You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

LdapUserServiceTest.java 6.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. /*
  2. * Copyright 2012 John Crygier
  3. * Copyright 2012 gitblit.com
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. */
  17. package com.gitblit.tests;
  18. import java.util.HashMap;
  19. import java.util.Map;
  20. import org.junit.Before;
  21. import org.junit.BeforeClass;
  22. import org.junit.Test;
  23. import com.gitblit.LdapUserService;
  24. import com.gitblit.models.UserModel;
  25. import com.gitblit.tests.mock.MemorySettings;
  26. import com.gitblit.utils.StringUtils;
  27. import com.unboundid.ldap.listener.InMemoryDirectoryServer;
  28. import com.unboundid.ldap.listener.InMemoryDirectoryServerConfig;
  29. import com.unboundid.ldap.listener.InMemoryListenerConfig;
  30. import com.unboundid.ldif.LDIFReader;
  31. /**
  32. * An Integration test for LDAP that tests going against an in-memory UnboundID
  33. * LDAP server.
  34. *
  35. * @author jcrygier
  36. *
  37. */
  38. public class LdapUserServiceTest extends GitblitUnitTest {
  39. private LdapUserService ldapUserService;
  40. static int ldapPort = 1389;
  41. @BeforeClass
  42. public static void createInMemoryLdapServer() throws Exception {
  43. InMemoryDirectoryServerConfig config = new InMemoryDirectoryServerConfig("dc=MyDomain");
  44. config.addAdditionalBindCredentials("cn=Directory Manager", "password");
  45. config.setListenerConfigs(InMemoryListenerConfig.createLDAPConfig("default", ldapPort));
  46. config.setSchema(null);
  47. InMemoryDirectoryServer ds = new InMemoryDirectoryServer(config);
  48. ds.importFromLDIF(true, new LDIFReader(LdapUserServiceTest.class.getResourceAsStream("resources/ldapUserServiceSampleData.ldif")));
  49. ds.startListening();
  50. }
  51. @Before
  52. public void createLdapUserService() {
  53. ldapUserService = new LdapUserService();
  54. ldapUserService.setup(getSettings());
  55. }
  56. private MemorySettings getSettings() {
  57. Map<String, Object> backingMap = new HashMap<String, Object>();
  58. backingMap.put("realm.ldap.server", "ldap://localhost:" + ldapPort);
  59. backingMap.put("realm.ldap.domain", "");
  60. backingMap.put("realm.ldap.username", "cn=Directory Manager");
  61. backingMap.put("realm.ldap.password", "password");
  62. backingMap.put("realm.ldap.backingUserService", "users.conf");
  63. backingMap.put("realm.ldap.maintainTeams", "true");
  64. backingMap.put("realm.ldap.accountBase", "OU=Users,OU=UserControl,OU=MyOrganization,DC=MyDomain");
  65. backingMap.put("realm.ldap.accountPattern", "(&(objectClass=person)(sAMAccountName=${username}))");
  66. backingMap.put("realm.ldap.groupBase", "OU=Groups,OU=UserControl,OU=MyOrganization,DC=MyDomain");
  67. backingMap.put("realm.ldap.groupPattern", "(&(objectClass=group)(member=${dn}))");
  68. backingMap.put("realm.ldap.admins", "UserThree @Git_Admins \"@Git Admins\"");
  69. backingMap.put("realm.ldap.displayName", "displayName");
  70. backingMap.put("realm.ldap.email", "email");
  71. MemorySettings ms = new MemorySettings(backingMap);
  72. return ms;
  73. }
  74. @Test
  75. public void testAuthenticate() {
  76. UserModel userOneModel = ldapUserService.authenticate("UserOne", "userOnePassword".toCharArray());
  77. assertNotNull(userOneModel);
  78. assertNotNull(userOneModel.getTeam("git_admins"));
  79. assertNotNull(userOneModel.getTeam("git_users"));
  80. assertTrue(userOneModel.canAdmin);
  81. UserModel userOneModelFailedAuth = ldapUserService.authenticate("UserOne", "userTwoPassword".toCharArray());
  82. assertNull(userOneModelFailedAuth);
  83. UserModel userTwoModel = ldapUserService.authenticate("UserTwo", "userTwoPassword".toCharArray());
  84. assertNotNull(userTwoModel);
  85. assertNotNull(userTwoModel.getTeam("git_users"));
  86. assertNull(userTwoModel.getTeam("git_admins"));
  87. assertNotNull(userTwoModel.getTeam("git admins"));
  88. assertTrue(userTwoModel.canAdmin);
  89. UserModel userThreeModel = ldapUserService.authenticate("UserThree", "userThreePassword".toCharArray());
  90. assertNotNull(userThreeModel);
  91. assertNotNull(userThreeModel.getTeam("git_users"));
  92. assertNull(userThreeModel.getTeam("git_admins"));
  93. assertTrue(userThreeModel.canAdmin);
  94. }
  95. @Test
  96. public void testDisplayName() {
  97. UserModel userOneModel = ldapUserService.authenticate("UserOne", "userOnePassword".toCharArray());
  98. assertNotNull(userOneModel);
  99. assertEquals("User One", userOneModel.displayName);
  100. // Test more complicated scenarios - concat
  101. MemorySettings ms = getSettings();
  102. ms.put("realm.ldap.displayName", "${personalTitle}. ${givenName} ${surname}");
  103. ldapUserService = new LdapUserService();
  104. ldapUserService.setup(ms);
  105. userOneModel = ldapUserService.authenticate("UserOne", "userOnePassword".toCharArray());
  106. assertNotNull(userOneModel);
  107. assertEquals("Mr. User One", userOneModel.displayName);
  108. }
  109. @Test
  110. public void testEmail() {
  111. UserModel userOneModel = ldapUserService.authenticate("UserOne", "userOnePassword".toCharArray());
  112. assertNotNull(userOneModel);
  113. assertEquals("userone@gitblit.com", userOneModel.emailAddress);
  114. // Test more complicated scenarios - concat
  115. MemorySettings ms = getSettings();
  116. ms.put("realm.ldap.email", "${givenName}.${surname}@gitblit.com");
  117. ldapUserService = new LdapUserService();
  118. ldapUserService.setup(ms);
  119. userOneModel = ldapUserService.authenticate("UserOne", "userOnePassword".toCharArray());
  120. assertNotNull(userOneModel);
  121. assertEquals("User.One@gitblit.com", userOneModel.emailAddress);
  122. }
  123. @Test
  124. public void testLdapInjection() {
  125. // Inject so "(&(objectClass=person)(sAMAccountName=${username}))" becomes "(&(objectClass=person)(sAMAccountName=*)(userPassword=userOnePassword))"
  126. // Thus searching by password
  127. UserModel userOneModel = ldapUserService.authenticate("*)(userPassword=userOnePassword", "userOnePassword".toCharArray());
  128. assertNull(userOneModel);
  129. }
  130. @Test
  131. public void testLocalAccount() {
  132. UserModel localAccount = new UserModel("bruce");
  133. localAccount.displayName = "Bruce Campbell";
  134. localAccount.password = StringUtils.MD5_TYPE + StringUtils.getMD5("gimmesomesugar");
  135. ldapUserService.deleteUser(localAccount.username);
  136. assertTrue("Failed to add local account",
  137. ldapUserService.updateUserModel(localAccount));
  138. assertEquals("Accounts are not equal!",
  139. localAccount,
  140. ldapUserService.authenticate(localAccount.username, "gimmesomesugar".toCharArray()));
  141. assertTrue("Failed to delete local account!",
  142. ldapUserService.deleteUser(localAccount.username));
  143. }
  144. }