Skip to content

Conversation

@sumit-bose
Copy link
Contributor

The Kerberos 'an2ln' localauth plugin should be disabled in AD and IPA environments where SSSD's localauth plugin can handle the mapping. In a plain Kerberos environment libkrb5 defaults should be used.

Please note, this test is expected to fail until #8136 is commited.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces two new tests to verify the disabling of the 'an2ln' Kerberos localauth plugin in different environments (AD/IPA and LDAP). The tests check for the presence or absence of the localauth plugin configuration file and ensure that Kerberos TGT is available after logging in as a test user. I have identified a potential issue in the first test where the regular expression pattern might not be robust enough to handle variations in the path to the sssd_krb5_localauth_plugin.so module.

Copy link
Contributor

@aplopez aplopez left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM


@pytest.mark.importance("critical")
@pytest.mark.topology(KnownTopology.LDAP)
def test_disable_an2ln_kdc(client: Client, provider: GenericProvider, kdc: KDC):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At the very least test name doesn't match what it does.

Test doesn't make sure 'an2ln' is disabled, it makes sure config snippet is absent.

And I'm not sure this test is really needed at all... imo, definitely not importance("critical")

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi,

I changed the name and made the importance "high". I think this test is important because we want to make sure the file isn't present in the plain krb5 case because it's creation cannot be disabled otherwise.

bye,
Sumit

The Kerberos 'an2ln' localauth plugin should be disabled in AD and IPA
environments where SSSD's localauth plugin can handle the mapping. In a
plain Kerberos environment libkrb5 defaults should be used.

Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Alejandro López <allopez@redhat.com>
@sssd-bot
Copy link

The pull request was accepted by @alexey-tikhonov with the following PR CI status:


🟢 CodeFactor (success)
🟢 CodeQL (success)
NEUTRAL osh-diff-scan:fedora-rawhide-x86_64:upstream (neutral)
🟢 rpm-build:centos-stream-10-x86_64:upstream (success)
🟢 rpm-build:fedora-41-x86_64:upstream (success)
🟢 rpm-build:fedora-42-x86_64:upstream (success)
🟢 rpm-build:fedora-43-x86_64:upstream (success)
🟢 rpm-build:fedora-rawhide-x86_64:upstream (success)
🟢 Analyze (target) / cppcheck (success)
🟢 ci / intgcheck (centos-10) (success)
🟢 ci / intgcheck (fedora-41) (success)
🟢 ci / intgcheck (fedora-42) (success)
🟢 ci / intgcheck (fedora-43) (success)
🟢 ci / intgcheck (fedora-44) (success)
🟢 ci / prepare (success)
🔴 ci / system (centos-10) (failure)
🟢 ci / system (fedora-41) (success)
🟢 ci / system (fedora-42) (success)
🟢 ci / system (fedora-43) (success)
🟢 ci / system (fedora-44) (success)
➖ Coverity scan / coverity (skipped)
🟢 Static code analysis / codeql (success)
🟢 Static code analysis / pre-commit (success)
🟢 Static code analysis / python-system-tests (success)


There are unsuccessful or unfinished checks. Make sure that the failures are not related to this pull request before merging.

@alexey-tikhonov alexey-tikhonov merged commit e95d3fe into SSSD:master Nov 18, 2025
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants