selftest: run the FSRVP test suite against s3
authorDavid Disseldorp <ddiss@samba.org>
Tue, 14 May 2013 22:45:17 +0000 (00:45 +0200)
committerDavid Disseldorp <ddiss@samba.org>
Tue, 14 May 2013 22:49:30 +0000 (00:49 +0200)
selftest/knownfail
selftest/skip
source3/selftest/tests.py

index fbfeae7a03968ad499d85e4b7e8816aaf0f292bc..659159f13b62247ed2c47754aed65934238902da 100644 (file)
 ^samba3.raw.session.*reauth2 # maybe fix this?
 ^samba3.rpc.spoolss.printer.addprinter.driver_info_winreg # knownfail or flapping?
 ^samba3.rpc.spoolss.printer.addprinterex.driver_info_winreg # knownfail or flapping?
+^samba4.rpc.fsrvp      # fsrvp server only provided by smbd
 #
 # The following tests fail against plugin_s4_dc (aka s3fs) currently.
 # These need to be examined and either fixed or correctly categorised.
index 50a6e0cd897e87ec1d815a9664a35e6a005f3455..1a152200c8a3601567d764d560101b8846d1d3ee 100644 (file)
@@ -79,7 +79,6 @@
 ^samba4.rpc.frsapi                                                     # Not provided by Samba 4
 ^samba4.rpc.ntsvcs                                                     # Not provided by Samba 4
 ^samba4.rpc.dfs                                                                # Not provided by Samba 4
-^samba4.rpc.fsrvp                                                      # fsrvp server support not yet provided
 ^samba4.*.base.samba3.*                                                # Samba3-specific test
 ^samba4.*.raw.samba3.*                                         # Samba3-specific test
 ^samba4.rpc..*samba3.*                                         # Samba3-specific test
index 4453c4de608383776b1696bfc2493b2bf45fa51f..21e3b39eb69c7daa0ad7569ce3e28882955559ec 100755 (executable)
@@ -407,3 +407,4 @@ for e in endianness_options:
             plansmbtorture4testsuite(test, "s3dc", options, 'over ncacn_ip_tcp with [%s%s%s] ' % (a, s, e))
 
 plansmbtorture4testsuite('rpc.epmapper', 's3dc:local', 'ncalrpc: -U$USERNAME%$PASSWORD', 'over ncalrpc')
+plansmbtorture4testsuite('rpc.fsrvp', 's3dc:local', 'ncacn_np:$SERVER_IP[/pipe/FssagentRpc] -U$USERNAME%$PASSWORD', 'over ncacn_np')