from samba.auth import AuthContext
from samba.dcerpc import security
from samba.ndr import ndr_unpack
-from samba.ntstatus import NT_STATUS_ACCESS_DENIED
+from samba.ntstatus import NT_STATUS_NO_IMPERSONATION_TOKEN
from samba.tests.krb5.kdc_base_test import KDCBaseTest
# cached credentials.
lp = self.get_lp()
+ lp.set('server role', 'active directory domain controller')
settings = {}
settings["lp_ctx"] = lp
self.fail()
enum, _ = e.args
- self.assertEqual(NT_STATUS_ACCESS_DENIED, enum)
+ self.assertEqual(NT_STATUS_NO_IMPERSONATION_TOKEN, enum)
return
token = session.security_token
enum, estr = e.args
self.assertEqual(ERR_OPERATIONS_ERROR, enum)
- self.assertIn('NT_STATUS_ACCESS_DENIED', estr)
+ self.assertIn('NT_STATUS_NO_IMPERSONATION_TOKEN', estr)
return
ldb_res = ldb_as_user.search('',
from samba import NTSTATUSError, credentials
from samba.dcerpc import lsa
-from samba.ntstatus import NT_STATUS_ACCESS_DENIED
+from samba.ntstatus import NT_STATUS_NO_IMPERSONATION_TOKEN
from samba.tests.krb5.kdc_base_test import KDCBaseTest
self.fail()
enum, _ = e.args
- self.assertEqual(NT_STATUS_ACCESS_DENIED, enum)
+ self.assertEqual(NT_STATUS_NO_IMPERSONATION_TOKEN, enum)
return
(account_name, _) = conn.GetUserName(None, None, None)
from samba import NTSTATUSError
from samba.dcerpc import security
from samba.ndr import ndr_unpack
-from samba.ntstatus import NT_STATUS_ACCESS_DENIED
+from samba.ntstatus import NT_STATUS_NO_IMPERSONATION_TOKEN
from samba.samba3 import libsmb_samba_internal as libsmb
from samba.samba3 import param as s3param
self.fail()
enum, _ = e.args
- self.assertEqual(NT_STATUS_ACCESS_DENIED, enum)
+ self.assertEqual(NT_STATUS_NO_IMPERSONATION_TOKEN, enum)
return
else:
self.assertFalse(expect_error)