s4:dsdb/tests: use ncacn_ip_tcp:server[seal] for samr connections
authorStefan Metzmacher <metze@samba.org>
Wed, 22 Jun 2016 13:08:43 +0000 (15:08 +0200)
committerAndrew Bartlett <abartlet@samba.org>
Mon, 27 Jun 2016 03:00:16 +0000 (05:00 +0200)
This allows the tests to pass against a fully patched Windows Server.

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
source4/dsdb/tests/python/password_lockout.py
source4/dsdb/tests/python/token_group.py
source4/dsdb/tests/python/user_account_control.py

index 84eaaed0602f1630b16a338b34c6db2e50cc60cf..7cd7d503333bd9e46675b905546687395c372ed3 100755 (executable)
@@ -365,7 +365,7 @@ lockoutThreshold: """ + str(lockoutThreshold) + """
         self.base_dn = self.ldb.domain_dn()
 
         self.domain_sid = security.dom_sid(self.ldb.get_domain_sid())
-        self.samr = samr.samr("ncacn_ip_tcp:%s[sign]" % host, lp, global_creds)
+        self.samr = samr.samr("ncacn_ip_tcp:%s[seal]" % host, lp, global_creds)
         self.samr_handle = self.samr.Connect2(None, security.SEC_FLAG_MAXIMUM_ALLOWED)
         self.samr_domain = self.samr.OpenDomain(self.samr_handle, security.SEC_FLAG_MAXIMUM_ALLOWED, self.domain_sid)
 
index dbd697425add06b4b4dc866ad076358ad1485aee..e3a7586316382b8835a9bd6ee82d6a74adf1d438 100755 (executable)
@@ -543,7 +543,7 @@ class DynamicTokenTest(samba.tests.TestCase):
             self.fail(msg="This test is only valid on ldap (so we an find the hostname and use SAMR)")
         host = url.split("://")[1]
         (domain_sid, user_rid) = self.user_sid.split()
-        samr_conn = samba.dcerpc.samr.samr("ncacn_ip_tcp:%s[sign]" % host, lp, creds)
+        samr_conn = samba.dcerpc.samr.samr("ncacn_ip_tcp:%s[seal]" % host, lp, creds)
         samr_handle = samr_conn.Connect2(None, security.SEC_FLAG_MAXIMUM_ALLOWED)
         samr_domain = samr_conn.OpenDomain(samr_handle, security.SEC_FLAG_MAXIMUM_ALLOWED,
                                       domain_sid)
@@ -621,7 +621,7 @@ class DynamicTokenTest(samba.tests.TestCase):
         user_sid = ndr_unpack(samba.dcerpc.security.dom_sid, res[0]["objectSid"][0])
 
         (domain_sid, user_rid) = user_sid.split()
-        samr_conn = samba.dcerpc.samr.samr("ncacn_ip_tcp:%s[sign]" % host, lp, creds)
+        samr_conn = samba.dcerpc.samr.samr("ncacn_ip_tcp:%s[seal]" % host, lp, creds)
         samr_handle = samr_conn.Connect2(None, security.SEC_FLAG_MAXIMUM_ALLOWED)
         samr_domain = samr_conn.OpenDomain(samr_handle, security.SEC_FLAG_MAXIMUM_ALLOWED,
                                            domain_sid)
index 37594f2c246acb80b5adf8fec64f87f0fba90127..c583883ae28e1004cafc28369dce33a088eaaa49 100755 (executable)
@@ -141,7 +141,7 @@ class UserAccountControlTests(samba.tests.TestCase):
         self.domain_sid = security.dom_sid(self.samdb.get_domain_sid())
         self.base_dn = self.samdb.domain_dn()
 
-        self.samr = samr.samr("ncacn_ip_tcp:%s[sign]" % host, lp, self.unpriv_creds)
+        self.samr = samr.samr("ncacn_ip_tcp:%s[seal]" % host, lp, self.unpriv_creds)
         self.samr_handle = self.samr.Connect2(None, security.SEC_FLAG_MAXIMUM_ALLOWED)
         self.samr_domain = self.samr.OpenDomain(self.samr_handle, security.SEC_FLAG_MAXIMUM_ALLOWED, self.domain_sid)