From 9130bbb7e5c3268cf51c8be01bea0cd64b0e1304 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sun, 15 Jul 2012 11:34:06 +1000 Subject: selftest: Run unix.whomai against the machine acccount as well This shows that the machine account got an extra SID in the token for domain users. Andrew Bartlett --- source3/selftest/tests.py | 2 ++ 1 file changed, 2 insertions(+) (limited to 'source3/selftest') diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py index 6f7ab32c5d..a890372883 100755 --- a/source3/selftest/tests.py +++ b/source3/selftest/tests.py @@ -305,6 +305,8 @@ for t in tests: plansmbtorturetestsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=doscharset=ISO-8859-1') plansmbtorturetestsuite(t, "plugin_s4_dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=doscharset=ISO-8859-1') elif t == "unix.whoami": + plansmbtorturetestsuite(t, "member:local", '//$SERVER/tmp --machine-pass', description="machine account") + plansmbtorturetestsuite(t, "s3member:local", '//$SERVER/tmp --machine-pass --option=torture:addc=$DC_SERVER', description="machine account") for env in ["s3dc", "member"]: plansmbtorturetestsuite(t, env, '//$SERVER/tmp -U$DC_USERNAME%$DC_PASSWORD') plansmbtorturetestsuite(t, env, '//$SERVER/tmpguest -U%', description='anonymous connection') -- cgit