Skip to content

Commit

Permalink
ipatests: fix healthcheck test for ipahealthcheck.ds.encryption
Browse files Browse the repository at this point in the history
389ds is combining the value set in dse.ldif and the current crypto
policy to evaluate the min TLS version that it will be using.
The test needs to change the crypto policy to LEGACY in order to allow
TLS 1.0, because the DEFAULT policy prevents TLS 1.0 on fc33+.

Fixes: https://pagure.io/freeipa/issue/8670

Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
Reviewed-By: Kaleemullah Siddiqui <ksiddiqu@redhat.com>
  • Loading branch information
Florence Blanc-Renaud authored and flo-renaud committed Jan 20, 2021
1 parent 6b93636 commit 279d8b7
Showing 1 changed file with 5 additions and 0 deletions.
5 changes: 5 additions & 0 deletions ipatests/test_integration/test_ipahealthcheck.py
Expand Up @@ -1026,6 +1026,10 @@ def modify_tls(self, restart_service):
"""
instance = realm_to_serverid(self.master.domain.realm)
cmd = ["systemctl", "restart", "dirsrv@{}".format(instance)]
# The crypto policy must be set to LEGACY otherwise 389ds
# combines crypto policy amd minSSLVersion and removes
# TLS1.0 on fedora>=33 as the DEFAULT policy forbids TLS1.0
self.master.run_command(['update-crypto-policies', '--set', 'LEGACY'])
self.master.run_command(
[
"dsconf",
Expand All @@ -1037,6 +1041,7 @@ def modify_tls(self, restart_service):
)
self.master.run_command(cmd)
yield
self.master.run_command(['update-crypto-policies', '--set', 'DEFAULT'])
self.master.run_command(
[
"dsconf",
Expand Down

0 comments on commit 279d8b7

Please sign in to comment.