Bug 1903025

Summary: test failure in test_acme.py::TestACME::test_third_party_certs
Product: Red Hat Enterprise Linux 8 Reporter: Mohammad Rizwan <myusuf>
Component: ipaAssignee: Thomas Woerner <twoerner>
Status: CLOSED ERRATA QA Contact: ipa-qe <ipa-qe>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 8.4CC: ksiddiqu, rcritten, tscherf
Target Milestone: rcKeywords: Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ipa-4.9.0-0.2.rc2 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 15:48:22 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mohammad Rizwan 2020-12-01 07:17:01 UTC
Description of problem:
test failure in test_acme.py::TestACME::test_third_party_certs because call to super(TestACME, cls).install(mh) was removed in https://pagure.io/freeipa/c/c4a6b0e5662f539b8438cdbc593eb713ea8c6da2

Because of this the acme tests are broken.

Version-Release number of selected component (if applicable):
rhel8.4
python3-ipatests-4.9.0-0.1.rc1.module+el8.4.0+8830+62cd648b.noarch

How reproducible:
always

Steps to Reproduce:
1. install python3-ipatests-4.9.0-0.1.rc1.module+el8.4.0+8830+62cd648b.noarch and run test_integration/test_acme.py

Actual results:
Test failures

Expected results:
Test passes

Additional info:

Comment 1 Mohammad Rizwan 2020-12-01 07:17:43 UTC
upstream ticket: https://pagure.io/freeipa/issue/8581

Comment 2 Mohammad Rizwan 2020-12-01 07:18:12 UTC
upstream PR: https://github.com/freeipa/freeipa/pull/5266/

Comment 3 Rob Crittenden 2020-12-01 14:40:55 UTC
Fixed upstream:

master:
b6004cf88f97e00740e60c2d1facb4c3f467f21d
75e3803b688362fdce82d7633edd305bc2b354d8
e6489dcb8cb34e0eb8955e601b329a4521a82f3e
3a9fc0115698fa013ff6d36301ceca0ff0655a9e
70306515f78de52baa8c965fb9141bb3bc1bb304
89fddb07503c2df1bd547b4f0c2f2b119cbd23b8
790b765598bf6ee5813163785e2e4fae12f03081

ipa-4-9:
a3c5c71925b5fd8faa56379d92fa19631d230108
17f293e9da0375bac4871c0100c6146a8c2f8e55
75ad5757528491616f7f4e596bb9f6b152944d99
b474b263ed0161ba8411cc84014e4d08a44ac15f
5d286e79515c8a6c856a5acde6300271422acfac
de5baf8516cde060f1606070b2a8824f71178f16
3cd6b81a68be98ae9f60da67d2bc640831f0cf0c

Comment 10 errata-xmlrpc 2021-05-18 15:48:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:1846