You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auth_source_ldap_test.rb 8.6KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. # Redmine - project management software
  2. # Copyright (C) 2006-2017 Jean-Philippe Lang
  3. #
  4. # This program is free software; you can redistribute it and/or
  5. # modify it under the terms of the GNU General Public License
  6. # as published by the Free Software Foundation; either version 2
  7. # of the License, or (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU General Public License
  15. # along with this program; if not, write to the Free Software
  16. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  17. require File.expand_path('../../test_helper', __FILE__)
  18. class AuthSourceLdapTest < ActiveSupport::TestCase
  19. include Redmine::I18n
  20. fixtures :auth_sources
  21. def setup
  22. end
  23. def test_initialize
  24. auth_source = AuthSourceLdap.new
  25. assert_nil auth_source.id
  26. assert_equal "AuthSourceLdap", auth_source.type
  27. assert_equal "", auth_source.name
  28. assert_nil auth_source.host
  29. assert_nil auth_source.port
  30. assert_nil auth_source.account
  31. assert_equal "", auth_source.account_password
  32. assert_nil auth_source.base_dn
  33. assert_nil auth_source.attr_login
  34. assert_nil auth_source.attr_firstname
  35. assert_nil auth_source.attr_lastname
  36. assert_nil auth_source.attr_mail
  37. assert_equal false, auth_source.onthefly_register
  38. assert_equal false, auth_source.tls
  39. assert_equal true, auth_source.verify_peer
  40. assert_equal :ldap, auth_source.ldap_mode
  41. assert_nil auth_source.filter
  42. assert_nil auth_source.timeout
  43. end
  44. def test_create
  45. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName')
  46. assert a.save
  47. end
  48. def test_should_strip_ldap_attributes
  49. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  50. :attr_firstname => 'givenName ')
  51. assert a.save
  52. assert_equal 'givenName', a.reload.attr_firstname
  53. end
  54. def test_replace_port_zero_to_389
  55. a = AuthSourceLdap.new(
  56. :name => 'My LDAP', :host => 'ldap.example.net', :port => 0,
  57. :base_dn => 'dc=example,dc=net', :attr_login => 'sAMAccountName',
  58. :attr_firstname => 'givenName ')
  59. assert a.save
  60. assert_equal 389, a.port
  61. end
  62. def test_filter_should_be_validated
  63. set_language_if_valid 'en'
  64. a = AuthSourceLdap.new(:name => 'My LDAP', :host => 'ldap.example.net', :port => 389, :attr_login => 'sn')
  65. a.filter = "(mail=*@redmine.org"
  66. assert !a.valid?
  67. assert_include "LDAP filter is invalid", a.errors.full_messages
  68. a.filter = "(mail=*@redmine.org)"
  69. assert a.valid?
  70. end
  71. test 'ldap_mode setter sets tls and verify_peer' do
  72. a = AuthSourceLdap.new
  73. a.ldap_mode = 'ldaps_verify_peer'
  74. assert a.tls
  75. assert a.verify_peer
  76. a.ldap_mode = 'ldaps_verify_none'
  77. assert a.tls
  78. assert !a.verify_peer
  79. a.ldap_mode = 'ldap'
  80. assert !a.tls
  81. assert !a.verify_peer
  82. end
  83. test 'ldap_mode getter reads from tls and verify_peer' do
  84. a = AuthSourceLdap.new
  85. a.tls = true
  86. a.verify_peer = true
  87. assert_equal :ldaps_verify_peer, a.ldap_mode
  88. a.tls = true
  89. a.verify_peer = false
  90. assert_equal :ldaps_verify_none, a.ldap_mode
  91. a.tls = false
  92. a.verify_peer = false
  93. assert_equal :ldap, a.ldap_mode
  94. a.tls = false
  95. a.verify_peer = true
  96. assert_equal :ldap, a.ldap_mode
  97. end
  98. if ldap_configured?
  99. test '#authenticate with a valid LDAP user should return the user attributes' do
  100. auth = AuthSourceLdap.find(1)
  101. auth.update_attribute :onthefly_register, true
  102. attributes = auth.authenticate('example1','123456')
  103. assert attributes.is_a?(Hash), "An hash was not returned"
  104. assert_equal 'Example', attributes[:firstname]
  105. assert_equal 'One', attributes[:lastname]
  106. assert_equal 'example1@redmine.org', attributes[:mail]
  107. assert_equal auth.id, attributes[:auth_source_id]
  108. attributes.keys.each do |attribute|
  109. assert User.new.respond_to?("#{attribute}="), "Unexpected :#{attribute} attribute returned"
  110. end
  111. end
  112. test '#authenticate with an invalid LDAP user should return nil' do
  113. auth = AuthSourceLdap.find(1)
  114. assert_nil auth.authenticate('nouser','123456')
  115. end
  116. test '#authenticate without a login should return nil' do
  117. auth = AuthSourceLdap.find(1)
  118. assert_nil auth.authenticate('','123456')
  119. end
  120. test '#authenticate without a password should return nil' do
  121. auth = AuthSourceLdap.find(1)
  122. assert_nil auth.authenticate('edavis','')
  123. end
  124. test '#authenticate without filter should return any user' do
  125. auth = AuthSourceLdap.find(1)
  126. assert auth.authenticate('example1','123456')
  127. assert auth.authenticate('edavis', '123456')
  128. end
  129. test '#authenticate with filter should return user who matches the filter only' do
  130. auth = AuthSourceLdap.find(1)
  131. auth.filter = "(mail=*@redmine.org)"
  132. assert auth.authenticate('example1','123456')
  133. assert_nil auth.authenticate('edavis', '123456')
  134. end
  135. def test_authenticate_should_timeout
  136. auth_source = AuthSourceLdap.find(1)
  137. auth_source.timeout = 1
  138. def auth_source.initialize_ldap_con(*args); sleep(5); end
  139. assert_raise AuthSourceTimeoutException do
  140. auth_source.authenticate 'example1', '123456'
  141. end
  142. end
  143. def test_search_should_return_matching_entries
  144. results = AuthSource.search("exa")
  145. assert_equal 1, results.size
  146. result = results.first
  147. assert_kind_of Hash, result
  148. assert_equal "example1", result[:login]
  149. assert_equal "Example", result[:firstname]
  150. assert_equal "One", result[:lastname]
  151. assert_equal "example1@redmine.org", result[:mail]
  152. assert_equal 1, result[:auth_source_id]
  153. end
  154. def test_search_with_no_match_should_return_an_empty_array
  155. results = AuthSource.search("wro")
  156. assert_equal [], results
  157. end
  158. def test_search_with_exception_should_return_an_empty_array
  159. Net::LDAP.stubs(:new).raises(Net::LDAP::Error, 'Cannot connect')
  160. results = AuthSource.search("exa")
  161. assert_equal [], results
  162. end
  163. def test_test_connection_with_correct_host_and_port
  164. auth_source = AuthSourceLdap.find(1)
  165. assert_nothing_raised do
  166. auth_source.test_connection
  167. end
  168. end
  169. def test_test_connection_with_incorrect_host
  170. auth_source = AuthSourceLdap.find(1)
  171. auth_source.host = "badhost"
  172. auth_source.save!
  173. assert_raise AuthSourceException do
  174. auth_source.test_connection
  175. end
  176. end
  177. def test_test_connection_with_incorrect_port
  178. auth_source = AuthSourceLdap.find(1)
  179. auth_source.port = 1234
  180. auth_source.save!
  181. assert_raise AuthSourceException do
  182. auth_source.test_connection
  183. end
  184. end
  185. def test_test_connection_bind_with_account_and_password
  186. auth_source = AuthSourceLdap.find(1)
  187. auth_source.account = "cn=admin,dc=redmine,dc=org"
  188. auth_source.account_password = "secret"
  189. auth_source.save!
  190. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  191. assert_equal "secret", auth_source.account_password
  192. assert_nil auth_source.test_connection
  193. end
  194. def test_test_connection_bind_without_account_and_password
  195. auth_source = AuthSourceLdap.find(1)
  196. assert_nil auth_source.account
  197. assert_equal "", auth_source.account_password
  198. assert_nil auth_source.test_connection
  199. end
  200. def test_test_connection_bind_with_incorrect_account
  201. auth_source = AuthSourceLdap.find(1)
  202. auth_source.account = "cn=baduser,dc=redmine,dc=org"
  203. auth_source.account_password = "secret"
  204. auth_source.save!
  205. assert_equal "cn=baduser,dc=redmine,dc=org", auth_source.account
  206. assert_equal "secret", auth_source.account_password
  207. assert_raise AuthSourceException do
  208. auth_source.test_connection
  209. end
  210. end
  211. def test_test_connection_bind_with_incorrect_password
  212. auth_source = AuthSourceLdap.find(1)
  213. auth_source.account = "cn=admin,dc=redmine,dc=org"
  214. auth_source.account_password = "badpassword"
  215. auth_source.save!
  216. assert_equal "cn=admin,dc=redmine,dc=org", auth_source.account
  217. assert_equal "badpassword", auth_source.account_password
  218. assert_raise AuthSourceException do
  219. auth_source.test_connection
  220. end
  221. end
  222. else
  223. puts '(Test LDAP server not configured)'
  224. end
  225. end