From fe8a1fcda792ee38faaadf1da2905b62302ce3e1 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sun, 14 Apr 2013 20:04:45 +1000 Subject: selftest: Run raw.acls test against the nfs4acl_xattr module This is the first time we have tested the NFSv4 ACL mapping code. Sadly most tests fail but these can be fixed from here. This at least shows that the code does not segfault. Andrew Bartlett Reviewed-by: Jeremy Allison --- source3/selftest/tests.py | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'source3/selftest') diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py index 1c123f5735..11504c0490 100755 --- a/source3/selftest/tests.py +++ b/source3/selftest/tests.py @@ -343,6 +343,10 @@ for t in tests: plansmbtorture4testsuite(t, "plugin_s4_dc", '//$SERVER/tmp -U$USERNAME%$PASSWORD') elif t == "idmap.rfc2307": plantestsuite(t, "s3member_rfc2307", [os.path.join(samba3srcdir, "../nsswitch/tests/test_idmap_rfc2307.sh"), '$DOMAIN', 'Administrator', '2000000', '"Domain Users"', '2000001', 'ou=idmap,dc=samba,dc=example,dc=com', '$DC_SERVER', '$DC_USERNAME', '$DC_PASSWORD']) + elif t == "raw.acls": + plansmbtorture4testsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD') + plansmbtorture4testsuite(t, "s3dc", '//$SERVER_IP/nfs4acl_share -U$USERNAME%$PASSWORD', description='nfs4acl_xattr') + plansmbtorture4testsuite(t, "plugin_s4_dc", '//$SERVER_IP/tmpcase -U$USERNAME%$PASSWORD') else: plansmbtorture4testsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD') plansmbtorture4testsuite(t, "plugin_s4_dc", '//$SERVER/tmp -U$USERNAME%$PASSWORD') -- cgit