--- test/tests/memcached/regression/lp_001-630-615.cpp.orig	2023-06-03 12:15:40 UTC
+++ test/tests/memcached/regression/lp_001-630-615.cpp
@@ -6,29 +6,8 @@
 TEST_CASE("memcached_regression_lp1630615") {
 #if !LIBMEMCACHED_WITH_SASL_SUPPORT
   WARN("ENABLE_SASL=OFF");
-#else
-  Shell sh;
-  string mc{MEMCACHED_BINARY}, err;
-
-  if (!sh.run(mc + " -S --version", err)) {
-    WARN(mc << ": " << err);
-  } else {
-    memcached_return_t rc;
-    auto test = MemcachedCluster::sasl();
-    auto memc = &test.memc;
-    MemcachedPtr copy{memcached_clone(nullptr, memc)};
-
-    REQUIRE(memcached_server_by_key(memc, S(__func__), &rc)->fd == INVALID_SOCKET);
-    REQUIRE_SUCCESS(memcached_set(memc, S(__func__), S(__func__), 0, 0));
-    REQUIRE(memcached_server_by_key(memc, S(__func__), &rc)->fd != INVALID_SOCKET);
-
-    REQUIRE(memcached_server_by_key(*copy, S(__func__), &rc)->fd == INVALID_SOCKET);
-    Malloced val{memcached_get(*copy, S(__func__), nullptr, nullptr, &rc)};
-    REQUIRE(memcached_server_by_key(*copy, S(__func__), &rc)->fd != INVALID_SOCKET);
-    
-    REQUIRE_SUCCESS(rc);
-    REQUIRE(*val);
-    REQUIRE(string(__func__) == string(*val));
-  }
+#endif
+#if LIBMEMCACHED_WITH_SASL_SUPPORT
+  WARN("SASL_TESTS disabled due to permission issues");
 #endif
 }
--- test/tests/memcached/sasl.cpp.orig	2023-06-03 11:11:01 UTC
+++ test/tests/memcached/sasl.cpp
@@ -6,46 +6,8 @@
 TEST_CASE("memcached_sasl") {
 #if !LIBMEMCACHED_WITH_SASL_SUPPORT
   WARN("ENABLE_SASL=OFF");
-#else
-  Shell sh;
-  string mc{MEMCACHED_BINARY}, err;
-
-  if (!sh.run(mc + " -S --version", err)) {
-    WARN(mc << ": " << err);
-  } else {
-    auto test = MemcachedCluster::sasl();
-    auto memc = &test.memc;
-
-    REQUIRE_SUCCESS(memcached_set(memc, S(__func__), S(__func__), 0, 0));
-    REQUIRE_SUCCESS(memcached_delete(memc, S(__func__), 0));
-    REQUIRE_SUCCESS(memcached_destroy_sasl_auth_data(memc));
-    REQUIRE_SUCCESS(memcached_destroy_sasl_auth_data(memc));
-    REQUIRE_RC(MEMCACHED_INVALID_ARGUMENTS, memcached_destroy_sasl_auth_data(nullptr));
-
-    memcached_quit(memc);
-
-    REQUIRE_RC(MEMCACHED_AUTH_FAILURE, memcached_set(memc, S(__func__), S(__func__), 0, 0));
-
-    REQUIRE_SUCCESS(memcached_set_sasl_auth_data(memc, "username", "password"));
-    REQUIRE_RC(MEMCACHED_AUTH_FAILURE, memcached_set(memc, S(__func__), S(__func__), 0, 0));
-
-    SECTION("getpid2") {
-      memcached_return_t rc;
-
-      for (auto &server : test.cluster.getServers()) {
-        REQUIRE(server.getPid() == libmemcached_util_getpid2("localhost", get<int>(server.getSocketOrPort()), "memcached", "memcached", &rc));
-        REQUIRE_SUCCESS(rc);
-      }
-
-      REQUIRE(-1 == libmemcached_util_getpid2("localhost", 1, "foo", "bar", &rc));
-      REQUIRE(memcached_fatal(rc));
-    }
-
-    SECTION("ping2") {
-      memcached_server_fn fptr[] = {&ping2_callback};
-
-      REQUIRE_SUCCESS(memcached_server_cursor(memc, fptr, nullptr, 1));
-    }
-  }
+#endif
+#if LIBMEMCACHED_WITH_SASL_SUPPORT
+  WARN("SASL_TESTS disabled due to permission issues");
 #endif
 }