Modifications related to issue
https://opends.dev.java.net/issues/show_bug.cgi?id=582
ldap tools (ldapsearch, ldapdelete, ldapcompare, ldapmodify,
ldappasswordmodify) will now be able to use properties files.
| | |
| | | StringArgument saslOptions = null; |
| | | StringArgument trustStorePath = null; |
| | | StringArgument trustStorePassword = null; |
| | | StringArgument propertiesFileArgument = null; |
| | | BooleanArgument noPropertiesFileArgument = null; |
| | | |
| | | ArrayList<String> dnStrings = new ArrayList<String> (); |
| | | String attributeType = null; |
| | |
| | | |
| | | try |
| | | { |
| | | propertiesFileArgument = new StringArgument("propertiesFilePath", |
| | | null, OPTION_LONG_PROP_FILE_PATH, |
| | | false, false, true, OPTION_VALUE_PROP_FILE_PATH, null, null, |
| | | INFO_DESCRIPTION_PROP_FILE_PATH.get()); |
| | | argParser.addArgument(propertiesFileArgument); |
| | | argParser.setFilePropertiesArgument(propertiesFileArgument); |
| | | |
| | | noPropertiesFileArgument = new BooleanArgument( |
| | | "noPropertiesFileArgument", null, OPTION_LONG_NO_PROP_FILE, |
| | | INFO_DESCRIPTION_NO_PROP_FILE.get()); |
| | | argParser.addArgument(noPropertiesFileArgument); |
| | | argParser.setNoPropertiesFileArgument(noPropertiesFileArgument); |
| | | |
| | | hostName = new StringArgument("host", OPTION_SHORT_HOST, |
| | | OPTION_LONG_HOST, false, false, true, |
| | | OPTION_VALUE_HOST, "localhost", null, |
| | | INFO_DESCRIPTION_HOST.get()); |
| | | hostName.setPropertyName(OPTION_LONG_HOST); |
| | | argParser.addArgument(hostName); |
| | | |
| | | port = new IntegerArgument("port", OPTION_SHORT_PORT, |
| | | OPTION_LONG_PORT, false, false, true, |
| | | OPTION_VALUE_PORT, 389, null, |
| | | INFO_DESCRIPTION_PORT.get()); |
| | | port.setPropertyName(OPTION_LONG_PORT); |
| | | argParser.addArgument(port); |
| | | |
| | | useSSL = new BooleanArgument("useSSL", OPTION_SHORT_USE_SSL, |
| | | OPTION_LONG_USE_SSL, |
| | | INFO_DESCRIPTION_USE_SSL.get()); |
| | | useSSL.setPropertyName(OPTION_LONG_USE_SSL); |
| | | argParser.addArgument(useSSL); |
| | | |
| | | startTLS = new BooleanArgument("startTLS", OPTION_SHORT_START_TLS, |
| | | OPTION_LONG_START_TLS, |
| | | INFO_DESCRIPTION_START_TLS.get()); |
| | | startTLS.setPropertyName(OPTION_LONG_START_TLS); |
| | | argParser.addArgument(startTLS); |
| | | |
| | | bindDN = new StringArgument("bindDN", OPTION_SHORT_BINDDN, |
| | | OPTION_LONG_BINDDN, false, false, true, |
| | | OPTION_VALUE_BINDDN, null, null, |
| | | INFO_DESCRIPTION_BINDDN.get()); |
| | | bindDN.setPropertyName(OPTION_LONG_BINDDN); |
| | | argParser.addArgument(bindDN); |
| | | |
| | | bindPassword = new StringArgument("bindPassword", OPTION_SHORT_BINDPWD, |
| | |
| | | OPTION_VALUE_BINDPWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_BINDPASSWORD.get()); |
| | | bindPassword.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindPassword); |
| | | |
| | | bindPasswordFile = |
| | |
| | | false, false, |
| | | OPTION_VALUE_BINDPWD_FILE, null, |
| | | null, INFO_DESCRIPTION_BINDPASSWORDFILE.get()); |
| | | bindPasswordFile.setPropertyName(OPTION_LONG_BINDPWD_FILE); |
| | | argParser.addArgument(bindPasswordFile); |
| | | |
| | | filename = new StringArgument("filename", OPTION_SHORT_FILENAME, |
| | | OPTION_LONG_FILENAME, false, false, |
| | | true, OPTION_VALUE_FILENAME, null, null, |
| | | INFO_COMPARE_DESCRIPTION_FILENAME.get()); |
| | | filename.setPropertyName(OPTION_LONG_FILENAME); |
| | | argParser.addArgument(filename); |
| | | |
| | | saslExternal = |
| | | new BooleanArgument("useSASLExternal", 'r', |
| | | "useSASLExternal", |
| | | INFO_DESCRIPTION_USE_SASL_EXTERNAL.get()); |
| | | saslExternal.setPropertyName("useSASLExternal"); |
| | | argParser.addArgument(saslExternal); |
| | | |
| | | saslOptions = new StringArgument("saslOption", OPTION_SHORT_SASLOPTION, |
| | |
| | | true, true, |
| | | OPTION_VALUE_SASLOPTION, null, null, |
| | | INFO_DESCRIPTION_SASL_PROPERTIES.get()); |
| | | saslOptions.setPropertyName(OPTION_LONG_SASLOPTION); |
| | | argParser.addArgument(saslOptions); |
| | | |
| | | trustAll = new BooleanArgument("trustAll", 'X', "trustAll", |
| | | INFO_DESCRIPTION_TRUSTALL.get()); |
| | | trustAll.setPropertyName("trustAll"); |
| | | argParser.addArgument(trustAll); |
| | | |
| | | keyStorePath = new StringArgument("keyStorePath", |
| | |
| | | OPTION_VALUE_KEYSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPATH.get()); |
| | | keyStorePath.setPropertyName(OPTION_LONG_KEYSTOREPATH); |
| | | argParser.addArgument(keyStorePath); |
| | | |
| | | keyStorePassword = new StringArgument("keyStorePassword", |
| | |
| | | OPTION_LONG_KEYSTORE_PWD, false, false, |
| | | true, "{keyStorePassword}", null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD.get()); |
| | | keyStorePassword.setPropertyName(OPTION_LONG_KEYSTORE_PWD); |
| | | argParser.addArgument(keyStorePassword); |
| | | |
| | | keyStorePasswordFile = |
| | |
| | | OPTION_VALUE_KEYSTORE_PWD_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD_FILE.get()); |
| | | keyStorePasswordFile.setPropertyName(OPTION_LONG_KEYSTORE_PWD_FILE); |
| | | argParser.addArgument(keyStorePasswordFile); |
| | | |
| | | certNickname = |
| | | new StringArgument("certnickname", 'N', "certNickname", |
| | | false, false, true, "{nickname}", null, |
| | | null, INFO_DESCRIPTION_CERT_NICKNAME.get()); |
| | | certNickname.setPropertyName("certNickname"); |
| | | argParser.addArgument(certNickname); |
| | | |
| | | trustStorePath = |
| | |
| | | OPTION_VALUE_TRUSTSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPATH.get()); |
| | | trustStorePath.setPropertyName(OPTION_LONG_TRUSTSTOREPATH); |
| | | argParser.addArgument(trustStorePath); |
| | | |
| | | trustStorePassword = |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_TRUSTSTORE_PWD, null, |
| | | null, INFO_DESCRIPTION_TRUSTSTOREPASSWORD.get()); |
| | | trustStorePassword.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD); |
| | | argParser.addArgument(trustStorePassword); |
| | | |
| | | trustStorePasswordFile = |
| | |
| | | OPTION_LONG_TRUSTSTORE_PWD_FILE, false, false, |
| | | OPTION_VALUE_TRUSTSTORE_PWD_FILE, null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPASSWORD_FILE.get()); |
| | | trustStorePasswordFile.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD_FILE); |
| | | argParser.addArgument(trustStorePasswordFile); |
| | | |
| | | assertionFilter = new StringArgument("assertionfilter", null, |
| | | OPTION_LONG_ASSERTION_FILE, false, false, true, |
| | | OPTION_VALUE_ASSERTION_FILE, null, null, |
| | | INFO_DESCRIPTION_ASSERTION_FILTER.get()); |
| | | assertionFilter.setPropertyName(OPTION_LONG_ASSERTION_FILE); |
| | | argParser.addArgument(assertionFilter); |
| | | |
| | | controlStr = |
| | | new StringArgument("control", 'J', "control", false, true, true, |
| | | "{controloid[:criticality[:value|::b64value|:<filePath]]}", |
| | | null, null, INFO_DESCRIPTION_CONTROLS.get()); |
| | | controlStr.setPropertyName("control"); |
| | | argParser.addArgument(controlStr); |
| | | |
| | | version = new IntegerArgument("version", OPTION_SHORT_PROTOCOL_VERSION, |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_PROTOCOL_VERSION, |
| | | 3, null, INFO_DESCRIPTION_VERSION.get()); |
| | | version.setPropertyName(OPTION_LONG_PROTOCOL_VERSION); |
| | | argParser.addArgument(version); |
| | | |
| | | encodingStr = new StringArgument("encoding", 'i', "encoding", |
| | | false, false, |
| | | true, "{encoding}", null, null, |
| | | INFO_DESCRIPTION_ENCODING.get()); |
| | | encodingStr.setPropertyName("encoding"); |
| | | argParser.addArgument(encodingStr); |
| | | |
| | | continueOnError = new BooleanArgument("continueOnError", 'c', |
| | | "continueOnError", |
| | | INFO_DESCRIPTION_CONTINUE_ON_ERROR.get()); |
| | | continueOnError.setPropertyName("continueOnError"); |
| | | argParser.addArgument(continueOnError); |
| | | |
| | | noop = new BooleanArgument("no-op", OPTION_SHORT_DRYRUN, |
| | | OPTION_LONG_DRYRUN, |
| | | INFO_DESCRIPTION_NOOP.get()); |
| | | argParser.addArgument(noop); |
| | | noop.setPropertyName(OPTION_LONG_DRYRUN); |
| | | |
| | | verbose = new BooleanArgument("verbose", 'v', "verbose", |
| | | INFO_DESCRIPTION_VERBOSE.get()); |
| | | verbose.setPropertyName("verbose"); |
| | | argParser.addArgument(verbose); |
| | | |
| | | showUsage = new BooleanArgument("showUsage", OPTION_SHORT_HELP, |
| | |
| | | StringArgument saslOptions = null; |
| | | StringArgument trustStorePath = null; |
| | | StringArgument trustStorePassword = null; |
| | | StringArgument propertiesFileArgument = null; |
| | | BooleanArgument noPropertiesFileArgument = null; |
| | | |
| | | Reader rdr = null; |
| | | ArrayList<String> dnStrings = new ArrayList<String> (); |
| | |
| | | false, true, 0, 1, "\"DN\""); |
| | | try |
| | | { |
| | | propertiesFileArgument = new StringArgument("propertiesFilePath", |
| | | null, OPTION_LONG_PROP_FILE_PATH, |
| | | false, false, true, OPTION_VALUE_PROP_FILE_PATH, null, null, |
| | | INFO_DESCRIPTION_PROP_FILE_PATH.get()); |
| | | argParser.addArgument(propertiesFileArgument); |
| | | argParser.setFilePropertiesArgument(propertiesFileArgument); |
| | | |
| | | noPropertiesFileArgument = new BooleanArgument( |
| | | "noPropertiesFileArgument", null, OPTION_LONG_NO_PROP_FILE, |
| | | INFO_DESCRIPTION_NO_PROP_FILE.get()); |
| | | argParser.addArgument(noPropertiesFileArgument); |
| | | argParser.setNoPropertiesFileArgument(noPropertiesFileArgument); |
| | | |
| | | hostName = new StringArgument("host", OPTION_SHORT_HOST, |
| | | OPTION_LONG_HOST, false, false, true, |
| | | OPTION_VALUE_HOST, "localhost", null, |
| | | INFO_DESCRIPTION_HOST.get()); |
| | | hostName.setPropertyName(OPTION_LONG_HOST); |
| | | argParser.addArgument(hostName); |
| | | |
| | | port = new IntegerArgument("port", OPTION_SHORT_PORT, |
| | | OPTION_LONG_PORT, false, false, true, |
| | | OPTION_VALUE_PORT, 389, null, |
| | | INFO_DESCRIPTION_PORT.get()); |
| | | port.setPropertyName(OPTION_LONG_PORT); |
| | | argParser.addArgument(port); |
| | | |
| | | useSSL = new BooleanArgument("useSSL", OPTION_SHORT_USE_SSL, |
| | | OPTION_LONG_USE_SSL, |
| | | INFO_DESCRIPTION_USE_SSL.get()); |
| | | useSSL.setPropertyName(OPTION_LONG_USE_SSL); |
| | | argParser.addArgument(useSSL); |
| | | |
| | | startTLS = new BooleanArgument("startTLS", OPTION_SHORT_START_TLS, |
| | | OPTION_LONG_START_TLS, |
| | | INFO_DESCRIPTION_START_TLS.get()); |
| | | startTLS.setPropertyName(OPTION_LONG_START_TLS); |
| | | argParser.addArgument(startTLS); |
| | | |
| | | bindDN = new StringArgument("bindDN", OPTION_SHORT_BINDDN, |
| | | OPTION_LONG_BINDDN, false, false, true, |
| | | OPTION_VALUE_BINDDN, null, null, |
| | | INFO_DESCRIPTION_BINDDN.get()); |
| | | bindDN.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindDN); |
| | | |
| | | bindPassword = new StringArgument("bindPassword", OPTION_SHORT_BINDPWD, |
| | |
| | | OPTION_VALUE_BINDPWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_BINDPASSWORD.get()); |
| | | bindPassword.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindPassword); |
| | | |
| | | bindPasswordFile = |
| | |
| | | false, false, |
| | | OPTION_VALUE_BINDPWD_FILE, null, |
| | | null, INFO_DESCRIPTION_BINDPASSWORDFILE.get()); |
| | | bindPasswordFile.setPropertyName(OPTION_LONG_BINDPWD_FILE); |
| | | argParser.addArgument(bindPasswordFile); |
| | | |
| | | filename = new StringArgument("filename", OPTION_SHORT_FILENAME, |
| | |
| | | new BooleanArgument("useSASLExternal", 'r', |
| | | "useSASLExternal", |
| | | INFO_DESCRIPTION_USE_SASL_EXTERNAL.get()); |
| | | saslExternal.setPropertyName("useSASLExternal"); |
| | | argParser.addArgument(saslExternal); |
| | | |
| | | saslOptions = new StringArgument( |
| | |
| | | false, true, true, |
| | | OPTION_VALUE_SASLOPTION, null, |
| | | null, INFO_DESCRIPTION_SASL_PROPERTIES.get()); |
| | | saslOptions.setPropertyName(OPTION_LONG_SASLOPTION); |
| | | argParser.addArgument(saslOptions); |
| | | |
| | | trustAll = new BooleanArgument("trustAll", 'X', "trustAll", |
| | | INFO_DESCRIPTION_TRUSTALL.get()); |
| | | trustAll.setPropertyName("trustAll"); |
| | | argParser.addArgument(trustAll); |
| | | |
| | | keyStorePath = new StringArgument("keyStorePath", |
| | |
| | | OPTION_VALUE_KEYSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPATH.get()); |
| | | keyStorePath.setPropertyName(OPTION_LONG_KEYSTOREPATH); |
| | | argParser.addArgument(keyStorePath); |
| | | |
| | | keyStorePassword = |
| | |
| | | true, OPTION_VALUE_KEYSTORE_PWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD.get()); |
| | | keyStorePassword.setPropertyName(OPTION_LONG_KEYSTORE_PWD); |
| | | argParser.addArgument(keyStorePassword); |
| | | |
| | | keyStorePasswordFile = |
| | |
| | | OPTION_VALUE_KEYSTORE_PWD_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD_FILE.get()); |
| | | keyStorePasswordFile.setPropertyName(OPTION_LONG_KEYSTORE_PWD_FILE); |
| | | argParser.addArgument(keyStorePasswordFile); |
| | | |
| | | certNickname = new StringArgument( |
| | | "certnickname", 'N', "certNickname", |
| | | false, false, true, "{nickname}", null, |
| | | null, INFO_DESCRIPTION_CERT_NICKNAME.get()); |
| | | certNickname.setPropertyName("certNickname"); |
| | | argParser.addArgument(certNickname); |
| | | |
| | | trustStorePath = new StringArgument( |
| | |
| | | OPTION_VALUE_TRUSTSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPATH.get()); |
| | | trustStorePath.setPropertyName(OPTION_LONG_TRUSTSTOREPATH); |
| | | argParser.addArgument(trustStorePath); |
| | | |
| | | trustStorePassword = |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_TRUSTSTORE_PWD, null, |
| | | null, INFO_DESCRIPTION_TRUSTSTOREPASSWORD.get()); |
| | | trustStorePassword.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD); |
| | | argParser.addArgument(trustStorePassword); |
| | | |
| | | trustStorePasswordFile = |
| | |
| | | OPTION_LONG_TRUSTSTORE_PWD_FILE, false, false, |
| | | OPTION_VALUE_TRUSTSTORE_PWD_FILE, null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPASSWORD_FILE.get()); |
| | | trustStorePasswordFile.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD_FILE); |
| | | argParser.addArgument(trustStorePasswordFile); |
| | | |
| | | deleteSubtree = |
| | | new BooleanArgument("deleteSubtree", 'x', "deleteSubtree", |
| | | INFO_DELETE_DESCRIPTION_DELETE_SUBTREE.get()); |
| | | deleteSubtree.setPropertyName("deleteSubtree"); |
| | | argParser.addArgument(deleteSubtree); |
| | | |
| | | controlStr = |
| | | new StringArgument("control", 'J', "control", false, true, true, |
| | | "{controloid[:criticality[:value|::b64value|:<fileurl]]}", |
| | | null, null, INFO_DESCRIPTION_CONTROLS.get()); |
| | | controlStr.setPropertyName("control"); |
| | | argParser.addArgument(controlStr); |
| | | |
| | | version = new IntegerArgument("version", OPTION_SHORT_PROTOCOL_VERSION, |
| | | OPTION_LONG_PROTOCOL_VERSION, false, false, |
| | | true, OPTION_VALUE_PROTOCOL_VERSION, 3, |
| | | null, INFO_DESCRIPTION_VERSION.get()); |
| | | version.setPropertyName(OPTION_LONG_PROTOCOL_VERSION); |
| | | argParser.addArgument(version); |
| | | |
| | | encodingStr = new StringArgument("encoding", 'i', |
| | | OPTION_LONG_ENCODING, false, |
| | | false, true, "{encoding}", null, null, |
| | | INFO_DESCRIPTION_ENCODING.get()); |
| | | encodingStr.setPropertyName(OPTION_LONG_ENCODING); |
| | | argParser.addArgument(encodingStr); |
| | | |
| | | continueOnError = |
| | | new BooleanArgument("continueOnError", 'c', "continueOnError", |
| | | INFO_DESCRIPTION_CONTINUE_ON_ERROR.get()); |
| | | continueOnError.setPropertyName("continueOnError"); |
| | | argParser.addArgument(continueOnError); |
| | | |
| | | noop = new BooleanArgument("no-op", OPTION_SHORT_DRYRUN, |
| | | OPTION_LONG_DRYRUN, INFO_DESCRIPTION_NOOP.get()); |
| | | noop.setPropertyName(OPTION_LONG_DRYRUN); |
| | | argParser.addArgument(noop); |
| | | |
| | | verbose = new BooleanArgument("verbose", 'v', "verbose", |
| | | INFO_DESCRIPTION_VERBOSE.get()); |
| | | verbose.setPropertyName("verbose"); |
| | | argParser.addArgument(verbose); |
| | | |
| | | showUsage = new BooleanArgument("showUsage", OPTION_SHORT_HELP, |
| | |
| | | StringArgument saslOptions = null; |
| | | StringArgument trustStorePath = null; |
| | | StringArgument trustStorePassword = null; |
| | | StringArgument propertiesFileArgument = null; |
| | | BooleanArgument noPropertiesFileArgument = null; |
| | | |
| | | // Create the command-line argument parser for use with this program. |
| | | Message toolDescription = INFO_LDAPMODIFY_TOOL_DESCRIPTION.get(); |
| | |
| | | false); |
| | | try |
| | | { |
| | | propertiesFileArgument = new StringArgument("propertiesFilePath", |
| | | null, OPTION_LONG_PROP_FILE_PATH, |
| | | false, false, true, OPTION_VALUE_PROP_FILE_PATH, null, null, |
| | | INFO_DESCRIPTION_PROP_FILE_PATH.get()); |
| | | argParser.addArgument(propertiesFileArgument); |
| | | argParser.setFilePropertiesArgument(propertiesFileArgument); |
| | | |
| | | noPropertiesFileArgument = new BooleanArgument( |
| | | "noPropertiesFileArgument", null, OPTION_LONG_NO_PROP_FILE, |
| | | INFO_DESCRIPTION_NO_PROP_FILE.get()); |
| | | argParser.addArgument(noPropertiesFileArgument); |
| | | argParser.setNoPropertiesFileArgument(noPropertiesFileArgument); |
| | | |
| | | hostName = new StringArgument("host", OPTION_SHORT_HOST, |
| | | OPTION_LONG_HOST, false, false, true, |
| | | OPTION_VALUE_HOST, "localhost", null, |
| | | INFO_DESCRIPTION_HOST.get()); |
| | | hostName.setPropertyName(OPTION_LONG_HOST); |
| | | argParser.addArgument(hostName); |
| | | |
| | | port = new IntegerArgument("port", OPTION_SHORT_PORT, |
| | | OPTION_LONG_PORT, false, false, true, |
| | | OPTION_VALUE_PORT, 389, null, |
| | | INFO_DESCRIPTION_PORT.get()); |
| | | port.setPropertyName(OPTION_LONG_PORT); |
| | | argParser.addArgument(port); |
| | | |
| | | useSSL = new BooleanArgument("useSSL", OPTION_SHORT_USE_SSL, |
| | | OPTION_LONG_USE_SSL, |
| | | INFO_DESCRIPTION_USE_SSL.get()); |
| | | useSSL.setPropertyName(OPTION_LONG_USE_SSL); |
| | | argParser.addArgument(useSSL); |
| | | |
| | | startTLS = new BooleanArgument("startTLS", OPTION_SHORT_START_TLS, |
| | | OPTION_LONG_START_TLS, |
| | | INFO_DESCRIPTION_START_TLS.get()); |
| | | startTLS.setPropertyName(OPTION_LONG_START_TLS); |
| | | argParser.addArgument(startTLS); |
| | | |
| | | bindDN = new StringArgument("bindDN", OPTION_SHORT_BINDDN, |
| | | OPTION_LONG_BINDDN, false, false, true, |
| | | OPTION_VALUE_BINDDN, null, null, |
| | | INFO_DESCRIPTION_BINDDN.get()); |
| | | bindDN.setPropertyName(OPTION_LONG_BINDDN); |
| | | argParser.addArgument(bindDN); |
| | | |
| | | bindPassword = new StringArgument("bindPassword", OPTION_SHORT_BINDPWD, |
| | |
| | | OPTION_VALUE_BINDPWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_BINDPASSWORD.get()); |
| | | bindPassword.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindPassword); |
| | | |
| | | bindPasswordFile = |
| | |
| | | false, false, |
| | | OPTION_VALUE_BINDPWD_FILE, null, |
| | | null, INFO_DESCRIPTION_BINDPASSWORDFILE.get()); |
| | | bindPasswordFile.setPropertyName(OPTION_VALUE_BINDPWD_FILE); |
| | | argParser.addArgument(bindPasswordFile); |
| | | |
| | | defaultAdd = new BooleanArgument( |
| | |
| | | OPTION_LONG_FILENAME, false, false, |
| | | true, OPTION_VALUE_FILENAME, null, null, |
| | | INFO_LDAPMODIFY_DESCRIPTION_FILENAME.get()); |
| | | filename.setPropertyName(OPTION_LONG_FILENAME); |
| | | argParser.addArgument(filename); |
| | | |
| | | saslExternal = new BooleanArgument( |
| | | "useSASLExternal", 'r', |
| | | "useSASLExternal", |
| | | INFO_DESCRIPTION_USE_SASL_EXTERNAL.get()); |
| | | saslExternal.setPropertyName("useSASLExternal"); |
| | | argParser.addArgument(saslExternal); |
| | | |
| | | saslOptions = new StringArgument("saslOption", OPTION_SHORT_SASLOPTION, |
| | |
| | | true, true, |
| | | OPTION_VALUE_SASLOPTION, null, null, |
| | | INFO_DESCRIPTION_SASL_PROPERTIES.get()); |
| | | saslOptions.setPropertyName(OPTION_LONG_SASLOPTION); |
| | | argParser.addArgument(saslOptions); |
| | | |
| | | trustAll = new BooleanArgument("trustAll", 'X', "trustAll", |
| | | INFO_DESCRIPTION_TRUSTALL.get()); |
| | | trustAll.setPropertyName("trustAll"); |
| | | argParser.addArgument(trustAll); |
| | | |
| | | keyStorePath = new StringArgument("keyStorePath", |
| | |
| | | OPTION_VALUE_KEYSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPATH.get()); |
| | | keyStorePath.setPropertyName(OPTION_LONG_KEYSTOREPATH); |
| | | argParser.addArgument(keyStorePath); |
| | | |
| | | keyStorePassword = |
| | |
| | | OPTION_VALUE_KEYSTORE_PWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD.get()); |
| | | keyStorePassword.setPropertyName(OPTION_LONG_KEYSTORE_PWD); |
| | | argParser.addArgument(keyStorePassword); |
| | | |
| | | keyStorePasswordFile = |
| | |
| | | false, false, OPTION_VALUE_KEYSTORE_PWD_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD_FILE.get()); |
| | | keyStorePasswordFile.setPropertyName(OPTION_LONG_KEYSTORE_PWD_FILE); |
| | | argParser.addArgument(keyStorePasswordFile); |
| | | |
| | | certNickname = new StringArgument( |
| | | "certnickname", 'N', "certNickname", |
| | | false, false, true, "{nickname}", null, |
| | | null, INFO_DESCRIPTION_CERT_NICKNAME.get()); |
| | | certNickname.setPropertyName("certNickname"); |
| | | argParser.addArgument(certNickname); |
| | | |
| | | trustStorePath = new StringArgument( |
| | |
| | | OPTION_VALUE_TRUSTSTOREPATH, |
| | | null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPATH.get()); |
| | | trustStorePath.setPropertyName(OPTION_LONG_TRUSTSTOREPATH); |
| | | argParser.addArgument(trustStorePath); |
| | | |
| | | trustStorePassword = |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_TRUSTSTORE_PWD, null, |
| | | null, INFO_DESCRIPTION_TRUSTSTOREPASSWORD.get()); |
| | | trustStorePassword.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD); |
| | | argParser.addArgument(trustStorePassword); |
| | | |
| | | trustStorePasswordFile = |
| | |
| | | OPTION_LONG_TRUSTSTORE_PWD_FILE, false, false, |
| | | OPTION_VALUE_TRUSTSTORE_PWD_FILE, null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPASSWORD_FILE.get()); |
| | | trustStorePasswordFile.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD_FILE); |
| | | argParser.addArgument(trustStorePasswordFile); |
| | | |
| | | proxyAuthzID = new StringArgument("proxy_authzid", |
| | |
| | | false, true, |
| | | OPTION_VALUE_PROXYAUTHID, null, null, |
| | | INFO_DESCRIPTION_PROXY_AUTHZID.get()); |
| | | proxyAuthzID.setPropertyName(OPTION_LONG_PROXYAUTHID); |
| | | argParser.addArgument(proxyAuthzID); |
| | | |
| | | reportAuthzID = new BooleanArgument( |
| | | "reportauthzid", 'E', |
| | | "reportAuthzID", |
| | | INFO_DESCRIPTION_REPORT_AUTHZID.get()); |
| | | reportAuthzID.setPropertyName("reportAuthzID"); |
| | | argParser.addArgument(reportAuthzID); |
| | | |
| | | assertionFilter = new StringArgument( |
| | |
| | | OPTION_VALUE_ASSERTION_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_ASSERTION_FILTER.get()); |
| | | assertionFilter.setPropertyName(OPTION_LONG_ASSERTION_FILE); |
| | | argParser.addArgument(assertionFilter); |
| | | |
| | | preReadAttributes = new StringArgument( |
| | |
| | | "preReadAttributes", false, false, |
| | | true, "{attrList}", null, null, |
| | | INFO_DESCRIPTION_PREREAD_ATTRS.get()); |
| | | preReadAttributes.setPropertyName("preReadAttributes"); |
| | | argParser.addArgument(preReadAttributes); |
| | | |
| | | postReadAttributes = new StringArgument( |
| | |
| | | false, true, "{attrList}", null, |
| | | null, |
| | | INFO_DESCRIPTION_POSTREAD_ATTRS.get()); |
| | | postReadAttributes.setPropertyName("postReadAttributes"); |
| | | argParser.addArgument(postReadAttributes); |
| | | |
| | | controlStr = |
| | | new StringArgument("control", 'J', "control", false, true, true, |
| | | "{controloid[:criticality[:value|::b64value|:<fileurl]]}", |
| | | null, null, INFO_DESCRIPTION_CONTROLS.get()); |
| | | controlStr.setPropertyName("control"); |
| | | argParser.addArgument(controlStr); |
| | | |
| | | version = new IntegerArgument("version", OPTION_SHORT_PROTOCOL_VERSION, |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_PROTOCOL_VERSION, 3, null, |
| | | INFO_DESCRIPTION_VERSION.get()); |
| | | version.setPropertyName(OPTION_LONG_PROTOCOL_VERSION); |
| | | argParser.addArgument(version); |
| | | |
| | | encodingStr = new StringArgument("encoding", 'i', "encoding", |
| | | false, false, |
| | | true, "{encoding}", null, null, |
| | | INFO_DESCRIPTION_ENCODING.get()); |
| | | encodingStr.setPropertyName("encoding"); |
| | | argParser.addArgument(encodingStr); |
| | | |
| | | continueOnError = new BooleanArgument("continueOnError", 'c', |
| | | "continueOnError", |
| | | INFO_DESCRIPTION_CONTINUE_ON_ERROR.get()); |
| | | continueOnError.setPropertyName("continueOnError"); |
| | | argParser.addArgument(continueOnError); |
| | | |
| | | noop = new BooleanArgument("no-op", OPTION_SHORT_DRYRUN, |
| | | OPTION_LONG_DRYRUN, |
| | | INFO_DESCRIPTION_NOOP.get()); |
| | | noop.setPropertyName(OPTION_LONG_DRYRUN); |
| | | argParser.addArgument(noop); |
| | | |
| | | verbose = new BooleanArgument("verbose", 'v', "verbose", |
| | | INFO_DESCRIPTION_VERBOSE.get()); |
| | | verbose.setPropertyName("verbose"); |
| | | argParser.addArgument(verbose); |
| | | |
| | | showUsage = new BooleanArgument("showUsage", OPTION_SHORT_HELP, |
| | |
| | | StringArgument sslKeyStorePIN; |
| | | StringArgument sslTrustStore; |
| | | StringArgument sslTrustStorePIN; |
| | | StringArgument propertiesFileArgument; |
| | | BooleanArgument noPropertiesFileArgument; |
| | | |
| | | |
| | | // Initialize the argument parser. |
| | |
| | | |
| | | try |
| | | { |
| | | propertiesFileArgument = new StringArgument("propertiesFilePath", |
| | | null, OPTION_LONG_PROP_FILE_PATH, |
| | | false, false, true, OPTION_VALUE_PROP_FILE_PATH, null, null, |
| | | INFO_DESCRIPTION_PROP_FILE_PATH.get()); |
| | | argParser.addArgument(propertiesFileArgument); |
| | | argParser.setFilePropertiesArgument(propertiesFileArgument); |
| | | |
| | | noPropertiesFileArgument = new BooleanArgument( |
| | | "noPropertiesFileArgument", null, OPTION_LONG_NO_PROP_FILE, |
| | | INFO_DESCRIPTION_NO_PROP_FILE.get()); |
| | | argParser.addArgument(noPropertiesFileArgument); |
| | | argParser.setNoPropertiesFileArgument(noPropertiesFileArgument); |
| | | |
| | | ldapHost = new StringArgument("ldaphost", OPTION_SHORT_HOST, |
| | | OPTION_LONG_HOST, false, false, |
| | | true, OPTION_VALUE_HOST, "127.0.0.1", null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_HOST.get()); |
| | | ldapHost.setPropertyName(OPTION_LONG_HOST); |
| | | argParser.addArgument(ldapHost); |
| | | |
| | | |
| | |
| | | true, OPTION_VALUE_PORT, 389, |
| | | null, true, 1, true, |
| | | 65535, INFO_LDAPPWMOD_DESCRIPTION_PORT.get()); |
| | | ldapPort.setPropertyName(OPTION_LONG_PORT); |
| | | argParser.addArgument(ldapPort); |
| | | |
| | | |
| | | useSSL = new BooleanArgument("usessl", OPTION_SHORT_USE_SSL, |
| | | OPTION_LONG_USE_SSL, |
| | | INFO_LDAPPWMOD_DESCRIPTION_USE_SSL.get()); |
| | | useSSL.setPropertyName(OPTION_LONG_USE_SSL); |
| | | argParser.addArgument(useSSL); |
| | | |
| | | |
| | | useStartTLS = new BooleanArgument("usestarttls", OPTION_SHORT_START_TLS, |
| | | OPTION_LONG_START_TLS, |
| | | INFO_LDAPPWMOD_DESCRIPTION_USE_STARTTLS.get()); |
| | | useStartTLS.setPropertyName(OPTION_LONG_START_TLS); |
| | | argParser.addArgument(useStartTLS); |
| | | |
| | | |
| | |
| | | OPTION_LONG_BINDDN, false, false, true, |
| | | OPTION_VALUE_BINDDN, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_BIND_DN.get()); |
| | | bindDN.setPropertyName(OPTION_LONG_BINDDN); |
| | | argParser.addArgument(bindDN); |
| | | |
| | | |
| | |
| | | OPTION_LONG_BINDPWD, false, false, |
| | | true, OPTION_VALUE_BINDPWD, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_BIND_PW.get()); |
| | | bindPW.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindPW); |
| | | |
| | | |
| | |
| | | OPTION_LONG_BINDPWD_FILE, false, |
| | | false, OPTION_VALUE_BINDPWD_FILE, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_BIND_PW_FILE.get()); |
| | | bindPWFile.setPropertyName(OPTION_LONG_BINDPWD_FILE); |
| | | argParser.addArgument(bindPWFile); |
| | | |
| | | |
| | | authzID = new StringArgument("authzid", 'a', "authzID", false, false, |
| | | true, "{authzID}", null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_AUTHZID.get()); |
| | | authzID.setPropertyName("authzID"); |
| | | argParser.addArgument(authzID); |
| | | |
| | | |
| | | provideDNForAuthzID = |
| | | new BooleanArgument("providednforauthzid", 'A',"provideDNForAuthzID", |
| | | INFO_LDAPPWMOD_DESCRIPTION_PROVIDE_DN_FOR_AUTHZID.get()); |
| | | provideDNForAuthzID.setPropertyName("provideDNForAuthzID"); |
| | | argParser.addArgument(provideDNForAuthzID); |
| | | |
| | | |
| | | newPW = new StringArgument("newpw", 'n', "newPassword", false, false, |
| | | true, "{newPassword}", null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_NEWPW.get()); |
| | | newPW.setPropertyName("newPassword"); |
| | | argParser.addArgument(newPW); |
| | | |
| | | |
| | |
| | | "newpwfile", 'N', "newPasswordFile", |
| | | false, false, "{file}", null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_NEWPWFILE.get()); |
| | | newPWFile.setPropertyName("newPasswordFile"); |
| | | argParser.addArgument(newPWFile); |
| | | |
| | | |
| | |
| | | new StringArgument("currentpw", 'c', "currentPassword", false, false, |
| | | true, "{currentPassword}", null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_CURRENTPW.get()); |
| | | currentPW.setPropertyName("currentPassword"); |
| | | argParser.addArgument(currentPW); |
| | | |
| | | |
| | |
| | | "currentpwfile", 'C', "currentPasswordFile", |
| | | false, false, "{file}", null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_CURRENTPWFILE.get()); |
| | | currentPWFile.setPropertyName("currentPasswordFile"); |
| | | argParser.addArgument(currentPWFile); |
| | | |
| | | |
| | | sslBlindTrust = |
| | | new BooleanArgument("blindtrust", 'X', "trustAll", |
| | | INFO_LDAPPWMOD_DESCRIPTION_BLIND_TRUST.get()); |
| | | sslBlindTrust.setPropertyName("trustAll"); |
| | | argParser.addArgument(sslBlindTrust); |
| | | |
| | | |
| | |
| | | OPTION_LONG_KEYSTOREPATH, false, false, |
| | | true, OPTION_VALUE_KEYSTOREPATH, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_KEYSTORE.get()); |
| | | sslKeyStore.setPropertyName(OPTION_LONG_KEYSTOREPATH); |
| | | argParser.addArgument(sslKeyStore); |
| | | |
| | | |
| | |
| | | OPTION_VALUE_KEYSTORE_PWD, |
| | | null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_KEYSTORE_PIN.get()); |
| | | sslKeyStorePIN.setPropertyName(OPTION_LONG_KEYSTORE_PWD); |
| | | argParser.addArgument(sslKeyStorePIN); |
| | | |
| | | |
| | |
| | | false, false, OPTION_VALUE_KEYSTORE_PWD_FILE, |
| | | null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_KEYSTORE_PINFILE.get()); |
| | | sslKeyStorePINFile.setPropertyName(OPTION_LONG_KEYSTORE_PWD_FILE); |
| | | argParser.addArgument(sslKeyStorePINFile); |
| | | |
| | | |
| | |
| | | false, true, |
| | | OPTION_VALUE_TRUSTSTOREPATH, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_TRUSTSTORE.get()); |
| | | sslTrustStore.setPropertyName(OPTION_LONG_TRUSTSTOREPATH); |
| | | argParser.addArgument(sslTrustStore); |
| | | |
| | | |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_TRUSTSTORE_PWD, null, null, |
| | | INFO_LDAPPWMOD_DESCRIPTION_TRUSTSTORE_PIN.get()); |
| | | sslTrustStorePIN.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD); |
| | | argParser.addArgument(sslTrustStorePIN); |
| | | |
| | | |
| | |
| | | OPTION_LONG_TRUSTSTORE_PWD_FILE, false, false, |
| | | OPTION_VALUE_TRUSTSTORE_PWD_FILE, null, |
| | | null, INFO_LDAPPWMOD_DESCRIPTION_TRUSTSTORE_PINFILE.get()); |
| | | sslTrustStorePINFile.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD_FILE); |
| | | argParser.addArgument(sslTrustStorePINFile); |
| | | |
| | | |
| | |
| | | new StringArgument("control", 'J', "control", false, true, true, |
| | | "{controloid[:criticality[:value|::b64value|:<fileurl]]}", |
| | | null, null, INFO_DESCRIPTION_CONTROLS.get()); |
| | | controlStr.setPropertyName("control"); |
| | | argParser.addArgument(controlStr); |
| | | |
| | | |
| | |
| | | StringArgument vlvDescriptor = null; |
| | | StringArgument effectiveRightsUser = null; |
| | | StringArgument effectiveRightsAttrs = null; |
| | | StringArgument propertiesFileArgument = null; |
| | | BooleanArgument noPropertiesFileArgument = null; |
| | | |
| | | |
| | | // Create the command-line argument parser for use with this program. |
| | |
| | | |
| | | try |
| | | { |
| | | propertiesFileArgument = new StringArgument("propertiesFilePath", |
| | | null, OPTION_LONG_PROP_FILE_PATH, |
| | | false, false, true, OPTION_VALUE_PROP_FILE_PATH, null, null, |
| | | INFO_DESCRIPTION_PROP_FILE_PATH.get()); |
| | | argParser.addArgument(propertiesFileArgument); |
| | | argParser.setFilePropertiesArgument(propertiesFileArgument); |
| | | |
| | | noPropertiesFileArgument = new BooleanArgument( |
| | | "noPropertiesFileArgument", null, OPTION_LONG_NO_PROP_FILE, |
| | | INFO_DESCRIPTION_NO_PROP_FILE.get()); |
| | | argParser.addArgument(noPropertiesFileArgument); |
| | | argParser.setNoPropertiesFileArgument(noPropertiesFileArgument); |
| | | |
| | | hostName = new StringArgument("host", OPTION_SHORT_HOST, |
| | | OPTION_LONG_HOST, false, false, true, |
| | | OPTION_VALUE_HOST, "localhost", null, |
| | | INFO_DESCRIPTION_HOST.get()); |
| | | hostName.setPropertyName(OPTION_LONG_HOST); |
| | | argParser.addArgument(hostName); |
| | | |
| | | port = new IntegerArgument("port", OPTION_SHORT_PORT, |
| | | OPTION_LONG_PORT, false, false, true, |
| | | OPTION_VALUE_PORT, 389, null, |
| | | INFO_DESCRIPTION_PORT.get()); |
| | | port.setPropertyName(OPTION_LONG_PORT); |
| | | argParser.addArgument(port); |
| | | |
| | | useSSL = new BooleanArgument("useSSL", OPTION_SHORT_USE_SSL, |
| | | OPTION_LONG_USE_SSL, |
| | | INFO_DESCRIPTION_USE_SSL.get()); |
| | | useSSL.setPropertyName(OPTION_LONG_USE_SSL); |
| | | argParser.addArgument(useSSL); |
| | | |
| | | startTLS = new BooleanArgument("startTLS", OPTION_SHORT_START_TLS, |
| | | OPTION_LONG_START_TLS, |
| | | INFO_DESCRIPTION_START_TLS.get()); |
| | | startTLS.setPropertyName(OPTION_LONG_START_TLS); |
| | | argParser.addArgument(startTLS); |
| | | |
| | | bindDN = new StringArgument("bindDN", OPTION_SHORT_BINDDN, |
| | | OPTION_LONG_BINDDN, false, false, true, |
| | | OPTION_VALUE_BINDDN, null, null, |
| | | INFO_DESCRIPTION_BINDDN.get()); |
| | | bindDN.setPropertyName(OPTION_LONG_BINDDN); |
| | | argParser.addArgument(bindDN); |
| | | |
| | | bindPassword = new StringArgument("bindPassword", OPTION_SHORT_BINDPWD, |
| | |
| | | OPTION_VALUE_BINDPWD, |
| | | null, null, |
| | | INFO_DESCRIPTION_BINDPASSWORD.get()); |
| | | bindPassword.setPropertyName(OPTION_LONG_BINDPWD); |
| | | argParser.addArgument(bindPassword); |
| | | |
| | | bindPasswordFile = |
| | |
| | | false, false, |
| | | OPTION_VALUE_BINDPWD_FILE, null, |
| | | null, INFO_DESCRIPTION_BINDPASSWORDFILE.get()); |
| | | bindPasswordFile.setPropertyName(OPTION_LONG_BINDPWD_FILE); |
| | | argParser.addArgument(bindPasswordFile); |
| | | |
| | | baseDN = new StringArgument("baseDN", OPTION_SHORT_BASEDN, |
| | | OPTION_LONG_BASEDN, true, false, true, |
| | | OPTION_VALUE_BASEDN, null, null, |
| | | INFO_SEARCH_DESCRIPTION_BASEDN.get()); |
| | | baseDN.setPropertyName(OPTION_LONG_BASEDN); |
| | | argParser.addArgument(baseDN); |
| | | |
| | | searchScope = new StringArgument( |
| | | "searchScope", 's', "searchScope", false, |
| | | false, true, "{searchScope}", null, null, |
| | | INFO_SEARCH_DESCRIPTION_SEARCH_SCOPE.get()); |
| | | searchScope.setPropertyName("searchScope"); |
| | | argParser.addArgument(searchScope); |
| | | |
| | | filename = new StringArgument("filename", OPTION_SHORT_FILENAME, |
| | | OPTION_LONG_FILENAME, false, false, |
| | | true, OPTION_VALUE_FILENAME, null, null, |
| | | INFO_SEARCH_DESCRIPTION_FILENAME.get()); |
| | | searchScope.setPropertyName(OPTION_LONG_FILENAME); |
| | | argParser.addArgument(filename); |
| | | |
| | | saslExternal = new BooleanArgument( |
| | | "useSASLExternal", 'r', |
| | | "useSASLExternal", |
| | | INFO_DESCRIPTION_USE_SASL_EXTERNAL.get()); |
| | | saslExternal.setPropertyName("useSASLExternal"); |
| | | argParser.addArgument(saslExternal); |
| | | |
| | | saslOptions = new StringArgument("saslOption", OPTION_SHORT_SASLOPTION, |
| | |
| | | true, true, |
| | | OPTION_VALUE_SASLOPTION, null, null, |
| | | INFO_DESCRIPTION_SASL_PROPERTIES.get()); |
| | | saslOptions.setPropertyName(OPTION_LONG_SASLOPTION); |
| | | argParser.addArgument(saslOptions); |
| | | |
| | | trustAll = new BooleanArgument("trustAll", 'X', "trustAll", |
| | | INFO_DESCRIPTION_TRUSTALL.get()); |
| | | trustAll.setPropertyName("trustAll"); |
| | | argParser.addArgument(trustAll); |
| | | |
| | | keyStorePath = new StringArgument("keyStorePath", |
| | |
| | | OPTION_LONG_KEYSTOREPATH, false, false, true, |
| | | OPTION_VALUE_KEYSTOREPATH, null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPATH.get()); |
| | | keyStorePath.setPropertyName(OPTION_LONG_KEYSTOREPATH); |
| | | argParser.addArgument(keyStorePath); |
| | | |
| | | keyStorePassword = new StringArgument("keyStorePassword", |
| | |
| | | OPTION_LONG_KEYSTORE_PWD, false, false, |
| | | true, OPTION_VALUE_KEYSTORE_PWD, null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD.get()); |
| | | keyStorePassword.setPropertyName(OPTION_LONG_KEYSTORE_PWD); |
| | | argParser.addArgument(keyStorePassword); |
| | | |
| | | keyStorePasswordFile = |
| | |
| | | OPTION_VALUE_KEYSTORE_PWD_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_KEYSTOREPASSWORD_FILE.get()); |
| | | keyStorePasswordFile.setPropertyName(OPTION_LONG_KEYSTORE_PWD_FILE); |
| | | argParser.addArgument(keyStorePasswordFile); |
| | | |
| | | certNickname = new StringArgument( |
| | | "certnickname", 'N', "certNickname", |
| | | "certnickname", OPTION_SHORT_CERT_NICKNAME, |
| | | OPTION_LONG_CERT_NICKNAME, |
| | | false, false, true, "{nickname}", null, |
| | | null, INFO_DESCRIPTION_CERT_NICKNAME.get()); |
| | | certNickname.setPropertyName(OPTION_LONG_CERT_NICKNAME); |
| | | argParser.addArgument(certNickname); |
| | | |
| | | trustStorePath = new StringArgument("trustStorePath", |
| | |
| | | false, false, true, |
| | | OPTION_VALUE_TRUSTSTOREPATH, null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPATH.get()); |
| | | trustStorePath.setPropertyName(OPTION_LONG_TRUSTSTOREPATH); |
| | | argParser.addArgument(trustStorePath); |
| | | |
| | | trustStorePassword = |
| | |
| | | false, false, true, OPTION_VALUE_TRUSTSTORE_PWD, |
| | | null, |
| | | null, INFO_DESCRIPTION_TRUSTSTOREPASSWORD.get()); |
| | | trustStorePassword.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD); |
| | | argParser.addArgument(trustStorePassword); |
| | | |
| | | trustStorePasswordFile = |
| | |
| | | OPTION_LONG_TRUSTSTORE_PWD_FILE, false, false, |
| | | OPTION_VALUE_TRUSTSTORE_PWD_FILE, null, null, |
| | | INFO_DESCRIPTION_TRUSTSTOREPASSWORD_FILE.get()); |
| | | trustStorePasswordFile.setPropertyName(OPTION_LONG_TRUSTSTORE_PWD_FILE); |
| | | argParser.addArgument(trustStorePasswordFile); |
| | | |
| | | proxyAuthzID = new StringArgument("proxy_authzid", |
| | |
| | | false, true, |
| | | OPTION_VALUE_PROXYAUTHID, null, null, |
| | | INFO_DESCRIPTION_PROXY_AUTHZID.get()); |
| | | proxyAuthzID.setPropertyName(OPTION_LONG_PROXYAUTHID); |
| | | argParser.addArgument(proxyAuthzID); |
| | | |
| | | reportAuthzID = new BooleanArgument( |
| | | "reportauthzid", 'E', OPTION_LONG_REPORT_AUTHZ_ID, |
| | | INFO_DESCRIPTION_REPORT_AUTHZID.get()); |
| | | reportAuthzID.setPropertyName(OPTION_LONG_REPORT_AUTHZ_ID); |
| | | argParser.addArgument(reportAuthzID); |
| | | |
| | | usePasswordPolicyControl = new BooleanArgument( |
| | | "usepwpolicycontrol", null, |
| | | OPTION_LONG_USE_PW_POLICY_CTL, |
| | | INFO_DESCRIPTION_USE_PWP_CONTROL.get()); |
| | | usePasswordPolicyControl.setPropertyName(OPTION_LONG_USE_PW_POLICY_CTL); |
| | | argParser.addArgument(usePasswordPolicyControl); |
| | | |
| | | pSearchInfo = new StringArgument("psearchinfo", 'C', "persistentSearch", |
| | | false, false, true, |
| | | "ps[:changetype[:changesonly[:entrychgcontrols]]]", |
| | | null, null, INFO_DESCRIPTION_PSEARCH_INFO.get()); |
| | | pSearchInfo.setPropertyName("persistentSearch"); |
| | | argParser.addArgument(pSearchInfo); |
| | | |
| | | simplePageSize = new IntegerArgument( |
| | |
| | | "{numEntries}", 1000, null, true, 1, |
| | | false, 0, |
| | | INFO_DESCRIPTION_SIMPLE_PAGE_SIZE.get()); |
| | | simplePageSize.setPropertyName("simplePageSize"); |
| | | argParser.addArgument(simplePageSize); |
| | | |
| | | assertionFilter = new StringArgument( |
| | |
| | | true, OPTION_VALUE_ASSERTION_FILE, |
| | | null, null, |
| | | INFO_DESCRIPTION_ASSERTION_FILTER.get()); |
| | | assertionFilter.setPropertyName(OPTION_LONG_ASSERTION_FILE); |
| | | argParser.addArgument(assertionFilter); |
| | | |
| | | matchedValuesFilter = new StringArgument( |
| | |
| | | "matchedValuesFilter", false, true, true, |
| | | "{filter}", null, null, |
| | | INFO_DESCRIPTION_MATCHED_VALUES_FILTER.get()); |
| | | matchedValuesFilter.setPropertyName("matchedValuesFilter"); |
| | | argParser.addArgument(matchedValuesFilter); |
| | | |
| | | sortOrder = new StringArgument( |
| | | "sortorder", 'S', "sortOrder", false, |
| | | false, true, "{sortOrder}", null, null, |
| | | INFO_DESCRIPTION_SORT_ORDER.get()); |
| | | sortOrder.setPropertyName("sortOrder"); |
| | | argParser.addArgument(sortOrder); |
| | | |
| | | vlvDescriptor = |
| | |
| | | false, true, |
| | | "{before:after:index:count | before:after:value}", |
| | | null, null, INFO_DESCRIPTION_VLV.get()); |
| | | vlvDescriptor.setPropertyName("virtualListView"); |
| | | argParser.addArgument(vlvDescriptor); |
| | | |
| | | controlStr = |
| | | new StringArgument("control", 'J', "control", false, true, true, |
| | | "{controloid[:criticality[:value|::b64value|:<fileurl]]}", |
| | | null, null, INFO_DESCRIPTION_CONTROLS.get()); |
| | | controlStr.setPropertyName("control"); |
| | | argParser.addArgument(controlStr); |
| | | |
| | | effectiveRightsUser = |
| | | new StringArgument("effectiveRightsUser", |
| | | OPTION_SHORT_EFFECTIVERIGHTSUSER, |
| | | OPTION_LONG_EFFECTIVERIGHTSUSER, false, false, true, |
| | | "{authzid}", null, null, |
| | | INFO_DESCRIPTION_EFFECTIVERIGHTS_USER.get( )); |
| | | effectiveRightsUser.setPropertyName(OPTION_LONG_EFFECTIVERIGHTSUSER); |
| | | argParser.addArgument(effectiveRightsUser); |
| | | |
| | | effectiveRightsAttrs = |
| | |
| | | OPTION_LONG_EFFECTIVERIGHTSATTR, false, true, true, |
| | | "{attribute}", null, null, |
| | | INFO_DESCRIPTION_EFFECTIVERIGHTS_ATTR.get( )); |
| | | effectiveRightsAttrs.setPropertyName(OPTION_LONG_EFFECTIVERIGHTSATTR); |
| | | argParser.addArgument(effectiveRightsAttrs); |
| | | |
| | | version = new IntegerArgument("version", OPTION_SHORT_PROTOCOL_VERSION, |
| | | OPTION_LONG_PROTOCOL_VERSION, false, false, |
| | | true, OPTION_VALUE_PROTOCOL_VERSION, 3, |
| | | null, INFO_DESCRIPTION_VERSION.get()); |
| | | version.setPropertyName(OPTION_LONG_PROTOCOL_VERSION); |
| | | argParser.addArgument(version); |
| | | |
| | | encodingStr = new StringArgument("encoding", 'i', "encoding", false, |
| | | false, true, "{encoding}", null, null, |
| | | INFO_DESCRIPTION_ENCODING.get()); |
| | | encodingStr.setPropertyName("encoding"); |
| | | argParser.addArgument(encodingStr); |
| | | |
| | | dereferencePolicy = |
| | | new StringArgument("derefpolicy", 'a', "dereferencePolicy", false, |
| | | false, true, "{dereferencePolicy}", null, null, |
| | | INFO_SEARCH_DESCRIPTION_DEREFERENCE_POLICY.get()); |
| | | dereferencePolicy.setPropertyName("dereferencePolicy"); |
| | | argParser.addArgument(dereferencePolicy); |
| | | |
| | | typesOnly = new BooleanArgument("typesOnly", 'A', "typesOnly", |
| | | INFO_DESCRIPTION_TYPES_ONLY.get()); |
| | | typesOnly.setPropertyName("typesOnly"); |
| | | argParser.addArgument(typesOnly); |
| | | |
| | | sizeLimit = new IntegerArgument("sizeLimit", 'z', "sizeLimit", false, |
| | | false, true, "{sizeLimit}", 0, null, |
| | | INFO_SEARCH_DESCRIPTION_SIZE_LIMIT.get()); |
| | | sizeLimit.setPropertyName("sizeLimit"); |
| | | argParser.addArgument(sizeLimit); |
| | | |
| | | timeLimit = new IntegerArgument("timeLimit", 'l', "timeLimit", false, |
| | | false, true, "{timeLimit}", 0, null, |
| | | INFO_SEARCH_DESCRIPTION_TIME_LIMIT.get()); |
| | | timeLimit.setPropertyName("timeLimit"); |
| | | argParser.addArgument(timeLimit); |
| | | |
| | | dontWrap = new BooleanArgument("dontwrap", 'T', |
| | | "dontWrap", |
| | | INFO_DESCRIPTION_DONT_WRAP.get()); |
| | | dontWrap.setPropertyName("dontWrap"); |
| | | argParser.addArgument(dontWrap); |
| | | |
| | | countEntries = new BooleanArgument("countentries", null, "countEntries", |
| | | INFO_DESCRIPTION_COUNT_ENTRIES.get()); |
| | | countEntries.setPropertyName("countEntries"); |
| | | argParser.addArgument(countEntries); |
| | | |
| | | continueOnError = |
| | | new BooleanArgument("continueOnError", 'c', "continueOnError", |
| | | INFO_DESCRIPTION_CONTINUE_ON_ERROR.get()); |
| | | continueOnError.setPropertyName("continueOnError"); |
| | | argParser.addArgument(continueOnError); |
| | | |
| | | noop = new BooleanArgument("noop", OPTION_SHORT_DRYRUN, |
| | | OPTION_LONG_DRYRUN, INFO_DESCRIPTION_NOOP.get()); |
| | | noop.setPropertyName(OPTION_LONG_DRYRUN); |
| | | argParser.addArgument(noop); |
| | | |
| | | verbose = new BooleanArgument("verbose", 'v', "verbose", |
| | | INFO_DESCRIPTION_VERBOSE.get()); |
| | | verbose.setPropertyName("verbose"); |
| | | argParser.addArgument(verbose); |
| | | |
| | | showUsage = new BooleanArgument("showUsage", OPTION_SHORT_HELP, |
| | |
| | | "-V", "2", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:nottest", |
| | | "o=test" |
| | | }; |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-K", keyStorePath, |
| | | "-W", "password", |
| | | "-P", trustStorePath, |
| | | "--noPropertiesFile", |
| | | "-r", |
| | | "cn:Test User", |
| | | "cn=Test User,o=test" |
| | |
| | | "-W", "password", |
| | | "-N", "client-cert", |
| | | "-P", trustStorePath, |
| | | "--noPropertiesFile", |
| | | "-r", |
| | | "cn:Test User", |
| | | "cn=Test User,o=test" |
| | |
| | | "-W", "password", |
| | | "-N", "invalid", |
| | | "-P", trustStorePath, |
| | | "--noPropertiesFile", |
| | | "-r", |
| | | "cn:Test User", |
| | | "cn=Test User,o=test" |
| | |
| | | "-K", keyStorePath, |
| | | "-W", "password", |
| | | "-P", trustStorePath, |
| | | "--noPropertiesFile", |
| | | "-r", |
| | | "cn:Test User", |
| | | "cn=Test User,o=test" |
| | |
| | | "-o", "mech=CRAM-MD5", |
| | | "-o", "authid=u:test.user", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "givenName:Test", |
| | | "uid=test.user,o=test" |
| | | }; |
| | |
| | | "-o", "authzid=u:test.user", |
| | | "-o", "realm=o=test", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "givenName:Test", |
| | | "uid=test.user,o=test" |
| | | }; |
| | |
| | | "-o", "mech=PLAIN", |
| | | "-o", "authid=dn:cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "givenName:Test", |
| | | "uid=test.user,o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o::" + Base64.encode("test".getBytes("UTF-8")), |
| | | "o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o::***invalidencoding***", |
| | | "o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:<" + f.getAbsolutePath(), |
| | | "o=test" |
| | | }; |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o:<does.not.exist", |
| | | "o=test" |
| | | }; |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(o=test)", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(o=notAMatch)", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | "o=test" |
| | | }; |
| | |
| | | "-w", "password", |
| | | "-c", |
| | | "-f", path, |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-c", |
| | | "-f", "does.not.exist", |
| | | "--noPropertiesFile", |
| | | "o:test", |
| | | }; |
| | | |
| | |
| | | "-V", "2", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-o", "mech=PLAIN", |
| | | "-o", "authid=dn:cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "cn=Does Not Exist,o=test" |
| | | }; |
| | | |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "malformed" |
| | | }; |
| | | |
| | |
| | | "-V", "3", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-j", validPasswordFile, |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-j", invalidPasswordFile, |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-j", "does.not.exist", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-j", validPasswordFile, |
| | | "-c", |
| | | "-f", path |
| | | "-f", path, |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | LDAPDelete.mainDelete(args, false, null, null); |
| | |
| | | /** |
| | | * Tests a subtree delete operation. |
| | | * |
| | | * @throws Exception If an unexpectd problem occurs. |
| | | * @throws Exception If an unexpected problem occurs. |
| | | */ |
| | | @Test() |
| | | public void testSubtreeDelete() |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-x", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "subtreedelete:true", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-n", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "no-op:true", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-J", OID_MANAGE_DSAIT_CONTROL + ":false", |
| | | "-J", OID_SUBTREE_DELETE_CONTROL + ":true", |
| | | "--noPropertiesFile", |
| | | "o=test" |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-V", "2", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-V", "3", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-W", "password", |
| | | "-P", trustStorePath, |
| | | "-r", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-N", "client-cert", |
| | | "-P", trustStorePath, |
| | | "-r", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-N", "invalid", |
| | | "-P", trustStorePath, |
| | | "-r", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-W", "password", |
| | | "-P", trustStorePath, |
| | | "-r", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-o", "authzid=u:test.user", |
| | | "-o", "realm=o=test", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-o", "mech=PLAIN", |
| | | "-o", "authid=dn:cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "no-op:true", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "no-op:true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "no-op:true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-J", "no-op:true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(o=test)", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(o=foo)", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(o=test)", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--assertionFilter", "(ou=People)", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--preReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--preReadAttributes", "o,objectClass", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--preReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--preReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--postReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--postReadAttributes", "o,objectClass", |
| | | "--noPropertiesFile", |
| | | "-f", modifyFilePath |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--postReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--postReadAttributes", "o", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--postReadAttributes", "o,objectClass", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-a", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-J", OID_MANAGE_DSAIT_CONTROL + ":false", |
| | | "-J", OID_SUBTREE_DELETE_CONTROL + ":true", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-c", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "--noPropertiesFile", |
| | | "-f", path |
| | | }; |
| | | |
| | |
| | | "-D", "uid=test.user,o=test", |
| | | "-w", "password", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "uid=test.user,o=test", |
| | | "-w", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "uid=test.user,o=test", |
| | | "-w", "password", |
| | | "-c", "password" |
| | | "-c", "password", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-h", "127.0.0.1", |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "uid=test.user,o=test", |
| | | "-w", "password" |
| | | "-w", "password", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-w", "password", |
| | | "-a", "u:test.user", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-w", "password", |
| | | "-A", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-D", "uid=test.user,o=test", |
| | | "-w", "password", |
| | | "-A", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-h", "127.0.0.1", |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password" |
| | | "-c", "password", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test" |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-X", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-P", trustStorePath, |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-X", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-P", trustStorePath, |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-c", "password", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-j", currentPasswordFile, |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-N", newPasswordFile |
| | | "-N", newPasswordFile, |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-a", "u:test.user", |
| | | "-C", currentPasswordFile, |
| | | "-N", newPasswordFile |
| | | "-N", newPasswordFile, |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-a", "dn:invalid", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertFalse(LDAPPasswordModify.mainPasswordModify(args, false, null, |
| | |
| | | "-D", "cn=Directory Manager", |
| | | "-w", "password", |
| | | "-a", "dn:cn=Does Not Exist,o=test", |
| | | "-n", "newPassword" |
| | | "-n", "newPassword", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertFalse(LDAPPasswordModify.mainPasswordModify(args, false, null, |
| | |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword", |
| | | "-J", "pwpolicy:true" |
| | | "-J", "pwpolicy:true", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertFalse(LDAPPasswordModify.mainPasswordModify(args, false, null, |
| | |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword", |
| | | "-J", "1.2.3.4:true" |
| | | "-J", "1.2.3.4:true", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertFalse(LDAPPasswordModify.mainPasswordModify(args, false, null, null) |
| | |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true" |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-w", "password", |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword", |
| | | "-J", "noop:true" |
| | | "-J", "noop:true", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-a", "dn:uid=test.user,o=test", |
| | | "-n", "newPassword", |
| | | "-J", OID_LDAP_NOOP_OPENLDAP_ASSIGNED + ":true", |
| | | "-J", OID_PASSWORD_POLICY_CONTROL + ":true" |
| | | "-J", OID_PASSWORD_POLICY_CONTROL + ":true", |
| | | "--noPropertiesFile" |
| | | }; |
| | | |
| | | assertEquals(LDAPPasswordModify.mainPasswordModify(args, false, null, null), |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "", |
| | | "-s", "invalid", |
| | | "--dry-run", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-X", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-P", trustStorePath, |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-r", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-r", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-r", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-r", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "password", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-w", "wrongPassword", |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-j", validPasswordFile, |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-j", invalidPasswordFile, |
| | | "-b", "", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-b", "malformed", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-b", "o=does not exist", |
| | | "-s", "base", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-p", String.valueOf(TestCaseUtils.getServerLdapPort()), |
| | | "-b", "o=test", |
| | | "-s", scope, |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "-a", derefPolicy, |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "-A", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--reportAuthzID", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--reportAuthzID", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--usePasswordPolicyControl", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "-J", OID_ACCOUNT_USABLE_CONTROL + ":true", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "-J", "accountusable:true", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--assertionFilter", "(objectClass=top)", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--assertionFilter", "(objectClass=doesNotMatch)", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "base", |
| | | "--matchedValuesFilter", "(objectClass=*person)", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)", |
| | | "objectClass" |
| | | }; |
| | |
| | | "-b", "o=test", |
| | | "-s", "sub", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "o=test", |
| | | "-s", "sub", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "-J", OID_LDAP_SUBENTRIES + ":true", |
| | | "(objectClass=*)" |
| | | }; |
| | |
| | | "-b", "o=test", |
| | | "-s", "sub", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "-J", "subentries:true", |
| | | "(objectClass=*)" |
| | | }; |
| | |
| | | "-s", "base", |
| | | "-J", OID_ACCOUNT_USABLE_CONTROL + ":true", |
| | | "-J", OID_MANAGE_DSAIT_CONTROL + ":false", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "one", |
| | | "--simplePageSize", "2", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-S", "givenName", |
| | | "--simplePageSize", "2", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "sub", |
| | | "-S", "givenName", |
| | | "--countEntries", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "givenName", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "-givenName", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "givenName:caseExactOrderingMatch", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "sn,givenName", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "sn,-givenName", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "-,sn", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "-sn:", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "undefined", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-S", "givenName:undefined", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-b", "dc=example,dc=com", |
| | | "-s", "sub", |
| | | "-G", "0:9:1:0", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-S", "sn,givenName", |
| | | "--simplePageSize", "2", |
| | | "-G", "0:3:1:0", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "sub", |
| | | "-S", "sn,givenName", |
| | | "-G", "invalid", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "sub", |
| | | "-S", "sn,givenName", |
| | | "-G", "invalid:9:invalid", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "sub", |
| | | "-S", "sn,givenName", |
| | | "-G", "invalid:9:1:0", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |
| | |
| | | "-s", "sub", |
| | | "-S", "givenName", |
| | | "-G", "1:3:1:0", |
| | | "--noPropertiesFile", |
| | | "(objectClass=*)" |
| | | }; |
| | | |