selftest: Run unix.whomai against the machine acccount as well
authorAndrew Bartlett <abartlet@samba.org>
Sun, 15 Jul 2012 01:34:06 +0000 (11:34 +1000)
committerAndrew Bartlett <abartlet@samba.org>
Thu, 19 Jul 2012 02:04:20 +0000 (04:04 +0200)
This shows that the machine account got an extra SID in the token for domain users.

Andrew Bartlett

source3/selftest/tests.py

index 6f7ab32c5deba138e8cba8d433698092f910ce66..a890372883d81ef6fa4b75147b3f2d59cbdd3788 100755 (executable)
@@ -305,6 +305,8 @@ for t in tests:
         plansmbtorturetestsuite(t, "s3dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=doscharset=ISO-8859-1')
         plansmbtorturetestsuite(t, "plugin_s4_dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=doscharset=ISO-8859-1')
     elif t == "unix.whoami":
+        plansmbtorturetestsuite(t, "member:local", '//$SERVER/tmp --machine-pass', description="machine account")
+        plansmbtorturetestsuite(t, "s3member:local", '//$SERVER/tmp --machine-pass --option=torture:addc=$DC_SERVER', description="machine account")
         for env in ["s3dc", "member"]:
             plansmbtorturetestsuite(t, env, '//$SERVER/tmp -U$DC_USERNAME%$DC_PASSWORD')
             plansmbtorturetestsuite(t, env, '//$SERVER/tmpguest -U%', description='anonymous connection')