This allows the tests to pass against a fully patched Windows Server.
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
from samba.dcerpc import security
from samba.tests import delete_force
from samba.dcerpc import security
from samba.tests import delete_force
+from samba import gensec
parser = optparse.OptionParser("sam.py [options] <host>")
sambaopts = options.SambaOptions(parser)
parser = optparse.OptionParser("sam.py [options] <host>")
sambaopts = options.SambaOptions(parser)
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
+creds.set_gensec_features(creds.get_gensec_features() | gensec.FEATURE_SEAL)
class SamTests(samba.tests.TestCase):
class SamTests(samba.tests.TestCase):