diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2022-10-17 21:51:59 +1100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-10-17 21:51:59 +1100 |
| commit | 3a70f6739b82a523fc8112a29ac156446253fc58 (patch) | |
| tree | 9a888643c24bd3888f9fa49a11f1a61000cd0c38 /internal/authentication/ldap_user_provider_test.go | |
| parent | 8eadf72dc776aa75cdb7337f7d54dff50cbf14ec (diff) | |
feat(authentication): file password algorithms (#3848)
This adds significant enhancements to the file auth provider including multiple additional algorithms.
Diffstat (limited to 'internal/authentication/ldap_user_provider_test.go')
| -rw-r--r-- | internal/authentication/ldap_user_provider_test.go | 98 |
1 files changed, 49 insertions, 49 deletions
diff --git a/internal/authentication/ldap_user_provider_test.go b/internal/authentication/ldap_user_provider_test.go index aeaf5b835..a74e24477 100644 --- a/internal/authentication/ldap_user_provider_test.go +++ b/internal/authentication/ldap_user_provider_test.go @@ -23,7 +23,7 @@ func TestShouldCreateRawConnectionWhenSchemeIsLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -55,7 +55,7 @@ func TestShouldCreateTLSConnectionWhenSchemeIsLDAPS(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldaps://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -105,7 +105,7 @@ func TestEscapeSpecialCharsInGroupsFilter(t *testing.T) { mockFactory := NewMockLDAPClientFactory(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldaps://127.0.0.1:389", GroupsFilter: "(|(member={dn})(uid={username})(uid={input}))", }, @@ -163,7 +163,7 @@ func TestShouldCheckLDAPServerExtensions(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -228,7 +228,7 @@ func TestShouldNotCheckLDAPServerExtensionsWhenRootDSEReturnsMoreThanOneEntry(t mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -294,7 +294,7 @@ func TestShouldCheckLDAPServerControlTypes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -359,7 +359,7 @@ func TestShouldNotEnablePasswdModifyExtensionOrControlTypes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -424,7 +424,7 @@ func TestShouldReturnCheckServerConnectError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -457,7 +457,7 @@ func TestShouldReturnCheckServerSearchError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -519,7 +519,7 @@ func TestShouldEscapeUserInput(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", @@ -553,7 +553,7 @@ func TestShouldReturnEmailWhenAttributeSameAsUsername(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -624,7 +624,7 @@ func TestShouldReturnUsernameAndBlankDisplayNameWhenAttributesTheSame(t *testing mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -695,7 +695,7 @@ func TestShouldReturnBlankEmailAndDisplayNameWhenAttrsLenZero(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -769,7 +769,7 @@ func TestShouldCombineUsernameFilterAndUsersFilter(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", UsernameAttribute: "uid", @@ -820,7 +820,7 @@ func TestShouldNotCrashWhenGroupsAreNotRetrievedFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -893,7 +893,7 @@ func TestShouldNotCrashWhenEmailsAreNotRetrievedFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -954,7 +954,7 @@ func TestShouldReturnUsernameFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1027,7 +1027,7 @@ func TestShouldReturnUsernameFromLDAPWithReferrals(t *testing.T) { mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1119,7 +1119,7 @@ func TestShouldReturnUsernameFromLDAPWithReferralsInErrorAndResult(t *testing.T) mockClientReferralAlt := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1244,7 +1244,7 @@ func TestShouldReturnUsernameFromLDAPWithReferralsErr(t *testing.T) { mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1331,7 +1331,7 @@ func TestShouldNotUpdateUserPasswordConnect(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1398,7 +1398,7 @@ func TestShouldNotUpdateUserPasswordGetDetails(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1475,7 +1475,7 @@ func TestShouldUpdateUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -1582,7 +1582,7 @@ func TestShouldUpdateUserPasswordMSAD(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -1692,7 +1692,7 @@ func TestShouldUpdateUserPasswordMSADWithReferrals(t *testing.T) { mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -1820,7 +1820,7 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralConnectErr(t *test mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -1939,7 +1939,7 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralModifyErr(t *testi mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -2071,7 +2071,7 @@ func TestShouldUpdateUserPasswordMSADWithoutReferrals(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -2185,7 +2185,7 @@ func TestShouldUpdateUserPasswordPasswdModifyExtension(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -2292,7 +2292,7 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferrals(t *testing.T mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -2419,7 +2419,7 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithoutReferrals(t *testin mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -2532,7 +2532,7 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralConne mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -2650,7 +2650,7 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralPassw mockClientReferral := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -2781,7 +2781,7 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHints(t *testing mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -2892,7 +2892,7 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHintsDeprecated( mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -3003,7 +3003,7 @@ func TestShouldUpdateUserPasswordActiveDirectory(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "activedirectory", URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", @@ -3114,7 +3114,7 @@ func TestShouldUpdateUserPasswordBasic(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ Implementation: "custom", URL: "ldap://127.0.0.1:389", User: "uid=admin,dc=example,dc=com", @@ -3222,7 +3222,7 @@ func TestShouldReturnErrorWhenMultipleUsernameAttributes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3288,7 +3288,7 @@ func TestShouldReturnErrorWhenZeroUsernameAttributes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3354,7 +3354,7 @@ func TestShouldReturnErrorWhenUsernameAttributeNotReturned(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3416,7 +3416,7 @@ func TestShouldReturnErrorWhenMultipleUsersFound(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3499,7 +3499,7 @@ func TestShouldReturnErrorWhenNoDN(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3565,7 +3565,7 @@ func TestShouldCheckValidUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3633,7 +3633,7 @@ func TestShouldNotCheckValidUserPasswordWithConnectError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3672,7 +3672,7 @@ func TestShouldCheckInvalidUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3740,7 +3740,7 @@ func TestShouldCallStartTLSWhenEnabled(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3815,7 +3815,7 @@ func TestShouldParseDynamicConfiguration(t *testing.T) { mockFactory := NewMockLDAPClientFactory(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3853,7 +3853,7 @@ func TestShouldCallStartTLSWithInsecureSkipVerifyWhenSkipVerifyTrue(t *testing.T mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldap://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", @@ -3936,7 +3936,7 @@ func TestShouldReturnLDAPSAlreadySecuredWhenStartTLSAttempted(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) ldapClient := newLDAPUserProvider( - schema.LDAPAuthenticationBackendConfiguration{ + schema.LDAPAuthenticationBackend{ URL: "ldaps://127.0.0.1:389", User: "cn=admin,dc=example,dc=com", Password: "password", |
