diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2023-09-03 16:01:46 +1000 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-09-03 16:01:46 +1000 |
| commit | 40026701fdf604b874334166b9984f6ac003f0fa (patch) | |
| tree | 7e7f90d62e07a627c8fc4e6335749d45ebcedd25 /internal/authentication/ldap_user_provider_test.go | |
| parent | 3d1a02a8d3aa75e2e7bd2d7520e29518d11afa62 (diff) | |
docs: jsonschema (#5493)
Adds a JSON Schema for the configuration, user database, and most exports.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/authentication/ldap_user_provider_test.go')
| -rw-r--r-- | internal/authentication/ldap_user_provider_test.go | 274 |
1 files changed, 137 insertions, 137 deletions
diff --git a/internal/authentication/ldap_user_provider_test.go b/internal/authentication/ldap_user_provider_test.go index 1664909fa..c0e989429 100644 --- a/internal/authentication/ldap_user_provider_test.go +++ b/internal/authentication/ldap_user_provider_test.go @@ -17,13 +17,13 @@ import ( ) func TestNewLDAPUserProvider(t *testing.T) { - provider := NewLDAPUserProvider(schema.AuthenticationBackend{LDAP: &schema.LDAPAuthenticationBackend{}}, nil) + provider := NewLDAPUserProvider(schema.AuthenticationBackend{LDAP: &schema.AuthenticationBackendLDAP{}}, nil) assert.NotNil(t, provider) } func TestNewLDAPUserProviderWithFactoryWithoutFactory(t *testing.T) { - provider := NewLDAPUserProviderWithFactory(schema.LDAPAuthenticationBackend{}, false, nil, nil) + provider := NewLDAPUserProviderWithFactory(schema.AuthenticationBackendLDAP{}, false, nil, nil) assert.NotNil(t, provider) @@ -38,7 +38,7 @@ func TestShouldCreateRawConnectionWhenSchemeIsLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", @@ -70,7 +70,7 @@ func TestShouldCreateTLSConnectionWhenSchemeIsLDAPS(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPSAddress, User: "cn=admin,dc=example,dc=com", Password: "password", @@ -120,7 +120,7 @@ func TestEscapeSpecialCharsInGroupsFilter(t *testing.T) { mockFactory := NewMockLDAPClientFactory(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPSAddress, GroupsFilter: "(|(member={dn})(uid={username})(uid={input}))", }, @@ -150,23 +150,23 @@ func TestResolveGroupsFilter(t *testing.T) { testCases := []struct { name string - have schema.LDAPAuthenticationBackend + have schema.AuthenticationBackendLDAP input string profile ldapUserProfile expected string }{ { "ShouldResolveEmptyFilter", - schema.LDAPAuthenticationBackend{}, + schema.AuthenticationBackendLDAP{}, "", ldapUserProfile{}, "", }, { "ShouldResolveMemberOfRDNFilter", - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ GroupsFilter: "(|{memberof:rdn})", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", GroupName: "cn", MemberOf: "memberOf", @@ -183,9 +183,9 @@ func TestResolveGroupsFilter(t *testing.T) { }, { "ShouldResolveMemberOfDNFilter", - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ GroupsFilter: "(|{memberof:dn})", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", GroupName: "cn", MemberOf: "memberOf", @@ -246,7 +246,7 @@ func (e *ExtendedSearchRequestMatcher) String() string { func TestShouldCheckLDAPEpochFilters(t *testing.T) { type have struct { users string - attr schema.LDAPAuthenticationAttributes + attr schema.AuthenticationBackendLDAPAttributes } type expected struct { @@ -302,7 +302,7 @@ func TestShouldCheckLDAPEpochFilters(t *testing.T) { for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ UsersFilter: tc.have.users, Attributes: tc.have.attr, BaseDN: "dc=example,dc=com", @@ -326,11 +326,11 @@ func TestShouldCheckLDAPServerExtensions(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -394,11 +394,11 @@ func TestShouldNotCheckLDAPServerExtensionsWhenRootDSEReturnsMoreThanOneEntry(t mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -463,11 +463,11 @@ func TestShouldCheckLDAPServerControlTypes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -531,11 +531,11 @@ func TestShouldNotEnablePasswdModifyExtensionOrControlTypes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -599,11 +599,11 @@ func TestShouldReturnCheckServerConnectError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -635,11 +635,11 @@ func TestShouldReturnCheckServerSearchError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -683,12 +683,12 @@ func TestShouldPermitRootDSEFailure(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ PermitFeatureDetectionFailure: true, Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -747,11 +747,11 @@ func TestShouldEscapeUserInput(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -784,11 +784,11 @@ func TestShouldReturnEmailWhenAttributeSameAsUsername(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "mail", Mail: "mail", DisplayName: "displayName", @@ -858,11 +858,11 @@ func TestShouldReturnUsernameAndBlankDisplayNameWhenAttributesTheSame(t *testing mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "uid", @@ -932,11 +932,11 @@ func TestShouldReturnBlankEmailAndDisplayNameWhenAttrsLenZero(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1013,12 +1013,12 @@ func TestShouldCombineUsernameFilterAndUsersFilter(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", UsersFilter: "(&({username_attribute}={input})(&(objectCategory=person)(objectClass=user)))", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1092,11 +1092,11 @@ func TestShouldNotCrashWhenGroupsAreNotRetrievedFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1169,11 +1169,11 @@ func TestLDAPUserProvider_GetDetails_ShouldReturnOnUserError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1217,11 +1217,11 @@ func TestLDAPUserProvider_GetDetails_ShouldReturnOnGroupsError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1290,11 +1290,11 @@ func TestShouldNotCrashWhenEmailsAreNotRetrievedFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", DisplayName: "displayName", MemberOf: "memberOf", @@ -1356,11 +1356,11 @@ func TestShouldUnauthenticatedBind(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", DisplayName: "displayName", MemberOf: "memberOf", @@ -1422,11 +1422,11 @@ func TestShouldReturnUsernameFromLDAP(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1498,11 +1498,11 @@ func TestShouldReturnUsernameFromLDAPSearchModeMemberOfRDN(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -1588,11 +1588,11 @@ func TestShouldReturnUsernameFromLDAPSearchModeMemberOfDN(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "CN=Administrator,CN=Users,DC=example,DC=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -1676,11 +1676,11 @@ func TestShouldReturnErrSearchMemberOf(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "CN=Administrator,CN=Users,DC=example,DC=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -1760,11 +1760,11 @@ func TestShouldReturnErrUnknownSearchMode(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "CN=Administrator,CN=Users,DC=example,DC=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -1836,11 +1836,11 @@ func TestShouldSkipEmptyAttributesSearchModeMemberOf(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "CN=Administrator,CN=Users,DC=example,DC=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -1950,11 +1950,11 @@ func TestShouldSkipEmptyAttributesSearchModeFilter(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "CN=Administrator,CN=Users,DC=example,DC=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -2064,11 +2064,11 @@ func TestShouldSkipEmptyGroupsResultMemberOf(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2146,11 +2146,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsInErrorAndResult(t *testing.T) mockClientReferralAlt := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2275,11 +2275,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsInErrorAndNoResult(t *testing. mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2366,11 +2366,11 @@ func TestShouldReturnDialErrDuringReferralSearchUsernameFromLDAPWithReferralsInE mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2421,11 +2421,11 @@ func TestShouldReturnSearchErrDuringReferralSearchUsernameFromLDAPWithReferralsI mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2485,11 +2485,11 @@ func TestShouldNotReturnUsernameFromLDAPWithReferralsInErrorAndReferralsNotPermi mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2535,11 +2535,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsErr(t *testing.T) { mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2626,11 +2626,11 @@ func TestShouldNotUpdateUserPasswordConnect(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2696,11 +2696,11 @@ func TestShouldNotUpdateUserPasswordGetDetails(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2776,11 +2776,11 @@ func TestShouldUpdateUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2886,12 +2886,12 @@ func TestShouldUpdateUserPasswordMSAD(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -2999,12 +2999,12 @@ func TestShouldUpdateUserPasswordMSADWithReferrals(t *testing.T) { mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3130,12 +3130,12 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralConnectErr(t *test mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3252,12 +3252,12 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralModifyErr(t *testi mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3387,12 +3387,12 @@ func TestShouldUpdateUserPasswordMSADWithoutReferrals(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3504,11 +3504,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtension(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3614,11 +3614,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferrals(t *testing.T mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3744,11 +3744,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithoutReferrals(t *testin mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3860,11 +3860,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralConne mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -3981,11 +3981,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralPassw mockClientReferral := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4115,12 +4115,12 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHints(t *testing mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -4230,12 +4230,12 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHintsDeprecated( mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -4345,12 +4345,12 @@ func TestShouldUpdateUserPasswordActiveDirectory(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "activedirectory", Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ DistinguishedName: "distinguishedName", Username: "sAMAccountName", Mail: "mail", @@ -4460,12 +4460,12 @@ func TestShouldUpdateUserPasswordBasic(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Implementation: "custom", Address: testLDAPAddress, User: "uid=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4571,11 +4571,11 @@ func TestShouldReturnErrorWhenMultipleUsernameAttributes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4640,11 +4640,11 @@ func TestShouldReturnErrorWhenZeroUsernameAttributes(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4709,11 +4709,11 @@ func TestShouldReturnErrorWhenUsernameAttributeNotReturned(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4774,11 +4774,11 @@ func TestShouldReturnErrorWhenMultipleUsersFound(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4860,11 +4860,11 @@ func TestShouldReturnErrorWhenNoDN(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -4929,11 +4929,11 @@ func TestShouldCheckValidUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5000,11 +5000,11 @@ func TestShouldNotCheckValidUserPasswordWithConnectError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5042,11 +5042,11 @@ func TestShouldNotCheckValidUserPasswordWithGetProfileError(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5087,11 +5087,11 @@ func TestShouldCheckInvalidUserPassword(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5158,11 +5158,11 @@ func TestShouldCallStartTLSWhenEnabled(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5237,11 +5237,11 @@ func TestShouldParseDynamicConfiguration(t *testing.T) { mockFactory := NewMockLDAPClientFactory(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5289,11 +5289,11 @@ func TestShouldCallStartTLSWithInsecureSkipVerifyWhenSkipVerifyTrue(t *testing.T mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5304,7 +5304,7 @@ func TestShouldCallStartTLSWithInsecureSkipVerifyWhenSkipVerifyTrue(t *testing.T AdditionalUsersDN: "ou=users", BaseDN: "dc=example,dc=com", StartTLS: true, - TLS: &schema.TLSConfig{ + TLS: &schema.TLS{ SkipVerify: true, }, }, @@ -5380,11 +5380,11 @@ func TestShouldReturnLDAPSAlreadySecuredWhenStartTLSAttempted(t *testing.T) { mockClient := NewMockLDAPClient(ctrl) provider := NewLDAPUserProviderWithFactory( - schema.LDAPAuthenticationBackend{ + schema.AuthenticationBackendLDAP{ Address: testLDAPSAddress, User: "cn=admin,dc=example,dc=com", Password: "password", - Attributes: schema.LDAPAuthenticationAttributes{ + Attributes: schema.AuthenticationBackendLDAPAttributes{ Username: "uid", Mail: "mail", DisplayName: "displayName", @@ -5394,7 +5394,7 @@ func TestShouldReturnLDAPSAlreadySecuredWhenStartTLSAttempted(t *testing.T) { AdditionalUsersDN: "ou=users", BaseDN: "dc=example,dc=com", StartTLS: true, - TLS: &schema.TLSConfig{ + TLS: &schema.TLS{ SkipVerify: true, }, }, |
