s4:tests/samba_tool/gpo.py: add test_show_as_admin()
authorStefan Metzmacher <metze@samba.org>
Tue, 20 Nov 2012 14:02:05 +0000 (15:02 +0100)
committerMichael Adam <obnox@samba.org>
Fri, 30 Nov 2012 16:17:19 +0000 (17:17 +0100)
This calls samba-tool gpo show as admin (which should be able to
see the full nTSecurityDescriptor.

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Michael Adam <obnox@samba.org>
source4/scripting/python/samba/tests/samba_tool/gpo.py

index 82e7268e1b9695d30313f1ec119b5dd23b2f4623..ce8c65f7f090699f32e4f62992931a6a894d7935 100644 (file)
@@ -49,6 +49,11 @@ os.environ["SERVER"])
         (result, out, err) = self.runsubcmd("gpo", "show", self.gpo_guid, "-H", "ldap://%s" % os.environ["SERVER"])
         self.assertCmdSuccess(result, "Ensuring gpo fetched successfully")
 
+    def test_show_as_admin(self):
+        """Show a real GPO, and make sure it passes"""
+        (result, out, err) = self.runsubcmd("gpo", "show", self.gpo_guid, "-H", "ldap://%s" % os.environ["SERVER"], "-U%s%%%s" % (os.environ["USERNAME"], os.environ["PASSWORD"]))
+        self.assertCmdSuccess(result, "Ensuring gpo fetched successfully")
+
     def test_aclcheck(self):
         """Check all the GPOs on the remote server have correct ACLs"""
         (result, out, err) = self.runsubcmd("gpo", "aclcheck", "-H", "ldap://%s" % os.environ["SERVER"], "-U%s%%%s" % (os.environ["USERNAME"], os.environ["PASSWORD"]))