From ea39583dfc87868653807a87f73dca9c4f5c38f8 Mon Sep 17 00:00:00 2001
From: dugan <dugan@localhost>
Date: Mon, 25 Sep 2006 20:11:38 +0000
Subject: [PATCH] Add TestLDAPConnectionHandler.java test.

---
 opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/TestLDAPConnectionHandler.java |  328 ++++++++++++++++++++++++++++++++++++++++++++++
 opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/LdapTestCase.java              |   46 ++++++
 2 files changed, 374 insertions(+), 0 deletions(-)

diff --git a/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/LdapTestCase.java b/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/LdapTestCase.java
index 775fe68..69b9ba8 100644
--- a/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/LdapTestCase.java
+++ b/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/LdapTestCase.java
@@ -26,13 +26,19 @@
  */
 package org.opends.server.protocols.ldap ;
 
+import static org.opends.server.config.ConfigConstants.ATTR_LISTEN_PORT;
+import org.opends.server.types.Entry;
 import org.opends.server.DirectoryServerTestCase;
+import org.opends.server.config.ConfigEntry;
 import org.opends.server.protocols.asn1.ASN1Boolean;
 import org.opends.server.protocols.asn1.ASN1Element;
 import org.opends.server.protocols.asn1.ASN1Long;
 import org.opends.server.protocols.asn1.ASN1Sequence;
+import org.opends.server.types.Attribute;
 import org.testng.annotations.Test;
 
+import java.net.InetSocketAddress;
+import java.net.ServerSocket;
 import java.util.ArrayList;
 import java.util.LinkedList;
 import java.util.ListIterator;
@@ -44,6 +50,9 @@
 @Test(groups = { "precommit", "ldap" })
 public abstract class LdapTestCase extends DirectoryServerTestCase
 {
+	
+	private static String localHost = "127.0.0.1";
+	
   /**
    * Determine whether one LDAPAttribute is equal to another.
    * The values of the attribute must be identical and in the same order.
@@ -136,4 +145,41 @@
 	  op.toString(sb);
 	  op.toString(sb, 1);
   }
+  
+  /**
+   * Generate a LDAPConnectionHandler from a entry. The listen port is
+   * determined automatiacally, so no ATTR_LISTEN_PORT should be in the
+   * entry.
+   * 
+   * @param handlerEntry The entry to be used to configure the handle.
+   * @return
+   * @throws Exception if the handler cannot be initialized.
+   */
+  static LDAPConnectionHandler 
+  getLDAPHandlerInstance(Entry handlerEntry) throws Exception {
+	  ServerSocket serverLdapSocket = new ServerSocket();
+	  serverLdapSocket.setReuseAddress(true);
+	  serverLdapSocket.bind(new InetSocketAddress(localHost, 0));
+	  long serverLdapPort = serverLdapSocket.getLocalPort();
+	  Attribute a=new Attribute(ATTR_LISTEN_PORT, String.valueOf(serverLdapPort));
+	  handlerEntry.addAttribute(a,null);
+	  String LDAPClassName=LDAPConnectionHandler.class.getName();
+	  Class LDAPConnHandlerClass = Class.forName(LDAPClassName);
+	  LDAPConnectionHandler LDAPConnHandler = 
+		  (LDAPConnectionHandler) LDAPConnHandlerClass.newInstance();
+	  LDAPConnHandler.initializeConnectionHandler(new ConfigEntry(handlerEntry, null ));
+	  return LDAPConnHandler;
+  }
+  
+  /**
+ * @return A free port number.
+ * @throws Exception if socket cannot be created or bound to.
+ */
+static long
+  getFreePort() throws Exception {
+	  ServerSocket serverLdapSocket = new ServerSocket();
+	  serverLdapSocket.setReuseAddress(true);
+	  serverLdapSocket.bind(new InetSocketAddress(localHost, 0));
+	  return serverLdapSocket.getLocalPort();
+  }
 }
diff --git a/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/TestLDAPConnectionHandler.java b/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/TestLDAPConnectionHandler.java
new file mode 100644
index 0000000..4550ea3
--- /dev/null
+++ b/opends/tests/unit-tests-testng/src/server/org/opends/server/protocols/ldap/TestLDAPConnectionHandler.java
@@ -0,0 +1,328 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License").  You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at
+ * trunk/opends/resource/legal-notices/OpenDS.LICENSE
+ * or https://OpenDS.dev.java.net/OpenDS.LICENSE.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at
+ * trunk/opends/resource/legal-notices/OpenDS.LICENSE.  If applicable,
+ * add the following below this CDDL HEADER, with the fields enclosed
+ * by brackets "[]" replaced with your own identifying * information:
+ *      Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ *
+ *
+ *      Portions Copyright 2006 Sun Microsystems, Inc.
+ */
+
+package org.opends.server.protocols.ldap;
+
+import java.util.LinkedHashMap;
+import java.util.LinkedList;
+import java.util.List;
+import java.util.Collection;
+
+import static org.opends.server.config.ConfigConstants.*;
+
+import org.opends.server.api.ClientConnection;
+import org.opends.server.TestCaseUtils;
+import org.opends.server.types.*;
+import org.opends.server.config.ConfigAttribute;
+import org.opends.server.config.ConfigEntry;
+import org.opends.server.core.DirectoryServer;
+import org.opends.server.types.Attribute;
+import org.opends.server.types.Entry;
+import static org.testng.Assert.*;
+
+import org.testng.annotations.BeforeClass;
+import org.testng.annotations.Test;
+
+/**
+ * @author Administrator
+ *
+ */
+public class TestLDAPConnectionHandler extends LdapTestCase {
+
+	private static String reasonMsg="Don't need a reason.";
+
+	/**
+	 * Once-only initialization.
+	 * 
+	 * @throws Exception
+	 *           If an unexpected error occurred.
+	 */
+	@BeforeClass
+	public void setUp() throws Exception {
+		// This test suite depends on having the schema available, so we'll
+		// start the server.
+		TestCaseUtils.startServer();
+	}
+
+	@Test()
+	/**
+	 *  Creates two handlers, one which is SSL type. Then change some values via the setter
+	 *  methods.
+	 *  
+	 * @throws Exception if the handler cannot be instantiated.
+	 */
+	public void testLDAPConnectionHandler() throws Exception {
+		Entry LDAPHandlerEntry=null;
+
+		LDAPHandlerEntry=TestCaseUtils.makeEntry(
+				"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
+				"objectClass: top",
+				"objectClass: ds-cfg-connection-handler",
+				"objectClass: ds-cfg-ldap-connection-handler",
+				"cn: LDAP Connection Handler",
+				"ds-cfg-connection-handler-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
+				"ds-cfg-connection-handler-enabled: true",
+				"ds-cfg-listen-address: 0.0.0.0",
+				"ds-cfg-accept-backlog: 128",
+				"ds-cfg-allow-ldapv2: false",
+				"ds-cfg-keep-stats: false",
+				"ds-cfg-use-tcp-keepalive: true",
+				"ds-cfg-use-tcp-nodelay: true",
+				"ds-cfg-allow-tcp-reuse-address: true",
+				"ds-cfg-send-rejection-notice: true",
+				"ds-cfg-max-request-size: 5 megabytes",
+				"ds-cfg-num-request-handlers: 2",
+				"ds-cfg-allow-start-tls: false",
+				"ds-cfg-use-ssl: false",
+				"ds-cfg-ssl-client-auth-policy: optional",
+		"ds-cfg-ssl-cert-nickname: server-cert");
+		LDAPConnectionHandler LDAPConnHandler=getLDAPHandlerInstance(LDAPHandlerEntry);
+		LDAPConnHandler.allowLDAPv2();
+		LDAPConnHandler.allowStartTLS();
+		LDAPConnHandler.setKeepStats(false);
+		LDAPConnHandler.keepStats();
+		LDAPConnHandler.toString(new StringBuilder());
+		LDAPConnHandler.toString();
+		LDAPStatistics tracker=LDAPConnHandler.getStatTracker();
+		LinkedHashMap<String,String> alerts = LDAPConnHandler.getAlerts();
+		String c=LDAPConnHandler.getClassName();
+		DN dn = LDAPConnHandler.getComponentEntryDN();
+		DN dn1 = LDAPConnHandler.getConfigurableComponentEntryDN();
+		List<ConfigAttribute> atts = LDAPConnHandler.getConfigurationAttributes();
+		String[] cips = LDAPConnHandler.getEnabledSSLCipherSuites();
+		String[] protos = LDAPConnHandler.getEnabledSSLProtocols();
+		int maxReqSize = LDAPConnHandler.getMaxRequestSize();
+		String shutListName=LDAPConnHandler.getShutdownListenerName();
+		SSLClientAuthPolicy policy = LDAPConnHandler.getSSLClientAuthPolicy();
+		Collection<ClientConnection> cons=LDAPConnHandler.getClientConnections();
+		LDAPConnHandler.processServerShutdown(reasonMsg);
+		//Reset some things for the SSL handler	
+		Attribute useSSL=new Attribute(ATTR_USE_SSL, String.valueOf(false));
+		//MPD fix this in ConfigConstants
+		Attribute startTls=new Attribute(ATTR_ALLOW_STARTTLS, String.valueOf(false));
+		AttributeType attrType=DirectoryServer.getAttributeType(ATTR_LISTEN_PORT, true);
+		Attribute a=new Attribute(attrType);
+		LDAPHandlerEntry.removeAttribute(a, null);
+		LDAPHandlerEntry.removeAttribute(useSSL, null);
+		LDAPHandlerEntry.removeAttribute(startTls, null);
+		Attribute useSSL1=new Attribute(ATTR_USE_SSL, String.valueOf(true));
+		Attribute startTls1=new Attribute(ATTR_ALLOW_STARTTLS, String.valueOf(true));
+		LDAPHandlerEntry.addAttribute(useSSL1,null);
+		LDAPHandlerEntry.addAttribute(startTls1,null);
+		LDAPConnectionHandler LDAPSConnHandler = getLDAPHandlerInstance(LDAPHandlerEntry);
+		LDAPSConnHandler.finalizeConnectionHandler(reasonMsg, true);
+		LDAPConnHandler.processServerShutdown(reasonMsg);
+	}
+
+	@Test()
+	/**
+	 *  Start a handler an then give its hasAcceptableConfiguration a ConfigEntry with
+	 *  numerous invalid cases.
+	 *  
+	 * @throws Exception if handler cannot be instantiated or the configuration is 
+	 *                   accepted.
+	 */
+	public void testBadLDAPConnectionHandlerConfiguration() throws Exception
+	{
+		Entry BadHandlerEntry=TestCaseUtils.makeEntry(
+				"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
+				"objectClass: top",
+				"objectClass: ds-cfg-connection-handler",
+				"objectClass: ds-cfg-ldap-connection-handler",
+				"cn: LDAP Connection Handler",
+				"ds-cfg-connection-handler-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
+				"ds-cfg-connection-handler-enabled: true",
+				"ds-cfg-listen-address: 0.0.0.0",
+				"ds-cfg-accept-backlog: 128",
+				"ds-cfg-allow-ldapv2: false",
+				"ds-cfg-keep-stats: false",
+				"ds-cfg-use-tcp-keepalive: true",
+				"ds-cfg-use-tcp-nodelay: true",
+				"ds-cfg-allow-tcp-reuse-address: true",
+				"ds-cfg-send-rejection-notice: true",
+				"ds-cfg-max-request-size: 5 megabytes",
+				"ds-cfg-num-request-handlers: 2",
+				"ds-cfg-allow-start-tls: false",
+				"ds-cfg-use-ssl: false",
+				"ds-cfg-ssl-client-auth-policy: optional",
+		"ds-cfg-ssl-cert-nickname: server-cert");
+		LDAPConnectionHandler LDAPConnHandler=getLDAPHandlerInstance(BadHandlerEntry);
+		//Add some invalid attrs and some duplicate attrs probably a better way but I feel
+		//like typing
+		Attribute a2=new Attribute(ATTR_LISTEN_PORT, String.valueOf(389));
+		Attribute a2a=new Attribute(ATTR_LISTEN_PORT, String.valueOf(70000));
+		Attribute a3=new Attribute(ATTR_LISTEN_ADDRESS, "localhost");
+		Attribute a3a=new Attribute(ATTR_LISTEN_ADDRESS, "FAFASFSDFSADFASDFSDFSDAFAS");
+		Attribute a4=new Attribute(ATTR_ACCEPT_BACKLOG, String.valueOf(Long.MAX_VALUE));
+		Attribute a5=new Attribute(ATTR_ALLOWED_CLIENT, "129.800.990.45");
+		Attribute a6=new Attribute(ATTR_DENIED_CLIENT, "129.");
+		Attribute a7=new Attribute(ATTR_ALLOW_LDAPV2, "45");
+		Attribute a8=new Attribute(ATTR_KEEP_LDAP_STATS, "45");
+		Attribute a9=new Attribute(ATTR_SEND_REJECTION_NOTICE, "45");
+		Attribute a10=new Attribute(ATTR_USE_TCP_KEEPALIVE, "45");
+		Attribute a11=new Attribute(ATTR_USE_TCP_NODELAY, "45");
+		Attribute a12=new Attribute(ATTR_ALLOW_REUSE_ADDRESS, "45");
+		Attribute a13=new Attribute(ATTR_MAX_REQUEST_SIZE, "45 FLUBBERBYTES");
+		Attribute a14=new Attribute(ATTR_USE_SSL, "45");
+		Attribute a15=new Attribute(ATTR_ALLOW_STARTTLS, "45");
+		BadHandlerEntry.addAttribute(a2, null);
+		BadHandlerEntry.addAttribute(a3, null);
+		BadHandlerEntry.addAttribute(a2a, null);
+		BadHandlerEntry.addAttribute(a3a, null);
+		BadHandlerEntry.addAttribute(a4, null);
+		BadHandlerEntry.addAttribute(a5, null);
+		BadHandlerEntry.addAttribute(a6, null);
+		BadHandlerEntry.addAttribute(a7, null);
+		BadHandlerEntry.addAttribute(a8, null);
+		BadHandlerEntry.addAttribute(a9, null);
+		BadHandlerEntry.addAttribute(a10, null);
+		BadHandlerEntry.addAttribute(a11, null);
+		BadHandlerEntry.addAttribute(a12, null);
+		BadHandlerEntry.addAttribute(a13, null);
+		BadHandlerEntry.addAttribute(a14, null);
+		BadHandlerEntry.addAttribute(a15, null);
+		LinkedList<String> reasons = new LinkedList<String>();
+		ConfigEntry BadConfigEntry=new ConfigEntry(BadHandlerEntry, null );
+		boolean ret=LDAPConnHandler.hasAcceptableConfiguration(BadConfigEntry, reasons);
+		LDAPConnHandler.finalizeConnectionHandler(reasonMsg, true);
+		LDAPConnHandler.processServerShutdown(reasonMsg);
+		assertFalse(ret);
+	}
+
+	/**
+	 * Create handler and then change most of its values and see if
+	 * it is acceptable and applied.
+	 * @throws Exception if handler cannot be instantiated.
+	 */
+	@Test()
+	public void testGoodLDAPConnectionHandlerConfiguration() throws Exception
+	{
+		Entry GoodHandlerEntry=TestCaseUtils.makeEntry(
+				"dn: cn=LDAP Connection Handler,cn=Connection Handlers,cn=config",
+				"objectClass: top",
+				"objectClass: ds-cfg-connection-handler",
+				"objectClass: ds-cfg-ldap-connection-handler",
+				"cn: LDAP Connection Handler",
+				"ds-cfg-connection-handler-class: org.opends.server.protocols.ldap.LDAPConnectionHandler",
+				"ds-cfg-connection-handler-enabled: true",
+				"ds-cfg-listen-address: 0.0.0.0",
+				"ds-cfg-accept-backlog: 128",
+				"ds-cfg-allow-ldapv2: false",
+				"ds-cfg-keep-stats: false",
+				"ds-cfg-use-tcp-keepalive: true",
+				"ds-cfg-use-tcp-nodelay: true",
+				"ds-cfg-allow-tcp-reuse-address: true",
+				"ds-cfg-send-rejection-notice: true",
+				"ds-cfg-max-request-size: 5 megabytes",
+				"ds-cfg-num-request-handlers: 2",
+				"ds-cfg-allow-start-tls: false",
+				"ds-cfg-use-ssl: true",
+				"ds-cfg-ssl-client-auth-policy: optional",
+		"ds-cfg-ssl-cert-nickname: server-cert");
+		LDAPConnectionHandler LDAPConnHandler=getLDAPHandlerInstance(GoodHandlerEntry);
+		//Make attrTypes to remove
+		AttributeType at0=DirectoryServer.getAttributeType(ATTR_LISTEN_PORT, true);
+		AttributeType at1=DirectoryServer.getAttributeType(ATTR_LISTEN_ADDRESS, true);
+		AttributeType at2=DirectoryServer.getAttributeType(ATTR_ALLOW_LDAPV2, true);
+		AttributeType at3=DirectoryServer.getAttributeType(ATTR_ALLOW_LDAPV2, true);
+		AttributeType at4=DirectoryServer.getAttributeType(ATTR_KEEP_LDAP_STATS, true);
+		AttributeType at5=DirectoryServer.getAttributeType(ATTR_SEND_REJECTION_NOTICE,true);
+		AttributeType at6=DirectoryServer.getAttributeType(ATTR_USE_TCP_KEEPALIVE,true);
+		AttributeType at7=DirectoryServer.getAttributeType(ATTR_USE_TCP_NODELAY,true);
+		AttributeType at8=DirectoryServer.getAttributeType(ATTR_ALLOW_REUSE_ADDRESS,true);
+		AttributeType at9=DirectoryServer.getAttributeType(ATTR_USE_SSL,true);
+		AttributeType at10=DirectoryServer.getAttributeType(ATTR_ALLOW_STARTTLS,true);
+		AttributeType at11=DirectoryServer.getAttributeType(ATTR_MAX_REQUEST_SIZE,true);
+		AttributeType at12=DirectoryServer.getAttributeType(ATTR_ACCEPT_BACKLOG,true);
+		//Remove them
+		Attribute rAttr0=new Attribute(at0);
+		GoodHandlerEntry.removeAttribute(rAttr0, null);
+		Attribute rAttr1=new Attribute(at1);
+		GoodHandlerEntry.removeAttribute(rAttr1, null);
+		Attribute rAttr2=new Attribute(at2);
+		GoodHandlerEntry.removeAttribute(rAttr2, null);
+		Attribute rAttr3=new Attribute(at3);
+		GoodHandlerEntry.removeAttribute(rAttr3, null);
+		Attribute rAttr4=new Attribute(at4);
+		GoodHandlerEntry.removeAttribute(rAttr4, null);
+		Attribute rAttr5=new Attribute(at5);
+		GoodHandlerEntry.removeAttribute(rAttr5, null);
+		Attribute rAttr6=new Attribute(at6);
+		GoodHandlerEntry.removeAttribute(rAttr6, null);
+		Attribute rAttr7=new Attribute(at7);		
+		GoodHandlerEntry.removeAttribute(rAttr7, null);
+		Attribute rAttr8=new Attribute(at8);
+		Attribute rAttr9=new Attribute(at9);
+		Attribute rAttr10=new Attribute(at10);
+		Attribute rAttr11=new Attribute(at11);
+		Attribute rAttr12=new Attribute(at12);
+		GoodHandlerEntry.removeAttribute(rAttr8, null);
+		GoodHandlerEntry.removeAttribute(rAttr9, null);
+		GoodHandlerEntry.removeAttribute(rAttr10, null);
+		GoodHandlerEntry.removeAttribute(rAttr11, null);
+		GoodHandlerEntry.removeAttribute(rAttr12, null);
+		//Make new AttrTypes with different values
+		long newPort=getFreePort();
+		Attribute a2=new Attribute(ATTR_LISTEN_PORT, String.valueOf(newPort));
+		Attribute a3=new Attribute(ATTR_LISTEN_ADDRESS, "localhost");	
+		Attribute a4=new Attribute(ATTR_ACCEPT_BACKLOG, String.valueOf(25));
+		Attribute a5=new Attribute(ATTR_ALLOWED_CLIENT, "129.56.56.45");
+		Attribute a6=new Attribute(ATTR_DENIED_CLIENT, "129.*.*.90");
+		Attribute a7=new Attribute(ATTR_ALLOW_LDAPV2, "true");
+		Attribute a8=new Attribute(ATTR_KEEP_LDAP_STATS, "true");
+		Attribute a9=new Attribute(ATTR_SEND_REJECTION_NOTICE, "false");
+		Attribute a10=new Attribute(ATTR_USE_TCP_KEEPALIVE, "false");
+		Attribute a11=new Attribute(ATTR_USE_TCP_NODELAY, "false");
+		Attribute a12=new Attribute(ATTR_ALLOW_REUSE_ADDRESS, "false");
+		Attribute a13=new Attribute(ATTR_MAX_REQUEST_SIZE, "45 kb");
+		Attribute a14=new Attribute(ATTR_USE_SSL, "false");
+		Attribute a15=new Attribute(ATTR_ALLOW_STARTTLS, "true");
+		//Add them
+		GoodHandlerEntry.addAttribute(a2, null);
+		GoodHandlerEntry.addAttribute(a3, null);
+		GoodHandlerEntry.addAttribute(a4, null);
+		GoodHandlerEntry.addAttribute(a5, null);
+		GoodHandlerEntry.addAttribute(a6, null);
+		GoodHandlerEntry.addAttribute(a7, null);
+		GoodHandlerEntry.addAttribute(a8, null);
+		GoodHandlerEntry.addAttribute(a9, null);
+		GoodHandlerEntry.addAttribute(a10, null);
+		GoodHandlerEntry.addAttribute(a11, null);
+		GoodHandlerEntry.addAttribute(a12, null);
+		GoodHandlerEntry.addAttribute(a13, null);
+		GoodHandlerEntry.addAttribute(a14, null);
+		GoodHandlerEntry.addAttribute(a15, null);
+		LinkedList<String> reasons = new LinkedList<String>();
+		ConfigEntry newConfigEntry=new ConfigEntry(GoodHandlerEntry, null );
+		//see if we're ok
+		boolean ret=LDAPConnHandler.hasAcceptableConfiguration(newConfigEntry, reasons);
+		assertTrue(ret);	
+		LDAPConnHandler.applyNewConfiguration(newConfigEntry, true);
+		LDAPConnHandler.finalizeConnectionHandler(reasonMsg, true);
+
+	}
+}

--
Gitblit v1.10.0