@@ -116,75 +116,7 @@ def test_06_slurm_trace(self):
116
116
self .skip_ok_unless (service .is_running (core .config ['slurm.service-name' ]), 'slurm service not running' )
117
117
self .run_blahp_trace ('slurm' )
118
118
119
- @core .osgrelease ('3.3' )
120
- def test_07_ping_with_gums (self ):
121
- core .state ['condor-ce.gums-auth' ] = False
122
- self .general_requirements ()
123
- core .skip_ok_unless_installed ('gums-service' )
124
-
125
- # Setting up GUMS auth using the instructions here:
126
- # https://opensciencegrid.github.io/docs/compute-element/install-htcondor-ce/#authentication-with-gums
127
- hostname = core .get_hostname ()
128
-
129
- lcmaps_contents = '''gumsclient = "lcmaps_gums_client.mod"
130
- "-resourcetype ce"
131
- "-actiontype execute-now"
132
- "-capath /etc/grid-security/certificates"
133
- "-cert /etc/grid-security/hostcert.pem"
134
- "-key /etc/grid-security/hostkey.pem"
135
- "--cert-owner root"
136
- # Change this URL to your GUMS server
137
- "--endpoint https://%s:8443/gums/services/GUMSXACMLAuthorizationServicePort"
138
-
139
- verifyproxy = "lcmaps_verify_proxy.mod"
140
- "--allow-limited-proxy"
141
- " -certdir /etc/grid-security/certificates"
142
-
143
- # lcmaps policies require at least two modules, so these are here to
144
- # fill in if only one module is needed. "good | bad" has no effect.
145
- good = "lcmaps_dummy_good.mod"
146
- bad = "lcmaps_dummy_bad.mod"
147
-
148
- authorize_only:
149
- ## Policy 1: GUMS but not SAZ (most common, default)
150
- gumsclient -> good | bad
151
- ''' % hostname
152
-
153
- gums_properties_contents = '''gums.location=https://%s:8443/gums/services/GUMSAdmin
154
- gums.authz=https://%s:8443/gums/services/GUMSXACMLAuthorizationServicePort
155
- ''' % (hostname , hostname )
156
-
157
- core .config ['condor-ce.lcmapsdb' ] = '/etc/lcmaps.db'
158
- core .config ['condor-ce.gums-properties' ] = '/etc/gums/gums-client.properties'
159
- core .config ['condor-ce.gsi-authz' ] = '/etc/grid-security/gsi-authz.conf'
160
-
161
- files .write (core .config ['condor-ce.lcmapsdb' ], lcmaps_contents , owner = 'condor-ce.gums' )
162
- files .write (core .config ['condor-ce.gums-properties' ], gums_properties_contents , owner = 'condor-ce' )
163
- files .replace (core .config ['condor-ce.gsi-authz' ],
164
- '# globus_mapping liblcas_lcmaps_gt4_mapping.so lcmaps_callout' ,
165
- 'globus_mapping liblcas_lcmaps_gt4_mapping.so lcmaps_callout' ,
166
- owner = 'condor-ce' )
167
- try :
168
- core .state ['condor-ce.gums-auth' ] = True
169
-
170
- service .check_stop ('condor-ce' )
171
-
172
- stat = core .get_stat (core .config ['condor-ce.collectorlog' ])
173
-
174
- service .check_start ('condor-ce' )
175
- # Wait for the schedd to come back up
176
- self .failUnless (condor .wait_for_daemon (core .config ['condor-ce.collectorlog' ], stat , 'Schedd' , 300.0 ),
177
- 'Schedd failed to restart within the 1 min window' )
178
- command = ('condor_ce_ping' , 'WRITE' , '-verbose' )
179
- stdout , _ , _ = core .check_system (command , 'ping using GSI and gridmap' , user = True )
180
- self .assert_ (re .search (r'Authorized:\s*TRUE' , stdout ), 'could not authorize with GSI' )
181
-
182
- finally :
183
- files .restore (core .config ['condor-ce.lcmapsdb' ], 'condor-ce.gums' )
184
- files .restore (core .config ['condor-ce.gsi-authz' ], 'condor-ce' )
185
- files .restore (core .config ['condor-ce.gums-properties' ], 'condor-ce' )
186
-
187
- def test_08_ceview (self ):
119
+ def test_07_ceview (self ):
188
120
core .config ['condor-ce.view-listening' ] = False
189
121
self .general_requirements ()
190
122
core .skip_ok_unless_installed ('htcondor-ce-view' )
0 commit comments