Renamed, and refactored version of the LdapPasswordAuthenticationTest which works with the newest 'stable' verion of the LdapPasswordAuthenticationDao.
This commit is contained in:
parent
3762ba25e8
commit
1f46005dad
|
@ -0,0 +1,132 @@
|
|||
/* Copyright 2004, 2005 Acegi Technology Pty Limited
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package net.sf.acegisecurity.providers.dao.ldap;
|
||||
|
||||
import net.sf.acegisecurity.BadCredentialsException;
|
||||
import net.sf.acegisecurity.UserDetails;
|
||||
import net.sf.acegisecurity.providers.dao.ldap.support.BaseLdapTestCase;
|
||||
|
||||
import javax.naming.NamingException;
|
||||
|
||||
|
||||
/**
|
||||
* Set of JUnit tests for the LdapPasswordAuthenticationDao.
|
||||
*
|
||||
* @author $author$
|
||||
* @version $Revision$
|
||||
*/
|
||||
public class LdapPasswordAuthenticationDaoTests extends BaseLdapTestCase {
|
||||
|
||||
private LdapPasswordAuthenticationDao dao;
|
||||
private String DEFAULT_ROLE = "DEFAULT_ROLE";
|
||||
|
||||
public static void main(String[] args) {
|
||||
LdapPasswordAuthenticationDaoTests ats = new LdapPasswordAuthenticationDaoTests();
|
||||
ats.setUp();
|
||||
try {
|
||||
ats.testSimpleUidUser();
|
||||
} catch (Throwable t) {
|
||||
t.printStackTrace();
|
||||
} finally {
|
||||
System.exit(0);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/** Check to see that a user with no roles can not login
|
||||
* (this is the correct behavior the last time I checked the Acegi Docs).
|
||||
*
|
||||
*/
|
||||
public void testEmptyRoles() {
|
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system");
|
||||
|
||||
try {
|
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("user.two",
|
||||
"plaintext2");
|
||||
fail("No roles are accessible for user; this test _should_ fail.");
|
||||
} catch (BadCredentialsException ex) {
|
||||
assertTrue("No roles are accessible for user; this test _should_ fail.",
|
||||
ex.getMessage().startsWith(LdapPasswordAuthenticationDao.BAD_CREDENTIALS_EXCEPTION_MESSAGE));
|
||||
}
|
||||
}
|
||||
|
||||
/** Test that the user who is identified by
|
||||
* Common Name (cn=..) can be authenticated. */
|
||||
public void testSimpleCnUser() throws NamingException {
|
||||
dao.setUsernameFormat("cn={0},ou=users,ou=system");
|
||||
dao.setUserLookupNameFormat("cn={0},ou=users");
|
||||
dao.setDefaultRole(DEFAULT_ROLE);
|
||||
|
||||
try {
|
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("User Two",
|
||||
"plaintext2");
|
||||
assertEquals(1, userDetails.getAuthorities().length);
|
||||
assertEquals(DEFAULT_ROLE,
|
||||
userDetails.getAuthorities()[0].getAuthority());
|
||||
} catch (BadCredentialsException ex) {
|
||||
fail();
|
||||
}
|
||||
}
|
||||
|
||||
/** Test that the user who is identified by
|
||||
* UID (uid=..) can be authenticated. */
|
||||
public void testSimpleUidUser() throws NamingException {
|
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system");
|
||||
dao.setUserLookupNameFormat("uid={0},ou=users");
|
||||
dao.setDefaultRole(DEFAULT_ROLE);
|
||||
|
||||
try {
|
||||
System.out.println("Attempting user auth.");
|
||||
|
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user",
|
||||
"plaintext");
|
||||
|
||||
//System.out.println( "UserDetails = " + userDetails );
|
||||
|
||||
assertEquals(1, userDetails.getAuthorities().length);
|
||||
assertEquals(DEFAULT_ROLE,
|
||||
userDetails.getAuthorities()[0].getAuthority());
|
||||
} catch (BadCredentialsException ex) {
|
||||
System.out.println("Unable to authenticate user.");
|
||||
ex.printStackTrace();
|
||||
fail();
|
||||
}
|
||||
}
|
||||
|
||||
/** Test that a login w/ a bad password fails. */
|
||||
public void testSimpleUidUserBadPassword() throws NamingException {
|
||||
dao.setUsernameFormat("uid={0},ou=users,ou=system");
|
||||
dao.setUserLookupNameFormat("uid={0},ou=users");
|
||||
dao.setDefaultRole(DEFAULT_ROLE);
|
||||
|
||||
try {
|
||||
UserDetails userDetails = dao.loadUserByUsernameAndPassword("one.user",
|
||||
"plainlywrong");
|
||||
fail();
|
||||
} catch (BadCredentialsException ex) {
|
||||
assertTrue(true);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Setup the basic properties of our LdapPasswordAuthenticationDao
|
||||
*/
|
||||
protected void setUp() {
|
||||
dao = new LdapPasswordAuthenticationDao();
|
||||
dao.setUrl("ldap://localhost:389/ou=system");
|
||||
}
|
||||
|
||||
}
|
Loading…
Reference in New Issue