You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auth_source_ldap_test.rb 8.7KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. # Redmine - project management software
  2. # Copyright (C) 2006-2017 Jean-Philippe Lang
  3. #
  4. # This program is free software; you can redistribute it and/or
  5. # modify it under the terms of the GNU General Public License
  6. # as published by the Free Software Foundation; either version 2
  7. # of the License, or (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU General Public License
  15. # along with this program; if not, write to the Free Software
  16. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  17. require File.expand_path('../../test_helper', __FILE__)
  18. class AuthSourceLdapTest < ActiveSupport::TestCase
  19. include Redmine::I18n
  20. fixtures :auth_sources
  21. def setup
  22. User.current = nil
  23. end
  24. def test_initialize
  25. auth_source = AuthSourceLdap.new
  26. assert_nil auth_source.id
  27. assert_equal "AuthSourceLdap", auth_source.type
  28. assert_equal "", auth_source.name
  29. assert_nil auth_source.host
  30. assert_nil auth_source.port
  31. assert_nil auth_source.account
  32. assert_equal "", auth_source.account_password
  33. assert_nil auth_source.base_dn
  34. assert_nil auth_source.attr_login
  35. assert_nil auth_source.attr_firstname
  36. assert_nil auth_source.attr_lastname
  37. assert_nil auth_source.attr_mail
  38. assert_equal false, auth_source.onthefly_register
  39. assert_equal false, auth_source.tls
  40. assert_equal true, auth_source.verify_peer
  41. assert_equal :ldap, auth_source.ldap_mode
  42. assert_nil auth_source.filter
  43. assert_nil auth_source.timeout
  44. end
  45. def test_create
  46. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName')
  47. assert a.save
  48. end
  49. def test_should_strip_ldap_attributes
  50. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  51. :attr_firstname => 'givenName ')
  52. assert a.save
  53. assert_equal 'givenName', a.reload.attr_firstname
  54. end
  55. def test_replace_port_zero_to_389
  56. a = AuthSourceLdap.new(
  57. :name => 'My LDAP', :host => 'ldap.example.net', :port => 0,
  58. :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  59. :attr_firstname => 'givenName ')
  60. assert a.save
  61. assert_equal 389, a.port
  62. end
  63. def test_filter_should_be_validated
  64. set_language_if_valid 'en'
  65. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :attr_login => 'sn')
  66. a.filter = "(mail=*@redmine.org"
  67. assert !a.valid?
  68. assert_include "LDAP filter is invalid", a.errors.full_messages
  69. a.filter = "(mail=*@redmine.org)"
  70. assert a.valid?
  71. end
  72. test 'ldap_mode setter sets tls and verify_peer' do
  73. a = AuthSourceLdap.new
  74. a.ldap_mode = 'ldaps_verify_peer'
  75. assert a.tls
  76. assert a.verify_peer
  77. a.ldap_mode = 'ldaps_verify_none'
  78. assert a.tls
  79. assert !a.verify_peer
  80. a.ldap_mode = 'ldap'
  81. assert !a.tls
  82. assert !a.verify_peer
  83. end
  84. test 'ldap_mode getter reads from tls and verify_peer' do
  85. a = AuthSourceLdap.new
  86. a.tls = true
  87. a.verify_peer = true
  88. assert_equal :ldaps_verify_peer, a.ldap_mode
  89. a.tls = true
  90. a.verify_peer = false
  91. assert_equal :ldaps_verify_none, a.ldap_mode
  92. a.tls = false
  93. a.verify_peer = false
  94. assert_equal :ldap, a.ldap_mode
  95. a.tls = false
  96. a.verify_peer = true
  97. assert_equal :ldap, a.ldap_mode
  98. end
  99. if ldap_configured?
  100. test '#authenticate with a valid LDAP user should return the user attributes' do
  101. auth = AuthSourceLdap.find(1)
  102. auth.update_attribute :onthefly_register, true
  103. attributes = auth.authenticate('example1','123456')
  104. assert attributes.is_a?(Hash), "An hash was not returned"
  105. assert_equal 'Example', attributes[:firstname]
  106. assert_equal 'One', attributes[:lastname]
  107. assert_equal 'example1@redmine.org', attributes[:mail]
  108. assert_equal auth.id, attributes[:auth_source_id]
  109. attributes.keys.each do |attribute|
  110. assert User.new.respond_to?("#{attribute}="), "Unexpected :#{attribute} attribute returned"
  111. end
  112. end
  113. test '#authenticate with an invalid LDAP user should return nil' do
  114. auth = AuthSourceLdap.find(1)
  115. assert_nil auth.authenticate('nouser','123456')
  116. end
  117. test '#authenticate without a login should return nil' do
  118. auth = AuthSourceLdap.find(1)
  119. assert_nil auth.authenticate('','123456')
  120. end
  121. test '#authenticate without a password should return nil' do
  122. auth = AuthSourceLdap.find(1)
  123. assert_nil auth.authenticate('edavis','')
  124. end
  125. test '#authenticate without filter should return any user' do
  126. auth = AuthSourceLdap.find(1)
  127. assert auth.authenticate('example1','123456')
  128. assert auth.authenticate('edavis', '123456')
  129. end
  130. test '#authenticate with filter should return user who matches the filter only' do
  131. auth = AuthSourceLdap.find(1)
  132. auth.filter = "(mail=*@redmine.org)"
  133. assert auth.authenticate('example1','123456')
  134. assert_nil auth.authenticate('edavis', '123456')
  135. end
  136. def test_authenticate_should_timeout
  137. auth_source = AuthSourceLdap.find(1)
  138. auth_source.timeout = 1
  139. def auth_source.initialize_ldap_con(*args); sleep(5); end
  140. assert_raise AuthSourceTimeoutException do
  141. auth_source.authenticate 'example1', '123456'
  142. end
  143. end
  144. def test_search_should_return_matching_entries
  145. results = AuthSource.search("exa")
  146. assert_equal 1, results.size
  147. result = results.first
  148. assert_kind_of Hash, result
  149. assert_equal "example1", result[:login]
  150. assert_equal "Example", result[:firstname]
  151. assert_equal "One", result[:lastname]
  152. assert_equal "example1@redmine.org", result[:mail]
  153. assert_equal 1, result[:auth_source_id]
  154. end
  155. def test_search_with_no_match_should_return_an_empty_array
  156. results = AuthSource.search("wro")
  157. assert_equal [], results
  158. end
  159. def test_search_with_exception_should_return_an_empty_array
  160. Net::LDAP.stubs(:new).raises(Net::LDAP::Error, 'Cannot connect')
  161. results = AuthSource.search("exa")
  162. assert_equal [], results
  163. end
  164. def test_test_connection_with_correct_host_and_port
  165. auth_source = AuthSourceLdap.find(1)
  166. assert_nothing_raised do
  167. auth_source.test_connection
  168. end
  169. end
  170. def test_test_connection_with_incorrect_host
  171. auth_source = AuthSourceLdap.find(1)
  172. auth_source.host = "badhost"
  173. auth_source.save!
  174. assert_raise AuthSourceException do
  175. auth_source.test_connection
  176. end
  177. end
  178. def test_test_connection_with_incorrect_port
  179. auth_source = AuthSourceLdap.find(1)
  180. auth_source.port = 1234
  181. auth_source.save!
  182. assert_raise AuthSourceException do
  183. auth_source.test_connection
  184. end
  185. end
  186. def test_test_connection_bind_with_account_and_password
  187. auth_source = AuthSourceLdap.find(1)
  188. auth_source.account = "cn=admin,dc=redmine,dc=org"
  189. auth_source.account_password = "secret"
  190. auth_source.save!
  191. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  192. assert_equal "secret", auth_source.account_password
  193. assert_nil auth_source.test_connection
  194. end
  195. def test_test_connection_bind_without_account_and_password
  196. auth_source = AuthSourceLdap.find(1)
  197. assert_nil auth_source.account
  198. assert_equal "", auth_source.account_password
  199. assert_nil auth_source.test_connection
  200. end
  201. def test_test_connection_bind_with_incorrect_account
  202. auth_source = AuthSourceLdap.find(1)
  203. auth_source.account = "cn=baduser,dc=redmine,dc=org"
  204. auth_source.account_password = "secret"
  205. auth_source.save!
  206. assert_equal "cn=baduser,dc=redmine,dc=org", auth_source.account
  207. assert_equal "secret", auth_source.account_password
  208. assert_raise AuthSourceException do
  209. auth_source.test_connection
  210. end
  211. end
  212. def test_test_connection_bind_with_incorrect_password
  213. auth_source = AuthSourceLdap.find(1)
  214. auth_source.account = "cn=admin,dc=redmine,dc=org"
  215. auth_source.account_password = "badpassword"
  216. auth_source.save!
  217. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  218. assert_equal "badpassword", auth_source.account_password
  219. assert_raise AuthSourceException do
  220. auth_source.test_connection
  221. end
  222. end
  223. else
  224. puts '(Test LDAP server not configured)'
  225. end
  226. end