1 changed files with 132 additions and 0 deletions
@ -0,0 +1,132 @@
@@ -0,0 +1,132 @@
|
||||
/* Copyright 2004, 2005 Acegi Technology Pty Limited |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package net.sf.acegisecurity.providers.dao.ldap; |
||||
|
||||
import net.sf.acegisecurity.BadCredentialsException; |
||||
import net.sf.acegisecurity.UserDetails; |
||||
import net.sf.acegisecurity.providers.dao.ldap.support.BaseLdapTestCase; |
||||
|
||||
import javax.naming.NamingException; |
||||
|
||||
|
||||
/** |
||||
* Set of JUnit tests for the LdapPasswordAuthenticationDao. |
||||
* |
||||
* @author $author$ |
||||
* @version $Revision$ |
||||
*/ |
||||
public class LdapPasswordAuthenticationDaoTests extends BaseLdapTestCase { |
||||
|
||||
private LdapPasswordAuthenticationDao dao; |
||||
private String DEFAULT_ROLE = "DEFAULT_ROLE"; |
||||
|
||||
public static void main(String[] args) { |
||||
LdapPasswordAuthenticationDaoTests ats = new LdapPasswordAuthenticationDaoTests(); |
||||
ats.setUp(); |
||||
try { |
||||
ats.testSimpleUidUser(); |
||||
} catch (Throwable t) { |
||||
t.printStackTrace(); |
||||
} finally { |
||||
System.exit(0); |
||||
} |
||||
} |
||||
|
||||
|
||||
/** Check to see that a user with no roles can not login |
||||
* (this is the correct behavior the last time I checked the Acegi Docs). |
||||
* |
||||
*/ |
||||
public void testEmptyRoles() { |
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system"); |
||||
|
||||
try { |
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("user.two", |
||||
"plaintext2"); |
||||
fail("No roles are accessible for user; this test _should_ fail."); |
||||
} catch (BadCredentialsException ex) { |
||||
assertTrue("No roles are accessible for user; this test _should_ fail.", |
||||
ex.getMessage().startsWith(LdapPasswordAuthenticationDao.BAD_CREDENTIALS_EXCEPTION_MESSAGE)); |
||||
} |
||||
} |
||||
|
||||
/** Test that the user who is identified by |
||||
* Common Name (cn=..) can be authenticated. */ |
||||
public void testSimpleCnUser() throws NamingException { |
||||
dao.setUsernameFormat("cn={0},ou=users,ou=system"); |
||||
dao.setUserLookupNameFormat("cn={0},ou=users"); |
||||
dao.setDefaultRole(DEFAULT_ROLE); |
||||
|
||||
try { |
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("User Two", |
||||
"plaintext2"); |
||||
assertEquals(1, userDetails.getAuthorities().length); |
||||
assertEquals(DEFAULT_ROLE, |
||||
userDetails.getAuthorities()[0].getAuthority()); |
||||
} catch (BadCredentialsException ex) { |
||||
fail(); |
||||
} |
||||
} |
||||
|
||||
/** Test that the user who is identified by |
||||
* UID (uid=..) can be authenticated. */ |
||||
public void testSimpleUidUser() throws NamingException { |
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system"); |
||||
dao.setUserLookupNameFormat("uid={0},ou=users"); |
||||
dao.setDefaultRole(DEFAULT_ROLE); |
||||
|
||||
try { |
||||
System.out.println("Attempting user auth."); |
||||
|
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user", |
||||
"plaintext"); |
||||
|
||||
//System.out.println( "UserDetails = " + userDetails );
|
||||
|
||||
assertEquals(1, userDetails.getAuthorities().length); |
||||
assertEquals(DEFAULT_ROLE, |
||||
userDetails.getAuthorities()[0].getAuthority()); |
||||
} catch (BadCredentialsException ex) { |
||||
System.out.println("Unable to authenticate user."); |
||||
ex.printStackTrace(); |
||||
fail(); |
||||
} |
||||
} |
||||
|
||||
/** Test that a login w/ a bad password fails. */ |
||||
public void testSimpleUidUserBadPassword() throws NamingException { |
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system"); |
||||
dao.setUserLookupNameFormat("uid={0},ou=users"); |
||||
dao.setDefaultRole(DEFAULT_ROLE); |
||||
|
||||
try { |
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user", |
||||
"plainlywrong"); |
||||
fail(); |
||||
} catch (BadCredentialsException ex) { |
||||
assertTrue(true); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Setup the basic properties of our LdapPasswordAuthenticationDao |
||||
*/ |
||||
protected void setUp() { |
||||
dao = new LdapPasswordAuthenticationDao(); |
||||
dao.setUrl("ldap://localhost:389/ou=system"); |
||||
} |
||||
|
||||
} |
||||
Loading…
Reference in new issue