) commit pragma was used or there is a reason documented that there are no appropriate tags for this PR.Gatekeeper: