Use a short tempdir for UNIX-domain sockets in t_changepw.py. Otherwise, we get a UNIX domain socket path too long error. Mirror the approach already used by t_ccache.py / t_otp.py --- a/tests/t_changepw.py +++ b/tests/t_changepw.py @@ -1,10 +1,14 @@ from k5test import * +import tempfile -# Also listen on a UNIX domain sockets for kpasswd. +# sun_path is limited to 108 bytes on Linux; the portage build path +# can push $testdir/*.sock past that limit. Use a short tempdir +# instead, matching what t_ccache.py / t_otp.py already do. +sockdir = tempfile.mkdtemp() unix_conf = {'realms': {'$realm': { - 'kdc_listen': '$port0, $testdir/krb5.sock', - 'kadmind_listen': '$port1, $testdir/kadmin.sock', - 'kpasswd_listen': '$port2, $testdir/kpasswd.sock'}}} + 'kdc_listen': '$port0, %s/k' % sockdir, + 'kadmind_listen': '$port1, %s/a' % sockdir, + 'kpasswd_listen': '$port2, %s/p' % sockdir}}} realm = K5Realm(create_host=False,get_creds=False, kdc_conf=unix_conf) realm.start_kadmind() realm.prep_kadmin() @@ -56,9 +60,9 @@ realm.run([kadminl, 'delprinc', 'testprinc']) mark('password change over UNIX domain socket') unix_cli_conf = {'realms': {'$realm': { - 'kdc': '$testdir/krb5.sock', - 'admin_server': '$testdir/kadmin.sock', - 'kpasswd_server': '$testdir/kpasswd.sock'}}} + 'kdc': '%s/k' % sockdir, + 'admin_server': '%s/a' % sockdir, + 'kpasswd_server': '%s/p' % sockdir}}} unix_cli = realm.special_env('unix_cli', False, krb5_conf=unix_cli_conf) realm.run([kadminl, 'addprinc', '-pw', 'pw1', 'testprinc'])