<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <br>
    <br>
    <div class="moz-cite-prefix">On 09/03/2015 01:40 PM, Lenka Doudova
      wrote:<br>
    </div>
    <blockquote cite="mid:55E831C7.1040202@redhat.com" type="cite">
      <meta content="text/html; charset=windows-1252"
        http-equiv="Content-Type">
      Hi,<br>
      <br>
      I took a look at it at Milan's request.<br>
      <br>
      patch 0008 - tracker looks ok, ACK<br>
      patch 0009 - test cases look ok as well, but can't get it to run,
      10 out of 14 tests fail, starting with internal error, which I
      haven't been able to track down, nor fix it.<br>
    </blockquote>
    <br>
    Can you check /var/log/httpr/errors_log what the internal error is?<br>
    <br>
    Martin^2<br>
    <blockquote cite="mid:55E831C7.1040202@redhat.com" type="cite"> <br>
      Lenka<br>
      <br>
      <small>=================================== FAILURES
        ===================================<br>
        ____________________ TestProfileCRUD.test_create_duplicate
        _____________________<br>
        <br>
        self =
        <ipatests.test_xmlrpc.test_certprofile_plugin.TestProfileCRUD
        object at 0x7f36459e7110><br>
        user_profile =
        <ipatests.test_xmlrpc.test_certprofile_plugin.CertprofileTracker
        object at 0x7f36459e73d0><br>
        <br>
            def test_create_duplicate(self, user_profile):<br>
                msg = u'Certificate Profile with name "{}" already
        exists'<br>
        >       user_profile.ensure_exists()<br>
        <br>
        ipatests/test_xmlrpc/test_certprofile_plugin.py:178: <br>
        _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
        _ _ _ _ _ _ _ _ <br>
        ipatests/test_xmlrpc/ldaptracker.py:169: in ensure_exists<br>
            self.create(force=True)<br>
        ipatests/test_xmlrpc/ldaptracker.py:206: in create<br>
            result = command()<br>
        ipatests/test_xmlrpc/ldaptracker.py:127: in run_command<br>
            result = cmd(*args, **options)<br>
        ipalib/frontend.py:443: in __call__<br>
            ret = self.run(*args, **options)<br>
        ipalib/frontend.py:761: in run<br>
            return self.forward(*args, **options)<br>
        ipalib/frontend.py:782: in forward<br>
            return self.Backend.rpcclient.forward(self.name, *args,
        **kw)<br>
        ipalib/rpc.py:947: in forward<br>
            return self._call_command(command, params)<br>
        ipalib/rpc.py:924: in _call_command<br>
            return command(*params)<br>
        ipalib/rpc.py:1075: in _call<br>
            return self.__request(name, args)<br>
        _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
        _ _ _ _ _ _ _ _ <br>
        <br>
        self = <ipalib.rpc.JSONServerProxy object at
        0x7f36459e71d0><br>
        name = 'certprofile_import'<br>
        args = (('caIPAserviceCert_mod',), {'all': False, 'description':
        'Storing copy of a profile', 'file':
        'profileId=caIPAservice...sion Default<br>
        policyset.serverCertSet.11.default.params.userExtOID=2.5.29.17<br>
        ', 'ipacertprofilestoreissued': True, ...})<br>
        <br>
            def __request(self, name, args):<br>
                payload = {'method': unicode(name), 'params': args,
        'id': 0}<br>
                version = args[1].get('version',
        VERSION_WITHOUT_CAPABILITIES)<br>
                payload = json_encode_binary(payload, version)<br>
            <br>
                if self.__verbose >= 2:<br>
                    root_logger.info('Request: %s',<br>
                                     json.dumps(payload, sort_keys=True,
        indent=4))<br>
            <br>
                response = self.__transport.request(<br>
                    self.__host,<br>
                    self.__handler,<br>
                    json.dumps(payload),<br>
                    verbose=self.__verbose >= 3,<br>
                )<br>
            <br>
                try:<br>
                    response = json_decode_binary(json.loads(response))<br>
                except ValueError as e:<br>
                    raise JSONError(str(e))<br>
            <br>
                if self.__verbose >= 2:<br>
                    root_logger.info(<br>
                        'Response: %s',<br>
                        json.dumps(json_encode_binary(response,
        version),<br>
                                   sort_keys=True, indent=4)<br>
                    )<br>
                error = response.get('error')<br>
                if error:<br>
                    try:<br>
                        error_class = errors_by_code[error['code']]<br>
                    except KeyError:<br>
                        raise UnknownError(<br>
                            code=error.get('code'),<br>
                            error=error.get('message'),<br>
                            server=self.__host,<br>
                        )<br>
                    else:<br>
        >               raise error_class(message=error['message'])<br>
        E               InternalError: an internal error has occurred<br>
      </small><br>
      <br>
      <br>
      <br>
      <div class="moz-cite-prefix">On 08/31/2015 03:25 PM, Fraser
        Tweedale wrote:<br>
      </div>
      <blockquote
        cite="mid:20150831132524.GE5879@dhcp-40-8.bne.redhat.com"
        type="cite">
        <pre wrap="">On Mon, Aug 31, 2015 at 12:24:13PM +0200, Martin Basti wrote:
</pre>
        <blockquote type="cite">
          <pre wrap="">
On 08/18/2015 04:06 PM, Milan Kubík wrote:
</pre>
          <blockquote type="cite">
            <pre wrap="">On 08/11/2015 03:17 AM, Fraser Tweedale wrote:
</pre>
            <blockquote type="cite">
              <pre wrap="">On Mon, Aug 10, 2015 at 11:36:31AM +0200, Milan Kubík wrote:
</pre>
              <blockquote type="cite">
                <pre wrap="">On 08/05/2015 02:57 PM, Milan Kubík wrote:
</pre>
                <blockquote type="cite">
                  <pre wrap="">Hi list,

I'm sending the test plan [1] for certificate profiles and preliminary
patches for it.
The plan covers basic CRUD test and some corner cases. I'm open to
more
suggestions.

More complicated tests involving certificate profiles will require the
code (and tests)
for CA ACLs merged, so it's not there at the moment.

There are some unfinished test cases in places I wasn't sure what the
result should be.
We need to iterate through these to fix it.


[1]: <a moz-do-not-send="true" class="moz-txt-link-freetext" href="http://www.freeipa.org/page/V4/Certificate_Profiles/Test_Plan">http://www.freeipa.org/page/V4/Certificate_Profiles/Test_Plan</a>

Cheers,
Milan
</pre>
                </blockquote>
                <pre wrap="">Hi all,

have you had some time to look at the code and proposal?
Today I want to write a basic CRUD test for the ACLs as well as a few
test
cases to check if the ACL is being enforced. It should make it into
wiki
today or by tomorrow. I'll send an update then.

Cheers,
Milan

</pre>
              </blockquote>
              <pre wrap="">Hi Milan,

I have reviewed the V4/Certificate_Profiles/Test_Plan.  Couple of
comments:

- Test case: Import profile with incorrect values
  - Expected result: refused with error.
  - A simple way to provoke this condition is to add a number to
    ``policyset.serverCertSet.list``.
  - A similar test case should exist for certprofile-mod.

- Test case: Delete default profile
  - As discussed elsewhere, expected result should be failure.
    I filed ticket #5198 to make it so :)

I will review the patch soon.

Cheers,
Fraser
</pre>
            </blockquote>
            <pre wrap="">Hello,

how is the review going? I'd like to have at least the tracker (patch
0008)
reviewed (and merged :) if possible. It will be needed in CA ACL tests.

Cheers,
Milan

</pre>
          </blockquote>
          <pre wrap="">Fraser, do you review this patchset?
</pre>
        </blockquote>
        <pre wrap="">This fell off my radar, sorry!  I eyeballed it a while back and
everything seemed fine; I have not (successfully) run the tests yet
though.  I will complete the review tomorrow.

Thanks,
Fraser

</pre>
      </blockquote>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
    </blockquote>
    <br>
  </body>
</html>