1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-08 21:18:16 +03:00

python:samba:tests: Fix code spelling

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Andreas Schneider 2023-06-06 13:28:13 +02:00 committed by Andreas Schneider
parent ab3792931b
commit d4798967c0
33 changed files with 58 additions and 56 deletions

View File

@ -25,7 +25,7 @@ class DfsInheritanceSmbCaclsTests(InheritanceSmbCaclsTests):
def setUp(self):
# This is some intentional trickery to ensure we skip
# InheritanceSmbCaclsTests.setUp so we can create a new
# test directory & file hierachy (including a nested dfs link)
# test directory & file hierarchy (including a nested dfs link)
SmbCaclsBlockboxTestBase.setUp(self)
smbclient_args = self.build_test_cmd("smbclient", ["//%s/%s" % (self.server, self.share), "-c", "mkdir %s" % os.getenv("TESTDIR", "smbcacls")])
self.check_output(smbclient_args)

View File

@ -237,7 +237,7 @@ class InheritanceSmbCaclsTests(SmbCaclsBlockboxTestBase):
try:
# add flags on oi_dir
# This is somwhat artificial, we need to add a new acl to the directory
# This is somewhat artificial, we need to add a new acl to the directory
# so that the following modify operation doesn't fail. Previously
# '--modify' was used in place of '--add' but that resulted in failure
# to access the directory ( or even modify the acl ).
@ -462,7 +462,7 @@ class InheritanceSmbCaclsTests(SmbCaclsBlockboxTestBase):
delete_ace_str = "ACL:%s:ALLOWED/0x0/RWD" % self.user
try:
# This is somwhat artificial, we need to add a new acl to the
# This is somewhat artificial, we need to add a new acl to the
# directory so that the following modify operation doesn't fail.
# Previously '--modify' was used in place of '--add' but that
# resulted in failure to access the directory ( or even modify
@ -688,7 +688,7 @@ class InheritanceSmbCaclsTests(SmbCaclsBlockboxTestBase):
try:
# add flags on oi_dir
# This is somwhat artificial, we need to add a new acl to the
# This is somewhat artificial, we need to add a new acl to the
# directory so that the following modify operation doesn't fail.
# Previously '--modify' was used in place of '--add' but that
# resulted in failure to access the directory ( or even modify

View File

@ -30,7 +30,7 @@ class BaseCompressionTest(TestCase):
"""Compress, decompress, assert equality with original.
If size_delta is None, no size is given to decompress. This
should fail with the Huffman varient and succeed with plain.
should fail with the Huffman variant and succeed with plain.
Otherwise size_delta is added to the gven size; if negative,
we'd expect a failure, with plain compression a positive delta
will succeed.
@ -91,7 +91,7 @@ class LzxpressPlainCompressionTest(BaseCompressionTest):
def test_round_trip_aaa_long(self):
s = b'a' * 150000
# this *wont* fail because although the data will run out
# this *won't* fail because although the data will run out
# before the buffer is full, LZXpress plain does not care
# about that.
try:
@ -194,7 +194,7 @@ class LzxpressHuffmanCompressionTest(BaseCompressionTest):
# For the Huffman algorithm, the length is really an essential
# part of the compression data, and the bindings will reject a
# call with out it. This happens at the arument parsing stage,
# call with out it. This happens at the argument parsing stage,
# so is a TypeError (i.e. wrong type of function), not a
# CompressionError.
self.assertRaises(TypeError,

View File

@ -48,7 +48,7 @@ class SubstituteVarTestCase(TestCase):
def test_check_all_substituted(self):
samba.check_all_substituted("nothing to see here")
self.assertRaises(Exception, samba.check_all_substituted,
"Not subsituted: ${FOOBAR}")
"Not substituted: ${FOOBAR}")
class ArcfourTestCase(TestCase):

View File

@ -364,7 +364,7 @@ class DnsserverTests(RpcInterfaceTestCase):
# there should be no A record, and one TOMBSTONE record.
self.assert_num_records(self.custom_zone, "testrecord", 'A', 0)
# we can't make assertions about the tombstone count based on
# RPC calls, as ther are no tombstones in RPCs (there is
# RPC calls, as there are no tombstones in RPCs (there is
# "DNS_TYPE_ZERO" instead). Nor do tombstones show up if we
# use DNS_TYPE_ALL.
self.assert_num_records(self.custom_zone, "testrecord", 'ALL', 0)

View File

@ -55,7 +55,7 @@ class SrvsvcTests(RpcInterfaceTestCase):
parm_error = 0x00000000
self.conn.NetShareAdd(self.server_unc, 502, share, parm_error)
name = share.name
share.comment = "now sucessfully modified "
share.comment = "now successfully modified "
parm_error = self.pipe.NetShareSetInfo(self.server_unc, name,
502, share, parm_error)

View File

@ -116,7 +116,7 @@ class StringTests(samba.tests.TestCase):
class StringTestsWithoutLeakCheck(samba.tests.TestCase):
"""We know that the ndr unpacking test leaves stuff in the
autofree_context, and we don't want to worry about that. So for
this test we don't make meory leak assertions."""
this test we don't make memory leak assertions."""
def test_string_from_ndr(self):
info = drsblobs.repsFromTo2OtherInfo()

View File

@ -1920,7 +1920,7 @@ class TestDNSAging(DNSTest):
self.assertEqual(rec.dwTimeStamp, 0) # timestamp stays zero
if failures:
self.fail(f"failed {failures}/{total} defered assertions")
self.fail(f"failed {failures}/{total} deferred assertions")
def test_static_record_dynamic_update(self):
"""Add a static record, then a dynamic record.

View File

@ -273,9 +273,9 @@ class DomainBackupBase(BlackboxTestCase):
bkp_pd = get_prim_dom(paths.secrets, bkp_lp)
self.assertEqual(len(bkp_pd), 1)
acn = bkp_pd[0].get('samAccountName')
self.assertIsNotNone(acn)
self.assertEqual(str(acn[0]), self.new_server + '$')
account = bkp_pd[0].get('samAccountName')
self.assertIsNotNone(account)
self.assertEqual(str(account[0]), self.new_server + '$')
self.assertIsNotNone(bkp_pd[0].get('secret'))
samdb = SamDB(url=paths.samdb, session_info=system_session(),

View File

@ -87,7 +87,7 @@ class DsdbAccountTests(TestCase):
def test_ridalloc_next_free_rid(self):
# Test RID allocation. We assume that RID
# pools allocated to us are continguous.
# pools allocated to us are contiguous.
self.samdb.transaction_start()
try:
orig_rid_set = self.get_rid_set(self.rid_set_dn)

View File

@ -443,7 +443,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.realm.lower())
def test_get_dc_winbind_need_2012r2(self):
"""Test requring that we have a FL2012R2 DC as answer
"""Test requiring that we have a FL2012R2 DC as answer
"""
self.assertIsNotNone(self.trust_realm)
@ -472,7 +472,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertTrue(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_DS_9)
def test_get_dc_direct_need_2012r2_but_not_found(self):
"""Test requring that we have a FL2012R2 DC as answer, aginst the FL2008R2 domain
"""Test requiring that we have a FL2012R2 DC as answer, against the FL2008R2 domain
This test requires that the DC in the FL2008R2 does not claim
to be 2012R2 capable (off by default in Samba)
@ -492,7 +492,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.fail(f"Incorrect error {estr} from GetDcNameEx looking for 2012R2 DC that was not available")
def test_get_dc_direct_need_web_but_not_found(self):
"""Test requring that we (do not) have a AD Web Services on the DC
"""Test requiring that we (do not) have a AD Web Services on the DC
This test requires that the DC does not advertise AD Web Services
@ -525,7 +525,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertFalse(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_ADS_WEB_SERVICE)
def test_get_dc_winbind_need_web_but_not_found(self):
"""Test requring that we (do not) have a AD Web Services on the trusted DC
"""Test requiring that we (do not) have a AD Web Services on the trusted DC
This test requires that the DC does not advertise AD Web Services
@ -558,7 +558,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertFalse(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_ADS_WEB_SERVICE)
def test_get_dc_direct_need_2012r2(self):
"""Test requring that we have a FL2012R2 DC as answer
"""Test requiring that we have a FL2012R2 DC as answer
"""
self.assertIsNotNone(self.trust_realm)
@ -586,7 +586,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertTrue(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_DS_9)
def test_get_dc_winbind_need_2012r2_but_not_found(self):
"""Test requring that we have a FL2012R2 DC as answer, aginst the FL2008R2 domain
"""Test requiring that we have a FL2012R2 DC as answer, against the FL2008R2 domain
This test requires that the DC in the FL2008R2 does not claim
to be 2012R2 capable (off by default in Samba)
@ -616,7 +616,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertFalse(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_DS_9)
def test_get_dc_winbind_need_2012r2_but_not_found_fallback(self):
"""Test requring that we have a FL2012R2 DC as answer, aginst the
"""Test requiring that we have a FL2012R2 DC as answer, against the
FL2008R2 domain, then trying for just FL2008R2 (to show caching bugs)
This test requires that the DC in the FL2008R2 does not claim
@ -656,7 +656,7 @@ class GetDCNameEx(samba.tests.TestCase):
self.assertTrue(cldap_netlogon_reply.server_type & nbt.NBT_SERVER_FULL_SECRET_DOMAIN_6)
def test_get_dc_direct_need_2012r2_but_not_found_fallback(self):
"""Test requring that we have a FL2012R2 DC as answer, aginst the
"""Test requiring that we have a FL2012R2 DC as answer, against the
FL2008R2 domain, then trying for just FL2008R2 (to show caching bugs)
This test requires that the DC in the FL2008R2 does not claim

View File

@ -307,7 +307,7 @@ class PacClaimsTests(TestCase):
client_claims_bytes1 = ndr_pack(client_claims)
client_claims2 = ndr_unpack(claims.CLAIMS_SET_METADATA_NDR, client_claims_bytes1)
# Confirm that despite no lenghts being set, the data is compressed correctly
# Confirm that despite no lengths being set, the data is compressed correctly
self.assertEqual(client_claims2.claims.metadata.uncompressed_claims_set_size,
8232)
self.assertEqual(client_claims2.claims.metadata.claims_set_size,

View File

@ -334,7 +334,7 @@ class ClaimsTests(KDCBaseTest):
expected_client_claims=(expected_claims
if not remove_claims else None))
# Perform a test similar to that preceeding. This time, create both a user
# Perform a test similar to that preceding. This time, create both a user
# and a computer account, each having an applicable claim. After obtaining
# tickets, from which the claims are optionally removed, change the claim
# attribute of each account to a different value. Then perform constrained

View File

@ -2010,7 +2010,7 @@ class FAST_Tests(KDCBaseTest):
checksum_keys = self.get_krbtgt_checksum_key()
# Use our modifed TGT to replace the one in the request.
# Use our modified TGT to replace the one in the request.
return self.modified_ticket(user_tgt,
modify_fn=modify_fn,
checksum_keys=checksum_keys)

View File

@ -504,7 +504,7 @@ class KpasswdTests(KDCBaseTest):
target_realm=creds.get_realm())
# Test setting a password, specifying both principal and realm of the
# target user, whem the user has control access on their account.
# target user, when the user has control access on their account.
def test_kpasswd_set_target_princ_and_realm_access(self):
# Create an account for testing.
creds = self._get_creds()

View File

@ -42,7 +42,7 @@ global_hexdump = False
class MS_Kile_Client_Principal_Lookup_Tests(KDCBaseTest):
''' Tests for MS-KILE client principal look-up
See [MS-KILE]: Kerberos Protocol Extensions
secion 3.3.5.6.1 Client Principal Lookup
section 3.3.5.6.1 Client Principal Lookup
'''
def setUp(self):

View File

@ -31,7 +31,7 @@ from samba.samdb import SamDB
"""KRB5 Integration tests for pycredentials.
Seperated from py_credentials so as to allow running against just one
Separated from py_credentials so as to allow running against just one
environment so we know the server that we add the user on will be our
KDC

View File

@ -64,11 +64,11 @@ class LdapReferralTest(samba.tests.TestCase):
scope=ldb.SCOPE_SUBTREE,
attrs=["objectGUID", "samAccountName"])
referals = res.referals
for referal in referals:
referrals = res.referals
for referral in referrals:
self.assertTrue(
referal.startswith("ldap://"),
"{0} does not start with ldap://".format(referal))
referral.startswith("ldap://"),
"{0} does not start with ldap://".format(referral))
# The referral entries for an ldaps request should have the ldaps scheme
# i.e. then should all start with "ldaps://"
@ -83,8 +83,8 @@ class LdapReferralTest(samba.tests.TestCase):
scope=ldb.SCOPE_SUBTREE,
attrs=["objectGUID", "samAccountName"])
referals = res.referals
for referal in referals:
referrals = res.referals
for referral in referrals:
self.assertTrue(
referal.startswith("ldaps://"),
"{0} does not start with ldaps://".format(referal))
referral.startswith("ldaps://"),
"{0} does not start with ldaps://".format(referral))

View File

@ -267,7 +267,7 @@ class LdapUpnSamTest(LdapUpnSamTestBase):
#
# * If a dictionary, it is a mapping of some of ['sam', 'upn']
# to strings (in this way, you can add two attributes in one
# mesage, or attempt a samaccountname with '@').
# message, or attempt a samaccountname with '@').
#
# expected can be «ok», «bad» (mapped to True and False,
# respectively), or a specific LDB error code, if that exact

View File

@ -64,7 +64,7 @@ class NetJoinNoSpnegoTests(samba.tests.TestCaseInTempDir):
return
else:
raise
self.fail("Shoud have rejected NTLMv2 without SPNEGO")
self.fail("Should have rejected NTLMv2 without SPNEGO")
def test_net_join_no_spnego_ntlmv1(self):
self.lp.set("client ipc max protocol", "NT1")

View File

@ -74,7 +74,7 @@ class LoadParmTestCase(samba.tests.TestCaseInTempDir):
def test_dump(self):
samba_lp = param.LoadParm()
# Just test successfull method execution (outputs to stdout)
# Just test successful method execution (outputs to stdout)
self.assertEqual(None, samba_lp.dump())
def test_dump_to_file(self):
@ -87,7 +87,7 @@ class LoadParmTestCase(samba.tests.TestCaseInTempDir):
def test_dump_a_parameter(self):
samba_lp = param.LoadParm()
samba_lp.load_default()
# Just test successfull method execution
# Just test successful method execution
self.assertEqual(None, samba_lp.dump_a_parameter('interfaces'))
def test_dump_a_parameter_to_file(self):

View File

@ -295,7 +295,7 @@ class ContactCmdTestCase(SambaToolCmdTest):
self.assertEqual("%s" % found.get("cn"), expected_cn)
# remove given name, initials and surname
# (must forece new cn, because en empty new CN throws an error)
# (must force new cn, because en empty new CN throws an error)
(result, out, err) = self.runsubcmd("contact", "rename", expected_cn,
"--force-new-cn=%s" % expected_cn,
"--surname=",

View File

@ -1136,7 +1136,7 @@ class DnsCmdTestCase(SambaToolCmdTest):
(
# snizle has 2 A, 2 AAAA, 10 fancy, and 2 TXT records, in
# that order.
# the A, AAAA, and TXT recrods should be dynamic
# the A, AAAA, and TXT records should be dynamic
['--mark-records-dynamic-regex=sniz'],
{'snizle': [('R', 'nowish'),
('R', 'nowish'),
@ -1198,7 +1198,7 @@ class DnsCmdTestCase(SambaToolCmdTest):
(
# This regex should catch snizle, frobitz, and
# ts-multi. Note that the 1e7 ts-multi record is
# alreay dynamic and doesn't change.
# already dynamic and doesn't change.
['--mark-records-dynamic-regex=[i]'],
{'ts-multi': [('R', 'nowish'),
('R', 'nowish'),

View File

@ -49,7 +49,7 @@ class DrsCloneDcDataLmdbSizeTestCase(SambaToolCmdTest):
# Get the lmdb map size for the specified command
#
# While there is a python lmdb package available we use the lmdb command
# line utilities to avoid introducing a dependancy.
# line utilities to avoid introducing a dependency.
#
def get_lmdb_environment_size(self, path):
(result, out, err) = self.run_command("mdb_stat -ne %s" % path)

View File

@ -255,7 +255,7 @@ class PwdSettingsCmdTestCase(SambaToolCmdTest):
"pso", "delete"), pso_name,
"-H", self.server,
self.user_auth)
self.assertCmdFail(result, "Deleteing a non-existent PSO should fail")
self.assertCmdFail(result, "Deleting a non-existent PSO should fail")
self.assertIn("Unable to find PSO", err)
def check_pso_applied(self, user, pso):

View File

@ -75,7 +75,7 @@ class PromoteDcLmdbSizeTestCase(SambaToolCmdTest):
# Get the lmdb map size for the specified command
#
# While there is a python lmdb package available we use the lmdb command
# line utilities to avoid introducing a dependancy.
# line utilities to avoid introducing a dependency.
#
def get_lmdb_environment_size(self, path):
(result, out, err) = self.run_command("mdb_stat -ne %s" % path)

View File

@ -50,7 +50,7 @@ class ProvisionLmdbSizeTestCase(SambaToolCmdTest):
# Get the lmdb map size for the specified command
#
# While there is a python lmdb package available we use the lmdb command
# line utilities to avoid introducing a dependancy.
# line utilities to avoid introducing a dependency.
#
def get_lmdb_environment_size(self, path):
(result, out, err) = self.run_command("mdb_stat -ne %s" % path)

View File

@ -394,7 +394,7 @@ class UserCmdTestCase(SambaToolCmdTest):
expires = nttime2unix(int("%s" % found.get("accountExpires")))
self.assertWithin(expires, twodays, 5, "Ensure account expires is within 5 seconds of the expected time")
# TODO: renable this after the filter case is sorted out
# TODO: re-enable this after the filter case is sorted out
if "filters are broken, bail now":
return

View File

@ -415,7 +415,7 @@ class UserCmdCryptShaTestCase(SambaToolCmdTest):
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# As the number of rounds did not match, should have returned the
# first hash of the coresponding scheme
# first hash of the corresponding scheme
out = self._get_password("virtualCryptSHA256," +
"virtualCryptSHA512")
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))

View File

@ -178,7 +178,7 @@ class UserCmdCryptShaTestCaseUserPassword(UserCmdCryptShaTestCase):
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
# As the number of rounds did not match, should have returned the
# first hash of the coresponding scheme
# first hash of the corresponding scheme
out = self._get_password("virtualCryptSHA256," +
"virtualCryptSHA512")
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))

View File

@ -369,7 +369,7 @@ class SMBNotifyTests(TestCase):
# trigger notification for both
self.smb_conn.rmdir(private_path)
# check that both get thte notification
# check that both get the notification
changes = notify_unpriv.get_changes(wait=True)
self.assertIsNotNone(changes)
self.assertEqual(changes[0]['name'], private_rel)

View File

@ -42,7 +42,7 @@ class SmbdBaseTests(TestCaseInTempDir):
self.assertEqual(self.get_umask(), TEST_UMASK,
"umask unexpectedly overridden by test")
# restore the original umask value (before we interferred with it)
# restore the original umask value (before we interfered with it)
os.umask(self.orig_umask)
super(SmbdBaseTests, self).tearDown()

View File

@ -54,7 +54,8 @@ class XattrTests(TestCase):
samba.xattr_native.wrap_setxattr(tempf, "user.unittests",
ndr_pack(ntacl))
except IOError:
raise SkipTest("the filesystem where the tests are runned do not support XATTR")
raise SkipTest("the filesystem where the tests are run does not "
"support XATTR")
os.unlink(tempf)
def test_set_and_get_native(self):
@ -68,7 +69,8 @@ class XattrTests(TestCase):
text = samba.xattr_native.wrap_getxattr(tempf, "user.unittests")
self.assertEqual(text, reftxt)
except IOError:
raise SkipTest("the filesystem where the tests are runned do not support XATTR")
raise SkipTest("the filesystem where the tests are run does not "
"support XATTR")
os.unlink(tempf)
def test_set_xattr_tdb(self):