summaryrefslogtreecommitdiff
path: root/source3/selftest
diff options
context:
space:
mode:
authorRalph Boehme <slow@samba.org>2019-04-16 16:54:21 +0200
committerJeremy Allison <jra@samba.org>2019-08-08 20:24:33 +0000
commit017af5d583175ff9f15c64fa7cc631eb4512367b (patch)
treeb0284673eda3e834f5b2b2969a1b65d28824acb7 /source3/selftest
parentb45a09f0e1ada1b5fa4a16fb652871f9ae973e2e (diff)
downloadsamba-017af5d583175ff9f15c64fa7cc631eb4512367b.tar.gz
torture: beginning of a mdssvc RPC service test-suite
Yikes! Most tests fail atm. Signed-off-by: Ralph Boehme <slow@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
Diffstat (limited to 'source3/selftest')
-rwxr-xr-xsource3/selftest/tests.py3
1 files changed, 3 insertions, 0 deletions
diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py
index c1058091410..8bdc7038362 100755
--- a/source3/selftest/tests.py
+++ b/source3/selftest/tests.py
@@ -488,6 +488,7 @@ rpc = ["rpc.authcontext", "rpc.samba3.bind", "rpc.samba3.srvsvc", "rpc.samba3.sh
"rpc.spoolss.driver",
"rpc.lsa", "rpc.lsa-getuser", "rpc.lsa.lookupsids", "rpc.lsa.lookupnames",
"rpc.lsa.privileges", "rpc.lsa.secrets",
+ "rpc.mdssvc",
"rpc.samr", "rpc.samr.users", "rpc.samr.users.privileges", "rpc.samr.passwords",
"rpc.samr.passwords.pwdlastset", "rpc.samr.passwords.lockout", "rpc.samr.passwords.badpwdcount", "rpc.samr.large-dc", "rpc.samr.machine.auth",
"rpc.samr.priv", "rpc.samr.passwords.validate",
@@ -571,6 +572,8 @@ for t in tests:
plansmbtorture4testsuite(t, "nt4_dc", 'ncacn_ip_tcp:$SERVER_IP -U$USERNAME%$PASSWORD', 'over ncacn_ip_tcp ')
plansmbtorture4testsuite(t, "ad_dc", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD', 'over ncacn_np ')
plansmbtorture4testsuite(t, "ad_dc", 'ncacn_ip_tcp:$SERVER_IP -U$USERNAME%$PASSWORD', 'over ncacn_ip_tcp ')
+ elif t == "rpc.mdssvc":
+ plansmbtorture4testsuite(t, "fileserver", '//$SERVER_IP/tmp -U$USERNAME%$PASSWORD --option=torture:no_spotlight_localdir=$SELFTEST_PREFIX/fileserver/share')
elif t == "rpc.samr.passwords.validate":
plansmbtorture4testsuite(t, "nt4_dc", 'ncacn_ip_tcp:$SERVER_IP[seal] -U$USERNAME%$PASSWORD', 'over ncacn_ip_tcp ')
plansmbtorture4testsuite(t, "ad_dc", 'ncacn_ip_tcp:$SERVER_IP[seal] -U$USERNAME%$PASSWORD', 'over ncacn_ip_tcp ')