2011-10-26 06:38:15 +04:00
# This file contains a list of regular expressions matching the names of
# tests that are expected to fail.
2008-05-30 16:13:23 +04:00
#
# "make test" will not report failures for tests listed here and will consider
# a successful run for any of these tests an error.
2011-10-26 06:38:15 +04:00
2011-12-04 07:38:07 +04:00
^samba3.blackbox.failure.failure # this is designed to fail, for testing our test infrastructure
2011-10-26 06:38:15 +04:00
.*driver.add_driver_timestamps # we only can store dates, not timestamps
2015-03-06 11:34:11 +03:00
^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-REAUTH # expected to give ACCESS_DENIED SMB2.1 doesn't have encryption
^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-RECONNECT # expected to give CONNECTION_DISCONNECTED, we need to fix the test
2018-10-18 15:00:13 +03:00
^samba3.smbtorture_s3.plain.*SMB2-DIR-FSYNC.*\(ad_dc_ntvfs\)
2019-09-26 22:36:18 +03:00
^samba3.smbtorture_s3.plain.*SMB2-PATH-SLASH.*\(ad_dc_ntvfs\)
2019-06-03 12:00:25 +03:00
^samba3.smbtorture_s3.plain.LOCK11.*\(ad_dc_ntvfs\)
2012-08-17 10:50:21 +04:00
^samba3.smb2.session enc.reconnect # expected to give CONNECTION_DISCONNECTED, we need to fix the test
^samba3.raw.session enc # expected to give ACCESS_DENIED as SMB1 encryption isn't used
^samba3.smbtorture_s3.crypt_server # expected to give ACCESS_DENIED as SMB1 encryption isn't used
2020-03-03 20:23:04 +03:00
^samba3.smbtorture_s3.*.LOCK12.*\(fileserver_smb1\)
2019-12-13 16:43:32 +03:00
^samba3.smbtorture_s3.*.LOCK12.*\(nt4_dc_smb1\)
2015-03-06 11:34:11 +03:00
^samba3.nbt.dgram.*netlogon2\(nt4_dc\)
2011-10-26 06:38:15 +04:00
^samba3.*rap.sam.*.useradd # Not provided by Samba 3
^samba3.*rap.sam.*.userdelete # Not provided by Samba 3
2020-03-10 21:51:09 +03:00
^samba3.libsmbclient.opendir # This requires a workgroup called 'WORKGROUP' and for netbios browse lists to have been registered
2012-02-08 19:05:34 +04:00
# see bug 8412
2012-02-14 14:42:16 +04:00
^samba3.smb2.rename.*.simple_nodelete
^samba3.smb2.rename.*.no_share_delete_no_delete_access
2019-11-08 16:32:44 +03:00
^samba3.blackbox.smbclient_machine_auth.plain.*nt4_dc:local # the NT4 DC does not currently set up a self-join
2019-12-16 19:07:34 +03:00
^samba3.raw.samba3hide.samba3hide\(ad_dc_smb1\) # This test fails against the ad_dc environment.
2019-12-13 15:22:05 +03:00
^samba3.raw.samba3closeerr.samba3closeerr\(nt4_dc_smb1\) # This test fails against an smbd environment with NT ACLs enabled
2019-12-16 19:01:33 +03:00
^samba3.raw.samba3closeerr.samba3closeerr\(fileserver_smb1\) # This test fails against an smbd environment with NT ACLs enabled
2019-12-13 15:01:49 +03:00
^samba3.raw.acls nfs4acl_xattr-simple-40.INHERITFLAGS\(nt4_dc_smb1\) # This (and the follow nfs4acl_xattr tests fail because our NFSv4 backend isn't a complete mapping yet.
^samba3.raw.acls nfs4acl_xattr-simple-40.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-simple-40.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-simple-40.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-simple-41.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-simple-41.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-simple-41.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-special-40.INHERITFLAGS\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-special-40.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-special-40.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-special-40.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-special-40.inherit_creator_owner\(nt4_d_smb1\)
2017-10-23 14:35:49 +03:00
^samba3.raw.acls nfs4acl_xattr-special-40.inherit_creator_group\(nt4_dc\)
2019-12-13 15:01:49 +03:00
^samba3.raw.acls nfs4acl_xattr-xdr-40.INHERITFLAGS\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-40.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-40.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-40.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-40.inherit_creator_owner\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-40.inherit_creator_group\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-41.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-41.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-xdr-41.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.INHERITFLAGS\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.nulldacl\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.inherit_creator_owner\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-40.inherit_creator_group\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-41.create_owner_file\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-41.create_owner_dir\(nt4_dc_smb1\)
^samba3.raw.acls nfs4acl_xattr-nfs-41.nulldacl\(nt4_dc_smb1\)
2012-08-09 01:43:05 +04:00
^samba3.base.delete.deltest16a
^samba3.base.delete.deltest17a
2019-12-11 21:35:10 +03:00
^samba3.unix.whoami anonymous connection.whoami\(ad_dc_smb1\) # We need to resolve if we should be including SID_NT_WORLD and SID_NT_NETWORK in this token
2019-12-16 20:08:35 +03:00
# smbclient4 behaves differently from smbclient (s3) when encountering
# logon failures when possesing a valid ticket. Test below has been
# changed to use smbclient (in order to support SMB2) and this part of the
# test fails due to this difference
^samba4.blackbox.chgdcpass.Test login with kerberos ccache after 2nd password change\(chgdcpass\)
2011-09-20 06:13:21 +04:00
# these show that we still have some differences between our system
# with our internal iconv because it passes except when we bypass our
# internal iconv modules
^samba4.local.convert_string_handle.system.iconv.gd_ascii
^samba4.local.convert_string_handle.system.iconv.gd_iso8859_cp850
2012-08-09 01:43:05 +04:00
^samba4..*base.delete.*.deltest17\(
^samba4..*base.delete.*.deltest17b
^samba4..*base.delete.*.deltest17c
^samba4..*base.delete.*.deltest17e
^samba4..*base.delete.*.deltest17f
2011-05-23 03:22:07 +04:00
^samba4..*base.delete.*.deltest20a
^samba4..*base.delete.*.deltest20b
2012-05-07 13:50:59 +04:00
^samba4.raw.session.reauth
2012-06-22 14:58:04 +04:00
^samba4.raw.session.expire1
2011-05-23 03:22:07 +04:00
^samba4.raw.rename.*.osxrename
^samba4.raw.rename.*.directory rename
^samba4.rpc.winreg.*security
2020-07-03 16:40:31 +03:00
^samba4.local.registry.*.(dir|ldb).check hive security
^samba4.local.registry.*.local.security
2011-05-23 03:22:07 +04:00
^samba4.rpc.wkssvc
^samba4.rpc.handles.*.lsarpc-shared
2020-06-29 13:45:33 +03:00
^samba4.rpc.epmapper.*.Lookup_simple
^samba4.rpc.epmapper.*.Map_simple
^samba4.rpc.epmapper.*.Map_full
2012-07-05 14:41:44 +04:00
^samba4.rpc.lsalookup on ncalrpc
^samba4.rpc.lsalookup on ncacn_np
^samba4.rpc.lsalookup with seal,padcheck
^samba4.rpc.lsalookup with validate
^samba4.rpc.lsalookup with bigendian
2015-11-10 12:25:10 +03:00
^samba4.rpc.lsa on ncacn_np with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
^samba4.rpc.lsa with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
^samba4.rpc.lsa.secrets.*seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
2011-05-23 03:22:07 +04:00
^samba4.rpc.netlogon.*.LogonUasLogon
^samba4.rpc.netlogon.*.LogonUasLogoff
^samba4.rpc.netlogon.*.DatabaseSync
^samba4.rpc.netlogon.*.DatabaseSync2
^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomains
^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomainsEx
^samba4.rpc.netlogon.*.GetPassword
^samba4.rpc.netlogon.*.DatabaseRedo
2016-12-13 02:25:12 +03:00
^samba4.rpc.netlogon.*.netlogon.lsa_over_netlogon\(ad_dc\) #Broken by split of \\pipe\lsass from \\pipe\netlogon in the IDL
2019-11-26 15:39:31 +03:00
^samba4.rpc.netlogon.*.netlogon.SetupCredentialsDowngrade\(ad_dc_ntvfs\) # Broken by allowing NT4 crypto on this environment
^samba4.rpc.netlogon.*.netlogon.SetupCredentialsDowngrade\(ad_dc_ntvfs:local\) # Broken by allowing NT4 crypto on this environment
2015-07-14 10:13:00 +03:00
^samba4.rpc.drsuapi.*ncacn_ip_tcp.*validate # should only work with seal
^samba4.rpc.drsuapi.*ncacn_ip_tcp.*bigendian # should only work with seal
2015-08-07 10:50:30 +03:00
^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.validate # should only work with seal
^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.bigendian # should only work with seal
2011-05-23 03:22:07 +04:00
^samba4.base.charset.*.Testing partial surrogate
2019-12-10 22:06:13 +03:00
^samba4.smb2.charset.*.Testing partial surrogate # This test is currently broken
^samba3.smb2.charset.*.Testing partial surrogate # This test is currently broken
2012-09-01 01:42:21 +04:00
^samba4.*.base.maximum_allowed # broken until we implement NTCREATEX_OPTIONS_BACKUP_INTENT
2019-12-21 00:06:13 +03:00
^samba..*.smb2.maximum_allowed
2008-02-18 23:13:03 +03:00
.*net.api.delshare.* # DelShare isn't implemented yet
2013-09-26 10:04:50 +04:00
^samba4.smb2.oplock.doc
2014-06-30 13:37:47 +04:00
^samba4.smb2.lock.valid-request
2019-08-16 17:24:34 +03:00
^samba4.raw.lock.multilock6.ad_dc_ntvfs
2019-02-26 16:04:42 +03:00
^samba4.ldap.python \(ad_dc_default\).Test add_ldif\(\) with BASE64 security descriptor input using WRONG domain SID\(.*\)$
2011-05-23 03:22:07 +04:00
^samba4.raw.lock.*.async # bug 6960
2015-04-29 02:33:30 +03:00
^samba4.raw.open.ntcreatex_supersede
2011-05-23 03:22:07 +04:00
^samba4.smb2.lock.*.multiple-unlock # bug 6959
2012-04-27 06:50:36 +04:00
^samba4.raw.sfileinfo.*.end-of-file\(.*\)$ # bug 6962
2011-05-23 03:22:07 +04:00
^samba4.raw.oplock.*.batch22 # bug 6963
2013-09-26 06:00:57 +04:00
^samba4.raw.oplock.*.doc1
2013-09-26 02:33:42 +04:00
^samba4.raw.oplock.*.exclusive5
2013-09-26 03:02:20 +04:00
^samba4.raw.oplock.*.exclusive9
2013-10-15 19:22:06 +04:00
^samba4.raw.oplock.*.level_ii_1
2011-05-23 03:22:07 +04:00
^samba4.raw.lock.*.zerobyteread # bug 6974
^samba4.smb2.lock.*.zerobyteread # bug 6974
^samba4.raw.streams.*.delete
^samba4.raw.streams.*.createdisp
^samba4.raw.streams.*.sumtab
2013-10-30 02:57:01 +04:00
^samba4.raw.streams.*.perms
2012-08-30 19:45:43 +04:00
^samba4.raw.acls.INHERITFLAGS
2011-05-23 03:22:07 +04:00
^samba4.raw.acls.*.create_dir
2017-09-07 18:26:58 +03:00
^samba4.raw.acls.*.create_owner_dir
^samba4.raw.acls.*.create_owner_file
2011-05-23 03:22:07 +04:00
^samba4.smb2.create.*.acldir
2014-06-18 04:02:07 +04:00
^samba4.smb2.create.*.impersonation
2011-05-23 03:22:07 +04:00
^samba4.smb2.acls.*.generic
^samba4.smb2.acls.*.inheritflags
^samba4.smb2.acls.*.owner
2015-10-14 01:33:47 +03:00
^samba4.smb2.acls.*.ACCESSBASED
2019-11-25 18:52:29 +03:00
^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.test_dirsync_deleted_items
#^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.*
2020-03-10 21:51:09 +03:00
^samba4.libsmbclient.opendir.(NT1|SMB3).opendir # This requires netbios browsing
2012-04-27 06:50:36 +04:00
^samba4.rpc.drsuapi.*.drsuapi.DsGetDomainControllerInfo\(.*\)$
^samba4.smb2.oplock.exclusive2\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.exclusive5\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.exclusive6\(.*\)$ # samba 4 oplocks are a mess
2013-09-26 03:02:20 +04:00
^samba4.smb2.oplock.exclusive9\(.*\)$
2012-04-27 06:50:36 +04:00
^samba4.smb2.oplock.brl3\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.levelii500\(.*\)$ # samba 4 oplocks are a mess
2019-05-21 15:53:46 +03:00
^samba4.smb2.oplock.levelii502\(.*\)$ # samba 4 oplocks are a mess
2012-04-27 06:50:36 +04:00
^samba4.smb2.oplock.brl1\(.*\)$ # samba 4 oplocks are a mess
2020-06-23 01:09:38 +03:00
^samba4.smb2.oplock.batch22.\(.*\)$ # samba 4 oplocks are a mess
2012-04-27 06:50:36 +04:00
^samba4.smb2.oplock.batch19\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch12\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch11\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch1\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch6\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch9\(.*\)$ # samba 4 oplocks are a mess
2014-11-05 21:12:20 +03:00
^samba4.smb2.oplock.batch9a\(.*\)$ # samba 4 oplocks are a mess
2012-04-27 06:50:36 +04:00
^samba4.smb2.oplock.batch10\(.*\)$ # samba 4 oplocks are a mess
^samba4.smb2.oplock.batch20\(.*\)$ # samba 4 oplocks are a mess
2014-09-12 14:11:43 +04:00
^samba4.smb2.oplock.batch26\(.*\)$
2012-09-26 05:24:22 +04:00
^samba4.smb2.oplock.stream1 # samba 4 oplocks are a mess
2020-03-03 14:09:09 +03:00
^samba4.smb2.oplock.statopen1\(ad_dc_ntvfs\)$ # fails with ACCESS_DENIED on a SYNCHRONIZE_ACCESS open
2013-08-22 15:06:59 +04:00
^samba4.smb2.getinfo.complex # streams on directories does not work
2013-08-27 13:41:13 +04:00
^samba4.smb2.getinfo.qfs_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
^samba4.smb2.getinfo.qfile_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
^samba4.smb2.getinfo.qsec_buffercheck # S4 does not do the BUFFER_TOO_SMALL thingy
2020-05-11 16:56:58 +03:00
^samba4.smb2.sharemode.sharemode-access
^samba4.smb2.sharemode.access-sharemode
2012-04-27 06:50:36 +04:00
^samba4.ntvfs.cifs.krb5.base.createx_access.createx_access\(.*\)$
2011-12-07 09:03:04 +04:00
^samba4.rpc.lsa.forest.trust #Not fully provided by Samba4
2013-03-22 14:36:49 +04:00
^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_full_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
^samba4.blackbox.upgradeprovision.release-4-0-0.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
2015-03-06 01:38:26 +03:00
^samba4.raw.read.readx\(ad_dc_ntvfs\) # fails readx 16bit alignment requirement
2012-04-27 06:49:14 +04:00
^samba3.smb2.create.gentest
^samba3.smb2.create.blob
^samba3.smb2.create.open
^samba3.smb2.notify.rec
2012-09-11 16:13:51 +04:00
^samba3.smb2.durable-open.delete_on_close2
2012-09-07 18:42:37 +04:00
^samba3.smb2.durable-v2-open.app-instance
2016-03-15 12:02:14 +03:00
^samba3.smb2.durable-open.reopen1a-lease\(ad_dc\)$
2016-03-15 11:06:56 +03:00
^samba3.smb2.durable-v2-open.reopen1a-lease\(ad_dc\)$
2015-03-06 01:38:26 +03:00
^samba4.smb2.ioctl.req_resume_key\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
2017-07-03 16:16:13 +03:00
^samba4.smb2.ioctl.req_two_resume_keys\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
2015-03-06 01:38:26 +03:00
^samba4.smb2.ioctl.copy_chunk_\w*\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
2017-05-16 14:14:16 +03:00
^samba4.smb2.ioctl.copy-chunk streams\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
2012-04-27 06:49:14 +04:00
^samba3.smb2.dir.one
^samba3.smb2.dir.modify
^samba3.smb2.oplock.batch20
2012-09-26 05:24:22 +04:00
^samba3.smb2.oplock.stream1
2012-04-27 06:49:14 +04:00
^samba3.smb2.streams.rename
^samba3.smb2.streams.rename2
^samba3.smb2.streams.attributes
2018-05-26 17:30:47 +03:00
^samba3.smb2.streams streams_xattr.rename\(nt4_dc\)
^samba3.smb2.streams streams_xattr.rename2\(nt4_dc\)
^samba3.smb2.streams streams_xattr.attributes\(nt4_dc\)
2013-08-22 15:06:59 +04:00
^samba3.smb2.getinfo.complex
2013-08-22 15:47:21 +04:00
^samba3.smb2.getinfo.fsinfo # quotas don't work yet
2012-04-27 06:49:14 +04:00
^samba3.smb2.setinfo.setinfo
2012-06-22 15:03:16 +04:00
^samba3.smb2.session.*reauth5 # some special anonymous checks?
2012-09-20 22:46:53 +04:00
^samba3.smb2.compound.interim2 # wrong return code (STATUS_CANCELLED)
2017-09-21 02:13:38 +03:00
^samba3.smb2.compound.aio.interim2 # wrong return code (STATUS_CANCELLED)
2020-06-24 18:41:15 +03:00
^samba3.smb2.replay.replay3 # This requires multi-chanel
^samba3.smb2.replay.replay4 # This requires multi-chanel
2020-07-03 11:09:16 +03:00
^samba3.smb2.lock.replay_smb3_specification_multi # This requires multi-chanel
^samba3.smb2.lock.replay_smb3_specification_durable\(nt4_dc\) # Requires durable handles
2012-10-24 17:55:20 +04:00
^samba3.smb2.lock.*replay_broken_windows # This tests the windows behaviour
2017-05-26 16:42:46 +03:00
^samba3.smb2.lease.statopen3
2018-04-20 15:51:10 +03:00
^samba3.smb2.lease.unlink # we currently do not downgrade RH lease to R after unlink
2016-01-19 16:55:03 +03:00
^samba3.smb2.multichannel
2016-10-04 02:15:20 +03:00
^samba4.smb2.ioctl.compress_notsup.*\(ad_dc_ntvfs\)
2012-06-22 14:11:43 +04:00
^samba3.raw.session.*reauth2 # maybe fix this?
2015-11-10 12:25:10 +03:00
^samba3.rpc.lsa.secrets.seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
2015-03-06 11:34:11 +03:00
^samba3.rpc.samr.passwords.badpwdcount.samr.badPwdCount\(nt4_dc\) # We fail this test currently
^samba3.rpc.samr.passwords.lockout.*\(nt4_dc\)$ # We fail this test currently
2012-04-26 17:31:28 +04:00
^samba3.rpc.spoolss.printer.addprinter.driver_info_winreg # knownfail or flapping?
^samba3.rpc.spoolss.printer.addprinterex.driver_info_winreg # knownfail or flapping?
2013-05-29 12:43:34 +04:00
^samba3.rpc.spoolss.printer.*.publish_toggle\(.*\)$ # needs spoolss AD member env
2016-09-06 13:11:26 +03:00
^samba3.rpc.spoolss.printer.*.log_jobinfo\(.*\)$ # not implemented yet
2019-09-22 04:34:56 +03:00
^samba3.rpc.spoolss.printserver.*.addpermachineconnection\(.*\)$ # not implemented yet
2013-02-01 17:53:12 +04:00
^samba3.rpc.spoolss.printserver.*.add_processor\(.*\)$
2016-08-20 00:27:19 +03:00
^samba3.rpc.spoolss.printserver.*.get_core_printer_drivers\(.*\)$
2016-08-20 01:01:52 +03:00
^samba3.rpc.spoolss.printserver.*.get_printer_driver_package_path\(.*\)$
2013-05-15 02:45:17 +04:00
^samba4.rpc.fsrvp # fsrvp server only provided by smbd
2012-04-30 17:39:10 +04:00
#
2015-03-05 20:08:43 +03:00
# The following tests fail against ad_dc (aka s3fs) currently.
2012-04-30 17:39:10 +04:00
# These need to be examined and either fixed or correctly categorised.
# but in the interests of ensuring we do not regress, we run the tests
# and list the current failures here.
#
2015-03-05 20:08:43 +03:00
^samba3.rpc.eventlog.eventlog.GetLogIntormation\(ad_dc\)
^samba3.rpc.eventlog.eventlog.FlushEventLog\(ad_dc\)
^samba3.rpc.eventlog.eventlog.ReportEventLog\(ad_dc\)
^samba3.rpc.eventlog.eventlog.ReadEventLog\(ad_dc\)
^samba3.rpc.eventlog.eventlog.GetNumRecords\(ad_dc\)
^samba3.rpc.eventlog.eventlog.OpenEventLog\(ad_dc\)
2019-12-11 21:06:47 +03:00
^samba3.rap.basic.netsessiongetinfo\(ad_dc_smb1\)
2020-03-06 00:45:48 +03:00
# not implemented
^samba3.rpc.svcctl.svcctl.ChangeServiceConfigW\(ad_dc\)
^samba3.rpc.svcctl.svcctl.ChangeServiceConfigW\(nt4_dc\)
2012-04-30 17:39:10 +04:00
#
2014-05-12 09:10:14 +04:00
# This makes less sense when not running against an AD DC
#
2015-03-06 01:46:14 +03:00
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping
2018-03-02 13:01:33 +03:00
^samba.wbinfo_simple.allocate-uid.wbinfo\(ad_dc_ntvfs:local\)
^samba.wbinfo_simple.allocate-gid.wbinfo\(ad_dc_ntvfs:local\)
^samba.wbinfo_simple.allocate-uid.wbinfo\(s4member:local\)
^samba.wbinfo_simple.allocate-gid.wbinfo\(s4member:local\)
^samba.wbinfo_simple.allocate-uid.wbinfo\(ad_dc:local\)
^samba.wbinfo_simple.allocate-gid.wbinfo\(ad_dc:local\)
^samba.wbinfo_simple.allocate-uid.wbinfo\(chgdcpass:local\)
^samba.wbinfo_simple.allocate-gid.wbinfo\(chgdcpass:local\)
^samba.wbinfo_simple.allocate-uid.wbinfo\(rodc:local\)
^samba.wbinfo_simple.allocate-gid.wbinfo\(rodc:local\)
2014-05-19 09:32:56 +04:00
#
2014-05-20 01:23:33 +04:00
# These do not work against winbindd in member mode for unknown reasons
#
2014-05-20 02:15:31 +04:00
^samba4.winbind.struct.domain_info\(s4member:local\)
^samba4.winbind.struct.getdcname\(s4member:local\)
2014-05-20 01:23:33 +04:00
#
2015-03-06 01:38:26 +03:00
# These fail since ad_dc_ntvfs assigns the local user's uid to SAMBADOMAIN/Administrator
2015-02-02 18:16:45 +03:00
# hence we have a duplicate UID in nsswitch.
#
2015-03-06 01:38:26 +03:00
^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc_ntvfs:local\)
^samba3.local.nss.reentrant enumeration\(ad_dc_ntvfs:local\)
^samba3.local.nss.enumeration\(ad_dc_ntvfs:local\)
2015-03-28 11:31:05 +03:00
^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc:local\)
^samba3.local.nss.reentrant enumeration\(ad_dc:local\)
^samba3.local.nss.enumeration\(ad_dc:local\)
2015-02-02 18:16:45 +03:00
#
2014-05-20 02:15:31 +04:00
# These do not work against winbindd in member mode for unknown reasons
#
2015-03-06 01:46:14 +03:00
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member\(ad_member:local\)
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping\(ad_member:local\)
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member\(ad_member:local\)
^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping\(ad_member:local\)
2015-06-12 05:41:20 +03:00
^samba4.winbind.struct.getdcname\(ad_member:local\)
^samba4.winbind.struct.lookup_name_sid\(ad_member:local\)
2014-10-23 13:02:57 +04:00
^samba4.winbind.struct.getdcname\(nt4_member:local\) # Works in other modes, just not against the classic/NT4 DC
2015-01-06 03:24:04 +03:00
#
# Differences in our KDC compared to windows
#
2015-02-07 16:32:43 +03:00
^samba4.krb5.kdc .*.as-req-pac-request # We should reply to a request for a PAC over UDP with KRB5KRB_ERR_RESPONSE_TOO_BIG unconditionally
2014-10-23 13:02:57 +04:00
#
# This will fail against the classic DC, because it requires kerberos
#
^samba4.winbind.pac.*\(nt4_member:local\) # No KDC on a classic DC
2015-07-20 04:23:30 +03:00
#
2015-07-30 05:29:54 +03:00
# This fails because our python bindings create python Lists, not a type
# we can watch for set methods on.
#
^samba.tests.dcerpc.integer.samba.tests.dcerpc.integer.IntegerTests.test_.*_into_uint8_list
2016-03-09 01:25:36 +03:00
#
# Samba sort takes a primative approach to unicode sort. These tests
# match Windows 2012R2 behaviour.
#
^samba4.ldap.sort.python.+UnicodeSortTests
2015-12-21 12:04:48 +03:00
#
## We assert all "ldap server require strong auth" combinations
#
^samba4.ldb.simple.ldap with SIMPLE-BIND.*ad_dc_ntvfs # ldap server require strong auth = allow_sasl_over_tls
^samba4.ldb.simple.ldap with SIMPLE-BIND.*fl2003dc # ldap server require strong auth = yes
^samba4.ldb.simple.ldaps with SASL-BIND.*fl2003dc # ldap server require strong auth = yes
2016-03-16 17:07:36 +03:00
# These are supposed to fail as we want to verify the "tls verify peer"
# restrictions. Note that fl2008r2dc uses a self-signed certificate
# with does not have a crl file.
#
^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name_if_available\(
^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name\(
^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=as_strict_as_possible\(
^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=ca_and_name\(
^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=as_strict_as_possible\(
^samba4.ldb.simple.ldaps.*SERVER.REALM.*tlsverifypeer=as_strict_as_possible.*fl2008r2dc
2015-08-07 10:50:30 +03:00
#
# we don't allow auth_level_connect anymore...
#
^samba3.blackbox.rpcclient.*ncacn_np.*with.*connect.*rpcclient # we don't allow auth_level_connect anymore
2016-04-06 06:44:58 +03:00
^samba.tests.dns.__main__.TestComplexQueries.test_cname_two_chain_not_matching_qtype
2015-07-15 12:10:24 +03:00
# ad_dc requires signing
#
^samba4.smb.signing.*disabled.*signing=off.*\(ad_dc\)
2016-07-04 14:18:03 +03:00
# fl2000dc doesn't support AES
^samba4.krb5.kdc.*as-req-aes.*fl2000dc
2018-03-13 18:56:20 +03:00
# nt4_member and ad_member don't support ntlmv1 (not even over SMB1)
2019-11-08 16:32:44 +03:00
^samba3.blackbox.smbclient_auth.plain.*option=clientntlmv2auth=no.member.creds.*as.user.*_member
^samba3.blackbox.smbclient_auth.plain.*option=clientntlmv2auth=no.*mNT1.member.creds.*as.user.*_member
2016-08-04 14:59:23 +03:00
#nt-vfs server blocks read with execute access
2016-07-31 14:29:37 +03:00
^samba4.smb2.read.access
2016-08-04 14:59:23 +03:00
#ntvfs server blocks copychunk with execute access on read handle
2016-08-04 13:12:58 +03:00
^samba4.smb2.ioctl.copy_chunk_bad_access
2016-08-15 05:10:38 +03:00
^samba4.drs.getnc_exop.python.*getnc_exop.DrsReplicaPrefixMapTestCase.test_regular_prefix_map_ex_attid.*
2016-08-30 15:35:34 +03:00
# We don't support NDR64 yet, so we generate the wrong FAULT code
2015-10-23 16:39:34 +03:00
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_no_auth_presentation_ctx_invalid4
2016-08-30 15:35:34 +03:00
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_spnego_change_auth_type2
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_spnego_change_transfer
2019-10-04 15:05:53 +03:00
# Association groups not implemented yet in s3 server implementation
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail1\(ad_member\)
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail2\(ad_member\)
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail3\(ad_member\)
^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_diff1\(ad_member\)
2016-09-24 09:47:44 +03:00
^samba4.rpc.echo.*on.*with.object.echo.doublepointer.*nt4_dc
^samba4.rpc.echo.*on.*with.object.echo.surrounding.*nt4_dc
^samba4.rpc.echo.*on.*with.object.echo.enum.*nt4_dc
^samba4.rpc.echo.*on.*with.object.echo.testcall.*nt4_dc
^samba4.rpc.echo.*on.*with.object.echo.testcall2.*nt4_dc
^samba4.rpc.echo.*on.*ncacn_ip_tcp.*with.object.*nt4_dc
2016-11-29 23:19:31 +03:00
^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
2016-12-06 01:00:17 +03:00
^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
2018-08-28 14:05:14 +03:00
^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
2018-11-30 17:36:14 +03:00
^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
2017-10-30 22:21:15 +03:00
^samba4.blackbox.dbcheck-links.release-4-5-0-pre1.dbcheck_dangling_multi_valued_clean
2017-03-03 07:31:46 +03:00
^samba4.blackbox.dbcheck-links.release-4-5-0-pre1.dangling_multi_valued_check_missing
2017-03-20 23:59:45 +03:00
#
2019-02-26 00:53:43 +03:00
# rap password tests don't function in the ad_dc_ntvfs environment
2017-03-20 23:59:45 +03:00
#
2019-02-26 00:53:43 +03:00
^samba.tests.auth_log_pass_change.samba.tests.auth_log_pass_change.AuthLogPassChangeTests.test_rap_change_password\(ad_dc_ntvfs\)
2016-09-20 07:25:34 +03:00
# We currently don't send referrals for LDAP modify of non-replicated attrs
2017-03-14 00:36:13 +03:00
^samba4.ldap.rodc.python\(rodc\).__main__.RodcTests.test_modify_nonreplicated.*
2017-04-10 01:16:57 +03:00
^samba4.ldap.rodc_rwdc.python.*.__main__.RodcRwdcTests.test_change_password_reveal_on_demand_kerberos
2017-07-03 02:28:06 +03:00
# NETLOGON is disabled in any non-DC environments
^samba.tests.netlogonsvc.python\(ad_member\)
^samba.tests.netlogonsvc.python\(simpleserver\)
^samba.tests.netlogonsvc.python\(fileserver\)
2017-07-04 04:40:31 +03:00
# NTLM authentication is (intentionally) disabled in ktest
2017-07-05 05:32:54 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
2018-09-12 14:46:21 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).python3.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python3.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
2018-11-30 17:36:14 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).python2.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python2.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
2017-07-04 08:27:27 +03:00
# Disabling NTLM means you can't use samr to change the password
2017-07-05 05:32:54 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)
2018-09-12 14:46:21 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).python3.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
2018-11-30 17:36:14 +03:00
^samba.tests.ntlmdisabled.python\(ktest\).python2.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
2018-09-12 14:46:21 +03:00
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python3.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)
2018-11-30 17:36:14 +03:00
^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python2.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)