ソースを参照

Renamed, and refactored version of the LdapPasswordAuthenticationTest which works with the newest 'stable' verion of the LdapPasswordAuthenticationDao.

Robert Sanders 20 年 前
コミット
1f46005dad

+ 132 - 0
sandbox/src/test/java/org/acegisecurity/providers/dao/ldap/LdapPasswordAuthenticationDaoTests.java

@@ -0,0 +1,132 @@
+/* Copyright 2004, 2005 Acegi Technology Pty Limited
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package net.sf.acegisecurity.providers.dao.ldap;
+
+import net.sf.acegisecurity.BadCredentialsException;
+import net.sf.acegisecurity.UserDetails;
+import net.sf.acegisecurity.providers.dao.ldap.support.BaseLdapTestCase;
+
+import javax.naming.NamingException;
+
+
+/**
+ * Set of JUnit tests for the LdapPasswordAuthenticationDao.
+ *
+ * @author $author$
+ * @version $Revision$
+ */
+public class LdapPasswordAuthenticationDaoTests extends BaseLdapTestCase {
+
+    private LdapPasswordAuthenticationDao dao;
+    private String DEFAULT_ROLE = "DEFAULT_ROLE";
+    
+    public static void main(String[] args) {
+    	LdapPasswordAuthenticationDaoTests ats = new LdapPasswordAuthenticationDaoTests();
+    	ats.setUp();
+    	try {
+    		ats.testSimpleUidUser();
+    	} catch (Throwable t) {
+    	    t.printStackTrace();
+    	} finally {
+    		System.exit(0);
+    	}
+    }
+
+    
+    /** Check to see that a user with no roles can not login 
+     *  (this is the correct behavior the last time I checked the Acegi Docs).
+     *
+     */
+    public void testEmptyRoles() {
+        dao.setUsernameFormat("uid={0},ou=users,ou=system");
+
+        try {
+            UserDetails userDetails = dao.loadUserByUsernameAndPassword("user.two",
+                    "plaintext2");
+            fail("No roles are accessible for user; this test _should_ fail.");
+        } catch (BadCredentialsException ex) {
+            assertTrue("No roles are accessible for user; this test _should_ fail.",
+                ex.getMessage().startsWith(LdapPasswordAuthenticationDao.BAD_CREDENTIALS_EXCEPTION_MESSAGE));
+        }
+    }
+
+    /** Test that the user who is identified by 
+     * Common Name (cn=..) can be authenticated. */
+    public void testSimpleCnUser() throws NamingException {
+        dao.setUsernameFormat("cn={0},ou=users,ou=system");
+        dao.setUserLookupNameFormat("cn={0},ou=users");
+        dao.setDefaultRole(DEFAULT_ROLE);
+
+        try {
+            UserDetails userDetails = dao.loadUserByUsernameAndPassword("User Two",
+                    "plaintext2");
+            assertEquals(1, userDetails.getAuthorities().length);
+            assertEquals(DEFAULT_ROLE,
+                userDetails.getAuthorities()[0].getAuthority());
+        } catch (BadCredentialsException ex) {
+            fail();
+        }
+    }
+
+    /** Test that the user who is identified by 
+     * UID (uid=..) can be authenticated. */
+    public void testSimpleUidUser() throws NamingException {
+        dao.setUsernameFormat("uid={0},ou=users,ou=system");
+        dao.setUserLookupNameFormat("uid={0},ou=users");
+        dao.setDefaultRole(DEFAULT_ROLE);
+
+        try {
+        	System.out.println("Attempting user auth.");
+        	
+            UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user",
+                    "plaintext");
+            
+            //System.out.println( "UserDetails = " + userDetails );
+            
+            assertEquals(1, userDetails.getAuthorities().length);
+            assertEquals(DEFAULT_ROLE,
+                userDetails.getAuthorities()[0].getAuthority());
+        } catch (BadCredentialsException ex) {
+        	System.out.println("Unable to authenticate user.");
+        	ex.printStackTrace();
+            fail();
+        }
+    }
+
+    /** Test that a login w/ a bad password fails. */
+    public void testSimpleUidUserBadPassword() throws NamingException {
+        dao.setUsernameFormat("uid={0},ou=users,ou=system");
+        dao.setUserLookupNameFormat("uid={0},ou=users");
+        dao.setDefaultRole(DEFAULT_ROLE);
+
+        try {
+            UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user",
+                    "plainlywrong");
+            fail();
+        } catch (BadCredentialsException ex) {
+            assertTrue(true);
+        }
+    } 
+
+    /**
+     * Setup the basic properties of our LdapPasswordAuthenticationDao
+     */
+    protected void setUp() {
+        dao = new LdapPasswordAuthenticationDao();
+        dao.setUrl("ldap://localhost:389/ou=system");
+    }
+
+}