blob: 09e7b4ccd902f28f4b9c6f6420c621f9fc80a9e1 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.api.ldap.extras.extended;
import static org.junit.jupiter.api.Assertions.assertArrayEquals;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertThrows;
import static org.junit.jupiter.api.Assertions.assertTrue;
import java.nio.ByteBuffer;
import java.util.Map;
import org.apache.directory.api.asn1.DecoderException;
import org.apache.directory.api.asn1.EncoderException;
import org.apache.directory.api.asn1.ber.Asn1Decoder;
import org.apache.directory.api.asn1.util.Asn1Buffer;
import org.apache.directory.api.ldap.codec.api.LdapApiService;
import org.apache.directory.api.ldap.codec.api.LdapEncoder;
import org.apache.directory.api.ldap.codec.api.LdapMessageContainer;
import org.apache.directory.api.ldap.codec.osgi.DefaultLdapCodecService;
import org.apache.directory.api.ldap.extras.extended.ads_impl.cancel.CancelFactory;
import org.apache.directory.api.ldap.extras.extended.ads_impl.startTls.StartTlsFactory;
import org.apache.directory.api.ldap.extras.extended.cancel.CancelRequest;
import org.apache.directory.api.ldap.extras.extended.startTls.StartTlsRequest;
import org.apache.directory.api.ldap.model.message.Control;
import org.apache.directory.api.ldap.model.message.ExtendedRequest;
import org.apache.directory.api.ldap.model.message.controls.ManageDsaIT;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.parallel.Execution;
import org.junit.jupiter.api.parallel.ExecutionMode;
/**
* Test the ExtendedRequest codec
*
* @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
*/
@Execution( ExecutionMode.CONCURRENT)
public class ExtendedRequestTest
{
private static LdapApiService codec;
@BeforeAll
public static void init()
{
codec = new DefaultLdapCodecService();
codec.getExtendedRequestFactories().put( "1.3.6.1.1.8", new CancelFactory( codec ) );
codec.getExtendedRequestFactories().put( "1.3.6.1.4.1.1466.20037", new StartTlsFactory( codec ) );
}
/**
* Test the decoding of a full ExtendedRequest
*/
@Test
public void testDecodeExtendedRequestSuccess() throws DecoderException, EncoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x1B );
stream.put( new byte[]
{
0x30, 0x19, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x14, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x0B,
'1', '.', '3', '.', '6', '.', '1', '.', '1', '.', '8',
// requestValue [1] OCTET STRING OPTIONAL }
( byte ) 0x81, 0x05,
0x30, 0x03,
0x02, 0x01, 0x01
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
Asn1Decoder.decode( stream, container );
// Check the decoded ExtendedRequest PDU
ExtendedRequest extendedRequest = container.getMessage();
assertTrue( extendedRequest instanceof CancelRequest );
CancelRequest cancelRequest = ( CancelRequest ) extendedRequest;
assertEquals( 1, cancelRequest.getMessageId() );
assertEquals( "1.3.6.1.1.8", cancelRequest.getRequestName() );
assertEquals( 1, cancelRequest.getCancelId() );
// Check encode reverse
Asn1Buffer buffer = new Asn1Buffer();
LdapEncoder.encodeMessage( buffer, codec, cancelRequest );
assertArrayEquals( stream.array(), buffer.getBytes().array() );
}
/**
* Test the decoding of a full ExtendedRequest with controls
*/
@Test
public void testDecodeExtendedRequestWithControls() throws DecoderException, EncoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x38 );
stream.put( new byte[]
{
0x30, 0x36, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x14, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x0B,
'1', '.', '3', '.', '6', '.', '1', '.', '1', '.', '8',
// requestValue [1] OCTET STRING OPTIONAL }
( byte ) 0x81, 0x05,
0x30, 0x03,
0x02, 0x01, 0x01,
( byte ) 0xA0, 0x1B, // A control
0x30, 0x19,
0x04, 0x17,
'2', '.', '1', '6', '.', '8', '4', '0', '.', '1', '.',
'1', '1', '3', '7', '3', '0', '.', '3', '.', '4', '.', '2'
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
Asn1Decoder.decode( stream, container );
// Check the decoded ExtendedRequest PDU
ExtendedRequest extendedRequest = container.getMessage();
assertTrue( extendedRequest instanceof CancelRequest );
CancelRequest cancelRequest = ( CancelRequest ) extendedRequest;
assertEquals( 1, cancelRequest.getMessageId() );
assertEquals( "1.3.6.1.1.8", cancelRequest.getRequestName() );
assertEquals( 1, cancelRequest.getCancelId() );
// Check the Control
Map<String, Control> controls = extendedRequest.getControls();
assertEquals( 1, controls.size() );
assertTrue( extendedRequest.hasControl( "2.16.840.1.113730.3.4.2" ) );
Control control = extendedRequest.getControl( "2.16.840.1.113730.3.4.2" );
assertTrue( control instanceof ManageDsaIT );
// Check encode reverse
Asn1Buffer buffer = new Asn1Buffer();
LdapEncoder.encodeMessage( buffer, codec, cancelRequest );
assertArrayEquals( stream.array(), buffer.getBytes().array() );
}
/**
* Test the decoding of a full ExtendedRequest with no value and with
* controls
*/
@Test
public void testDecodeExtendedRequestNoValueWithControls() throws DecoderException, EncoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x3C );
stream.put( new byte[]
{
0x30, 0x3A, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x18, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x16,
'1', '.', '3', '.', '6', '.', '1', '.', '4', '.', '1', '.',
'1', '4', '6', '6', '.', '2', '0', '0', '3', '7',
// requestValue [1] OCTET STRING OPTIONAL }
( byte ) 0xA0, 0x1B, // A control
0x30, 0x19,
0x04, 0x17,
'2', '.', '1', '6', '.', '8', '4', '0', '.', '1', '.',
'1', '1', '3', '7', '3', '0', '.', '3', '.', '4', '.', '2'
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
Asn1Decoder.decode( stream, container );
// Check the decoded ExtendedRequest PDU
ExtendedRequest extendedRequest = container.getMessage();
assertTrue( extendedRequest instanceof StartTlsRequest );
StartTlsRequest startTlsRequest = ( StartTlsRequest ) extendedRequest;
assertEquals( 1, startTlsRequest.getMessageId() );
assertEquals( "1.3.6.1.4.1.1466.20037", startTlsRequest.getRequestName() );
// Check the Control
Map<String, Control> controls = extendedRequest.getControls();
assertEquals( 1, controls.size() );
assertTrue( extendedRequest.hasControl( "2.16.840.1.113730.3.4.2" ) );
Control control = extendedRequest.getControl( "2.16.840.1.113730.3.4.2" );
assertTrue( control instanceof ManageDsaIT );
// Check encode reverse
Asn1Buffer buffer = new Asn1Buffer();
LdapEncoder.encodeMessage( buffer, codec, startTlsRequest );
assertArrayEquals( stream.array(), buffer.getBytes().array() );
}
/**
* Test the decoding of an empty ExtendedRequest
*/
@Test
public void testDecodeExtendedRequestEmpty() throws DecoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x07 );
stream.put( new byte[]
{
0x30, 0x05, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x00, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
assertThrows( DecoderException.class, ( ) ->
{
Asn1Decoder.decode( stream, container );
} );
}
/**
* Test the decoding of an empty OID
*/
@Test
public void testDecodeEmptyOID() throws DecoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x09 );
stream.put( new byte[]
{
0x30, 0x07, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x02, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
( byte ) 0x80, 0x00
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
assertThrows( DecoderException.class, ( ) ->
{
Asn1Decoder.decode( stream, container );
} );
}
/**
* Test the decoding of a bad name
*/
@Test
public void testDecodeExtendedBadRequestName() throws DecoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x1F );
stream.put( new byte[]
{
0x30, 0x1D, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x18, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x16,
'1', '-', '3', '.', '6', '.', '1', '.', '4', '.', '1', '.',
'1', '4', '6', '6', '.', '2', '0', '0', '3', '7',
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
assertThrows( DecoderException.class, ( ) ->
{
Asn1Decoder.decode( stream, container );
} );
}
/**
* Test the decoding of a name only ExtendedRequest
*/
@Test
public void testDecodeExtendedRequestName() throws DecoderException, EncoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x1F );
stream.put( new byte[]
{
0x30, 0x1D, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x18, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x16,
'1', '.', '3', '.', '6', '.', '1', '.', '4', '.', '1', '.',
'1', '4', '6', '6', '.', '2', '0', '0', '3', '7',
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
Asn1Decoder.decode( stream, container );
// Check the decoded ExtendedRequest PDU
ExtendedRequest extendedRequest = container.getMessage();
assertTrue( extendedRequest instanceof StartTlsRequest );
StartTlsRequest startTlsRequest = ( StartTlsRequest ) extendedRequest;
assertEquals( 1, startTlsRequest.getMessageId() );
assertEquals( "1.3.6.1.4.1.1466.20037", startTlsRequest.getRequestName() );
// Check encode reverse
Asn1Buffer buffer = new Asn1Buffer();
LdapEncoder.encodeMessage( buffer, codec, startTlsRequest );
assertArrayEquals( stream.array(), buffer.getBytes().array() );
}
/**
* Test the decoding of an empty value ExtendedRequest
*/
@Test
public void testDecodeExtendedRequestEmptyNoValue() throws DecoderException, EncoderException
{
ByteBuffer stream = ByteBuffer.allocate( 0x21 );
stream.put( new byte[]
{
0x30, 0x1F, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x1A, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x16,
'1', '.', '3', '.', '6', '.', '1', '.', '4', '.', '1', '.',
'1', '4', '6', '6', '.', '2', '0', '0', '3', '7',
// requestValue [1] OCTET STRING OPTIONAL }
( byte ) 0x81, 0x00
} );
stream.flip();
// Allocate a LdapMessage Container
LdapMessageContainer<ExtendedRequest> container = new LdapMessageContainer<>( codec );
// Decode the ExtendedRequest PDU
Asn1Decoder.decode( stream, container );
// Check the decoded ExtendedRequest PDU
ExtendedRequest extendedRequest = container.getMessage();
assertTrue( extendedRequest instanceof StartTlsRequest );
StartTlsRequest startTlsRequest = ( StartTlsRequest ) extendedRequest;
assertEquals( 1, startTlsRequest.getMessageId() );
assertEquals( "1.3.6.1.4.1.1466.20037", startTlsRequest.getRequestName() );
// Check encode reverse
Asn1Buffer buffer = new Asn1Buffer();
LdapEncoder.encodeMessage( buffer, codec, startTlsRequest );
assertArrayEquals(
new byte[]
{
0x30, 0x1D, // LDAPMessage ::= SEQUENCE {
0x02, 0x01, 0x01, // messageID MessageID
// CHOICE { ..., extendedReq ExtendedRequest, ...
0x77, 0x18, // ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
// requestName [0] LDAPOID,
( byte ) 0x80, 0x16,
'1', '.', '3', '.', '6', '.', '1', '.', '4', '.', '1', '.',
'1', '4', '6', '6', '.', '2', '0', '0', '3', '7'
// requestValue [1] OCTET STRING OPTIONAL }
}, buffer.getBytes().array() );
}
}