You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auth_source_ldap_test.rb 8.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. # frozen_string_literal: true
  2. # Redmine - project management software
  3. # Copyright (C) 2006- Jean-Philippe Lang
  4. #
  5. # This program is free software; you can redistribute it and/or
  6. # modify it under the terms of the GNU General Public License
  7. # as published by the Free Software Foundation; either version 2
  8. # of the License, or (at your option) any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License
  16. # along with this program; if not, write to the Free Software
  17. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  18. require_relative '../test_helper'
  19. class AuthSourceLdapTest < ActiveSupport::TestCase
  20. include Redmine::I18n
  21. fixtures :auth_sources
  22. def setup
  23. User.current = nil
  24. end
  25. def test_initialize
  26. auth_source = AuthSourceLdap.new
  27. assert_nil auth_source.id
  28. assert_equal "AuthSourceLdap", auth_source.type
  29. assert_equal "", auth_source.name
  30. assert_nil auth_source.host
  31. assert_nil auth_source.port
  32. assert_nil auth_source.account
  33. assert_equal "", auth_source.account_password
  34. assert_nil auth_source.base_dn
  35. assert_nil auth_source.attr_login
  36. assert_nil auth_source.attr_firstname
  37. assert_nil auth_source.attr_lastname
  38. assert_nil auth_source.attr_mail
  39. assert_equal false, auth_source.onthefly_register
  40. assert_equal false, auth_source.tls
  41. assert_equal true, auth_source.verify_peer
  42. assert_equal :ldap, auth_source.ldap_mode
  43. assert_nil auth_source.filter
  44. assert_nil auth_source.timeout
  45. end
  46. def test_create
  47. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName')
  48. assert a.save
  49. end
  50. def test_should_strip_ldap_attributes
  51. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  52. :attr_firstname => 'givenName ')
  53. assert a.save
  54. assert_equal 'givenName', a.reload.attr_firstname
  55. end
  56. def test_replace_port_zero_to_389
  57. a = AuthSourceLdap.new(
  58. :name => 'My LDAP', :host => 'ldap.example.net', :port => 0,
  59. :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  60. :attr_firstname => 'givenName ')
  61. assert a.save
  62. assert_equal 389, a.port
  63. end
  64. def test_filter_should_be_validated
  65. set_language_if_valid 'en'
  66. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :attr_login => 'sn')
  67. a.filter = "(mail=*@redmine.org"
  68. assert a.invalid?
  69. assert_include "LDAP filter is invalid", a.errors.full_messages
  70. a.filter = "(mail=*@redmine.org)"
  71. assert a.valid?
  72. end
  73. test 'ldap_mode setter sets tls and verify_peer' do
  74. a = AuthSourceLdap.new
  75. a.ldap_mode = 'ldaps_verify_peer'
  76. assert a.tls
  77. assert a.verify_peer
  78. a.ldap_mode = 'ldaps_verify_none'
  79. assert a.tls
  80. assert !a.verify_peer
  81. a.ldap_mode = 'ldap'
  82. assert !a.tls
  83. assert !a.verify_peer
  84. end
  85. test 'ldap_mode getter reads from tls and verify_peer' do
  86. a = AuthSourceLdap.new
  87. a.tls = true
  88. a.verify_peer = true
  89. assert_equal :ldaps_verify_peer, a.ldap_mode
  90. a.tls = true
  91. a.verify_peer = false
  92. assert_equal :ldaps_verify_none, a.ldap_mode
  93. a.tls = false
  94. a.verify_peer = false
  95. assert_equal :ldap, a.ldap_mode
  96. a.tls = false
  97. a.verify_peer = true
  98. assert_equal :ldap, a.ldap_mode
  99. end
  100. if ldap_configured?
  101. test '#authenticate with a valid LDAP user should return the user attributes' do
  102. auth = AuthSourceLdap.find(1)
  103. auth.update_attribute :onthefly_register, true
  104. attributes = auth.authenticate('example1', '123456')
  105. assert attributes.is_a?(Hash), "An hash was not returned"
  106. assert_equal 'Example', attributes[:firstname]
  107. assert_equal 'One', attributes[:lastname]
  108. assert_equal 'example1@redmine.org', attributes[:mail]
  109. assert_equal auth.id, attributes[:auth_source_id]
  110. attributes.each_key do |attribute|
  111. assert User.new.respond_to?(:"#{attribute}="), "Unexpected :#{attribute} attribute returned"
  112. end
  113. end
  114. test '#authenticate with an invalid LDAP user should return nil' do
  115. auth = AuthSourceLdap.find(1)
  116. assert_nil auth.authenticate('nouser', '123456')
  117. end
  118. test '#authenticate without a login should return nil' do
  119. auth = AuthSourceLdap.find(1)
  120. assert_nil auth.authenticate('', '123456')
  121. end
  122. test '#authenticate without a password should return nil' do
  123. auth = AuthSourceLdap.find(1)
  124. assert_nil auth.authenticate('edavis', '')
  125. end
  126. test '#authenticate without filter should return any user' do
  127. auth = AuthSourceLdap.find(1)
  128. assert auth.authenticate('example1', '123456')
  129. assert auth.authenticate('edavis', '123456')
  130. end
  131. test '#authenticate with filter should return user who matches the filter only' do
  132. auth = AuthSourceLdap.find(1)
  133. auth.filter = "(mail=*@redmine.org)"
  134. assert auth.authenticate('example1', '123456')
  135. assert_nil auth.authenticate('edavis', '123456')
  136. end
  137. def test_authenticate_should_timeout
  138. auth_source = AuthSourceLdap.find(1)
  139. auth_source.timeout = 1
  140. def auth_source.initialize_ldap_con(*args); sleep(5); end
  141. error = assert_raise AuthSourceTimeoutException do
  142. auth_source.authenticate 'example1', '123456'
  143. end
  144. assert_match /\ALDAP: /, error.message
  145. end
  146. def test_search_should_return_matching_entries
  147. results = AuthSource.search("exa")
  148. assert_equal 1, results.size
  149. result = results.first
  150. assert_kind_of Hash, result
  151. assert_equal "example1", result[:login]
  152. assert_equal "Example", result[:firstname]
  153. assert_equal "One", result[:lastname]
  154. assert_equal "example1@redmine.org", result[:mail]
  155. assert_equal 1, result[:auth_source_id]
  156. end
  157. def test_search_with_no_match_should_return_an_empty_array
  158. results = AuthSource.search("wro")
  159. assert_equal [], results
  160. end
  161. def test_search_with_exception_should_return_an_empty_array
  162. Net::LDAP.stubs(:new).raises(Net::LDAP::Error, 'Cannot connect')
  163. results = AuthSource.search("exa")
  164. assert_equal [], results
  165. end
  166. def test_test_connection_with_correct_host_and_port
  167. auth_source = AuthSourceLdap.find(1)
  168. assert_nothing_raised do
  169. auth_source.test_connection
  170. end
  171. end
  172. def test_test_connection_with_incorrect_host
  173. auth_source = AuthSourceLdap.find(1)
  174. auth_source.host = "badhost"
  175. auth_source.save!
  176. error = assert_raise AuthSourceException do
  177. auth_source.test_connection
  178. end
  179. assert_match /\ALDAP: /, error.message
  180. end
  181. def test_test_connection_with_incorrect_port
  182. auth_source = AuthSourceLdap.find(1)
  183. auth_source.port = 1234
  184. auth_source.save!
  185. assert_raise AuthSourceException do
  186. auth_source.test_connection
  187. end
  188. end
  189. def test_test_connection_bind_with_account_and_password
  190. auth_source = AuthSourceLdap.find(1)
  191. auth_source.account = "cn=admin,dc=redmine,dc=org"
  192. auth_source.account_password = "secret"
  193. auth_source.save!
  194. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  195. assert_equal "secret", auth_source.account_password
  196. assert_nil auth_source.test_connection
  197. end
  198. def test_test_connection_bind_without_account_and_password
  199. auth_source = AuthSourceLdap.find(1)
  200. assert_nil auth_source.account
  201. assert_equal "", auth_source.account_password
  202. assert_nil auth_source.test_connection
  203. end
  204. def test_test_connection_bind_with_incorrect_account
  205. auth_source = AuthSourceLdap.find(1)
  206. auth_source.account = "cn=baduser,dc=redmine,dc=org"
  207. auth_source.account_password = "secret"
  208. auth_source.save!
  209. assert_equal "cn=baduser,dc=redmine,dc=org", auth_source.account
  210. assert_equal "secret", auth_source.account_password
  211. assert_raise AuthSourceException do
  212. auth_source.test_connection
  213. end
  214. end
  215. def test_test_connection_bind_with_incorrect_password
  216. auth_source = AuthSourceLdap.find(1)
  217. auth_source.account = "cn=admin,dc=redmine,dc=org"
  218. auth_source.account_password = "badpassword"
  219. auth_source.save!
  220. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  221. assert_equal "badpassword", auth_source.account_password
  222. assert_raise AuthSourceException do
  223. auth_source.test_connection
  224. end
  225. end
  226. else
  227. puts '(Test LDAP server not configured)'
  228. end
  229. end