| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| * |
| */ |
| package org.apache.directory.server.core.authz; |
| |
| |
| import static org.apache.directory.server.core.authz.AutzIntegUtils.getAdminConnection; |
| import static org.apache.directory.server.core.authz.AutzIntegUtils.getConnectionAs; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertTrue; |
| |
| import java.util.HashSet; |
| |
| import org.apache.directory.ldap.client.api.LdapConnection; |
| import org.apache.directory.ldap.client.api.message.DeleteResponse; |
| import org.apache.directory.ldap.client.api.message.ModifyDnResponse; |
| import org.apache.directory.ldap.client.api.message.ModifyRequest; |
| import org.apache.directory.ldap.client.api.message.SearchResponse; |
| import org.apache.directory.ldap.client.api.message.SearchResultEntry; |
| import org.apache.directory.server.core.integ.AbstractLdapTestUnit; |
| import org.apache.directory.server.core.integ.FrameworkRunner; |
| import org.apache.directory.server.core.integ.IntegrationUtils; |
| import org.apache.directory.shared.ldap.constants.SchemaConstants; |
| import org.apache.directory.shared.ldap.cursor.Cursor; |
| import org.apache.directory.shared.ldap.entry.Entry; |
| import org.apache.directory.shared.ldap.filter.SearchScope; |
| import org.apache.directory.shared.ldap.message.ResultCodeEnum; |
| import org.apache.directory.shared.ldap.name.DN; |
| import org.apache.directory.shared.ldap.name.RDN; |
| import org.apache.directory.shared.ldap.util.ArrayUtils; |
| import org.apache.directory.shared.ldap.util.StringTools; |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| |
| |
| /** |
| * Tests the Authorization service to make sure it is enforcing policies |
| * correctly. |
| * |
| * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a> |
| * @version $Rev$ |
| */ |
| @RunWith(FrameworkRunner.class) |
| public class AuthorizationServiceAsAdminIT extends AbstractLdapTestUnit |
| { |
| |
| @Before |
| public void setService() |
| { |
| AutzIntegUtils.service = service; |
| } |
| |
| |
| @After |
| public void closeConnections() |
| { |
| IntegrationUtils.closeConnections(); |
| } |
| |
| |
| /** |
| * Makes sure the admin cannot delete the admin account. |
| * |
| * @throws Exception if there are problems |
| */ |
| @Test |
| public void testNoDeleteOnAdminByAdmin() throws Exception |
| { |
| DeleteResponse delResp = getAdminConnection().delete( "uid=admin,ou=system" ); |
| assertEquals( ResultCodeEnum.INSUFFICIENT_ACCESS_RIGHTS, delResp.getLdapResult().getResultCode() ); |
| } |
| |
| |
| /** |
| * Makes sure the admin cannot rename the admin account. |
| * |
| * @throws Exception if there are problems |
| */ |
| @Test |
| public void testNoRdnChangesOnAdminByAdmin() throws Exception |
| { |
| ModifyDnResponse resp = getAdminConnection().rename( new DN( "uid=admin,ou=system" ), new RDN( "uid=alex" ) ); |
| assertEquals( ResultCodeEnum.INSUFFICIENT_ACCESS_RIGHTS, resp.getLdapResult().getResultCode() ); |
| } |
| |
| |
| /** |
| * Makes sure the admin can update the admin account password. |
| * |
| * @throws Exception if there are problems |
| */ |
| @Test |
| public void testModifyOnAdminByAdmin() throws Exception |
| { |
| LdapConnection connection = getAdminConnection(); |
| DN adminDN = new DN( "uid=admin,ou=system" ); |
| ModifyRequest req = new ModifyRequest( adminDN ); |
| String newPwd = "replaced"; |
| req.replace( SchemaConstants.USER_PASSWORD_AT, newPwd ); |
| connection.modify( req ); |
| connection.close(); |
| |
| connection = getConnectionAs( adminDN, newPwd ); |
| Entry entry = ( ( SearchResultEntry ) connection.lookup( adminDN.getName() ) ).getEntry(); |
| assertTrue( ArrayUtils.isEquals( StringTools.getBytesUtf8( newPwd ), entry.get( "userPassword" ).get() |
| .getBytes() ) ); |
| } |
| |
| |
| /** |
| * Makes sure the admin can see all entries we know of on a subtree search. |
| * |
| * @throws Exception if there are problems |
| */ |
| @Test |
| public void testSearchSubtreeByAdmin() throws Exception |
| { |
| LdapConnection connection = getAdminConnection(); |
| |
| HashSet<String> set = new HashSet<String>(); |
| |
| Cursor<SearchResponse> cursor = connection.search( "ou=system", "(objectClass=*)", SearchScope.SUBTREE, "*" ); |
| |
| while ( cursor.next() ) |
| { |
| Entry result = ( ( SearchResultEntry ) cursor.get() ).getEntry(); |
| set.add( result.getDn().getName() ); |
| } |
| |
| cursor.close(); |
| |
| assertEquals( 10, set.size() ); |
| assertTrue( set.contains( "ou=system" ) ); |
| assertTrue( set.contains( "ou=configuration,ou=system" ) ); |
| assertTrue( set.contains( "ou=interceptors,ou=configuration,ou=system" ) ); |
| assertTrue( set.contains( "ou=partitions,ou=configuration,ou=system" ) ); |
| assertTrue( set.contains( "ou=services,ou=configuration,ou=system" ) ); |
| assertTrue( set.contains( "ou=groups,ou=system" ) ); |
| assertTrue( set.contains( "cn=Administrators,ou=groups,ou=system" ) ); |
| assertTrue( set.contains( "ou=users,ou=system" ) ); |
| assertTrue( set.contains( "prefNodeName=sysPrefRoot,ou=system" ) ); |
| assertTrue( set.contains( "uid=admin,ou=system" ) ); |
| } |
| } |