summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--src/appl/user_user/t_user2user.py2
-rw-r--r--src/kdc/t_workers.py2
-rw-r--r--src/lib/kdb/t_stringattr.py2
-rw-r--r--src/lib/krb5/ccache/t_cccol.py2
-rw-r--r--src/lib/krb5/krb/t_expire_warn.py2
-rw-r--r--src/lib/krb5/krb/t_vfy_increds.py2
-rw-r--r--src/tests/gssapi/t_ccselect.py2
-rw-r--r--src/tests/gssapi/t_gssapi.py2
-rw-r--r--src/tests/t_anonpkinit.py4
-rw-r--r--src/tests/t_cccol.py2
-rw-r--r--src/tests/t_crossrealm.py2
-rwxr-xr-xsrc/tests/t_general.py2
-rw-r--r--src/tests/t_lockout.py2
-rw-r--r--src/tests/t_renew.py2
-rw-r--r--src/tests/t_renprinc.py2
-rw-r--r--src/tests/t_stringattr.py2
-rw-r--r--src/util/gss-kernel-lib/t_kgss.py2
-rw-r--r--src/util/k5test.py2
18 files changed, 19 insertions, 19 deletions
diff --git a/src/appl/user_user/t_user2user.py b/src/appl/user_user/t_user2user.py
index bb9c42f42d..abd66413f2 100644
--- a/src/appl/user_user/t_user2user.py
+++ b/src/appl/user_user/t_user2user.py
@@ -15,4 +15,4 @@ for realm in multipass_realms():
fail('Message not echoed back.')
-success('User-2-user test programs.')
+success('User-2-user test programs')
diff --git a/src/kdc/t_workers.py b/src/kdc/t_workers.py
index f36b5a793d..7af3acfa15 100644
--- a/src/kdc/t_workers.py
+++ b/src/kdc/t_workers.py
@@ -5,4 +5,4 @@ realm = K5Realm(start_kdc=False, start_kadmind=False, create_host=False)
realm.start_kdc(['-w', '3'])
realm.kinit(realm.user_princ, password('user'))
realm.klist(realm.user_princ)
-success('KDC worker processes.')
+success('KDC worker processes')
diff --git a/src/lib/kdb/t_stringattr.py b/src/lib/kdb/t_stringattr.py
index 210134c8bf..f520370a48 100644
--- a/src/lib/kdb/t_stringattr.py
+++ b/src/lib/kdb/t_stringattr.py
@@ -3,4 +3,4 @@ from k5test import *
realm = K5Realm(create_kdb=False)
realm.run_as_master(['./t_stringattr'])
-success('String attribute unit tests.')
+success('String attribute unit tests')
diff --git a/src/lib/krb5/ccache/t_cccol.py b/src/lib/krb5/ccache/t_cccol.py
index d809971089..4399ce79c4 100644
--- a/src/lib/krb5/ccache/t_cccol.py
+++ b/src/lib/krb5/ccache/t_cccol.py
@@ -41,4 +41,4 @@ cursor_test('dirmem', [dccname, mfoo], [duser, dalice, dbob, mfoo])
realm.run_as_client([kdestroy])
cursor_test('noexist', [], [])
-success('Renewing credentials.')
+success('Renewing credentials')
diff --git a/src/lib/krb5/krb/t_expire_warn.py b/src/lib/krb5/krb/t_expire_warn.py
index 8d8ade9306..660ed2ecc3 100644
--- a/src/lib/krb5/krb/t_expire_warn.py
+++ b/src/lib/krb5/krb/t_expire_warn.py
@@ -60,4 +60,4 @@ if 'password_expiration = ' not in output or \
'password_expiration = 0\n' in output:
fail('Expected non-zero password expiration not seen for days')
-success('Password expiration warning tests.')
+success('Password expiration warning tests')
diff --git a/src/lib/krb5/krb/t_vfy_increds.py b/src/lib/krb5/krb/t_vfy_increds.py
index e302480a4b..1eab89363c 100644
--- a/src/lib/krb5/krb/t_vfy_increds.py
+++ b/src/lib/krb5/krb/t_vfy_increds.py
@@ -51,4 +51,4 @@ realm = K5Realm(start_kadmind=False, krb5_conf=conf)
os.remove(realm.keytab)
realm.run_as_server(['./t_vfy_increds'], expected_code=1)
-success('krb5_verify_init_creds tests.')
+success('krb5_verify_init_creds tests')
diff --git a/src/tests/gssapi/t_ccselect.py b/src/tests/gssapi/t_ccselect.py
index 2722873fc4..0d36d7a350 100644
--- a/src/tests/gssapi/t_ccselect.py
+++ b/src/tests/gssapi/t_ccselect.py
@@ -119,4 +119,4 @@ output = r1.run_as_client(['./t_ccselect', 'gss:bogus@' + hostname],
if 'does not match desired' not in output:
fail('Expected error not seen when k5identity selects bad principal.')
-success('GSSAPI credential selection tests.')
+success('GSSAPI credential selection tests')
diff --git a/src/tests/gssapi/t_gssapi.py b/src/tests/gssapi/t_gssapi.py
index 32485d03b7..e640e0231d 100644
--- a/src/tests/gssapi/t_gssapi.py
+++ b/src/tests/gssapi/t_gssapi.py
@@ -92,4 +92,4 @@ output = realm.run_as_client(['./t_accname', 'host/-nomatch-',
if 'host/-nomatch-' not in output:
fail('Expected host/-nomatch- in t_accname output')
-success('GSSAPI tests.')
+success('GSSAPI tests')
diff --git a/src/tests/t_anonpkinit.py b/src/tests/t_anonpkinit.py
index ddb96919b4..5b2368e12d 100644
--- a/src/tests/t_anonpkinit.py
+++ b/src/tests/t_anonpkinit.py
@@ -3,7 +3,7 @@ from k5test import *
# Skip this test if pkinit wasn't built.
if not os.path.exists(os.path.join(plugins, 'preauth', 'pkinit.so')):
- success('Warning: not testing pkinit because it is not built.')
+ success('Warning: not testing pkinit because it is not built')
exit(0)
# Construct a krb5.conf fragment configuring pkinit.
@@ -44,4 +44,4 @@ realm.addprinc('WELLKNOWN/ANONYMOUS')
realm.kinit('@%s' % realm.realm, flags=['-n'])
realm.run_as_client([kvno, realm.host_princ], expected_code=1)
-success('Anonymous PKINIT.')
+success('Anonymous PKINIT')
diff --git a/src/tests/t_cccol.py b/src/tests/t_cccol.py
index d8db275ce3..b30cbcf9bd 100644
--- a/src/tests/t_cccol.py
+++ b/src/tests/t_cccol.py
@@ -74,4 +74,4 @@ output = realm.run_as_client([klist, '-l'], expected_code=1)
if not output.endswith('---\n') or output.count('\n') != 2:
fail('kdestroy -a failed to empty cache collection.')
-success('Credential cache collection tests.')
+success('Credential cache collection tests')
diff --git a/src/tests/t_crossrealm.py b/src/tests/t_crossrealm.py
index bfd9d1ed55..afefb8592c 100644
--- a/src/tests/t_crossrealm.py
+++ b/src/tests/t_crossrealm.py
@@ -114,4 +114,4 @@ if 'Illegal cross-realm ticket' not in output:
fail('transited 2: Expected error message not in output')
stop(r1, r2, r3, r4)
-success('Cross-realm tests.')
+success('Cross-realm tests')
diff --git a/src/tests/t_general.py b/src/tests/t_general.py
index a2953fefde..c02a581a50 100755
--- a/src/tests/t_general.py
+++ b/src/tests/t_general.py
@@ -50,4 +50,4 @@ for realm in multipass_realms(create_host=False):
if 'Key: vno 258,' not in output:
fail('Expected vno not seen in kadmin.local output')
-success('Dump/load, FAST kinit, kdestroy, kvno wrapping.')
+success('Dump/load, FAST kinit, kdestroy, kvno wrapping')
diff --git a/src/tests/t_lockout.py b/src/tests/t_lockout.py
index bd33a95067..377e9ba5e7 100644
--- a/src/tests/t_lockout.py
+++ b/src/tests/t_lockout.py
@@ -48,5 +48,5 @@ if 'Clients credentials have been revoked while getting initial credentials' \
output = realm.run_kadminl('modprinc -unlock user')
realm.kinit(realm.user_princ, password('user'))
-success('Account lockout.')
+success('Account lockout')
diff --git a/src/tests/t_renew.py b/src/tests/t_renew.py
index 1053646349..af83007a87 100644
--- a/src/tests/t_renew.py
+++ b/src/tests/t_renew.py
@@ -13,4 +13,4 @@ realm.kinit(realm.user_princ, flags=['-R'])
realm.kinit(realm.user_princ, flags=['-R'])
realm.klist(realm.user_princ)
-success('Renewing credentials.')
+success('Renewing credentials')
diff --git a/src/tests/t_renprinc.py b/src/tests/t_renprinc.py
index d4ad902aa3..e29eb194cb 100644
--- a/src/tests/t_renprinc.py
+++ b/src/tests/t_renprinc.py
@@ -43,4 +43,4 @@ for st in salttypes:
realm.run_kadminl('renprinc -force newnormal newnormal2')
realm.kinit('newnormal2', password('normal'))
-success('Principal renaming tests.')
+success('Principal renaming tests')
diff --git a/src/tests/t_stringattr.py b/src/tests/t_stringattr.py
index 392ab6c98f..9d6fbe0a23 100644
--- a/src/tests/t_stringattr.py
+++ b/src/tests/t_stringattr.py
@@ -53,4 +53,4 @@ if 'attr2: value2' not in output or 'attr3: value3' not in output or \
'attr1:' in output:
fail('Final attribute query')
-success('KDB string attributes.')
+success('KDB string attributes')
diff --git a/src/util/gss-kernel-lib/t_kgss.py b/src/util/gss-kernel-lib/t_kgss.py
index 86cd340a15..52d1da2456 100644
--- a/src/util/gss-kernel-lib/t_kgss.py
+++ b/src/util/gss-kernel-lib/t_kgss.py
@@ -27,4 +27,4 @@ from k5test import *
for realm in multipass_realms():
realm.run_as_client(['./t_kgss_user', realm.host_princ])
-success('Kernel GSSAPI subset tests.')
+success('Kernel GSSAPI subset tests')
diff --git a/src/util/k5test.py b/src/util/k5test.py
index 0480854e1f..503085a31c 100644
--- a/src/util/k5test.py
+++ b/src/util/k5test.py
@@ -42,7 +42,7 @@ A sample test script:
realm.run_as_client(['./clientprog', realm.host_princ])
# Inform framework that tests completed successfully.
- success('World peace and cure for cancer.')
+ success('World peace and cure for cancer')
By default, the realm will have: