/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at legal-notices/CDDLv1_0.txt
|
* or http://forgerock.org/license/CDDLv1.0.html.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at legal-notices/CDDLv1_0.txt.
|
* If applicable, add the following below this CDDL HEADER, with the
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
* information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Copyright 2006-2009 Sun Microsystems, Inc.
|
* Portions Copyright 2012-2015 ForgeRock AS.
|
*/
|
package org.opends.server.protocols.ldap;
|
|
import static org.opends.server.config.ConfigConstants.*;
|
import static org.testng.Assert.*;
|
|
import java.util.Collection;
|
import java.util.LinkedList;
|
import java.util.List;
|
import java.util.Map;
|
|
import org.forgerock.i18n.LocalizableMessage;
|
import org.opends.server.TestCaseUtils;
|
import org.opends.server.admin.std.server.LDAPConnectionHandlerCfg;
|
import org.opends.server.api.ClientConnection;
|
import org.forgerock.opendj.config.server.ConfigException;
|
import org.opends.server.core.DirectoryServer;
|
import org.opends.server.types.Attribute;
|
import org.opends.server.types.AttributeType;
|
import org.opends.server.types.Attributes;
|
import org.opends.server.types.DN;
|
import org.opends.server.types.Entry;
|
import org.opends.server.types.SSLClientAuthPolicy;
|
import org.testng.annotations.BeforeClass;
|
import org.testng.annotations.Test;
|
|
@SuppressWarnings("javadoc")
|
public class TestLDAPConnectionHandler extends LdapTestCase {
|
|
private static LocalizableMessage reasonMsg= LocalizableMessage.raw("Don't need a reason.");
|
|
/**
|
* Once-only initialization.
|
*
|
* @throws Exception
|
* If an unexpected error occurred.
|
*/
|
@BeforeClass
|
public void setUp() throws Exception {
|
// This test suite depends on having the schema available, so we'll
|
// start the server.
|
TestCaseUtils.startServer();
|
}
|
|
/**
|
* Creates two handlers, one which is SSL type. Then change some values via the setter
|
* methods.
|
*
|
* @throws Exception if the handler cannot be instantiated.
|
*/
|
@Test
|
public void testLDAPConnectionHandler() throws Exception {
|
Entry LDAPHandlerEntry=null;
|
|
LDAPHandlerEntry=TestCaseUtils.makeEntry(
|
"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
|
"objectClass: top",
|
"objectClass: ds-cfg-connection-handler",
|
"objectClass: ds-cfg-ldap-connection-handler",
|
"cn: LDAP Connection Handler",
|
"ds-cfg-java-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
|
"ds-cfg-enabled: true",
|
"ds-cfg-listen-address: 0.0.0.0",
|
"ds-cfg-accept-backlog: 128",
|
"ds-cfg-allow-ldap-v2: false",
|
"ds-cfg-keep-stats: false",
|
"ds-cfg-use-tcp-keep-alive: true",
|
"ds-cfg-use-tcp-no-delay: true",
|
"ds-cfg-allow-tcp-reuse-address: true",
|
"ds-cfg-send-rejection-notice: true",
|
"ds-cfg-max-request-size: 5 megabytes",
|
"ds-cfg-num-request-handlers: 2",
|
"ds-cfg-allow-start-tls: false",
|
"ds-cfg-use-ssl: false",
|
"ds-cfg-ssl-client-auth-policy: optional",
|
"ds-cfg-ssl-cert-nickname: server-cert",
|
"ds-cfg-key-manager-provider: cn=JKS,cn=Key Manager Providers,cn=config",
|
"ds-cfg-trust-manager-provider: cn=JKS,cn=Trust Manager Providers,cn=config");
|
LDAPConnectionHandler LDAPConnHandler=getLDAPHandlerInstance(LDAPHandlerEntry);
|
LDAPConnHandler.allowLDAPv2();
|
LDAPConnHandler.allowStartTLS();
|
LDAPConnHandler.keepStats();
|
LDAPConnHandler.toString(new StringBuilder());
|
LDAPConnHandler.toString();
|
LDAPStatistics tracker=LDAPConnHandler.getStatTracker();
|
Map<String,String> alerts = LDAPConnHandler.getAlerts();
|
String c=LDAPConnHandler.getClassName();
|
DN dn = LDAPConnHandler.getComponentEntryDN();
|
Collection<String> cips = LDAPConnHandler.getEnabledSSLCipherSuites();
|
Collection<String> protos = LDAPConnHandler.getEnabledSSLProtocols();
|
int maxReqSize = LDAPConnHandler.getMaxRequestSize();
|
String shutListName=LDAPConnHandler.getShutdownListenerName();
|
SSLClientAuthPolicy policy = LDAPConnHandler.getSSLClientAuthPolicy();
|
Collection<ClientConnection> cons=LDAPConnHandler.getClientConnections();
|
LDAPConnHandler.processServerShutdown(reasonMsg);
|
//Reset some things for the SSL handler
|
Attribute useSSL=Attributes.create(ATTR_USE_SSL, String.valueOf(false));
|
Attribute startTls=Attributes.create(ATTR_ALLOW_STARTTLS, String.valueOf(false));
|
AttributeType attrType=DirectoryServer.getAttributeTypeOrDefault(ATTR_LISTEN_PORT);
|
Attribute a=Attributes.empty(attrType);
|
LDAPHandlerEntry.removeAttribute(a, null);
|
LDAPHandlerEntry.removeAttribute(useSSL, null);
|
LDAPHandlerEntry.removeAttribute(startTls, null);
|
Attribute useSSL1=Attributes.create(ATTR_USE_SSL, String.valueOf(true));
|
Attribute startTls1=Attributes.create(ATTR_ALLOW_STARTTLS, String.valueOf(false));
|
LDAPHandlerEntry.addAttribute(useSSL1,null);
|
LDAPHandlerEntry.addAttribute(startTls1,null);
|
LDAPConnectionHandler LDAPSConnHandler = getLDAPHandlerInstance(LDAPHandlerEntry);
|
LDAPSConnHandler.finalizeConnectionHandler(reasonMsg);
|
LDAPConnHandler.processServerShutdown(reasonMsg);
|
}
|
|
/**
|
* Start a handler an then give its hasAcceptableConfiguration a ConfigEntry with
|
* numerous invalid cases and single-valued attrs with duplicate values.
|
*
|
* @throws Exception if handler cannot be instantiated or the configuration is
|
* accepted.
|
*/
|
@Test(expectedExceptions = ConfigException.class)
|
public void testBadLDAPConnectionHandlerConfiguration() throws Exception
|
{
|
Entry BadHandlerEntry=TestCaseUtils.makeEntry(
|
"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
|
"objectClass: top",
|
"objectClass: ds-cfg-connection-handler",
|
"objectClass: ds-cfg-ldap-connection-handler",
|
"cn: LDAP Connection Handler",
|
"ds-cfg-java-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
|
"ds-cfg-enabled: true",
|
"ds-cfg-listen-address: 0.0.0.0",
|
"ds-cfg-accept-backlog: 128",
|
"ds-cfg-allow-ldap-v2: false",
|
"ds-cfg-keep-stats: false",
|
"ds-cfg-use-tcp-keep-alive: true",
|
"ds-cfg-use-tcp-no-delay: true",
|
"ds-cfg-allow-tcp-reuse-address: true",
|
"ds-cfg-send-rejection-notice: true",
|
"ds-cfg-max-request-size: 5 megabytes",
|
"ds-cfg-num-request-handlers: 2",
|
"ds-cfg-allow-start-tls: false",
|
"ds-cfg-use-ssl: false",
|
"ds-cfg-ssl-client-auth-policy: optional",
|
"ds-cfg-ssl-cert-nickname: server-cert",
|
"ds-cfg-key-manager-provider: cn=JKS,cn=Key Manager Providers,cn=config",
|
"ds-cfg-trust-manager-provider: cn=JKS,cn=Trust Manager Providers,cn=config");
|
|
// Add some invalid attrs and some duplicate attrs
|
Attribute a2=Attributes.create(ATTR_LISTEN_PORT, String.valueOf(389));
|
Attribute a2a=Attributes.create(ATTR_LISTEN_PORT, String.valueOf(70000));
|
Attribute a3=Attributes.create(ATTR_LISTEN_ADDRESS, "localhost");
|
Attribute a3a=Attributes.create(ATTR_LISTEN_ADDRESS, "FAFASFSDFSADFASDFSDFSDAFAS");
|
Attribute a4=Attributes.create(ATTR_ACCEPT_BACKLOG, String.valueOf(Long.MAX_VALUE));
|
Attribute a5=Attributes.create(ATTR_ALLOWED_CLIENT, "129.800.990.45");
|
Attribute a6=Attributes.create(ATTR_DENIED_CLIENT, "129.");
|
Attribute a7=Attributes.create(ATTR_ALLOW_LDAPV2, "45");
|
Attribute a8=Attributes.create(ATTR_KEEP_LDAP_STATS, "45");
|
Attribute a9=Attributes.create(ATTR_SEND_REJECTION_NOTICE, "45");
|
Attribute a10=Attributes.create(ATTR_USE_TCP_KEEPALIVE, "45");
|
Attribute a11=Attributes.create(ATTR_USE_TCP_NODELAY, "45");
|
Attribute a12=Attributes.create(ATTR_ALLOW_REUSE_ADDRESS, "45");
|
Attribute a13=Attributes.create(ATTR_MAX_REQUEST_SIZE, "45 FLUBBERBYTES");
|
Attribute a14=Attributes.create(ATTR_USE_SSL, "45");
|
Attribute a15=Attributes.create(ATTR_ALLOW_STARTTLS, "45");
|
BadHandlerEntry.addAttribute(a2, null);
|
BadHandlerEntry.addAttribute(a3, null);
|
BadHandlerEntry.addAttribute(a2a, null);
|
BadHandlerEntry.addAttribute(a3a, null);
|
BadHandlerEntry.addAttribute(a4, null);
|
BadHandlerEntry.addAttribute(a5, null);
|
BadHandlerEntry.addAttribute(a6, null);
|
BadHandlerEntry.addAttribute(a7, null);
|
BadHandlerEntry.addAttribute(a8, null);
|
BadHandlerEntry.addAttribute(a9, null);
|
BadHandlerEntry.addAttribute(a10, null);
|
BadHandlerEntry.addAttribute(a11, null);
|
BadHandlerEntry.addAttribute(a12, null);
|
BadHandlerEntry.addAttribute(a13, null);
|
BadHandlerEntry.addAttribute(a14, null);
|
BadHandlerEntry.addAttribute(a15, null);
|
|
LdapTestCase.getConfiguration(BadHandlerEntry);
|
}
|
|
/**
|
* Create handler and then change most of its values and see if
|
* it is acceptable and applied.
|
* @throws Exception if handler cannot be instantiated.
|
*/
|
@Test
|
public void testGoodLDAPConnectionHandlerConfiguration() throws Exception
|
{
|
Entry GoodHandlerEntry=TestCaseUtils.makeEntry(
|
"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
|
"objectClass: top",
|
"objectClass: ds-cfg-connection-handler",
|
"objectClass: ds-cfg-ldap-connection-handler",
|
"cn: LDAP Connection Handler",
|
"ds-cfg-java-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
|
"ds-cfg-enabled: true",
|
"ds-cfg-listen-address: 0.0.0.0",
|
"ds-cfg-accept-backlog: 128",
|
"ds-cfg-allow-ldap-v2: false",
|
"ds-cfg-keep-stats: false",
|
"ds-cfg-use-tcp-keep-alive: true",
|
"ds-cfg-use-tcp-no-delay: true",
|
"ds-cfg-allow-tcp-reuse-address: true",
|
"ds-cfg-send-rejection-notice: true",
|
"ds-cfg-max-request-size: 5 megabytes",
|
"ds-cfg-num-request-handlers: 2",
|
"ds-cfg-allow-start-tls: false",
|
"ds-cfg-use-ssl: true",
|
"ds-cfg-ssl-client-auth-policy: optional",
|
"ds-cfg-ssl-cert-nickname: server-cert",
|
"ds-cfg-key-manager-provider: cn=JKS,cn=Key Manager Providers,cn=config",
|
"ds-cfg-trust-manager-provider: cn=JKS,cn=Trust Manager Providers,cn=config");
|
LDAPConnectionHandler LDAPConnHandler=getLDAPHandlerInstance(GoodHandlerEntry);
|
//Make attrTypes to remove
|
AttributeType at0=DirectoryServer.getAttributeTypeOrDefault(ATTR_LISTEN_PORT);
|
// AttributeType at1=DirectoryServer.getAttributeType(ATTR_LISTEN_ADDRESS, true);
|
// Attribute rAttr1=new Attribute(at1);
|
// GoodHandlerEntry.removeAttribute(rAttr1, null);
|
AttributeType at2=DirectoryServer.getAttributeTypeOrDefault(ATTR_ALLOW_LDAPV2);
|
AttributeType at3=DirectoryServer.getAttributeTypeOrDefault(ATTR_ALLOW_LDAPV2);
|
AttributeType at4=DirectoryServer.getAttributeTypeOrDefault(ATTR_KEEP_LDAP_STATS);
|
AttributeType at5=DirectoryServer.getAttributeTypeOrDefault(ATTR_SEND_REJECTION_NOTICE);
|
AttributeType at6=DirectoryServer.getAttributeTypeOrDefault(ATTR_USE_TCP_KEEPALIVE);
|
AttributeType at7=DirectoryServer.getAttributeTypeOrDefault(ATTR_USE_TCP_NODELAY);
|
AttributeType at8=DirectoryServer.getAttributeTypeOrDefault(ATTR_ALLOW_REUSE_ADDRESS);
|
AttributeType at9=DirectoryServer.getAttributeTypeOrDefault(ATTR_USE_SSL);
|
AttributeType at10=DirectoryServer.getAttributeTypeOrDefault(ATTR_ALLOW_STARTTLS);
|
AttributeType at11=DirectoryServer.getAttributeTypeOrDefault(ATTR_MAX_REQUEST_SIZE);
|
AttributeType at12=DirectoryServer.getAttributeTypeOrDefault(ATTR_ACCEPT_BACKLOG);
|
//Remove them
|
Attribute rAttr0=Attributes.empty(at0);
|
GoodHandlerEntry.removeAttribute(rAttr0, null);
|
|
Attribute rAttr2=Attributes.empty(at2);
|
GoodHandlerEntry.removeAttribute(rAttr2, null);
|
Attribute rAttr3=Attributes.empty(at3);
|
GoodHandlerEntry.removeAttribute(rAttr3, null);
|
Attribute rAttr4=Attributes.empty(at4);
|
GoodHandlerEntry.removeAttribute(rAttr4, null);
|
Attribute rAttr5=Attributes.empty(at5);
|
GoodHandlerEntry.removeAttribute(rAttr5, null);
|
Attribute rAttr6=Attributes.empty(at6);
|
GoodHandlerEntry.removeAttribute(rAttr6, null);
|
Attribute rAttr7=Attributes.empty(at7);
|
GoodHandlerEntry.removeAttribute(rAttr7, null);
|
Attribute rAttr8=Attributes.empty(at8);
|
Attribute rAttr9=Attributes.empty(at9);
|
Attribute rAttr10=Attributes.empty(at10);
|
Attribute rAttr11=Attributes.empty(at11);
|
Attribute rAttr12=Attributes.empty(at12);
|
GoodHandlerEntry.removeAttribute(rAttr8, null);
|
GoodHandlerEntry.removeAttribute(rAttr9, null);
|
GoodHandlerEntry.removeAttribute(rAttr10, null);
|
GoodHandlerEntry.removeAttribute(rAttr11, null);
|
GoodHandlerEntry.removeAttribute(rAttr12, null);
|
//Make new AttrTypes with different values
|
long newPort = TestCaseUtils.findFreePort();
|
Attribute a2=Attributes.create(ATTR_LISTEN_PORT, String.valueOf(newPort));
|
//uncomment if want to test listen address
|
// Attribute a3=new Attribute(ATTR_LISTEN_ADDRESS, "localhost");
|
Attribute a4=Attributes.create(ATTR_ACCEPT_BACKLOG, String.valueOf(25));
|
Attribute a5=Attributes.create(ATTR_ALLOWED_CLIENT, "129.56.56.45");
|
Attribute a6=Attributes.create(ATTR_DENIED_CLIENT, "129.*.*.90");
|
Attribute a7=Attributes.create(ATTR_ALLOW_LDAPV2, "true");
|
Attribute a8=Attributes.create(ATTR_KEEP_LDAP_STATS, "true");
|
Attribute a9=Attributes.create(ATTR_SEND_REJECTION_NOTICE, "false");
|
Attribute a10=Attributes.create(ATTR_USE_TCP_KEEPALIVE, "false");
|
Attribute a11=Attributes.create(ATTR_USE_TCP_NODELAY, "false");
|
Attribute a12=Attributes.create(ATTR_ALLOW_REUSE_ADDRESS, "false");
|
Attribute a13=Attributes.create(ATTR_MAX_REQUEST_SIZE, "45 kb");
|
Attribute a14=Attributes.create(ATTR_USE_SSL, "false");
|
Attribute a15=Attributes.create(ATTR_ALLOW_STARTTLS, "true");
|
//Add them
|
GoodHandlerEntry.addAttribute(a2, null);
|
// GoodHandlerEntry.addAttribute(a3, null);
|
GoodHandlerEntry.addAttribute(a4, null);
|
GoodHandlerEntry.addAttribute(a5, null);
|
GoodHandlerEntry.addAttribute(a6, null);
|
GoodHandlerEntry.addAttribute(a7, null);
|
GoodHandlerEntry.addAttribute(a8, null);
|
GoodHandlerEntry.addAttribute(a9, null);
|
GoodHandlerEntry.addAttribute(a10, null);
|
GoodHandlerEntry.addAttribute(a11, null);
|
GoodHandlerEntry.addAttribute(a12, null);
|
GoodHandlerEntry.addAttribute(a13, null);
|
GoodHandlerEntry.addAttribute(a14, null);
|
GoodHandlerEntry.addAttribute(a15, null);
|
List<LocalizableMessage> reasons = new LinkedList<>();
|
LDAPConnectionHandlerCfg config = LdapTestCase.getConfiguration(GoodHandlerEntry);
|
//see if we're ok
|
boolean ret=LDAPConnHandler.isConfigurationChangeAcceptable(config, reasons);
|
assertTrue(ret);
|
//apply it
|
LDAPConnHandler.applyConfigurationChange(config);
|
LDAPConnHandler.finalizeConnectionHandler(reasonMsg);
|
}
|
}
|