/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at legal-notices/CDDLv1_0.txt
|
* or http://forgerock.org/license/CDDLv1.0.html.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at legal-notices/CDDLv1_0.txt.
|
* If applicable, add the following below this CDDL HEADER, with the
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
* information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Copyright 2006-2008 Sun Microsystems, Inc.
|
* Portions Copyright 2014-2015 ForgeRock AS
|
*/
|
package org.opends.server.tools;
|
|
import java.io.File;
|
import java.io.FileWriter;
|
import java.util.ArrayList;
|
|
import org.opends.server.TestCaseUtils;
|
import org.opends.server.core.DirectoryServer;
|
import org.opends.server.protocols.ldap.LDAPResultCode;
|
import org.testng.annotations.AfterClass;
|
import org.testng.annotations.BeforeClass;
|
import org.testng.annotations.DataProvider;
|
import org.testng.annotations.Test;
|
|
import static org.opends.server.util.ServerConstants.*;
|
import static org.testng.Assert.*;
|
|
/**
|
* A set of test cases for the LDAPModify tool.
|
*/
|
@SuppressWarnings("javadoc")
|
public class LDAPModifyTestCase
|
extends ToolsTestCase
|
{
|
/** The path to a file containing an invalid bind password. */
|
private String invalidPasswordFile;
|
|
/** The path to a file containing a valid bind password. */
|
private String validPasswordFile;
|
|
/** The path to a file containing a simple, valid modification. */
|
private String modifyFilePath;
|
|
|
|
/**
|
* Ensures that the Directory Server is running and performs other necessary
|
* setup.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@BeforeClass
|
public void startServerAndCreatePasswordFiles()
|
throws Exception
|
{
|
TestCaseUtils.startServer();
|
|
TestCaseUtils.dsconfig(
|
"set-sasl-mechanism-handler-prop",
|
"--handler-name", "DIGEST-MD5",
|
"--set", "server-fqdn:" + "127.0.0.1");
|
|
File pwFile = File.createTempFile("valid-bind-password-", ".txt");
|
pwFile.deleteOnExit();
|
FileWriter fileWriter = new FileWriter(pwFile);
|
fileWriter.write("password" + System.getProperty("line.separator"));
|
fileWriter.close();
|
validPasswordFile = pwFile.getAbsolutePath();
|
|
pwFile = File.createTempFile("invalid-bind-password-", ".txt");
|
pwFile.deleteOnExit();
|
fileWriter = new FileWriter(pwFile);
|
fileWriter.write("wrongPassword" + System.getProperty("line.separator"));
|
fileWriter.close();
|
invalidPasswordFile = pwFile.getAbsolutePath();
|
|
modifyFilePath = TestCaseUtils.createTempFile("dn: o=test",
|
"changetype: modify",
|
"replace: description",
|
"description: foo");
|
}
|
|
|
@AfterClass
|
public void tearDown() throws Exception {
|
|
TestCaseUtils.dsconfig(
|
"set-sasl-mechanism-handler-prop",
|
"--handler-name", "DIGEST-MD5",
|
"--remove", "server-fqdn:" + "127.0.0.1");
|
}
|
|
/**
|
* Retrieves sets of invalid arguments that may not be used to initialize
|
* the LDAPModify tool.
|
*
|
* @return Sets of invalid arguments that may not be used to initialize the
|
* LDAPModify tool.
|
*/
|
@DataProvider(name = "invalidArgs")
|
public Object[][] getInvalidArgumentLists()
|
{
|
ArrayList<String[]> argLists = new ArrayList<>();
|
ArrayList<String> reasonList = new ArrayList<>();
|
|
String[] args;
|
args = new String[]
|
{
|
"-D"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-D' argument");
|
|
args = new String[]
|
{
|
"-w"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-w' argument");
|
|
args = new String[]
|
{
|
"-j"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-j' argument");
|
|
args = new String[]
|
{
|
"-Y"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-Y' argument");
|
|
args = new String[]
|
{
|
"-i"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-i' argument");
|
|
args = new String[]
|
{
|
"-K"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-K' argument");
|
|
args = new String[]
|
{
|
"-P"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-P' argument");
|
|
args = new String[]
|
{
|
"-W"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-W' argument");
|
|
args = new String[]
|
{
|
"-h"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-h' argument");
|
|
args = new String[]
|
{
|
"-p"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-p' argument");
|
|
args = new String[]
|
{
|
"-V"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-V' argument");
|
|
args = new String[]
|
{
|
"-f"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-f' argument");
|
|
args = new String[]
|
{
|
"-J"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-J' argument");
|
|
args = new String[]
|
{
|
"-o"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '-o' argument");
|
|
args = new String[]
|
{
|
"-assertionFilter"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '--assertionFilter' argument");
|
|
args = new String[]
|
{
|
"--preReadAttributes"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '--preReadAttributes' argument");
|
|
args = new String[]
|
{
|
"--postReadAttributes"
|
};
|
argLists.add(args);
|
reasonList.add("No value for '--postReadAttributes' argument");
|
|
args = new String[]
|
{
|
"-D", "cn=Directory Manager",
|
"-j", "no.such.file",
|
};
|
argLists.add(args);
|
reasonList.add("Invalid bind password file path");
|
|
args = new String[]
|
{
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-j", validPasswordFile,
|
};
|
argLists.add(args);
|
reasonList.add("Both bind password and password file");
|
|
args = new String[]
|
{
|
"-V", "nonnumeric",
|
};
|
argLists.add(args);
|
reasonList.add("Non-numeric LDAP version");
|
|
args = new String[]
|
{
|
"-V", "1",
|
};
|
argLists.add(args);
|
reasonList.add("Invalid LDAP version");
|
|
args = new String[]
|
{
|
"-J", "1.2.3.4:invalidcriticality",
|
};
|
argLists.add(args);
|
reasonList.add("Invalid control criticality");
|
|
args = new String[]
|
{
|
"-p", "nonnumeric",
|
};
|
argLists.add(args);
|
reasonList.add("Non-numeric port");
|
|
args = new String[]
|
{
|
"-p", "999999",
|
};
|
argLists.add(args);
|
reasonList.add("Port value out of range");
|
|
args = new String[]
|
{
|
"-r",
|
"-K", "key.store.file",
|
};
|
argLists.add(args);
|
reasonList.add("SASL external without SSL or StartTLS");
|
|
args = new String[]
|
{
|
"-Z",
|
"-r",
|
};
|
argLists.add(args);
|
reasonList.add("SASL external without keystore file");
|
|
args = new String[]
|
{
|
"--assertionFilter", "(invalid)"
|
};
|
argLists.add(args);
|
reasonList.add("Invalid LDAP assertion filter");
|
|
args = new String[]
|
{
|
"-f", "no.such.file"
|
};
|
argLists.add(args);
|
reasonList.add("No such LDIF file");
|
|
|
Object[][] returnArray = new Object[argLists.size()][2];
|
for (int i=0; i < argLists.size(); i++)
|
{
|
returnArray[i][0] = argLists.get(i);
|
returnArray[i][1] = reasonList.get(i);
|
}
|
return returnArray;
|
}
|
|
|
|
/**
|
* Tests the LDAPModify tool with sets of invalid arguments.
|
*
|
* @param args The set of arguments to use for the LDAPModify tool.
|
* @param invalidReason The reason the provided arguments were invalid.
|
*/
|
@Test(dataProvider = "invalidArgs")
|
public void testInvalidArguments(String[] args, String invalidReason)
|
{
|
assertFalse(LDAPModify.mainModify(args, false, null, null) == 0,
|
"Should have been invalid because: " + invalidReason);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using LDAPv2.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testLDAPv2Modify()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-V", "2",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using LDAPv3.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testLDAPv3Modify()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-V", "3",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation over SSL using blind trust.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testSSLBlindTrust()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapsPort()),
|
"-Z",
|
"-X",
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation over SSL using a trust store.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testSSLTrustStore()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapsPort()),
|
"-Z",
|
"-P", trustStorePath,
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation with StartTSL using blind trust.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testStartTLSBlindTrust()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-q",
|
"-X",
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation with StartTLS using a trust store.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testStartTLSTrustStore()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-q",
|
"-P", trustStorePath,
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation over SSL using a trust store and SASL
|
* EXTERNAL.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testSSLTrustStoreSASLExternal()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: cn=Test User,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"cn: Test User",
|
"givenName: Test",
|
"ds-privilege-name: bypass-acl",
|
"sn: User");
|
|
|
String keyStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.keystore";
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapsPort()),
|
"-Z",
|
"-K", keyStorePath,
|
"-W", "password",
|
"-P", trustStorePath,
|
"-r",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation over SSL using a trust store and SASL
|
* EXTERNAL while explicitly specifying a valid client certificate.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testSSLTrustStoreSASLExternalValidClientCert()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: cn=Test User,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"cn: Test User",
|
"givenName: Test",
|
"ds-privilege-name: bypass-acl",
|
"sn: User");
|
|
|
String keyStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.keystore";
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapsPort()),
|
"-Z",
|
"-K", keyStorePath,
|
"-W", "password",
|
"-N", "client-cert",
|
"-P", trustStorePath,
|
"-r",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation over SSL using a trust store and SASL
|
* EXTERNAL while explicitly specifying an invalid client certificate.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testSSLTrustStoreSASLExternalInvalidClientCert()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: cn=Test User,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"cn: Test User",
|
"givenName: Test",
|
"ds-privilege-name: bypass-acl",
|
"sn: User");
|
|
|
String keyStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.keystore";
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapsPort()),
|
"-Z",
|
"-K", keyStorePath,
|
"-W", "password",
|
"-N", "invalid",
|
"-P", trustStorePath,
|
"-r",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertFalse(LDAPModify.mainModify(args, false, null, null) == 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation with StartTLS using a trust store and SASL
|
* EXTERNAL.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testStartTLSTrustStoreSASLExternal()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: cn=Test User,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"cn: Test User",
|
"givenName: Test",
|
"ds-privilege-name: bypass-acl",
|
"sn: User");
|
|
|
String keyStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.keystore";
|
String trustStorePath = DirectoryServer.getInstanceRoot() + File.separator +
|
"config" + File.separator + "client.truststore";
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-q",
|
"-K", keyStorePath,
|
"-W", "password",
|
"-P", trustStorePath,
|
"-r",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using CRAM-MD5 authentication.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testCRAMMD5()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: uid=test.user,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"uid: test.user",
|
"givenName: Test",
|
"sn: User",
|
"cn: Test User",
|
"ds-privilege-name: bypass-acl",
|
"userPassword: password",
|
"ds-pwp-password-policy-dn: cn=Clear UserPassword Policy," +
|
"cn=Password Policies,cn=config");
|
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-o", "mech=CRAM-MD5",
|
"-o", "authid=u:test.user",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using DIGEST-MD5 authentication.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDigestMD5()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: uid=test.user,o=test",
|
"objectClass: top",
|
"objectClass: person",
|
"objectClass: organizationalPerson",
|
"objectClass: inetOrgPerson",
|
"uid: test.user",
|
"givenName: Test",
|
"sn: User",
|
"cn: Test User",
|
"ds-privilege-name: bypass-acl",
|
"userPassword: password",
|
"ds-pwp-password-policy-dn: cn=Clear UserPassword Policy," +
|
"cn=Password Policies,cn=config");
|
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-o", "mech=DIGEST-MD5",
|
"-o", "authid=u:test.user",
|
"-o", "authzid=u:test.user",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using PLAIN authentication.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testPLAIN()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-o", "mech=PLAIN",
|
"-o", "authid=dn:cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the --dry-run client-side option.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyClientSideNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--dry-run",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple add operation using the --dry-run client-side option.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddClientSideNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"o: test");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--dry-run",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple delete operation using the --dry-run client-side option.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDeleteClientSideNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--dry-run",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using the --dry-run client-side option.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNClientSideNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--dry-run",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using LDAP No-Op control.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using LDAP No-Op control with an alternate
|
* name.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPNoOpAltName()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", "no-op:true",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple add operation using LDAP No-Op control.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddLDAPNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple add operation using LDAP No-Op control with an alternate
|
* name.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddLDAPNoOpAltName()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", "no-op:true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple delete operation using LDAP No-Op control.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDeleteLDAPNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple delete operation using LDAP No-Op control with an alternate
|
* name.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDeleteLDAPNoOpAltName()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", "no-op:true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using LDAP No-Op control.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNLDAPNoOp()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using LDAP No-Op control with an
|
* alternate name.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNLDAPNoOpAltName()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", "no-op:true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err),
|
LDAPResultCode.NO_OPERATION);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP assertion control in which
|
* the assertion is true.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPAssertionTrue()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--assertionFilter", "(o=test)",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP assertion control in which
|
* the assertion is not true.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPAssertionFalse()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--assertionFilter", "(o=foo)",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertFalse(LDAPModify.mainModify(args, false, null, null) == 0);
|
}
|
|
|
|
/**
|
* Tests a simple delete operation using the LDAP assertion control in which
|
* the assertion is true.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDeleteLDAPAssertionTrue()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile("dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--assertionFilter", "(o=test)",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using the LDAP assertion control in
|
* which the assertion is true.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNLDAPAssertionTrue()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String path = TestCaseUtils.createTempFile("dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--assertionFilter", "(ou=People)",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP pre-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPPreReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--preReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP pre-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPPreReadMultipleAttributes()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--preReadAttributes", "o,objectClass",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple delete operation using the LDAP pre-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDeleteLDAPPreReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile("dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--preReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using the LDAP pre-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNLDAPPreReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String path = TestCaseUtils.createTempFile("dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--preReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP post-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPostReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--postReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify operation using the LDAP post-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyLDAPPostReadMultipleAttributes()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--postReadAttributes", "o,objectClass",
|
"--noPropertiesFile",
|
"-f", modifyFilePath
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple add operation using the LDAP post-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddLDAPostReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--postReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a simple modify DN operation using the LDAP post-read control with a
|
* single attribute.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDNLDAPostReadSingleAttribute()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
TestCaseUtils.addEntry(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String path = TestCaseUtils.createTempFile("dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--postReadAttributes", "o",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests a modify operation that will fail on the server side.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testServerSideModifyFailure()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: modify",
|
"replace: description",
|
"description: foo");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--postReadAttributes", "o,objectClass",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertFalse(LDAPModify.mainModify(args, false, null, null) == 0);
|
}
|
|
|
|
/**
|
* Tests performing an add operation with an explicit changetype.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddExplicitChangeType()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests performing an add operation with an implied changetype.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testAddImplicitChangeType()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-a",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests performing a modify DN operation.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testModifyDN()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newRDN: ou=Users",
|
"deleteOldRDN: 1");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests performing a delete operation.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testDelete()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"objectClass: top",
|
"objectClass: organizationalUnit",
|
"ou: People",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests the inclusion of multiple arbitrary controls in the request to the
|
* server.
|
*
|
* @throws Exception If an unexpectd problem occurs.
|
*/
|
@Test
|
public void testMultipleRequestControls()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"changetype: delete");
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-J", OID_MANAGE_DSAIT_CONTROL + ":false",
|
"-J", OID_SUBTREE_DELETE_CONTROL + ":true",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
assertEquals(LDAPModify.mainModify(args, false, null, System.err), 0);
|
}
|
|
|
|
/**
|
* Tests with various forms of malformed LDIF changes.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testMalformedLDIF()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"description: No Changetype",
|
"",
|
"dn: o=test",
|
"changetype: invalid",
|
"replace: description",
|
"description: Invalid Changetype",
|
"",
|
"dn: o=test",
|
"changetype: modify",
|
"invalid: description",
|
"description: Invalid Attribute Modification",
|
"",
|
"dn: ou=People,o=test",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: add",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newrdn: invalid",
|
"deleteOldRDN: 1",
|
"",
|
"dn: ou=People,o=test",
|
"changetype: moddn",
|
"newrdn: ou=Users",
|
"deleteOldRDN: invalid");
|
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"-c",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
LDAPModify.mainModify(args, false, null,null);
|
}
|
|
|
|
/**
|
* Tests a modify attempt failure without continueOnError.
|
*
|
* @throws Exception If an unexpected problem occurs.
|
*/
|
@Test
|
public void testMalformedLDIFNoContinueOnError()
|
throws Exception
|
{
|
TestCaseUtils.initializeTestBackend(true);
|
|
String path = TestCaseUtils.createTempFile(
|
"dn: o=test",
|
"description: No Changetype",
|
"",
|
"dn: o=test",
|
"changetype: invalid",
|
"replace: description",
|
"description: Invalid Changetype");
|
|
|
String[] args =
|
{
|
"-h", "127.0.0.1",
|
"-p", String.valueOf(TestCaseUtils.getServerLdapPort()),
|
"-D", "cn=Directory Manager",
|
"-w", "password",
|
"--noPropertiesFile",
|
"-f", path
|
};
|
|
LDAPModify.mainModify(args, false, null,null);
|
}
|
|
|
|
/**
|
* Tests the LDAPModify tool with the "--help" option.
|
*/
|
@Test
|
public void testHelp()
|
{
|
String[] args = { "--help" };
|
assertEquals(LDAPModify.mainModify(args, false, null, null), 0);
|
|
args = new String[] { "-H" };
|
assertEquals(LDAPModify.mainModify(args, false, null, null), 0);
|
|
args = new String[] { "-?" };
|
assertEquals(LDAPModify.mainModify(args, false, null, null), 0);
|
}
|
}
|