SQ selftest: add a one-way trust between SAMBA2000 and ADDOMAIN
authorStefan Metzmacher <metze@samba.org>
Fri, 9 Jun 2017 12:23:49 +0000 (14:23 +0200)
committerStefan Metzmacher <metze@samba.org>
Fri, 16 Mar 2018 12:46:23 +0000 (13:46 +0100)
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
selftest/knownfail.d/one-way-trusts [new file with mode: 0644]
selftest/target/Samba4.pm
source4/selftest/tests.py

diff --git a/selftest/knownfail.d/one-way-trusts b/selftest/knownfail.d/one-way-trusts
new file mode 100644 (file)
index 0000000..7cfdf77
--- /dev/null
@@ -0,0 +1,19 @@
+#
+# There's only a one-way trust between SAMBA2000 and ADDOMAIN,
+# were ADDOMAIN trusts SAMBA2000.
+^samba4.blackbox.kinit_trust.*Test.login.with.user.kerberos.ccache.*\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*Test.login.with.kerberos.ccache\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*check.time.with.kerberos.ccache\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*Test.login.with.user.kerberos.lowercase.realm\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*Test.login.with.user.kerberos.lowercase.realm.2\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*wbinfo.ping.dc\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*wbinfo.change.outgoing.trust.pw\(fl2000dc:local\)
+^samba4.blackbox.kinit_trust.*wbinfo.check.outgoing.trust.pw\(fl2000dc:local\)
+^samba4.blackbox.trust_ntlm.Test07.*with.ADDOMAIN.*Administrator%locDCpass1\(fl2000dc:local\)
+^samba4.blackbox.trust_ntlm.Test08.*with.ADDOM.SAMBA.EXAMPLE.COM.*Administrator%locDCpass1\(fl2000dc:local\)
+^samba4.blackbox.trust_ntlm.Test09.*with.Administrator@ADDOMAIN%locDCpass1\(fl2000dc:local\)
+^samba4.blackbox.trust_ntlm.Test10.*with.Administrator@ADDOM.SAMBA.EXAMPLE.COM%locDCpass1\(fl2000dc:local\)
+^samba4.blackbox.trust_utils.*validate.trust.default.both\(fl2000dc:local\)
+^samba4.blackbox.trust_utils.*validate.trust.default.local\(fl2000dc:local\)
+^samba4.blackbox.trust_utils.*validate.trust.reverse.both\(fl2000dc:local\)
+^samba4.blackbox.trust_utils.*namespaces.own.default\(fl2000dc:local\)
index 814255412c4b265eccdbce3d7560464d35441cdf..01804e0a32f42d76a1e9bca5daa2c89d4c765ae4 100755 (executable)
@@ -1507,6 +1507,7 @@ sub provision_fl2000dc($$)
        print "PROVISIONING DC WITH FOREST LEVEL 2000...\n";
        my $extra_conf_options = "
        spnego:simulate_w2k=yes
+       ntlmssp_client:force_old_spnego=yes
        ntlmssp_server:force_old_spnego=yes
 ";
        my $extra_provision_options = undef;
index 3f1440d3d5e547cfe942def7dadcbadfcbe06a1b..81ef046ea6bac242848d000016f7ae53208d7447 100755 (executable)
@@ -410,6 +410,7 @@ else:
 
 plantestsuite("samba4.blackbox.trust_ntlm", "fl2008r2dc:local", [os.path.join(bbdir, "test_trust_ntlm.sh"), '$SERVER_IP', '$USERNAME', '$PASSWORD', '$REALM', '$DOMAIN', '$TRUST_USERNAME', '$TRUST_PASSWORD', '$TRUST_REALM', '$TRUST_DOMAIN', 'forest', 'auto', 'NT_STATUS_LOGON_FAILURE'])
 plantestsuite("samba4.blackbox.trust_ntlm", "fl2003dc:local", [os.path.join(bbdir, "test_trust_ntlm.sh"), '$SERVER_IP', '$USERNAME', '$PASSWORD', '$REALM', '$DOMAIN', '$TRUST_USERNAME', '$TRUST_PASSWORD', '$TRUST_REALM', '$TRUST_DOMAIN', 'external', 'auto', 'NT_STATUS_LOGON_FAILURE'])
+plantestsuite("samba4.blackbox.trust_ntlm", "fl2000dc:local", [os.path.join(bbdir, "test_trust_ntlm.sh"), '$SERVER_IP', '$USERNAME', '$PASSWORD', '$REALM', '$DOMAIN', '$TRUST_USERNAME', '$TRUST_PASSWORD', '$TRUST_REALM', '$TRUST_DOMAIN', 'external', 'auto', 'NT_STATUS_LOGON_FAILURE'])
 plantestsuite("samba4.blackbox.trust_ntlm", "ad_member:local", [os.path.join(bbdir, "test_trust_ntlm.sh"), '$SERVER_IP', '$USERNAME', '$PASSWORD', '$SERVER', '$SERVER', '$DC_USERNAME', '$DC_PASSWORD', '$REALM', '$DOMAIN', 'member', 'auto', 'NT_STATUS_LOGON_FAILURE'])
 plantestsuite("samba4.blackbox.trust_ntlm", "nt4_member:local", [os.path.join(bbdir, "test_trust_ntlm.sh"), '$SERVER_IP', '$USERNAME', '$PASSWORD', '$SERVER', '$SERVER', '$DC_USERNAME', '$DC_PASSWORD', '$DOMAIN', '$DOMAIN', 'member', 'auto', 'NT_STATUS_LOGON_FAILURE'])