summaryrefslogtreecommitdiff
path: root/internal/authentication/ldap_user_provider_test.go
diff options
context:
space:
mode:
authorJames Elliott <james-d-elliott@users.noreply.github.com>2023-09-03 16:01:46 +1000
committerGitHub <noreply@github.com>2023-09-03 16:01:46 +1000
commit40026701fdf604b874334166b9984f6ac003f0fa (patch)
tree7e7f90d62e07a627c8fc4e6335749d45ebcedd25 /internal/authentication/ldap_user_provider_test.go
parent3d1a02a8d3aa75e2e7bd2d7520e29518d11afa62 (diff)
docs: jsonschema (#5493)
Adds a JSON Schema for the configuration, user database, and most exports. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/authentication/ldap_user_provider_test.go')
-rw-r--r--internal/authentication/ldap_user_provider_test.go274
1 files changed, 137 insertions, 137 deletions
diff --git a/internal/authentication/ldap_user_provider_test.go b/internal/authentication/ldap_user_provider_test.go
index 1664909fa..c0e989429 100644
--- a/internal/authentication/ldap_user_provider_test.go
+++ b/internal/authentication/ldap_user_provider_test.go
@@ -17,13 +17,13 @@ import (
)
func TestNewLDAPUserProvider(t *testing.T) {
- provider := NewLDAPUserProvider(schema.AuthenticationBackend{LDAP: &schema.LDAPAuthenticationBackend{}}, nil)
+ provider := NewLDAPUserProvider(schema.AuthenticationBackend{LDAP: &schema.AuthenticationBackendLDAP{}}, nil)
assert.NotNil(t, provider)
}
func TestNewLDAPUserProviderWithFactoryWithoutFactory(t *testing.T) {
- provider := NewLDAPUserProviderWithFactory(schema.LDAPAuthenticationBackend{}, false, nil, nil)
+ provider := NewLDAPUserProviderWithFactory(schema.AuthenticationBackendLDAP{}, false, nil, nil)
assert.NotNil(t, provider)
@@ -38,7 +38,7 @@ func TestShouldCreateRawConnectionWhenSchemeIsLDAP(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
@@ -70,7 +70,7 @@ func TestShouldCreateTLSConnectionWhenSchemeIsLDAPS(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPSAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
@@ -120,7 +120,7 @@ func TestEscapeSpecialCharsInGroupsFilter(t *testing.T) {
mockFactory := NewMockLDAPClientFactory(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPSAddress,
GroupsFilter: "(|(member={dn})(uid={username})(uid={input}))",
},
@@ -150,23 +150,23 @@ func TestResolveGroupsFilter(t *testing.T) {
testCases := []struct {
name string
- have schema.LDAPAuthenticationBackend
+ have schema.AuthenticationBackendLDAP
input string
profile ldapUserProfile
expected string
}{
{
"ShouldResolveEmptyFilter",
- schema.LDAPAuthenticationBackend{},
+ schema.AuthenticationBackendLDAP{},
"",
ldapUserProfile{},
"",
},
{
"ShouldResolveMemberOfRDNFilter",
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
GroupsFilter: "(|{memberof:rdn})",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
GroupName: "cn",
MemberOf: "memberOf",
@@ -183,9 +183,9 @@ func TestResolveGroupsFilter(t *testing.T) {
},
{
"ShouldResolveMemberOfDNFilter",
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
GroupsFilter: "(|{memberof:dn})",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
GroupName: "cn",
MemberOf: "memberOf",
@@ -246,7 +246,7 @@ func (e *ExtendedSearchRequestMatcher) String() string {
func TestShouldCheckLDAPEpochFilters(t *testing.T) {
type have struct {
users string
- attr schema.LDAPAuthenticationAttributes
+ attr schema.AuthenticationBackendLDAPAttributes
}
type expected struct {
@@ -302,7 +302,7 @@ func TestShouldCheckLDAPEpochFilters(t *testing.T) {
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
UsersFilter: tc.have.users,
Attributes: tc.have.attr,
BaseDN: "dc=example,dc=com",
@@ -326,11 +326,11 @@ func TestShouldCheckLDAPServerExtensions(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -394,11 +394,11 @@ func TestShouldNotCheckLDAPServerExtensionsWhenRootDSEReturnsMoreThanOneEntry(t
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -463,11 +463,11 @@ func TestShouldCheckLDAPServerControlTypes(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -531,11 +531,11 @@ func TestShouldNotEnablePasswdModifyExtensionOrControlTypes(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -599,11 +599,11 @@ func TestShouldReturnCheckServerConnectError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -635,11 +635,11 @@ func TestShouldReturnCheckServerSearchError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -683,12 +683,12 @@ func TestShouldPermitRootDSEFailure(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
PermitFeatureDetectionFailure: true,
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -747,11 +747,11 @@ func TestShouldEscapeUserInput(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(|({username_attribute}={input})({mail_attribute}={input}))",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -784,11 +784,11 @@ func TestShouldReturnEmailWhenAttributeSameAsUsername(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "mail",
Mail: "mail",
DisplayName: "displayName",
@@ -858,11 +858,11 @@ func TestShouldReturnUsernameAndBlankDisplayNameWhenAttributesTheSame(t *testing
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "uid",
@@ -932,11 +932,11 @@ func TestShouldReturnBlankEmailAndDisplayNameWhenAttrsLenZero(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1013,12 +1013,12 @@ func TestShouldCombineUsernameFilterAndUsersFilter(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
UsersFilter: "(&({username_attribute}={input})(&(objectCategory=person)(objectClass=user)))",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1092,11 +1092,11 @@ func TestShouldNotCrashWhenGroupsAreNotRetrievedFromLDAP(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1169,11 +1169,11 @@ func TestLDAPUserProvider_GetDetails_ShouldReturnOnUserError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1217,11 +1217,11 @@ func TestLDAPUserProvider_GetDetails_ShouldReturnOnGroupsError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1290,11 +1290,11 @@ func TestShouldNotCrashWhenEmailsAreNotRetrievedFromLDAP(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
DisplayName: "displayName",
MemberOf: "memberOf",
@@ -1356,11 +1356,11 @@ func TestShouldUnauthenticatedBind(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
DisplayName: "displayName",
MemberOf: "memberOf",
@@ -1422,11 +1422,11 @@ func TestShouldReturnUsernameFromLDAP(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1498,11 +1498,11 @@ func TestShouldReturnUsernameFromLDAPSearchModeMemberOfRDN(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -1588,11 +1588,11 @@ func TestShouldReturnUsernameFromLDAPSearchModeMemberOfDN(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "CN=Administrator,CN=Users,DC=example,DC=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -1676,11 +1676,11 @@ func TestShouldReturnErrSearchMemberOf(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "CN=Administrator,CN=Users,DC=example,DC=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -1760,11 +1760,11 @@ func TestShouldReturnErrUnknownSearchMode(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "CN=Administrator,CN=Users,DC=example,DC=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -1836,11 +1836,11 @@ func TestShouldSkipEmptyAttributesSearchModeMemberOf(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "CN=Administrator,CN=Users,DC=example,DC=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -1950,11 +1950,11 @@ func TestShouldSkipEmptyAttributesSearchModeFilter(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "CN=Administrator,CN=Users,DC=example,DC=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -2064,11 +2064,11 @@ func TestShouldSkipEmptyGroupsResultMemberOf(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2146,11 +2146,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsInErrorAndResult(t *testing.T)
mockClientReferralAlt := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2275,11 +2275,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsInErrorAndNoResult(t *testing.
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2366,11 +2366,11 @@ func TestShouldReturnDialErrDuringReferralSearchUsernameFromLDAPWithReferralsInE
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2421,11 +2421,11 @@ func TestShouldReturnSearchErrDuringReferralSearchUsernameFromLDAPWithReferralsI
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2485,11 +2485,11 @@ func TestShouldNotReturnUsernameFromLDAPWithReferralsInErrorAndReferralsNotPermi
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2535,11 +2535,11 @@ func TestShouldReturnUsernameFromLDAPWithReferralsErr(t *testing.T) {
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2626,11 +2626,11 @@ func TestShouldNotUpdateUserPasswordConnect(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2696,11 +2696,11 @@ func TestShouldNotUpdateUserPasswordGetDetails(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2776,11 +2776,11 @@ func TestShouldUpdateUserPassword(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2886,12 +2886,12 @@ func TestShouldUpdateUserPasswordMSAD(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -2999,12 +2999,12 @@ func TestShouldUpdateUserPasswordMSADWithReferrals(t *testing.T) {
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3130,12 +3130,12 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralConnectErr(t *test
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3252,12 +3252,12 @@ func TestShouldUpdateUserPasswordMSADWithReferralsWithReferralModifyErr(t *testi
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3387,12 +3387,12 @@ func TestShouldUpdateUserPasswordMSADWithoutReferrals(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3504,11 +3504,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtension(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3614,11 +3614,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferrals(t *testing.T
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3744,11 +3744,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithoutReferrals(t *testin
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3860,11 +3860,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralConne
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -3981,11 +3981,11 @@ func TestShouldUpdateUserPasswordPasswdModifyExtensionWithReferralsReferralPassw
mockClientReferral := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4115,12 +4115,12 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHints(t *testing
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -4230,12 +4230,12 @@ func TestShouldUpdateUserPasswordActiveDirectoryWithServerPolicyHintsDeprecated(
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -4345,12 +4345,12 @@ func TestShouldUpdateUserPasswordActiveDirectory(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "activedirectory",
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
DistinguishedName: "distinguishedName",
Username: "sAMAccountName",
Mail: "mail",
@@ -4460,12 +4460,12 @@ func TestShouldUpdateUserPasswordBasic(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Implementation: "custom",
Address: testLDAPAddress,
User: "uid=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4571,11 +4571,11 @@ func TestShouldReturnErrorWhenMultipleUsernameAttributes(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4640,11 +4640,11 @@ func TestShouldReturnErrorWhenZeroUsernameAttributes(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4709,11 +4709,11 @@ func TestShouldReturnErrorWhenUsernameAttributeNotReturned(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4774,11 +4774,11 @@ func TestShouldReturnErrorWhenMultipleUsersFound(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4860,11 +4860,11 @@ func TestShouldReturnErrorWhenNoDN(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -4929,11 +4929,11 @@ func TestShouldCheckValidUserPassword(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5000,11 +5000,11 @@ func TestShouldNotCheckValidUserPasswordWithConnectError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5042,11 +5042,11 @@ func TestShouldNotCheckValidUserPasswordWithGetProfileError(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5087,11 +5087,11 @@ func TestShouldCheckInvalidUserPassword(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5158,11 +5158,11 @@ func TestShouldCallStartTLSWhenEnabled(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5237,11 +5237,11 @@ func TestShouldParseDynamicConfiguration(t *testing.T) {
mockFactory := NewMockLDAPClientFactory(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5289,11 +5289,11 @@ func TestShouldCallStartTLSWithInsecureSkipVerifyWhenSkipVerifyTrue(t *testing.T
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5304,7 +5304,7 @@ func TestShouldCallStartTLSWithInsecureSkipVerifyWhenSkipVerifyTrue(t *testing.T
AdditionalUsersDN: "ou=users",
BaseDN: "dc=example,dc=com",
StartTLS: true,
- TLS: &schema.TLSConfig{
+ TLS: &schema.TLS{
SkipVerify: true,
},
},
@@ -5380,11 +5380,11 @@ func TestShouldReturnLDAPSAlreadySecuredWhenStartTLSAttempted(t *testing.T) {
mockClient := NewMockLDAPClient(ctrl)
provider := NewLDAPUserProviderWithFactory(
- schema.LDAPAuthenticationBackend{
+ schema.AuthenticationBackendLDAP{
Address: testLDAPSAddress,
User: "cn=admin,dc=example,dc=com",
Password: "password",
- Attributes: schema.LDAPAuthenticationAttributes{
+ Attributes: schema.AuthenticationBackendLDAPAttributes{
Username: "uid",
Mail: "mail",
DisplayName: "displayName",
@@ -5394,7 +5394,7 @@ func TestShouldReturnLDAPSAlreadySecuredWhenStartTLSAttempted(t *testing.T) {
AdditionalUsersDN: "ou=users",
BaseDN: "dc=example,dc=com",
StartTLS: true,
- TLS: &schema.TLSConfig{
+ TLS: &schema.TLS{
SkipVerify: true,
},
},