CVE-2015-5370: s4:rpc_server: no authentication is indicated by pkt->auth_length...
[sfrench/samba-autobuild/.git] / selftest / knownfail
1 # This file contains a list of regular expressions matching the names of
2 # tests that are expected to fail.
3 #
4 # "make test" will not report failures for tests listed here and will consider
5 # a successful run for any of these tests an error.
6
7 ^samba3.blackbox.failure.failure # this is designed to fail, for testing our test infrastructure
8 .*driver.add_driver_timestamps # we only can store dates, not timestamps
9 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).LOCK9 # Fails against the s4 ntvfs server
10 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).OPLOCK2 # Fails against the s4 ntvfs server
11 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).STREAMERROR # Fails against the s4 ntvfs server
12 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DIR1 # Fails against the s4 ntvfs server
13 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DIR-CREATETIME # Fails against the s4 ntvfs server
14 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DELETE-LN # Fails against the s4 ntvfs server
15 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX # Fails against the s4 ntvfs server
16 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).UID-REGRESSION-TEST # Fails against the s4 ntvfs server
17 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SHORTNAME-TEST # Fails against the s4 ntvfs server
18 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-APPEND # Fails against the s4 ntvfs server
19 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-SYMLINK-ACL # Fails against the s4 ntvfs server
20 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-SYMLINK-EA # Fails against the s4 ntvfs server
21 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).NTTRANS-FSCTL # Fails against the s4 ntvfs server
22 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-NEGPROT # Fails against the s4 ntvfs server
23 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).BAD-NBT-SESSION # Fails against the s4 ntvfs server
24 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-SESSION-REAUTH # Fails against the s4 ntvfs server
25 ^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-SESSION-RECONNECT # Fails against the s4 ntvfs server
26  ^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-REAUTH # expected to give ACCESS_DENIED SMB2.1 doesn't have encryption
27 ^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-RECONNECT # expected to give CONNECTION_DISCONNECTED, we need to fix the test
28 ^samba3.smb2.session enc.reconnect # expected to give CONNECTION_DISCONNECTED, we need to fix the test
29 ^samba3.raw.session enc # expected to give ACCESS_DENIED as SMB1 encryption isn't used
30 ^samba3.smbtorture_s3.crypt_server # expected to give ACCESS_DENIED as SMB1 encryption isn't used
31 ^samba3.nbt.dgram.*netlogon2\(nt4_dc\)
32 ^samba3.*rap.sam.*.useradd # Not provided by Samba 3
33 ^samba3.*rap.sam.*.userdelete # Not provided by Samba 3
34 ^samba3.libsmbclient.opendir # This requires a workgroup called 'WORKGROUP' and for netbios browse lists to have been registered
35 # see bug 8412
36 ^samba3.smb2.rename.*.simple_nodelete
37 ^samba3.smb2.rename.*.no_share_delete_no_delete_access
38 ^samba3.blackbox.smbclient_machine_auth.plain \(nt4_dc:local\)# the NT4 DC does not currently set up a self-join
39 ^samba3.raw.samba3hide.samba3hide\((nt4_dc|ad_dc)\) # This test fails against an smbd environment with NT ACLs enabled
40 ^samba3.raw.samba3closeerr.samba3closeerr\(nt4_dc\) # This test fails against an smbd environment with NT ACLs enabled
41 ^samba3.raw.acls nfs4acl_xattr-simple.INHERITFLAGS\(nt4_dc\) # This (and the follow nfs4acl_xattr tests fail because our NFSv4 backend isn't a complete mapping yet.
42 ^samba3.raw.acls nfs4acl_xattr-simple.sd\(nt4_dc\)
43 ^samba3.raw.acls nfs4acl_xattr-simple.create_file\(nt4_dc\)
44 ^samba3.raw.acls nfs4acl_xattr-simple.create_dir\(nt4_dc\)
45 ^samba3.raw.acls nfs4acl_xattr-simple.nulldacl\(nt4_dc\)
46 ^samba3.raw.acls nfs4acl_xattr-simple.generic\(nt4_dc\)
47 ^samba3.raw.acls nfs4acl_xattr-simple.inheritance\(nt4_dc\)
48 ^samba3.raw.acls nfs4acl_xattr-special.INHERITFLAGS\(nt4_dc\)
49 ^samba3.raw.acls nfs4acl_xattr-special.sd\(nt4_dc\)
50 ^samba3.raw.acls nfs4acl_xattr-special.create_file\(nt4_dc\)
51 ^samba3.raw.acls nfs4acl_xattr-special.create_dir\(nt4_dc\)
52 ^samba3.raw.acls nfs4acl_xattr-special.nulldacl\(nt4_dc\)
53 ^samba3.raw.acls nfs4acl_xattr-special.generic\(nt4_dc\)
54 ^samba3.raw.acls nfs4acl_xattr-special.inheritance\(nt4_dc\)
55 ^samba3.raw.acls nfs4acl_xattr-special.inherit_creator_owner\(nt4_dc\)
56 ^samba3.raw.acls nfs4acl_xattr-special.inherit_creator_group\(nt4_dc\)
57 ^samba3.base.delete.deltest16a
58 ^samba3.base.delete.deltest17a
59 ^samba3.unix.whoami anonymous connection.whoami\(ad_dc\) # We need to resolve if we should be including SID_NT_WORLD and SID_NT_NETWORK in this token
60 ^samba3.unix.whoami anonymous connection.whoami\(ad_member\) # smbd maps anonymous logins to domain guest in the local domain, not SID_NT_ANONYMOUS
61 # these show that we still have some differences between our system
62 # with our internal iconv because it passes except when we bypass our
63 # internal iconv modules
64 ^samba4.local.convert_string_handle.system.iconv.gd_ascii
65 ^samba4.local.convert_string_handle.system.iconv.gd_iso8859_cp850
66 ^samba4..*base.delete.*.deltest17\(
67 ^samba4..*base.delete.*.deltest17b
68 ^samba4..*base.delete.*.deltest17c
69 ^samba4..*base.delete.*.deltest17e
70 ^samba4..*base.delete.*.deltest17f
71 ^samba4..*base.delete.*.deltest20a
72 ^samba4..*base.delete.*.deltest20b
73 ^samba4.raw.session.reauth
74 ^samba4.raw.session.expire1
75 ^samba4.raw.rename.*.osxrename
76 ^samba4.raw.rename.*.directory rename
77 ^samba4.raw.eas
78 ^samba4.rpc.winreg.*security
79 ^samba4.local.registry.(dir|ldb).check hive security
80 ^samba4.local.registry.local.security
81 ^samba4.rpc.wkssvc
82 ^samba4.rpc.handles.*.lsarpc-shared
83 ^samba4.rpc.epmapper
84 ^samba4.rpc.lsalookup on ncalrpc
85 ^samba4.rpc.lsalookup on ncacn_np
86 ^samba4.rpc.lsalookup with seal,padcheck
87 ^samba4.rpc.lsalookup with validate
88 ^samba4.rpc.lsalookup with bigendian
89 ^samba4.rpc.lsa on ncacn_np with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
90 ^samba4.rpc.lsa with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
91 ^samba4.rpc.lsa.secrets.*seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
92 ^samba4.rpc.netlogon.*.LogonUasLogon
93 ^samba4.rpc.netlogon.*.LogonUasLogoff
94 ^samba4.rpc.netlogon.*.DatabaseSync
95 ^samba4.rpc.netlogon.*.DatabaseSync2
96 ^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomains
97 ^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomainsEx
98 ^samba4.rpc.netlogon.*.GetPassword
99 ^samba4.rpc.netlogon.*.DatabaseRedo
100 ^samba4.rpc.drsuapi.*ncacn_ip_tcp.*validate # should only work with seal
101 ^samba4.rpc.drsuapi.*ncacn_ip_tcp.*bigendian # should only work with seal
102 ^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.validate # should only work with seal
103 ^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.bigendian # should only work with seal
104 ^samba4.base.charset.*.Testing partial surrogate
105 ^samba4.*.base.maximum_allowed          # broken until we implement NTCREATEX_OPTIONS_BACKUP_INTENT
106 .*net.api.delshare.*                            # DelShare isn't implemented yet
107 ^samba4.rap.*netservergetinfo
108 ^samba4.rap.*netsessionenum
109 ^samba4.rap.*netsessiongetinfo
110 ^samba4.rap.*netremotetod
111 # SMB2 in s4 does not seem to support rename correctly
112 ^samba4.smb2.rename.simple\(.*\)$
113 ^samba4.smb2.rename.no_sharing\(.*\)$
114 ^samba4.smb2.rename.share_delete_and_delete_access\(.*\)$
115 ^samba4.smb2.rename.no_share_delete_but_delete_access\(.*\)$
116 ^samba4.smb2.rename.share_delete_no_delete_access\(.*\)$
117 ^samba4.smb2.rename.no_share_delete_no_delete_access\(.*\)$
118 ^samba4.smb2.rename.msword
119 ^samba4.smb2.rename.rename_dir_bench\(ad_dc_ntvfs\)
120 ^samba4.smb2.rename.rename_dir_openfile\(.*\)$
121 ^samba4.smb2.oplock.doc
122 ^samba4.smb2.compound.related3
123 ^samba4.smb2.compound.compound-break
124 ^samba4.smb2.lock.valid-request
125 ^samba4.*base.delaywrite.*update of write time and SMBwrite truncate\(.*\)$
126 ^samba4.*base.delaywrite.*update of write time and SMBwrite truncate expand\(.*\)$
127 ^samba4.*base.delaywrite.*delayed update of write time 3a\(.*\)$
128 ^samba4.*base.delaywrite.*delayed update of write time 3c\(.*\)$
129 ^samba4.*base.delaywrite.*update of write time using SET_END_OF_FILE\(.*\)$
130 ^samba4.*base.delaywrite.*update of write time using SET_ALLOCATION_SIZE\(.*\)$
131 ^samba4.*base.delaywrite.*directory timestamp update test\(.*\)$
132 ^samba4.ldap.python \(ad_dc_ntvfs\).Test add_ldif\(\) with BASE64 security descriptor input using WRONG domain SID\(.*\)$
133 # some operations don't work over the CIFS NTVFS backend yet (eg. root_fid)
134 ^samba4.ntvfs.cifs.*.base.createx_sharemodes_dir
135 ^samba4.raw.lock.*.async # bug 6960
136 ^samba4.raw.open.ntcreatex_supersede
137 ^samba4.smb2.lock.*.multiple-unlock # bug 6959
138 ^samba4.raw.sfileinfo.*.end-of-file\(.*\)$ # bug 6962
139 ^samba4.raw.oplock.*.batch22 # bug 6963
140 ^samba4.raw.oplock.*.doc1
141 ^samba4.raw.oplock.*.exclusive5
142 ^samba4.raw.oplock.*.exclusive9
143 ^samba4.raw.oplock.*.level_ii_1
144 ^samba4.raw.lock.*.zerobyteread # bug 6974
145 ^samba4.smb2.lock.*.zerobyteread # bug 6974
146 ^samba4.raw.streams.*.delete
147 ^samba4.raw.streams.*.createdisp
148 ^samba4.raw.streams.*.sumtab
149 ^samba4.raw.streams.*.perms
150 ^samba4.raw.acls.INHERITFLAGS
151 ^samba4.raw.acls.*.create_dir
152 ^samba4.raw.acls.*.create_file
153 ^samba4.smb2.create.*.acldir
154 ^samba4.smb2.create.*.impersonation
155 ^samba4.smb2.acls.*.generic
156 ^samba4.smb2.acls.*.inheritflags
157 ^samba4.smb2.acls.*.owner
158 ^samba4.smb2.acls.*.ACCESSBASED
159 ^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.test_dirsync_deleted_items
160 #^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.*
161 ^samba4.libsmbclient.opendir.opendir # This requires netbios browsing
162 ^samba4.rpc.drsuapi.*.drsuapi.DsGetDomainControllerInfo\(.*\)$
163 ^samba4.smb2.oplock.exclusive2\(.*\)$ # samba 4 oplocks are a mess
164 ^samba4.smb2.oplock.exclusive5\(.*\)$ # samba 4 oplocks are a mess
165 ^samba4.smb2.oplock.exclusive6\(.*\)$ # samba 4 oplocks are a mess
166 ^samba4.smb2.oplock.exclusive9\(.*\)$
167 ^samba4.smb2.oplock.brl3\(.*\)$ # samba 4 oplocks are a mess
168 ^samba4.smb2.oplock.levelii500\(.*\)$ # samba 4 oplocks are a mess
169 ^samba4.smb2.oplock.brl1\(.*\)$ # samba 4 oplocks are a mess
170 ^samba4.smb2.oplock.batch22\(.*\)$ # samba 4 oplocks are a mess
171 ^samba4.smb2.oplock.batch19\(.*\)$ # samba 4 oplocks are a mess
172 ^samba4.smb2.oplock.batch12\(.*\)$ # samba 4 oplocks are a mess
173 ^samba4.smb2.oplock.batch11\(.*\)$ # samba 4 oplocks are a mess
174 ^samba4.smb2.oplock.batch1\(.*\)$ # samba 4 oplocks are a mess
175 ^samba4.smb2.oplock.batch6\(.*\)$ # samba 4 oplocks are a mess
176 ^samba4.smb2.oplock.batch9\(.*\)$ # samba 4 oplocks are a mess
177 ^samba4.smb2.oplock.batch9a\(.*\)$ # samba 4 oplocks are a mess
178 ^samba4.smb2.oplock.batch10\(.*\)$ # samba 4 oplocks are a mess
179 ^samba4.smb2.oplock.batch20\(.*\)$ # samba 4 oplocks are a mess
180 ^samba4.smb2.oplock.batch26\(.*\)$
181 ^samba4.smb2.oplock.stream1 # samba 4 oplocks are a mess
182 ^samba4.smb2.getinfo.complex # streams on directories does not work
183 ^samba4.smb2.getinfo.qfs_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
184 ^samba4.smb2.getinfo.qfile_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
185 ^samba4.smb2.getinfo.qsec_buffercheck # S4 does not do the BUFFER_TOO_SMALL thingy
186 ^samba4.ntvfs.cifs.krb5.base.createx_access.createx_access\(.*\)$
187 ^samba4.rpc.lsa.forest.trust #Not fully provided by Samba4
188 ^samba4.blackbox.kinit\(.*\).kinit with user password for expired password\(.*\) # We need to work out why this fails only during the pw change
189 ^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
190 ^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_full_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
191 ^samba4.blackbox.upgradeprovision.release-4-0-0.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
192 ^samba4.raw.read.readx\(ad_dc_ntvfs\) # fails readx 16bit alignment requirement
193 ^samba3.smb2.create.gentest
194 ^samba3.smb2.create.blob
195 ^samba3.smb2.create.open
196 ^samba3.smb2.notify.valid-req
197 ^samba3.smb2.notify.rec
198 ^samba3.smb2.durable-open.delete_on_close2
199 ^samba3.smb2.durable-v2-open.app-instance
200 ^samba3.smb2.durable-open.reopen1a-lease\(ad_dc\)$
201 ^samba3.smb2.durable-v2-open.reopen1a-lease\(ad_dc\)$
202 ^samba4.smb2.ioctl.req_resume_key\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
203 ^samba4.smb2.ioctl.copy_chunk_\w*\(ad_dc_ntvfs\)        # not supported by s4 ntvfs server
204 ^samba3.smb2.dir.one
205 ^samba3.smb2.dir.modify
206 ^samba3.smb2.oplock.batch20
207 ^samba3.smb2.oplock.stream1
208 ^samba3.smb2.streams.rename
209 ^samba3.smb2.streams.rename2
210 ^samba3.smb2.streams.attributes
211 ^samba3.smb2.getinfo.complex
212 ^samba3.smb2.getinfo.fsinfo # quotas don't work yet
213 ^samba3.smb2.setinfo.setinfo
214 ^samba3.smb2.session.*reauth5 # some special anonymous checks?
215 ^samba3.smb2.compound.interim2 # wrong return code (STATUS_CANCELLED)
216 ^samba3.smb2.replay.channel-sequence
217 ^samba3.smb2.replay.replay3
218 ^samba3.smb2.replay.replay4
219 ^samba3.smb2.lock.*replay
220 ^samba3.raw.session.*reauth2 # maybe fix this?
221 ^samba3.rpc.lsa.secrets.seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
222 ^samba3.rpc.samr.passwords.badpwdcount.samr.badPwdCount\(nt4_dc\) # We fail this test currently
223 ^samba3.rpc.samr.passwords.lockout.*\(nt4_dc\)$ # We fail this test currently
224 ^samba3.rpc.spoolss.printer.addprinter.driver_info_winreg # knownfail or flapping?
225 ^samba3.rpc.spoolss.printer.addprinterex.driver_info_winreg # knownfail or flapping?
226 ^samba3.rpc.spoolss.printer.*.publish_toggle\(.*\)$ # needs spoolss AD member env
227 ^samba3.rpc.spoolss.printserver.*.add_processor\(.*\)$
228 ^samba4.rpc.fsrvp       # fsrvp server only provided by smbd
229 #
230 # The following tests fail against ad_dc (aka s3fs) currently.
231 # These need to be examined and either fixed or correctly categorised.
232 # but in the interests of ensuring we do not regress, we run the tests
233 # and list the current failures here.
234 #
235 ^samba3.rpc.eventlog.eventlog.GetLogIntormation\(ad_dc\)
236 ^samba3.rpc.eventlog.eventlog.FlushEventLog\(ad_dc\)
237 ^samba3.rpc.eventlog.eventlog.ReportEventLog\(ad_dc\)
238 ^samba3.rpc.eventlog.eventlog.ReadEventLog\(ad_dc\)
239 ^samba3.rpc.eventlog.eventlog.GetNumRecords\(ad_dc\)
240 ^samba3.rpc.eventlog.eventlog.OpenEventLog\(ad_dc\)
241 ^samba3.rap.basic.netsessiongetinfo\(ad_dc\)
242 #
243 # This makes less sense when not running against an AD DC
244 #
245 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member
246 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member
247 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping
248 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping
249 ^samba.wbinfo_simple.\(ad_dc_ntvfs:local\).--allocate-uid
250 ^samba.wbinfo_simple.\(ad_dc_ntvfs:local\).--allocate-gid
251 ^samba.wbinfo_simple.\(s4member:local\).--allocate-uid
252 ^samba.wbinfo_simple.\(s4member:local\).--allocate-gid
253 ^samba.wbinfo_simple.\(ad_dc:local\).--allocate-uid
254 ^samba.wbinfo_simple.\(ad_dc:local\).--allocate-gid
255 ^samba.wbinfo_simple.\(chgdcpass:local\).--allocate-uid
256 ^samba.wbinfo_simple.\(chgdcpass:local\).--allocate-gid
257 #
258 # These do not work against winbindd in member mode for unknown reasons
259 #
260 ^samba4.winbind.struct.domain_info\(s4member:local\)
261 ^samba4.winbind.struct.getdcname\(s4member:local\)
262 ^samba.blackbox.wbinfo\(s4member:local\).wbinfo -r against s4member\(s4member:local\)
263 ^samba.blackbox.wbinfo\(s4member:local\).wbinfo --user-sids against s4member\(s4member:local\)
264 ^samba.wbinfo_simple.\(s4member:local\).--user-groups
265 ^samba.nss.test using winbind\(s4member:local\)
266 #
267 # These fail since ad_dc_ntvfs assigns the local user's uid to SAMBADOMAIN/Administrator
268 # hence we have a duplicate UID in nsswitch.
269 #
270 ^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc_ntvfs:local\)
271 ^samba3.local.nss.reentrant enumeration\(ad_dc_ntvfs:local\)
272 ^samba3.local.nss.enumeration\(ad_dc_ntvfs:local\)
273 ^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc:local\)
274 ^samba3.local.nss.reentrant enumeration\(ad_dc:local\)
275 ^samba3.local.nss.enumeration\(ad_dc:local\)
276 #
277 # These do not work against winbindd in member mode for unknown reasons
278 #
279 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member\(ad_member:local\)
280 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping\(ad_member:local\)
281 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member\(ad_member:local\)
282 ^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping\(ad_member:local\)
283 ^samba4.winbind.struct.getdcname\(ad_member:local\)
284 ^samba4.winbind.struct.lookup_name_sid\(ad_member:local\)
285 ^samba4.winbind.struct.getdcname\(nt4_member:local\) # Works in other modes, just not against the classic/NT4 DC
286 #
287 # Differences in our KDC compared to windows
288 #
289 ^samba4.krb5.kdc .*.as-req-pac-request # We should reply to a request for a PAC over UDP with KRB5KRB_ERR_RESPONSE_TOO_BIG unconditionally
290 #
291 # This will fail against the classic DC, because it requires kerberos
292 #
293 ^samba4.winbind.pac.*\(nt4_member:local\) # No KDC on a classic DC
294 #
295 # This fails because it requires the tombstone_reanimation module to be enabled
296 #
297 ^samba4.ldap.acl.python\(.*\).__main__.AclUndeleteTests.test_undelete\(.*\)
298 #
299 # This fails because our python bindings create python Lists, not a type
300 # we can watch for set methods on.
301 #
302 ^samba.tests.dcerpc.integer.samba.tests.dcerpc.integer.IntegerTests.test_.*_into_uint8_list
303 #
304 # Samba sort takes a primative approach to unicode sort. These tests
305 # match Windows 2012R2 behaviour.
306 #
307 ^samba4.ldap.sort.python.+UnicodeSortTests
308 #
309 ## We assert all "ldap server require strong auth" combinations
310 #
311 ^samba4.ldb.simple.ldap with SIMPLE-BIND.*ad_dc_ntvfs # ldap server require strong auth = allow_sasl_over_tls
312 ^samba4.ldb.simple.ldap with SIMPLE-BIND.*fl2003dc    # ldap server require strong auth = yes
313 ^samba4.ldb.simple.ldaps with SASL-BIND.*fl2003dc     # ldap server require strong auth = yes
314 # These are supposed to fail as we want to verify the "tls verify peer"
315 # restrictions. Note that fl2008r2dc uses a self-signed certificate
316 # with does not have a crl file.
317 #
318 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name_if_available\(
319 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name\(
320 ^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=as_strict_as_possible\(
321 ^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=ca_and_name\(
322 ^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=as_strict_as_possible\(
323 ^samba4.ldb.simple.ldaps.*SERVER.REALM.*tlsverifypeer=as_strict_as_possible.*fl2008r2dc
324 #
325 # we don't allow auth_level_connect anymore...
326 #
327 ^samba3.blackbox.rpcclient.*ncacn_np.*with.*connect.*rpcclient # we don't allow auth_level_connect anymore