2019-04-24 21:52:08 +00:00
|
|
|
package validator
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2019-11-17 10:47:07 +00:00
|
|
|
"github.com/clems4ever/authelia/internal/configuration/schema"
|
2019-04-24 21:52:08 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2019-12-06 08:15:54 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2019-04-24 21:52:08 +00:00
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestShouldRaiseErrorsWhenNoBackendProvided(t *testing.T) {
|
|
|
|
validator := schema.NewStructValidator()
|
|
|
|
backendConfig := schema.AuthenticationBackendConfiguration{}
|
|
|
|
|
|
|
|
ValidateAuthenticationBackend(&backendConfig, validator)
|
|
|
|
|
|
|
|
assert.Len(t, validator.Errors(), 1)
|
|
|
|
assert.EqualError(t, validator.Errors()[0], "Please provide `ldap` or `file` object in `authentication_backend`")
|
|
|
|
}
|
|
|
|
|
|
|
|
type FileBasedAuthenticationBackend struct {
|
|
|
|
suite.Suite
|
|
|
|
configuration schema.AuthenticationBackendConfiguration
|
|
|
|
validator *schema.StructValidator
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *FileBasedAuthenticationBackend) SetupTest() {
|
|
|
|
suite.validator = schema.NewStructValidator()
|
|
|
|
suite.configuration = schema.AuthenticationBackendConfiguration{}
|
|
|
|
suite.configuration.File = &schema.FileAuthenticationBackendConfiguration{Path: "/a/path"}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *FileBasedAuthenticationBackend) TestShouldValidateCompleteConfiguration() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *FileBasedAuthenticationBackend) TestShouldRaiseErrorWhenNoPathProvided() {
|
|
|
|
suite.configuration.File.Path = ""
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Please provide a `path` for the users database in `authentication_backend`")
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFileBasedAuthenticationBackend(t *testing.T) {
|
|
|
|
suite.Run(t, new(FileBasedAuthenticationBackend))
|
|
|
|
}
|
|
|
|
|
|
|
|
type LdapAuthenticationBackendSuite struct {
|
|
|
|
suite.Suite
|
|
|
|
configuration schema.AuthenticationBackendConfiguration
|
|
|
|
validator *schema.StructValidator
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) SetupTest() {
|
|
|
|
suite.validator = schema.NewStructValidator()
|
|
|
|
suite.configuration = schema.AuthenticationBackendConfiguration{}
|
|
|
|
suite.configuration.Ldap = &schema.LDAPAuthenticationBackendConfiguration{}
|
|
|
|
suite.configuration.Ldap.URL = "ldap://ldap"
|
|
|
|
suite.configuration.Ldap.User = "user"
|
|
|
|
suite.configuration.Ldap.Password = "password"
|
|
|
|
suite.configuration.Ldap.BaseDN = "base_dn"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldValidateCompleteConfiguration() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldRaiseErrorWhenURLNotProvided() {
|
|
|
|
suite.configuration.Ldap.URL = ""
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Please provide a URL to the LDAP server")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldRaiseErrorWhenUserNotProvided() {
|
|
|
|
suite.configuration.Ldap.User = ""
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Please provide a user name to connect to the LDAP server")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldRaiseErrorWhenPasswordNotProvided() {
|
|
|
|
suite.configuration.Ldap.Password = ""
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Please provide a password to connect to the LDAP server")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldRaiseErrorWhenBaseDNNotProvided() {
|
|
|
|
suite.configuration.Ldap.BaseDN = ""
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Please provide a base DN to connect to the LDAP server")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldSetDefaultUsersFilter() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
2019-10-29 20:26:15 +00:00
|
|
|
assert.Equal(suite.T(), "(cn={0})", suite.configuration.Ldap.UsersFilter)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldSetDefaultGroupsFilter() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
2019-10-29 20:26:15 +00:00
|
|
|
assert.Equal(suite.T(), "(member={dn})", suite.configuration.Ldap.GroupsFilter)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldSetDefaultGroupNameAttribute() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
|
|
|
assert.Equal(suite.T(), "cn", suite.configuration.Ldap.GroupNameAttribute)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldSetDefaultMailAttribute() {
|
|
|
|
ValidateAuthenticationBackend(&suite.configuration, suite.validator)
|
|
|
|
assert.Len(suite.T(), suite.validator.Errors(), 0)
|
|
|
|
assert.Equal(suite.T(), "mail", suite.configuration.Ldap.MailAttribute)
|
|
|
|
}
|
|
|
|
|
2019-12-06 08:15:54 +00:00
|
|
|
func (suite *LdapAuthenticationBackendSuite) TestShouldAdaptLDAPURL() {
|
|
|
|
assert.Equal(suite.T(), "", validateLdapURL("127.0.0.1", suite.validator))
|
|
|
|
require.Len(suite.T(), suite.validator.Errors(), 1)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[0], "Unknown scheme for ldap url, should be ldap:// or ldaps://")
|
|
|
|
|
|
|
|
assert.Equal(suite.T(), "", validateLdapURL("127.0.0.1:636", suite.validator))
|
|
|
|
require.Len(suite.T(), suite.validator.Errors(), 2)
|
|
|
|
assert.EqualError(suite.T(), suite.validator.Errors()[1], "Unable to parse URL to ldap server. The scheme is probably missing: ldap:// or ldaps://")
|
|
|
|
|
|
|
|
assert.Equal(suite.T(), "ldap://127.0.0.1:389", validateLdapURL("ldap://127.0.0.1", suite.validator))
|
|
|
|
assert.Equal(suite.T(), "ldap://127.0.0.1:390", validateLdapURL("ldap://127.0.0.1:390", suite.validator))
|
|
|
|
assert.Equal(suite.T(), "ldap://127.0.0.1:389/abc", validateLdapURL("ldap://127.0.0.1/abc", suite.validator))
|
|
|
|
assert.Equal(suite.T(), "ldap://127.0.0.1:389/abc?test=abc&x=y", validateLdapURL("ldap://127.0.0.1/abc?test=abc&x=y", suite.validator))
|
|
|
|
|
|
|
|
assert.Equal(suite.T(), "ldaps://127.0.0.1:390", validateLdapURL("ldaps://127.0.0.1:390", suite.validator))
|
|
|
|
assert.Equal(suite.T(), "ldaps://127.0.0.1:636", validateLdapURL("ldaps://127.0.0.1", suite.validator))
|
|
|
|
}
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
func TestLdapAuthenticationBackend(t *testing.T) {
|
|
|
|
suite.Run(t, new(LdapAuthenticationBackendSuite))
|
|
|
|
}
|