From 449b0665983bf83f1be7293b1bcc5d261dfcda02 Mon Sep 17 00:00:00 2001 From: Jason Blais Date: Tue, 6 Sep 2016 15:27:32 -0400 Subject: PLT-3766 Change LDAP references to AD/LDAP in the UI (#3925) --- store/sql_user_store_test.go | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'store') diff --git a/store/sql_user_store_test.go b/store/sql_user_store_test.go index 74c27dbea..753c54a7b 100644 --- a/store/sql_user_store_test.go +++ b/store/sql_user_store_test.go @@ -101,7 +101,7 @@ func TestUserStoreUpdate(t *testing.T) { u2.Email = model.NewId() if err := (<-store.User().Update(u2, false)).Err; err == nil { - t.Fatal("Update should have failed because you can't modify LDAP fields") + t.Fatal("Update should have failed because you can't modify AD/LDAP fields") } } @@ -460,14 +460,14 @@ func TestUserStoreGetForLogin(t *testing.T) { } if result := <-store.User().GetForLogin(*u2.AuthData, true, true, true); result.Err != nil { - t.Fatal("Should have gotten user by LDAP AuthData", result.Err) + t.Fatal("Should have gotten user by AD/LDAP AuthData", result.Err) } else if result.Data.(*model.User).Id != u2.Id { - t.Fatal("Should have gotten user2 by LDAP AuthData") + t.Fatal("Should have gotten user2 by AD/LDAP AuthData") } // prevent getting user by AuthData when they're not an LDAP user if result := <-store.User().GetForLogin(*u1.AuthData, true, true, true); result.Err == nil { - t.Fatal("Should not have gotten user by non-LDAP AuthData") + t.Fatal("Should not have gotten user by non-AD/LDAP AuthData") } // prevent getting user when different login methods are disabled @@ -480,7 +480,7 @@ func TestUserStoreGetForLogin(t *testing.T) { } if result := <-store.User().GetForLogin(*u2.AuthData, true, true, false); result.Err == nil { - t.Fatal("Should have failed to get user3 by LDAP AuthData") + t.Fatal("Should have failed to get user3 by AD/LDAP AuthData") } auth3 := model.NewId() -- cgit v1.2.3-1-g7c22