gpo: Apply Group Policy Login Prompt Message
[gd/samba-autobuild/.git] / selftest / knownfail
1 # This file contains a list of regular expressions matching the names of
2 # tests that are expected to fail.
3 #
4 # "make test" will not report failures for tests listed here and will consider
5 # a successful run for any of these tests an error.
6
7 ^samba3.blackbox.failure.failure # this is designed to fail, for testing our test infrastructure
8 .*driver.add_driver_timestamps # we only can store dates, not timestamps
9  ^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-REAUTH # expected to give ACCESS_DENIED SMB2.1 doesn't have encryption
10 ^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-RECONNECT # expected to give CONNECTION_DISCONNECTED, we need to fix the test
11 ^samba3.smbtorture_s3.plain.*SMB2-DIR-FSYNC.*\(ad_dc_ntvfs\)
12 ^samba3.smbtorture_s3.plain.*SMB2-PATH-SLASH.*\(ad_dc_ntvfs\)
13 ^samba3.smbtorture_s3.plain.LOCK11.*\(ad_dc_ntvfs\)
14 ^samba3.smb2.session enc.reconnect # expected to give CONNECTION_DISCONNECTED, we need to fix the test
15 ^samba3.raw.session enc # expected to give ACCESS_DENIED as SMB1 encryption isn't used
16 ^samba3.smbtorture_s3.crypt_server # expected to give ACCESS_DENIED as SMB1 encryption isn't used
17 ^samba3.smbtorture_s3.*.LOCK12.*\(fileserver_smb1\)
18 ^samba3.smbtorture_s3.*.LOCK12.*\(nt4_dc_smb1\)
19 ^samba3.nbt.dgram.*netlogon2\(nt4_dc\)
20 ^samba3.*rap.sam.*.useradd # Not provided by Samba 3
21 ^samba3.*rap.sam.*.userdelete # Not provided by Samba 3
22 ^samba3.libsmbclient.opendir # This requires a workgroup called 'WORKGROUP' and for netbios browse lists to have been registered
23 # see bug 8412
24 ^samba3.smb2.rename.*.simple_nodelete
25 ^samba3.smb2.rename.*.no_share_delete_no_delete_access
26 ^samba3.blackbox.smbclient_machine_auth.plain.*nt4_dc:local # the NT4 DC does not currently set up a self-join
27 ^samba3.raw.samba3hide.samba3hide\(ad_dc_smb1\) # This test fails against the ad_dc environment.
28 ^samba3.raw.samba3closeerr.samba3closeerr\(nt4_dc_smb1\) # This test fails against an smbd environment with NT ACLs enabled
29 ^samba3.raw.samba3closeerr.samba3closeerr\(fileserver_smb1\) # This test fails against an smbd environment with NT ACLs enabled
30 ^samba3.raw.acls nfs4acl_xattr-simple-40.INHERITFLAGS\(nt4_dc_smb1\) # This (and the follow nfs4acl_xattr tests fail because our NFSv4 backend isn't a complete mapping yet.
31 ^samba3.raw.acls nfs4acl_xattr-simple-40.create_owner_file\(nt4_dc_smb1\)
32 ^samba3.raw.acls nfs4acl_xattr-simple-40.create_owner_dir\(nt4_dc_smb1\)
33 ^samba3.raw.acls nfs4acl_xattr-simple-40.nulldacl\(nt4_dc_smb1\)
34 ^samba3.raw.acls nfs4acl_xattr-simple-41.create_owner_file\(nt4_dc_smb1\)
35 ^samba3.raw.acls nfs4acl_xattr-simple-41.create_owner_dir\(nt4_dc_smb1\)
36 ^samba3.raw.acls nfs4acl_xattr-simple-41.nulldacl\(nt4_dc_smb1\)
37 ^samba3.raw.acls nfs4acl_xattr-special-40.INHERITFLAGS\(nt4_dc_smb1\)
38 ^samba3.raw.acls nfs4acl_xattr-special-40.create_owner_file\(nt4_dc_smb1\)
39 ^samba3.raw.acls nfs4acl_xattr-special-40.create_owner_dir\(nt4_dc_smb1\)
40 ^samba3.raw.acls nfs4acl_xattr-special-40.nulldacl\(nt4_dc_smb1\)
41 ^samba3.raw.acls nfs4acl_xattr-special-40.inherit_creator_owner\(nt4_d_smb1\)
42 ^samba3.raw.acls nfs4acl_xattr-special-40.inherit_creator_group\(nt4_dc\)
43 ^samba3.raw.acls nfs4acl_xattr-xdr-40.INHERITFLAGS\(nt4_dc_smb1\)
44 ^samba3.raw.acls nfs4acl_xattr-xdr-40.create_owner_file\(nt4_dc_smb1\)
45 ^samba3.raw.acls nfs4acl_xattr-xdr-40.create_owner_dir\(nt4_dc_smb1\)
46 ^samba3.raw.acls nfs4acl_xattr-xdr-40.nulldacl\(nt4_dc_smb1\)
47 ^samba3.raw.acls nfs4acl_xattr-xdr-40.inherit_creator_owner\(nt4_dc_smb1\)
48 ^samba3.raw.acls nfs4acl_xattr-xdr-40.inherit_creator_group\(nt4_dc_smb1\)
49 ^samba3.raw.acls nfs4acl_xattr-xdr-41.create_owner_file\(nt4_dc_smb1\)
50 ^samba3.raw.acls nfs4acl_xattr-xdr-41.create_owner_dir\(nt4_dc_smb1\)
51 ^samba3.raw.acls nfs4acl_xattr-xdr-41.nulldacl\(nt4_dc_smb1\)
52 ^samba3.raw.acls nfs4acl_xattr-nfs-40.INHERITFLAGS\(nt4_dc_smb1\)
53 ^samba3.raw.acls nfs4acl_xattr-nfs-40.create_owner_file\(nt4_dc_smb1\)
54 ^samba3.raw.acls nfs4acl_xattr-nfs-40.create_owner_dir\(nt4_dc_smb1\)
55 ^samba3.raw.acls nfs4acl_xattr-nfs-40.nulldacl\(nt4_dc_smb1\)
56 ^samba3.raw.acls nfs4acl_xattr-nfs-40.inherit_creator_owner\(nt4_dc_smb1\)
57 ^samba3.raw.acls nfs4acl_xattr-nfs-40.inherit_creator_group\(nt4_dc_smb1\)
58 ^samba3.raw.acls nfs4acl_xattr-nfs-41.create_owner_file\(nt4_dc_smb1\)
59 ^samba3.raw.acls nfs4acl_xattr-nfs-41.create_owner_dir\(nt4_dc_smb1\)
60 ^samba3.raw.acls nfs4acl_xattr-nfs-41.nulldacl\(nt4_dc_smb1\)
61 ^samba3.base.delete.deltest16a
62 ^samba3.base.delete.deltest17a
63 ^samba3.unix.whoami anonymous connection.whoami\(ad_dc_smb1\) # We need to resolve if we should be including SID_NT_WORLD and SID_NT_NETWORK in this token
64 # smbclient4 behaves differently from smbclient (s3) when encountering
65 # logon failures when possesing a valid ticket. Test below has been
66 # changed to use smbclient (in order to support SMB2) and this part of the
67 # test fails due to this difference
68 ^samba4.blackbox.chgdcpass.Test login with kerberos ccache after 2nd password change\(chgdcpass\)
69 # these show that we still have some differences between our system
70 # with our internal iconv because it passes except when we bypass our
71 # internal iconv modules
72 ^samba4.local.convert_string_handle.system.iconv.gd_ascii
73 ^samba4.local.convert_string_handle.system.iconv.gd_iso8859_cp850
74 ^samba4..*base.delete.*.deltest17\(
75 ^samba4..*base.delete.*.deltest17b
76 ^samba4..*base.delete.*.deltest17c
77 ^samba4..*base.delete.*.deltest17e
78 ^samba4..*base.delete.*.deltest17f
79 ^samba4..*base.delete.*.deltest20a
80 ^samba4..*base.delete.*.deltest20b
81 ^samba4.raw.session.reauth
82 ^samba4.raw.session.expire1
83 ^samba4.raw.rename.*.osxrename
84 ^samba4.raw.rename.*.directory rename
85 ^samba4.rpc.winreg.*security
86 ^samba4.local.registry.*.(dir|ldb).check hive security
87 ^samba4.local.registry.*.local.security
88 ^samba4.rpc.wkssvc
89 ^samba4.rpc.handles.*.lsarpc-shared
90 ^samba4.rpc.epmapper.*.Lookup_simple
91 ^samba4.rpc.epmapper.*.Map_simple
92 ^samba4.rpc.epmapper.*.Map_full
93 ^samba4.rpc.lsalookup on ncalrpc
94 ^samba4.rpc.lsalookup on ncacn_np
95 ^samba4.rpc.lsalookup with seal,padcheck
96 ^samba4.rpc.lsalookup with validate
97 ^samba4.rpc.lsalookup with bigendian
98 ^samba4.rpc.lsa on ncacn_np with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
99 ^samba4.rpc.lsa with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
100 ^samba4.rpc.lsa.secrets.*seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
101 ^samba4.rpc.netlogon.*.LogonUasLogon
102 ^samba4.rpc.netlogon.*.LogonUasLogoff
103 ^samba4.rpc.netlogon.*.DatabaseSync
104 ^samba4.rpc.netlogon.*.DatabaseSync2
105 ^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomains
106 ^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomainsEx
107 ^samba4.rpc.netlogon.*.GetPassword
108 ^samba4.rpc.netlogon.*.DatabaseRedo
109 ^samba4.rpc.netlogon.*.netlogon.lsa_over_netlogon\(ad_dc\) #Broken by split of \\pipe\lsass from \\pipe\netlogon in the IDL
110 ^samba4.rpc.netlogon.*.netlogon.SetupCredentialsDowngrade\(ad_dc_ntvfs\) # Broken by allowing NT4 crypto on this environment
111 ^samba4.rpc.netlogon.*.netlogon.SetupCredentialsDowngrade\(ad_dc_ntvfs:local\) # Broken by allowing NT4 crypto on this environment
112 ^samba4.rpc.drsuapi.*ncacn_ip_tcp.*validate # should only work with seal
113 ^samba4.rpc.drsuapi.*ncacn_ip_tcp.*bigendian # should only work with seal
114 ^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.validate # should only work with seal
115 ^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.bigendian # should only work with seal
116 ^samba4.base.charset.*.Testing partial surrogate
117 ^samba4.smb2.charset.*.Testing partial surrogate # This test is currently broken
118 ^samba3.smb2.charset.*.Testing partial surrogate # This test is currently broken
119 ^samba4.*.base.maximum_allowed          # broken until we implement NTCREATEX_OPTIONS_BACKUP_INTENT
120 ^samba..*.smb2.maximum_allowed
121 .*net.api.delshare.*                            # DelShare isn't implemented yet
122 ^samba4.smb2.oplock.doc
123 ^samba4.smb2.lock.valid-request
124 ^samba4.raw.lock.multilock6.ad_dc_ntvfs
125 ^samba4.ldap.python \(ad_dc_default\).Test add_ldif\(\) with BASE64 security descriptor input using WRONG domain SID\(.*\)$
126 ^samba4.raw.lock.*.async # bug 6960
127 ^samba4.raw.open.ntcreatex_supersede
128 ^samba4.smb2.lock.*.multiple-unlock # bug 6959
129 ^samba4.raw.sfileinfo.*.end-of-file\(.*\)$ # bug 6962
130 ^samba4.raw.oplock.*.batch22 # bug 6963
131 ^samba4.raw.oplock.*.doc1
132 ^samba4.raw.oplock.*.exclusive5
133 ^samba4.raw.oplock.*.exclusive9
134 ^samba4.raw.oplock.*.level_ii_1
135 ^samba4.raw.lock.*.zerobyteread # bug 6974
136 ^samba4.smb2.lock.*.zerobyteread # bug 6974
137 ^samba4.raw.streams.*.delete
138 ^samba4.raw.streams.*.createdisp
139 ^samba4.raw.streams.*.sumtab
140 ^samba4.raw.streams.*.perms
141 ^samba4.raw.acls.INHERITFLAGS
142 ^samba4.raw.acls.*.create_dir
143 ^samba4.raw.acls.*.create_owner_dir
144 ^samba4.raw.acls.*.create_owner_file
145 ^samba4.smb2.create.*.acldir
146 ^samba4.smb2.create.*.impersonation
147 ^samba4.smb2.acls.*.generic
148 ^samba4.smb2.acls.*.inheritflags
149 ^samba4.smb2.acls.*.owner
150 ^samba4.smb2.acls.*.ACCESSBASED
151 ^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.test_dirsync_deleted_items
152 #^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.*
153 ^samba4.libsmbclient.opendir.(NT1|SMB3).opendir # This requires netbios browsing
154 ^samba4.rpc.drsuapi.*.drsuapi.DsGetDomainControllerInfo\(.*\)$
155 ^samba4.smb2.oplock.exclusive2\(.*\)$ # samba 4 oplocks are a mess
156 ^samba4.smb2.oplock.exclusive5\(.*\)$ # samba 4 oplocks are a mess
157 ^samba4.smb2.oplock.exclusive6\(.*\)$ # samba 4 oplocks are a mess
158 ^samba4.smb2.oplock.exclusive9\(.*\)$
159 ^samba4.smb2.oplock.brl3\(.*\)$ # samba 4 oplocks are a mess
160 ^samba4.smb2.oplock.levelii500\(.*\)$ # samba 4 oplocks are a mess
161 ^samba4.smb2.oplock.levelii502\(.*\)$ # samba 4 oplocks are a mess
162 ^samba4.smb2.oplock.brl1\(.*\)$ # samba 4 oplocks are a mess
163 ^samba4.smb2.oplock.batch22.\(.*\)$ # samba 4 oplocks are a mess
164 ^samba4.smb2.oplock.batch19\(.*\)$ # samba 4 oplocks are a mess
165 ^samba4.smb2.oplock.batch12\(.*\)$ # samba 4 oplocks are a mess
166 ^samba4.smb2.oplock.batch11\(.*\)$ # samba 4 oplocks are a mess
167 ^samba4.smb2.oplock.batch1\(.*\)$ # samba 4 oplocks are a mess
168 ^samba4.smb2.oplock.batch6\(.*\)$ # samba 4 oplocks are a mess
169 ^samba4.smb2.oplock.batch9\(.*\)$ # samba 4 oplocks are a mess
170 ^samba4.smb2.oplock.batch9a\(.*\)$ # samba 4 oplocks are a mess
171 ^samba4.smb2.oplock.batch10\(.*\)$ # samba 4 oplocks are a mess
172 ^samba4.smb2.oplock.batch20\(.*\)$ # samba 4 oplocks are a mess
173 ^samba4.smb2.oplock.batch26\(.*\)$
174 ^samba4.smb2.oplock.stream1 # samba 4 oplocks are a mess
175 ^samba4.smb2.oplock.statopen1\(ad_dc_ntvfs\)$ # fails with ACCESS_DENIED on a SYNCHRONIZE_ACCESS open
176 ^samba4.smb2.getinfo.complex # streams on directories does not work
177 ^samba4.smb2.getinfo.qfs_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
178 ^samba4.smb2.getinfo.qfile_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
179 ^samba4.smb2.getinfo.qsec_buffercheck # S4 does not do the BUFFER_TOO_SMALL thingy
180 ^samba4.smb2.sharemode.sharemode-access
181 ^samba4.smb2.sharemode.access-sharemode
182 ^samba4.ntvfs.cifs.krb5.base.createx_access.createx_access\(.*\)$
183 ^samba4.rpc.lsa.forest.trust #Not fully provided by Samba4
184 ^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
185 ^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_full_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
186 ^samba4.blackbox.upgradeprovision.release-4-0-0.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
187 ^samba4.raw.read.readx\(ad_dc_ntvfs\) # fails readx 16bit alignment requirement
188 ^samba3.smb2.create.gentest
189 ^samba3.smb2.create.blob
190 ^samba3.smb2.create.open
191 ^samba3.smb2.notify.rec
192 ^samba3.smb2.durable-open.delete_on_close2
193 ^samba3.smb2.durable-v2-open.app-instance
194 ^samba3.smb2.durable-open.reopen1a-lease\(ad_dc\)$
195 ^samba3.smb2.durable-v2-open.reopen1a-lease\(ad_dc\)$
196 ^samba4.smb2.ioctl.req_resume_key\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
197 ^samba4.smb2.ioctl.req_two_resume_keys\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
198 ^samba4.smb2.ioctl.copy_chunk_\w*\(ad_dc_ntvfs\)        # not supported by s4 ntvfs server
199 ^samba4.smb2.ioctl.copy-chunk streams\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
200 ^samba3.smb2.dir.one
201 ^samba3.smb2.dir.modify
202 ^samba3.smb2.oplock.batch20
203 ^samba3.smb2.oplock.stream1
204 ^samba3.smb2.streams.rename
205 ^samba3.smb2.streams.rename2
206 ^samba3.smb2.streams.attributes
207 ^samba3.smb2.streams streams_xattr.rename\(nt4_dc\)
208 ^samba3.smb2.streams streams_xattr.rename2\(nt4_dc\)
209 ^samba3.smb2.streams streams_xattr.attributes\(nt4_dc\)
210 ^samba3.smb2.getinfo.complex
211 ^samba3.smb2.getinfo.fsinfo # quotas don't work yet
212 ^samba3.smb2.setinfo.setinfo
213 ^samba3.smb2.session.*reauth5 # some special anonymous checks?
214 ^samba3.smb2.compound.interim2 # wrong return code (STATUS_CANCELLED)
215 ^samba3.smb2.compound.aio.interim2 # wrong return code (STATUS_CANCELLED)
216 ^samba3.smb2.replay.replay3 # This requires multi-chanel
217 ^samba3.smb2.replay.replay4 # This requires multi-chanel
218 ^samba3.smb2.lock.replay_smb3_specification_multi # This requires multi-chanel
219 ^samba3.smb2.lock.replay_smb3_specification_durable\(nt4_dc\) # Requires durable handles
220 ^samba3.smb2.lock.*replay_broken_windows # This tests the windows behaviour
221 ^samba3.smb2.lease.statopen3
222 ^samba3.smb2.lease.unlink # we currently do not downgrade RH lease to R after unlink
223 ^samba3.smb2.multichannel
224 ^samba4.smb2.ioctl.compress_notsup.*\(ad_dc_ntvfs\)
225 ^samba3.raw.session.*reauth2 # maybe fix this?
226 ^samba3.rpc.lsa.secrets.seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
227 ^samba3.rpc.samr.passwords.badpwdcount.samr.badPwdCount\(nt4_dc\) # We fail this test currently
228 ^samba3.rpc.samr.passwords.lockout.*\(nt4_dc\)$ # We fail this test currently
229 ^samba3.rpc.spoolss.printer.addprinter.driver_info_winreg # knownfail or flapping?
230 ^samba3.rpc.spoolss.printer.addprinterex.driver_info_winreg # knownfail or flapping?
231 ^samba3.rpc.spoolss.printer.*.publish_toggle\(.*\)$ # needs spoolss AD member env
232 ^samba3.rpc.spoolss.printer.*.log_jobinfo\(.*\)$ # not implemented yet
233 ^samba3.rpc.spoolss.printserver.*.addpermachineconnection\(.*\)$ # not implemented yet
234 ^samba3.rpc.spoolss.printserver.*.add_processor\(.*\)$
235 ^samba3.rpc.spoolss.printserver.*.get_core_printer_drivers\(.*\)$
236 ^samba3.rpc.spoolss.printserver.*.get_printer_driver_package_path\(.*\)$
237 ^samba4.rpc.fsrvp       # fsrvp server only provided by smbd
238 #
239 # The following tests fail against ad_dc (aka s3fs) currently.
240 # These need to be examined and either fixed or correctly categorised.
241 # but in the interests of ensuring we do not regress, we run the tests
242 # and list the current failures here.
243 #
244 ^samba3.rpc.eventlog.eventlog.GetLogIntormation\(ad_dc\)
245 ^samba3.rpc.eventlog.eventlog.FlushEventLog\(ad_dc\)
246 ^samba3.rpc.eventlog.eventlog.ReportEventLog\(ad_dc\)
247 ^samba3.rpc.eventlog.eventlog.ReadEventLog\(ad_dc\)
248 ^samba3.rpc.eventlog.eventlog.GetNumRecords\(ad_dc\)
249 ^samba3.rpc.eventlog.eventlog.OpenEventLog\(ad_dc\)
250 ^samba3.rap.basic.netsessiongetinfo\(ad_dc_smb1\)
251 # not implemented
252 ^samba3.rpc.svcctl.svcctl.ChangeServiceConfigW\(ad_dc\)
253 ^samba3.rpc.svcctl.svcctl.ChangeServiceConfigW\(nt4_dc\)
254 #
255 # This makes less sense when not running against an AD DC
256 #
257 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member
258 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member
259 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping
260 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping
261 ^samba.wbinfo_simple.allocate-uid.wbinfo\(ad_dc_ntvfs:local\)
262 ^samba.wbinfo_simple.allocate-gid.wbinfo\(ad_dc_ntvfs:local\)
263 ^samba.wbinfo_simple.allocate-uid.wbinfo\(s4member:local\)
264 ^samba.wbinfo_simple.allocate-gid.wbinfo\(s4member:local\)
265 ^samba.wbinfo_simple.allocate-uid.wbinfo\(ad_dc:local\)
266 ^samba.wbinfo_simple.allocate-gid.wbinfo\(ad_dc:local\)
267 ^samba.wbinfo_simple.allocate-uid.wbinfo\(chgdcpass:local\)
268 ^samba.wbinfo_simple.allocate-gid.wbinfo\(chgdcpass:local\)
269 ^samba.wbinfo_simple.allocate-uid.wbinfo\(rodc:local\)
270 ^samba.wbinfo_simple.allocate-gid.wbinfo\(rodc:local\)
271 #
272 # These do not work against winbindd in member mode for unknown reasons
273 #
274 ^samba4.winbind.struct.domain_info\(s4member:local\)
275 ^samba4.winbind.struct.getdcname\(s4member:local\)
276 #
277 # These fail since ad_dc_ntvfs assigns the local user's uid to SAMBADOMAIN/Administrator
278 # hence we have a duplicate UID in nsswitch.
279 #
280 ^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc_ntvfs:local\)
281 ^samba3.local.nss.reentrant enumeration\(ad_dc_ntvfs:local\)
282 ^samba3.local.nss.enumeration\(ad_dc_ntvfs:local\)
283 ^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc:local\)
284 ^samba3.local.nss.reentrant enumeration\(ad_dc:local\)
285 ^samba3.local.nss.enumeration\(ad_dc:local\)
286 #
287 # These do not work against winbindd in member mode for unknown reasons
288 #
289 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member\(ad_member:local\)
290 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping\(ad_member:local\)
291 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member\(ad_member:local\)
292 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping\(ad_member:local\)
293 ^samba4.winbind.struct.getdcname\(ad_member:local\)
294 ^samba4.winbind.struct.lookup_name_sid\(ad_member:local\)
295 ^samba4.winbind.struct.getdcname\(nt4_member:local\) # Works in other modes, just not against the classic/NT4 DC
296 #
297 # Differences in our KDC compared to windows
298 #
299 ^samba4.krb5.kdc .*.as-req-pac-request # We should reply to a request for a PAC over UDP with KRB5KRB_ERR_RESPONSE_TOO_BIG unconditionally
300 #
301 # This will fail against the classic DC, because it requires kerberos
302 #
303 ^samba4.winbind.pac.*\(nt4_member:local\) # No KDC on a classic DC
304 #
305 # This fails because our python bindings create python Lists, not a type
306 # we can watch for set methods on.
307 #
308 ^samba.tests.dcerpc.integer.samba.tests.dcerpc.integer.IntegerTests.test_.*_into_uint8_list
309 #
310 # Samba sort takes a primative approach to unicode sort. These tests
311 # match Windows 2012R2 behaviour.
312 #
313 ^samba4.ldap.sort.python.+UnicodeSortTests
314 #
315 ## We assert all "ldap server require strong auth" combinations
316 #
317 ^samba4.ldb.simple.ldap with SIMPLE-BIND.*ad_dc_ntvfs # ldap server require strong auth = allow_sasl_over_tls
318 ^samba4.ldb.simple.ldap with SIMPLE-BIND.*fl2003dc    # ldap server require strong auth = yes
319 ^samba4.ldb.simple.ldaps with SASL-BIND.*fl2003dc     # ldap server require strong auth = yes
320 # These are supposed to fail as we want to verify the "tls verify peer"
321 # restrictions. Note that fl2008r2dc uses a self-signed certificate
322 # with does not have a crl file.
323 #
324 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name_if_available\(
325 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name\(
326 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=as_strict_as_possible\(
327 ^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=ca_and_name\(
328 ^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=as_strict_as_possible\(
329 ^samba4.ldb.simple.ldaps.*SERVER.REALM.*tlsverifypeer=as_strict_as_possible.*fl2008r2dc
330 #
331 # we don't allow auth_level_connect anymore...
332 #
333 ^samba3.blackbox.rpcclient.*ncacn_np.*with.*connect.*rpcclient # we don't allow auth_level_connect anymore
334 ^samba.tests.dns.__main__.TestComplexQueries.test_cname_two_chain_not_matching_qtype
335 # ad_dc requires signing
336 #
337 ^samba4.smb.signing.*disabled.*signing=off.*\(ad_dc\)
338 # fl2000dc doesn't support AES
339 ^samba4.krb5.kdc.*as-req-aes.*fl2000dc
340 # nt4_member and ad_member don't support ntlmv1 (not even over SMB1)
341 ^samba3.blackbox.smbclient_auth.plain.*option=clientntlmv2auth=no.member.creds.*as.user.*_member
342 ^samba3.blackbox.smbclient_auth.plain.*option=clientntlmv2auth=no.*mNT1.member.creds.*as.user.*_member
343 #nt-vfs server blocks read with execute access
344 ^samba4.smb2.read.access
345 #ntvfs server blocks copychunk with execute access on read handle
346 ^samba4.smb2.ioctl.copy_chunk_bad_access
347 ^samba4.drs.getnc_exop.python.*getnc_exop.DrsReplicaPrefixMapTestCase.test_regular_prefix_map_ex_attid.*
348 # We don't support NDR64 yet, so we generate the wrong FAULT code
349 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_no_auth_presentation_ctx_invalid4
350 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_spnego_change_auth_type2
351 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_spnego_change_transfer
352 # Association groups not implemented yet in s3 server implementation
353 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail1\(ad_member\)
354 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail2\(ad_member\)
355 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_fail3\(ad_member\)
356 ^samba.tests.dcerpc.raw_protocol.*.TestDCERPC_BIND.test_assoc_group_diff1\(ad_member\)
357 ^samba4.rpc.echo.*on.*with.object.echo.doublepointer.*nt4_dc
358 ^samba4.rpc.echo.*on.*with.object.echo.surrounding.*nt4_dc
359 ^samba4.rpc.echo.*on.*with.object.echo.enum.*nt4_dc
360 ^samba4.rpc.echo.*on.*with.object.echo.testcall.*nt4_dc
361 ^samba4.rpc.echo.*on.*with.object.echo.testcall2.*nt4_dc
362 ^samba4.rpc.echo.*on.*ncacn_ip_tcp.*with.object.*nt4_dc
363 ^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
364 ^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
365 ^samba.tests.dcerpc.dnsserver.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
366 ^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
367 ^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
368 ^samba.tests.dcerpc.dnsserver.python3.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
369 ^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_add_duplicate_different_type.*
370 ^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_rank_none.*
371 ^samba.tests.dcerpc.dnsserver.python2.samba.tests.dcerpc.dnsserver.DnsserverTests.test_security_descriptor.*
372 ^samba4.blackbox.dbcheck-links.release-4-5-0-pre1.dbcheck_dangling_multi_valued_clean
373 ^samba4.blackbox.dbcheck-links.release-4-5-0-pre1.dangling_multi_valued_check_missing
374 #
375 # rap password tests don't function in the ad_dc_ntvfs environment
376 #
377 ^samba.tests.auth_log_pass_change.samba.tests.auth_log_pass_change.AuthLogPassChangeTests.test_rap_change_password\(ad_dc_ntvfs\)
378 # We currently don't send referrals for LDAP modify of non-replicated attrs
379 ^samba4.ldap.rodc.python\(rodc\).__main__.RodcTests.test_modify_nonreplicated.*
380 ^samba4.ldap.rodc_rwdc.python.*.__main__.RodcRwdcTests.test_change_password_reveal_on_demand_kerberos
381 # NETLOGON is disabled in any non-DC environments
382 ^samba.tests.netlogonsvc.python\(ad_member\)
383 ^samba.tests.netlogonsvc.python\(simpleserver\)
384 ^samba.tests.netlogonsvc.python\(fileserver\)
385 # NTLM authentication is (intentionally) disabled in ktest
386 ^samba.tests.ntlmdisabled.python\(ktest\).ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
387 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
388 ^samba.tests.ntlmdisabled.python\(ktest\).python3.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
389 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python3.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
390 ^samba.tests.ntlmdisabled.python\(ktest\).python2.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ktest\)
391 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python2.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ad_dc_no_ntlm\)
392 # Disabling NTLM means you can't use samr to change the password
393 ^samba.tests.ntlmdisabled.python\(ktest\).ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
394 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)
395 ^samba.tests.ntlmdisabled.python\(ktest\).python3.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
396 ^samba.tests.ntlmdisabled.python\(ktest\).python2.ntlmdisabled.NtlmDisabledTests.test_samr_change_password\(ktest\)
397 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python3.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)
398 ^samba.tests.ntlmdisabled.python\(ad_dc_no_ntlm\).python2.ntlmdisabled.NtlmDisabledTests.test_ntlm_connection\(ad_dc_no_ntlm\)