1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
/*
* SonarQube
* Copyright (C) 2009-2025 SonarSource SA
* mailto:info AT sonarsource DOT com
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
package org.sonar.auth.ldap;
import java.io.File;
import org.junit.Before;
import org.junit.ClassRule;
import org.junit.Test;
import org.mockito.Mockito;
import org.sonar.api.config.Configuration;
import org.sonar.api.config.internal.MapSettings;
import org.sonar.api.server.http.HttpRequest;
import org.sonar.auth.ldap.server.LdapServer;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.sonar.process.ProcessProperties.Property.SONAR_SECURITY_REALM;
/**
* Kerby's implementation of Kerberos requires to set following attributes:
*
* krb5AccountExpirationTime: 20300101000000Z
* krb5AccountDisabled: FALSE
* krb5KDCFlags: 126
* krb5AccountLockedOut: FALSE
*
* In case failure of expiration time is reported updated following attribute:
* krb5AccountExpirationTime: 20300101000000Z
*/
public class KerberosIT {
static {
System.setProperty("java.security.krb5.conf", new File("target/krb5.conf").getAbsolutePath());
}
@ClassRule
public static LdapServer server = new LdapServer("/krb.ldif");
LdapAuthenticator authenticator;
LdapRealm ldapRealm;
@Before
public void before() {
MapSettings settings = configure();
ldapRealm = new LdapRealm(new LdapSettingsManager(settings.asConfig()), settings.asConfig());
authenticator = ldapRealm.getAuthenticator();
}
@Test
public void test_wrong_password() {
LdapAuthenticator.Context wrongPasswordContext = new LdapAuthenticator.Context("Godin@EXAMPLE.ORG", "wrong_user_password", Mockito.mock(HttpRequest.class));
assertThat(authenticator.doAuthenticate(wrongPasswordContext).isSuccess()).isFalse();
}
@Test
public void test_correct_password() {
LdapAuthenticator.Context correctPasswordContext = new LdapAuthenticator.Context("Godin@EXAMPLE.ORG", "user_password", Mockito.mock(HttpRequest.class));
assertThat(authenticator.doAuthenticate(correctPasswordContext).isSuccess()).isTrue();
}
@Test
public void test_default_realm() {
// Using default realm from krb5.conf:
LdapAuthenticator.Context defaultRealmContext = new LdapAuthenticator.Context("Godin", "user_password", Mockito.mock(HttpRequest.class));
assertThat(authenticator.doAuthenticate(defaultRealmContext).isSuccess()).isTrue();
}
@Test
public void test_groups() {
LdapGroupsProvider groupsProvider = ldapRealm.getGroupsProvider();
LdapGroupsProvider.Context groupsContext = new LdapGroupsProvider.Context("default", "godin", Mockito.mock(HttpRequest.class));
assertThat(groupsProvider.doGetGroups(groupsContext))
.containsOnly("sonar-users");
}
@Test
public void wrong_bind_password() {
MapSettings settings = configure()
.setProperty("ldap.bindPassword", "wrong_bind_password");
Configuration config = settings.asConfig();
LdapSettingsManager settingsManager = new LdapSettingsManager(config);
assertThatThrownBy(() -> new LdapRealm(settingsManager, config))
.isInstanceOf(LdapException.class)
.hasMessage("LDAP realm failed to start: Unable to open LDAP connection");
}
private static MapSettings configure() {
return new MapSettings()
.setProperty("ldap.url", server.getUrl())
.setProperty("ldap.authentication", LdapContextFactory.AUTH_METHOD_GSSAPI)
.setProperty("ldap.bindDn", "SonarQube@EXAMPLE.ORG")
.setProperty("ldap.bindPassword", "bind_password")
.setProperty("ldap.user.baseDn", "ou=users,dc=example,dc=org")
.setProperty("ldap.group.baseDn", "ou=groups,dc=example,dc=org")
.setProperty("ldap.group.request", "(&(objectClass=groupOfUniqueNames)(uniqueMember={dn}))")
.setProperty(SONAR_SECURITY_REALM.getKey(), LdapRealm.LDAP_SECURITY_REALM);
}
}
|