2019-04-25 04:52:08 +07:00
package validator
import (
"testing"
"github.com/stretchr/testify/assert"
2019-12-06 15:15:54 +07:00
"github.com/stretchr/testify/require"
2019-04-25 04:52:08 +07:00
"github.com/stretchr/testify/suite"
2020-04-05 19:37:21 +07:00
"github.com/authelia/authelia/internal/configuration/schema"
2019-04-25 04:52:08 +07:00
)
func TestShouldRaiseErrorsWhenNoBackendProvided ( t * testing . T ) {
validator := schema . NewStructValidator ( )
backendConfig := schema . AuthenticationBackendConfiguration { }
ValidateAuthenticationBackend ( & backendConfig , validator )
2020-11-27 16:59:22 +07:00
require . Len ( t , validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( t , validator . Errors ( ) [ 0 ] , "Please provide `ldap` or `file` object in `authentication_backend`" )
}
type FileBasedAuthenticationBackend struct {
suite . Suite
configuration schema . AuthenticationBackendConfiguration
validator * schema . StructValidator
}
func ( suite * FileBasedAuthenticationBackend ) SetupTest ( ) {
suite . validator = schema . NewStructValidator ( )
suite . configuration = schema . AuthenticationBackendConfiguration { }
2020-04-11 10:54:18 +07:00
suite . configuration . File = & schema . FileAuthenticationBackendConfiguration { Path : "/a/path" , Password : & schema . PasswordConfiguration {
Algorithm : schema . DefaultPasswordConfiguration . Algorithm ,
Iterations : schema . DefaultPasswordConfiguration . Iterations ,
Parallelism : schema . DefaultPasswordConfiguration . Parallelism ,
Memory : schema . DefaultPasswordConfiguration . Memory ,
KeyLength : schema . DefaultPasswordConfiguration . KeyLength ,
SaltLength : schema . DefaultPasswordConfiguration . SaltLength ,
2020-03-06 08:38:02 +07:00
} }
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Algorithm = schema . DefaultPasswordConfiguration . Algorithm
2019-04-25 04:52:08 +07:00
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldValidateCompleteConfiguration ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenNoPathProvided ( ) {
suite . configuration . File . Path = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a `path` for the users database in `authentication_backend`" )
}
2020-03-06 08:38:02 +07:00
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenMemoryNotMoreThanEightTimesParallelism ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Memory = 8
suite . configuration . File . Password . Parallelism = 2
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Memory for argon2id must be 16 or more (parallelism * 8), you configured memory as 8 and parallelism as 2" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldSetDefaultConfigurationWhenBlank ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password = & schema . PasswordConfiguration { }
2020-03-06 08:38:02 +07:00
2020-04-11 10:54:18 +07:00
assert . Equal ( suite . T ( ) , 0 , suite . configuration . File . Password . KeyLength )
assert . Equal ( suite . T ( ) , 0 , suite . configuration . File . Password . Iterations )
assert . Equal ( suite . T ( ) , 0 , suite . configuration . File . Password . SaltLength )
assert . Equal ( suite . T ( ) , "" , suite . configuration . File . Password . Algorithm )
assert . Equal ( suite . T ( ) , 0 , suite . configuration . File . Password . Memory )
assert . Equal ( suite . T ( ) , 0 , suite . configuration . File . Password . Parallelism )
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2020-04-11 10:54:18 +07:00
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . KeyLength , suite . configuration . File . Password . KeyLength )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Iterations , suite . configuration . File . Password . Iterations )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . SaltLength , suite . configuration . File . Password . SaltLength )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Algorithm , suite . configuration . File . Password . Algorithm )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Memory , suite . configuration . File . Password . Memory )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Parallelism , suite . configuration . File . Password . Parallelism )
2020-03-06 08:38:02 +07:00
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldSetDefaultConfigurationWhenOnlySHA512Set ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password = & schema . PasswordConfiguration { }
assert . Equal ( suite . T ( ) , "" , suite . configuration . File . Password . Algorithm )
suite . configuration . File . Password . Algorithm = "sha512"
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2020-04-11 10:54:18 +07:00
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . KeyLength , suite . configuration . File . Password . KeyLength )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . Iterations , suite . configuration . File . Password . Iterations )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . SaltLength , suite . configuration . File . Password . SaltLength )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . Algorithm , suite . configuration . File . Password . Algorithm )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . Memory , suite . configuration . File . Password . Memory )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordSHA512Configuration . Parallelism , suite . configuration . File . Password . Parallelism )
2020-03-06 08:38:02 +07:00
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenKeyLengthTooLow ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . KeyLength = 1
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Key length for argon2id must be 16, you configured 1" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenSaltLengthTooLow ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . SaltLength = - 1
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "The salt length must be 2 or more, you configured -1" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenBadAlgorithmDefined ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Algorithm = "bogus"
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Unknown hashing algorithm supplied, valid values are argon2id and sha512, you configured 'bogus'" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenIterationsTooLow ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Iterations = - 1
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "The number of iterations specified is invalid, must be 1 or more, you configured -1" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldRaiseErrorWhenParallelismTooLow ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Parallelism = - 1
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-06 08:38:02 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Parallelism for argon2id must be 1 or more, you configured -1" )
}
func ( suite * FileBasedAuthenticationBackend ) TestShouldSetDefaultValues ( ) {
2020-04-11 10:54:18 +07:00
suite . configuration . File . Password . Algorithm = ""
suite . configuration . File . Password . Iterations = 0
suite . configuration . File . Password . SaltLength = 0
suite . configuration . File . Password . Memory = 0
suite . configuration . File . Password . Parallelism = 0
2020-03-06 08:38:02 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2020-04-11 10:54:18 +07:00
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Algorithm , suite . configuration . File . Password . Algorithm )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Iterations , suite . configuration . File . Password . Iterations )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . SaltLength , suite . configuration . File . Password . SaltLength )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Memory , suite . configuration . File . Password . Memory )
assert . Equal ( suite . T ( ) , schema . DefaultPasswordConfiguration . Parallelism , suite . configuration . File . Password . Parallelism )
2020-03-06 08:38:02 +07:00
}
2019-04-25 04:52:08 +07:00
func TestFileBasedAuthenticationBackend ( t * testing . T ) {
suite . Run ( t , new ( FileBasedAuthenticationBackend ) )
}
type LdapAuthenticationBackendSuite struct {
suite . Suite
configuration schema . AuthenticationBackendConfiguration
validator * schema . StructValidator
}
func ( suite * LdapAuthenticationBackendSuite ) SetupTest ( ) {
suite . validator = schema . NewStructValidator ( )
suite . configuration = schema . AuthenticationBackendConfiguration { }
suite . configuration . Ldap = & schema . LDAPAuthenticationBackendConfiguration { }
2020-11-27 16:59:22 +07:00
suite . configuration . Ldap . Implementation = schema . LDAPImplementationCustom
2019-04-25 04:52:08 +07:00
suite . configuration . Ldap . URL = "ldap://ldap"
suite . configuration . Ldap . User = "user"
suite . configuration . Ldap . Password = "password"
suite . configuration . Ldap . BaseDN = "base_dn"
2020-03-15 14:10:25 +07:00
suite . configuration . Ldap . UsernameAttribute = "uid"
2020-03-31 05:36:04 +07:00
suite . configuration . Ldap . UsersFilter = "(uid={input})"
suite . configuration . Ldap . GroupsFilter = "(cn={input})"
2019-04-25 04:52:08 +07:00
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldValidateCompleteConfiguration ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
}
2020-11-27 16:59:22 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseErrorWhenImplementationIsInvalidMSAD ( ) {
suite . configuration . Ldap . Implementation = "masd"
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "authentication backend ldap implementation must be blank or one of the following values `custom`, `activedirectory`" )
}
2019-04-25 04:52:08 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseErrorWhenURLNotProvided ( ) {
suite . configuration . Ldap . URL = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a URL to the LDAP server" )
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseErrorWhenUserNotProvided ( ) {
suite . configuration . Ldap . User = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a user name to connect to the LDAP server" )
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseErrorWhenPasswordNotProvided ( ) {
suite . configuration . Ldap . Password = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a password to connect to the LDAP server" )
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseErrorWhenBaseDNNotProvided ( ) {
suite . configuration . Ldap . BaseDN = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2019-04-25 04:52:08 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a base DN to connect to the LDAP server" )
}
2020-03-15 19:10:13 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseOnEmptyGroupsFilter ( ) {
2020-03-15 14:10:25 +07:00
suite . configuration . Ldap . GroupsFilter = ""
2019-04-25 04:52:08 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-03-15 19:10:13 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a groups filter with `groups_filter` attribute" )
}
2020-03-31 05:36:04 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseOnEmptyUsersFilter ( ) {
2020-03-15 19:10:13 +07:00
suite . configuration . Ldap . UsersFilter = ""
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-03-31 05:36:04 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Please provide a users filter with `users_filter` attribute" )
2019-04-25 04:52:08 +07:00
}
2020-11-27 16:59:22 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldNotRaiseOnEmptyUsernameAttribute ( ) {
2020-03-15 14:10:25 +07:00
suite . configuration . Ldap . UsernameAttribute = ""
2019-04-25 04:52:08 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2019-04-25 04:52:08 +07:00
}
2020-05-05 02:39:25 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseOnBadRefreshInterval ( ) {
suite . configuration . RefreshInterval = "blah"
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Auth Backend `refresh_interval` is configured to 'blah' but it must be either a duration notation or one of 'disable', or 'always'. Error from parser: Could not convert the input string of blah into a duration" )
}
2020-11-27 16:59:22 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldSetDefaultImplementation ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
assert . Equal ( suite . T ( ) , schema . LDAPImplementationCustom , suite . configuration . Ldap . Implementation )
}
2019-04-25 04:52:08 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldSetDefaultGroupNameAttribute ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
assert . Equal ( suite . T ( ) , "cn" , suite . configuration . Ldap . GroupNameAttribute )
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldSetDefaultMailAttribute ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2019-04-25 04:52:08 +07:00
assert . Equal ( suite . T ( ) , "mail" , suite . configuration . Ldap . MailAttribute )
}
2020-11-27 16:59:22 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldSetDefaultDisplayNameAttribute ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
assert . Equal ( suite . T ( ) , "displayname" , suite . configuration . Ldap . DisplayNameAttribute )
}
2020-05-05 02:39:25 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldSetDefaultRefreshInterval ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
2020-05-05 02:39:25 +07:00
assert . Equal ( suite . T ( ) , "5m" , suite . configuration . RefreshInterval )
}
2019-12-09 05:21:55 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseWhenUsersFilterDoesNotContainEnclosingParenthesis ( ) {
2020-03-31 05:36:04 +07:00
suite . configuration . Ldap . UsersFilter = "uid={input}"
2019-12-09 05:21:55 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-31 05:36:04 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "The users filter should contain enclosing parenthesis. For instance uid={input} should be (uid={input})" )
2019-12-09 05:21:55 +07:00
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldRaiseWhenGroupsFilterDoesNotContainEnclosingParenthesis ( ) {
2020-03-31 05:36:04 +07:00
suite . configuration . Ldap . GroupsFilter = "cn={input}"
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-31 05:36:04 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "The groups filter should contain enclosing parenthesis. For instance cn={input} should be (cn={input})" )
}
func ( suite * LdapAuthenticationBackendSuite ) TestShouldHelpDetectNoInputPlaceholder ( ) {
suite . configuration . Ldap . UsersFilter = "(objectClass=person)"
2019-12-09 05:21:55 +07:00
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
2020-11-27 16:59:22 +07:00
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
2020-03-31 05:36:04 +07:00
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Unable to detect {input} placeholder in users_filter, your configuration might be broken. Please review configuration options listed at https://docs.authelia.com/configuration/authentication/ldap.html" )
2019-12-09 05:21:55 +07:00
}
2019-12-06 15:15:54 +07:00
func ( suite * LdapAuthenticationBackendSuite ) TestShouldAdaptLDAPURL ( ) {
assert . Equal ( suite . T ( ) , "" , validateLdapURL ( "127.0.0.1" , suite . validator ) )
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 1 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 0 ] , "Unknown scheme for ldap url, should be ldap:// or ldaps://" )
assert . Equal ( suite . T ( ) , "" , validateLdapURL ( "127.0.0.1:636" , suite . validator ) )
require . Len ( suite . T ( ) , suite . validator . Errors ( ) , 2 )
assert . EqualError ( suite . T ( ) , suite . validator . Errors ( ) [ 1 ] , "Unable to parse URL to ldap server. The scheme is probably missing: ldap:// or ldaps://" )
assert . Equal ( suite . T ( ) , "ldap://127.0.0.1:389" , validateLdapURL ( "ldap://127.0.0.1" , suite . validator ) )
assert . Equal ( suite . T ( ) , "ldap://127.0.0.1:390" , validateLdapURL ( "ldap://127.0.0.1:390" , suite . validator ) )
assert . Equal ( suite . T ( ) , "ldap://127.0.0.1:389/abc" , validateLdapURL ( "ldap://127.0.0.1/abc" , suite . validator ) )
assert . Equal ( suite . T ( ) , "ldap://127.0.0.1:389/abc?test=abc&x=y" , validateLdapURL ( "ldap://127.0.0.1/abc?test=abc&x=y" , suite . validator ) )
assert . Equal ( suite . T ( ) , "ldaps://127.0.0.1:390" , validateLdapURL ( "ldaps://127.0.0.1:390" , suite . validator ) )
assert . Equal ( suite . T ( ) , "ldaps://127.0.0.1:636" , validateLdapURL ( "ldaps://127.0.0.1" , suite . validator ) )
}
2019-04-25 04:52:08 +07:00
func TestLdapAuthenticationBackend ( t * testing . T ) {
suite . Run ( t , new ( LdapAuthenticationBackendSuite ) )
}
2020-11-27 16:59:22 +07:00
type ActiveDirectoryAuthenticationBackendSuite struct {
suite . Suite
configuration schema . AuthenticationBackendConfiguration
validator * schema . StructValidator
}
func ( suite * ActiveDirectoryAuthenticationBackendSuite ) SetupTest ( ) {
suite . validator = schema . NewStructValidator ( )
suite . configuration = schema . AuthenticationBackendConfiguration { }
suite . configuration . Ldap = & schema . LDAPAuthenticationBackendConfiguration { }
suite . configuration . Ldap . Implementation = schema . LDAPImplementationActiveDirectory
suite . configuration . Ldap . URL = "ldap://ldap"
suite . configuration . Ldap . User = "user"
suite . configuration . Ldap . Password = "password"
suite . configuration . Ldap . BaseDN = "base_dn"
}
func ( suite * ActiveDirectoryAuthenticationBackendSuite ) TestShouldSetActiveDirectoryDefaults ( ) {
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . Len ( suite . T ( ) , suite . validator . Errors ( ) , 0 )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . UsersFilter ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . UsersFilter )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . UsernameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . UsernameAttribute )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . DisplayNameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . DisplayNameAttribute )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . MailAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . MailAttribute )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . GroupsFilter ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . GroupsFilter )
assert . Equal ( suite . T ( ) ,
suite . configuration . Ldap . GroupNameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . GroupNameAttribute )
}
func ( suite * ActiveDirectoryAuthenticationBackendSuite ) TestShouldOnlySetDefaultsIfNotManuallyConfigured ( ) {
suite . configuration . Ldap . UsersFilter = "(&({username_attribute}={input})(objectCategory=person)(objectClass=user)(!userAccountControl:1.2.840.113556.1.4.803:=2))"
suite . configuration . Ldap . UsernameAttribute = "cn"
suite . configuration . Ldap . MailAttribute = "userPrincipalName"
suite . configuration . Ldap . DisplayNameAttribute = "name"
suite . configuration . Ldap . GroupsFilter = "(&(member={dn})(objectClass=group)(objectCategory=group))"
suite . configuration . Ldap . GroupNameAttribute = "distinguishedName"
ValidateAuthenticationBackend ( & suite . configuration , suite . validator )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . UsersFilter ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . UsersFilter )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . UsernameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . UsernameAttribute )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . DisplayNameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . DisplayNameAttribute )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . MailAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . MailAttribute )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . GroupsFilter ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . GroupsFilter )
assert . NotEqual ( suite . T ( ) ,
suite . configuration . Ldap . GroupNameAttribute ,
schema . DefaultLDAPAuthenticationBackendImplementationActiveDirectoryConfiguration . GroupNameAttribute )
}
func TestActiveDirectoryAuthenticationBackend ( t * testing . T ) {
suite . Run ( t , new ( ActiveDirectoryAuthenticationBackendSuite ) )
}