selftest: Remove invalid security=share and rename secshare to simpleserver
authorAndrew Bartlett <abartlet@samba.org>
Wed, 26 Sep 2012 00:40:17 +0000 (10:40 +1000)
committerAndrew Bartlett <abartlet@samba.org>
Wed, 26 Sep 2012 02:08:26 +0000 (04:08 +0200)
This avoids the loadparm code failing due to the invalid smb.conf entry, and removes
the very last hint of security=share!

Andrew Bartlett

selftest/target/Samba3.pm
source3/selftest/tests.py

index c1f8fbd3c01707d56e5c0d2f07fbd0a104cf36a7..ef22b0286531d8b18e9c749bf2ff2cea19214725 100755 (executable)
@@ -153,8 +153,8 @@ sub setup_env($$$)
 
        if ($envname eq "s3dc") {
                return $self->setup_s3dc("$path/s3dc");
-       } elsif ($envname eq "secshare") {
-               return $self->setup_secshare("$path/secshare");
+       } elsif ($envname eq "simpleserver") {
+               return $self->setup_simpleserver("$path/simpleserver");
        } elsif ($envname eq "maptoguest") {
                return $self->setup_maptoguest("$path/maptoguest");
        } elsif ($envname eq "ktest") {
@@ -337,7 +337,7 @@ sub setup_admember($$$$)
        return $ret;
 }
 
-sub setup_secshare($$)
+sub setup_simpleserver($$)
 {
        my ($self, $path) = @_;
        my $vfs_modulesdir_abs = $ENV{VFSLIBDIR};
@@ -346,8 +346,7 @@ sub setup_secshare($$)
 
        my $prefix_abs = abs_path($path);
 
-       my $secshare_options = "
-       security = share
+       my $simpleserver_options = "
        lanman auth = yes
        vfs objects = $vfs_modulesdir_abs/xattr_tdb.so $vfs_modulesdir_abs/streams_depot.so
 
@@ -361,7 +360,7 @@ sub setup_secshare($$)
        my $vars = $self->provision($path,
                                    "LOCALSHARE4",
                                    "local4pass",
-                                   $secshare_options);
+                                   $simpleserver_options);
 
        $vars or return undef;
 
@@ -371,7 +370,7 @@ sub setup_secshare($$)
               return undef;
        }
 
-       $self->{vars}->{secshare} = $vars;
+       $self->{vars}->{simpleserver} = $vars;
 
        return $vars;
 }
index f4a0d54e03495015790486d8f21b42e455276a4e..b07b69086c6e7127fcc12ce0c57139b0d426215c 100755 (executable)
@@ -104,7 +104,7 @@ for t in tests:
 
 tests = ["RW1", "RW2", "RW3"]
 for t in tests:
-    plantestsuite("samba3.smbtorture_s3.vfs_aio_fork(secshare).%s" % t, "secshare", [os.path.join(samba3srcdir, "script/tests/test_smbtorture_s3.sh"), t, '//$SERVER_IP/vfs_aio_fork', '$USERNAME', '$PASSWORD', smbtorture3, "", "-l $LOCAL_PATH"])
+    plantestsuite("samba3.smbtorture_s3.vfs_aio_fork(simpleserver).%s" % t, "simpleserver", [os.path.join(samba3srcdir, "script/tests/test_smbtorture_s3.sh"), t, '//$SERVER_IP/vfs_aio_fork', '$USERNAME', '$PASSWORD', smbtorture3, "", "-l $LOCAL_PATH"])
 
 posix_tests=[ "POSIX", "POSIX-APPEND"]
 
@@ -200,7 +200,7 @@ plantestsuite("samba3.ntlm_auth.krb5(ktest:local) old ccache", "ktest:local", [o
 plantestsuite("samba3.ntlm_auth.krb5(ktest:local)", "ktest:local", [os.path.join(samba3srcdir, "script/tests/test_ntlm_auth_krb5.sh"), valgrindify(python), samba3srcdir, ntlm_auth, '$PREFIX/ktest/krb5_ccache-3', '$SERVER', configuration])
 
 
-for env in ["maptoguest", "secshare"]:
+for env in ["maptoguest", "simpleserver"]:
     plantestsuite("samba3.blackbox.smbclient_auth.plain (%s) local creds" % env, env, [os.path.join(samba3srcdir, "script/tests/test_smbclient_auth.sh"), '$SERVER', '$SERVER_IP', '$USERNAME', '$PASSWORD', smbclient, configuration + " --option=clientntlmv2auth=no --option=clientlanmanauth=yes"])
 
 env = "maptoguest"
@@ -343,7 +343,7 @@ for t in tests:
         plansmbtorturetestsuite(t, "plugin_s4_dc", '//$SERVER_IP/tmpcase -U$USERNAME%$PASSWORD')
     elif t == "raw.samba3hide" or t == "raw.samba3checkfsp" or t ==  "raw.samba3closeerr":
         plansmbtorturetestsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD')
-        plansmbtorturetestsuite(t, "secshare", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD')
+        plansmbtorturetestsuite(t, "simpleserver", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD')
         plansmbtorturetestsuite(t, "plugin_s4_dc", '//$SERVER/tmp -U$USERNAME%$PASSWORD')
     elif t == "raw.session" or t == "smb2.session":
         plansmbtorturetestsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD', 'plain')