|
@@ -0,0 +1,130 @@
|
|
|
+/* Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
|
|
|
+ *
|
|
|
+ * Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+ * you may not use this file except in compliance with the License.
|
|
|
+ * You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+
|
|
|
+package org.acegisecurity.ldap.ppolicy;
|
|
|
+
|
|
|
+import junit.framework.TestCase;
|
|
|
+
|
|
|
+import javax.naming.Context;
|
|
|
+import javax.naming.NamingException;
|
|
|
+import javax.naming.ldap.InitialLdapContext;
|
|
|
+import javax.naming.ldap.Control;
|
|
|
+import java.util.Hashtable;
|
|
|
+
|
|
|
+import org.acegisecurity.ldap.ppolicy.OracleIDPasswordPolicyControl;
|
|
|
+import org.acegisecurity.ldap.ppolicy.PasswordPolicyResponseControl;
|
|
|
+
|
|
|
+
|
|
|
+/**
|
|
|
+ * Tests for <tt>PasswordPolicyResponse</tt>.
|
|
|
+ *
|
|
|
+ * @author Luke Taylor
|
|
|
+ * @version $Id: PasswordPolicyResponseControlTests.java 1496 2006-05-23 13:38:33Z benalex $
|
|
|
+ */
|
|
|
+public class PasswordPolicyResponseControlTests extends TestCase {
|
|
|
+ //~ Methods ========================================================================================================
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Useful method for obtaining data from a server for use in tests
|
|
|
+ */
|
|
|
+// public void testAgainstServer() throws Exception {
|
|
|
+// Hashtable env = new Hashtable();
|
|
|
+// env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
|
|
|
+// env.put(Context.PROVIDER_URL, "ldap://myip/");
|
|
|
+// env.put(Context.SECURITY_AUTHENTICATION, "simple");
|
|
|
+// env.put(Context.SECURITY_PRINCIPAL, "cn=orcladmin,cn=Users");
|
|
|
+// env.put(Context.SECURITY_CREDENTIALS, "password");
|
|
|
+//
|
|
|
+// InitialLdapContext ctx = new InitialLdapContext(env, null);
|
|
|
+//
|
|
|
+// Control[] rctls = { new OracleIDPasswordPolicyControl()};
|
|
|
+//
|
|
|
+// try {
|
|
|
+//// ctx.addToEnvironment(LdapContext.CONTROL_FACTORIES, PasswordPolicyControlFactory.class.getName());
|
|
|
+// ctx.addToEnvironment(Context.SECURITY_PRINCIPAL, "cn=jerrymouse,cn=Users" );
|
|
|
+// ctx.addToEnvironment(Context.SECURITY_CREDENTIALS, "wheresthecheese");
|
|
|
+// ctx.reconnect(rctls);
|
|
|
+// } catch(NamingException ne) {
|
|
|
+// ne.printStackTrace();
|
|
|
+// // Ok.
|
|
|
+// }
|
|
|
+//
|
|
|
+// Control[] controls = ctx.getResponseControls();
|
|
|
+//
|
|
|
+// PasswordPolicyResponseControl ctrl = getPPolicyResponseCtl(ctx);
|
|
|
+// System.out.println(ctrl);
|
|
|
+//
|
|
|
+// assertNotNull(ctrl);
|
|
|
+//
|
|
|
+// //com.sun.jndi.ldap.LdapPoolManager.showStats(System.out);
|
|
|
+// }
|
|
|
+
|
|
|
+ private PasswordPolicyResponseControl getPPolicyResponseCtl(InitialLdapContext ctx) throws NamingException {
|
|
|
+ Control[] ctrls = ctx.getResponseControls();
|
|
|
+
|
|
|
+ for (int i = 0; ctrls != null && i < ctrls.length; i++) {
|
|
|
+ if (ctrls[i] instanceof PasswordPolicyResponseControl) {
|
|
|
+ return (PasswordPolicyResponseControl) ctrls[i];
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ return null;
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testOpenLDAP33SecondsTillPasswordExpiryCtrlIsParsedCorrectly() {
|
|
|
+ byte[] ctrlBytes = {0x30, 0x05, (byte) 0xA0, 0x03, (byte) 0xA0, 0x1, 0x21};
|
|
|
+
|
|
|
+ PasswordPolicyResponseControl ctrl = new PasswordPolicyResponseControl(ctrlBytes);
|
|
|
+
|
|
|
+ assertTrue(ctrl.hasWarning());
|
|
|
+ assertEquals(33, ctrl.getTimeBeforeExpiration());
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testOpenLDAP496GraceLoginsRemainingCtrlIsParsedCorrectly() {
|
|
|
+ byte[] ctrlBytes = {0x30, 0x06, (byte) 0xA0, 0x04, (byte) 0xA1, 0x02, 0x01, (byte) 0xF0};
|
|
|
+
|
|
|
+ PasswordPolicyResponseControl ctrl = new PasswordPolicyResponseControl(ctrlBytes);
|
|
|
+
|
|
|
+ assertTrue(ctrl.hasWarning());
|
|
|
+ assertEquals(496, ctrl.getGraceLoginsRemaining());
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testOpenLDAP5GraceLoginsRemainingCtrlIsParsedCorrectly() {
|
|
|
+ byte[] ctrlBytes = {0x30, 0x05, (byte) 0xA0, 0x03, (byte) 0xA1, 0x01, 0x05};
|
|
|
+
|
|
|
+ PasswordPolicyResponseControl ctrl = new PasswordPolicyResponseControl(ctrlBytes);
|
|
|
+
|
|
|
+ assertTrue(ctrl.hasWarning());
|
|
|
+ assertEquals(5, ctrl.getGraceLoginsRemaining());
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testOpenLDAPAccountLockedCtrlIsParsedCorrectly() {
|
|
|
+ byte[] ctrlBytes = {0x30, 0x03, (byte) 0xA1, 0x01, 0x01};
|
|
|
+
|
|
|
+ PasswordPolicyResponseControl ctrl = new PasswordPolicyResponseControl(ctrlBytes);
|
|
|
+
|
|
|
+ assertTrue(ctrl.hasError() && ctrl.isLocked());
|
|
|
+ assertFalse(ctrl.hasWarning());
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testOpenLDAPPasswordExpiredCtrlIsParsedCorrectly() {
|
|
|
+ byte[] ctrlBytes = {0x30, 0x03, (byte) 0xA1, 0x01, 0x00};
|
|
|
+
|
|
|
+ PasswordPolicyResponseControl ctrl = new PasswordPolicyResponseControl(ctrlBytes);
|
|
|
+
|
|
|
+ assertTrue(ctrl.hasError() && ctrl.isExpired());
|
|
|
+ assertFalse(ctrl.hasWarning());
|
|
|
+ }
|
|
|
+}
|