From: Jo Sutton Date: Wed, 17 Jan 2024 21:48:44 +0000 (+1300) Subject: python:tests: Fix code spelling X-Git-Tag: tdb-1.4.11~1752 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=678ed54e781b5b89c319dabca072fb9d3522986f;p=thirdparty%2Fsamba.git python:tests: Fix code spelling Signed-off-by: Jo Sutton Reviewed-by: Andrew Bartlett --- diff --git a/python/samba/tests/samba_tool/user_get_kerberos_ticket.py b/python/samba/tests/samba_tool/user_get_kerberos_ticket.py index 4ac502e3b8f..3ec9e3aff4a 100644 --- a/python/samba/tests/samba_tool/user_get_kerberos_ticket.py +++ b/python/samba/tests/samba_tool/user_get_kerberos_ticket.py @@ -55,7 +55,7 @@ SERVER_PASSWORD = os.environ["PASSWORD"] CREDS = f"-U{SERVER_USERNAME}%{SERVER_PASSWORD}" -class GetKerberosTiketTest(BlackboxTestCase): +class GetKerberosTicketTest(BlackboxTestCase): """Blackbox tests for GMSA getpassword and connecting as that user.""" @classmethod diff --git a/selftest/knownfail.d/samba-tool-user-get-kerberos-ticket b/selftest/knownfail.d/samba-tool-user-get-kerberos-ticket index db59a9a723c..1be23ead50b 100644 --- a/selftest/knownfail.d/samba-tool-user-get-kerberos-ticket +++ b/selftest/knownfail.d/samba-tool-user-get-kerberos-ticket @@ -1,5 +1,5 @@ # These tests will pass once gMSA support appears -^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTiketTest.test_gmsa_ticket.ad_dc:local -^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTiketTest.test_gmsa_ticket.ad_dc_no_ntlm:local -# This test could be fixed by reading the AES keys in supplementalCrednetials, not just the unicodePwd -^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTiketTest.test_user_ticket.ad_dc_no_ntlm:local +^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTicketTest.test_gmsa_ticket.ad_dc:local +^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTicketTest.test_gmsa_ticket.ad_dc_no_ntlm:local +# This test could be fixed by reading the AES keys in supplementalCredentials, not just the unicodePwd +^samba.tests.samba_tool.user_get_kerberos_ticket.samba.tests.samba_tool.user_get_kerberos_ticket.GetKerberosTicketTest.test_user_ticket.ad_dc_no_ntlm:local