1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-24 21:34:56 +03:00
samba-mirror/source4/selftest/knownfail
Andrew Tridgell bc2b4192c0 s4-test: the ldap secdesc test is expected to fail for now
Nadya, if this is not correct and you think this should be passing
already the please let me know. When I looked over it, it doesn't look
like it has a chance of passing until your acl module is in place and
enabled by default.
2009-10-18 16:32:01 +11:00

68 lines
2.8 KiB
Plaintext

# This file contains a list of regular expressions matching the names of
# tests that are expected to fail.
#
# "make test" will not report failures for tests listed here and will consider
# a successful run for any of these tests an error.
local.resolve.*.async
local.iconv.*.next_codepoint()
base.delete.*.deltest17
base.delete.*.deltest20a
base.delete.*.deltest20b
raw.rename.*.osxrename
raw.rename.*.directory rename
rpc.winreg.*security
samba4.local.registry.(dir|ldb).check hive security
samba4.local.registry.local.security
rpc.wkssvc
rpc.handles.*.lsarpc-shared
rpc.handles.*.mixed-shared
rpc.epmapper.*.Insert
rpc.epmapper.*.InqObject
rpc.dfs.*
rpc.drsuapi.*
rpc.lsalookup
rpc.cracknames
rpc.netlogon.*.LogonUasLogon
rpc.netlogon.*.LogonUasLogoff
rpc.netlogon.*.DatabaseSync
rpc.netlogon.*.DatabaseSync2
rpc.netlogon.*.LogonControl
rpc.netlogon.*.LogonControl2
rpc.netlogon.*.DsrEnumerateDomainTrusts
rpc.netlogon.*.NetrEnumerateTrustedDomains
rpc.netlogon.*.NetrEnumerateTrustedDomainsEx
rpc.netlogon.*.DsrGetDcSiteCoverageW
rpc.netlogon.*.DsRAddressToSitenamesW
rpc.netlogon.*.DsRAddressToSitenamesExW
rpc.netlogon.*.GetPassword
rpc.netlogon.*.GetTrustPasswords
rpc.netlogon.*.DatabaseRedo
rpc.netlogon.*.ServerGetTrustInfo
samba4.rpc.samr.passwords.pwdlastset # Not provided by Samba 4 yet
samba4.rpc.samr.users.privileges
samba4.rpc.spoolss.printer # Not provided by Samba 4 yet
base.charset.*.Testing partial surrogate
.*net.api.delshare.* # DelShare isn't implemented yet
rap.*netservergetinfo
smb2.persistent.handles1
samba4.winbind.struct.*.SHOW_SEQUENCE # Not yet working in winbind
samba4.winbind.struct.*.GETPWENT # Not yet working in winbind
samba4.winbind.struct.*.SETPWENT # Not yet working in winbind
samba4.winbind.struct.*.LOOKUP_NAME_SID # Not yet working in winbind
^samba4.*base.delaywrite.*update of write time and SMBwrite truncate$
^samba4.*base.delaywrite.*update of write time and SMBwrite truncate expand$
^samba4.*base.delaywrite.*delayed update of write time 3a$
^samba4.*base.delaywrite.*delayed update of write time 3c$
^samba4.*base.delaywrite.*update of write time using SET_END_OF_FILE$
^samba4.*base.delaywrite.*update of write time using SET_ALLOCATION_SIZE$
^samba4.ldap.python \(dc\).Test add_ldif\(\) with BASE64 security descriptor input using WRONG domain SID$
^samba4.ldap.python \(dc\).Testing ldb.add_ldif\(\) for nTSecurityDescriptor
^samba4.ldap.secdesc.python
# some operations don't work over the CIFS NTVFS backend yet (eg. root_fid)
samba4.ntvfs.cifs.base.createx_access
samba4.ntvfs.cifs.base.createx_sharemodes_dir
samba4.ntvfs.cifs.base.maximum_allowed
samba4.base.createx_access # this test is broken for non-administrator users
samba4.smb2.oplock # oplocks in the s4 SMB2 server are a mess
samba4.ldap.secdesc.python # this is expected to fail until the acl module is complete