Blame SOURCES/nss-pam-ldapd-rh-msgs-in-tests.patch

df3ee2
diff -up nss-pam-ldapd-0.8.13/tests/test_pamcmds.expect.rh_test_msgs nss-pam-ldapd-0.8.13/tests/test_pamcmds.expect
df3ee2
--- nss-pam-ldapd-0.8.13/tests/test_pamcmds.expect.rh_test_msgs	2014-01-20 15:32:33.253018468 +0100
df3ee2
+++ nss-pam-ldapd-0.8.13/tests/test_pamcmds.expect	2014-01-20 15:38:00.452957296 +0100
df3ee2
@@ -40,7 +40,7 @@ proc reset_password {} {
df3ee2
   expect {
df3ee2
     "LDAP administrator password" { send "test\r"; exp_continue }
df3ee2
     -regexp "(New|Retype new) password:" { send "test\r"; exp_continue }
df3ee2
-    "password updated successfully" {}
df3ee2
+    "passwd: all authentication tokens updated successfully" {}
df3ee2
     "Invalid credentials" abort
df3ee2
     "Authentication token manipulation error" abort
df3ee2
     default abort
df3ee2
@@ -114,7 +114,7 @@ proc test_login_unknown {uid passwd} {
df3ee2
   expect {
df3ee2
     "Password:" { send "$passwd\r"; exp_continue }
df3ee2
     "Unknown id" {}
df3ee2
-    "No passwd entry for user" {}
df3ee2
+    "su: user $uid does not exist" {}
df3ee2
     "\$ " abort
df3ee2
     default abort
df3ee2
   }
df3ee2
@@ -156,7 +156,7 @@ expect {
df3ee2
 }
df3ee2
 expect {
df3ee2
   -regexp "(New|Retype new) password:" { send "newpassword\r"; exp_continue }
df3ee2
-  "password updated successfully" {}
df3ee2
+  "passwd: all authentication tokens updated successfully" {}
df3ee2
   "Invalid credentials" abort
df3ee2
   "Authentication token manipulation error" abort
df3ee2
   "\$ " abort