/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at legal-notices/CDDLv1_0.txt
* or http://forgerock.org/license/CDDLv1.0.html.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at legal-notices/CDDLv1_0.txt.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2008-2010 Sun Microsystems, Inc.
* Portions Copyright 2011-2015 ForgeRock AS
* Portions Copyright 2013 Manuel Gaupp
*/
package org.opends.server.authorization.dseecompat;
import static org.opends.server.TestCaseUtils.*;
import static org.opends.server.config.ConfigConstants.*;
import static org.opends.server.util.CollectionUtils.*;
import static org.opends.server.util.ServerConstants.*;
import static org.testng.Assert.*;
import java.io.*;
import java.text.SimpleDateFormat;
import java.util.*;
import java.util.regex.Pattern;
import org.forgerock.i18n.LocalizableMessage;
import org.opends.server.TestCaseUtils;
import org.opends.server.protocols.ldap.LDAPResultCode;
import org.opends.server.tools.*;
import org.opends.server.types.LDIFExportConfig;
import org.opends.server.types.LDIFImportConfig;
import org.opends.server.util.LDIFReader;
import org.opends.server.util.LDIFWriter;
import org.testng.Assert;
import org.testng.annotations.BeforeClass;
import org.testng.annotations.BeforeMethod;
import org.testng.annotations.DataProvider;
import org.testng.annotations.Test;
/**
* These are more functional tests than unit tests. They go directly over
* LDAP for all of their operations. We use the builtin LDAPModify,
* LDAPSearch, etc. tools to do this, as well as the ones that can
* do similar operations directly on LDIF (e.g. LDIFDiff). This is
* probably the easiest way to test the code, and it makes it easy to test
* failures outside of the unit test by just running the ldif code
* directly.
*
* Most of the complexity is in the DataProviders because they try to
* squeeze everything they can out of what we have. We've scaled some of this
* back to make the tests run a little bit faster. If the tests fail quietly,
* then there is likely a problem in a DataProvider (e.g. a RuntimeException).
* In this case, running with -Dorg.opends.test.suppressOutput=false should
* help to diagnose the problem.
*
* Most of the redundancy and error-prone-ness has also been factored out.
* For instance, in general the code doesn't craft the ACIs directly; instead
* they are built by buildAciValue, so that we are less likely to screw up
* the syntax.
*/
@SuppressWarnings("javadoc")
@Test(sequential=true, groups="slow")
public class AciTests extends AciTestCase {
// TODO: test modify use cases
// TODO: test searches where we expect a subset of attributes and entries
// TODO: test delete
// TODO: test more combinations of attributes
// TODO: test multiple permission bind rules in the same ACI
// TODO: test more invalid filters. We should have at least one for each concept in the spec.
// TODO: test more with network addresses once this is working
// TODO: test ipv6
// TODO: test stuff happening in parallel!
// TODO: test ACI evaluation on adding, replacing, and with other operations
// TODO: check bypass-acl and modify-acl
// TODO: should we check that we get an error message on failures?
// TODO: test that the target has to be a subordinate
// TODO: test aci's with funky spacing
// TODO: Test anonymous access, i.e. all vs anyone
// TODO: Test ldap:///parent
// TODO: Test userattr
/**
* Tests are disabled this way because a class-level @Test(enabled=false)
* doesn't appear to work.
*/
private static final boolean TESTS_ARE_DISABLED = false;
/**
* This is used to lookup the day of the week from the calendar field.
* The calendar field is 1 based and starts with sun. We make [0] point
* to 'sat' instead of a bogus value since we need to be able to find the set of days without a
* specific day. It needs to be at the top since it's used by other
* static initialization.
*/
private static final String[] DAYS_OF_WEEK =
{"sat", "sun", "mon", "tue", "wed", "thu", "fri", "sat"};
private static final SimpleDateFormat TIME_FORMATTER = new SimpleDateFormat("HHmm");
// -----------------------------------------------------------------------------
// USERS
// -----------------------------------------------------------------------------
private static final String DIR_MGR_DN = "cn=Directory Manager";
private static final String DIR_MGR_PW = "password";
private static final String ADMIN_DN = "cn=aci admin,dc=example,dc=com";
private static final String ADMIN_PW = "PASSWORD";
private static final String ADMIN_DN_LDAP_URL = "ldap:///" + ADMIN_DN;
private static final String USER_DN = "cn=some user,dc=example,dc=com";
private static final String USER_PW = "userPass";
private static final String ANNONYMOUS_DN = "<>";
private static final String ANNONYMOUS_PW = "<>";
private static final Map DN_TO_PW;
static {
Map dnToPw = new HashMap<>();
dnToPw.put(DIR_MGR_DN, DIR_MGR_PW);
dnToPw.put(ADMIN_DN, ADMIN_PW);
dnToPw.put(ANNONYMOUS_DN, ANNONYMOUS_PW);
DN_TO_PW = Collections.unmodifiableMap(dnToPw);
}
private static final String OBJECTCLASS_STAR = "(objectclass=*)";
private static final String SCOPE_BASE = "base";
private static final String SCOPE_ONE = "one";
private static final String SCOPE_SUB = "sub";
// -----------------------------------------------------------------------------
//
// -----------------------------------------------------------------------------
private static final String MONITOR_DN = "cn=monitor";
private static final String OU_BASE_DN = "ou=acitest,dc=example,dc=com";
private static final String OU_GROUPS_DN = "ou=groups,dc=example,dc=com";
//These entries are used to test groupdn, roledn and userattr stuff.
private static final String OU_GROUP_1_DN = "cn=group1," + OU_GROUPS_DN;
private static final String OU_GROUP_2_DN = "cn=group2," + OU_GROUPS_DN;
//End group entries.
/** Used by modrdn new superior */
private static final String MANAGER_NEW_DN =
"cn=new managers," + OU_BASE_DN;
private static final String MGR_NEW_DN_URL = "ldap:///" + MANAGER_NEW_DN;
private static final String MANAGER_DN = "cn=the managers," + OU_BASE_DN;
private static final String MGR_DN_URL = "ldap:///" + MANAGER_DN;
//These entries are going to be used to test userattr parent stuff.
private static final String SALES_DN = "cn=sales dept," + MANAGER_DN;
private static final String SALES_NEW_DN = "cn=sales dept," + MANAGER_NEW_DN;
private static final String SALES_USER_1 = "cn=sales1 person," + SALES_DN;
private static final String SALES_USER_NEW_1 =
"cn=sales1 person," + SALES_NEW_DN;
private static final String SALES_USER_2 = "cn=sales2 person," + SALES_DN;
private static final String SALES_USER_3 = "cn=sales3 person," + SALES_DN;
private static final String LEVEL_1_USER_URL =
"ldap:///??base?(cn=level1 user)";
//End userattr entries.
private static final String OU_INNER_DN = "ou=inner," + OU_BASE_DN;
private static final String LDAP_URL_OU_INNER = "ldap:///" + OU_INNER_DN;
private static final String OU_LEAF_DN = "ou=leaf," + OU_INNER_DN;
private static final String LDAP_URL_OU_LEAF = "ldap:///" + OU_LEAF_DN;
private static final String LEVEL_1_USER_DN = "cn=level1 user," + OU_BASE_DN;
private static final String LEVEL_2_USER_DN = "cn=level2 user," + OU_INNER_DN;
private static final String LEVEL_3_USER_DN = "cn=level3 user," + OU_LEAF_DN;
/** The proxy DN. */
private static final String PROXY_USER_DN = "cn=proxy user," + OU_BASE_DN;
/**
* We need to delete all of these between each test. This list needs to be
* bottom up so that it can be handed to LDAPDelete.
*/
private static final String[] ALL_TEST_ENTRY_DNS_BOTTOM_UP = {
SALES_USER_1,
SALES_USER_2,
SALES_USER_3,
PROXY_USER_DN,
LEVEL_3_USER_DN,
LEVEL_2_USER_DN,
LEVEL_1_USER_DN,
SALES_DN,
OU_GROUP_2_DN,
OU_GROUP_1_DN,
OU_LEAF_DN,
OU_INNER_DN,
MANAGER_DN,
MANAGER_NEW_DN,
OU_GROUPS_DN,
OU_BASE_DN,
ADMIN_DN,
USER_DN
};
private static final String BIND_RULE_USERDN_SELF = "userdn=\"ldap:///self\"";
private static final String BIND_RULE_USERDN_ALL = "userdn=\"ldap:///all\"";
private static final String BIND_RULE_USERDN_ADMIN = "userdn=\"ldap:///" + ADMIN_DN + "\"";
private static final String BIND_RULE_USERDN_LEVEL_1 = "userdn=\"ldap:///" + LEVEL_1_USER_DN + "\"";
/** The proxy userdn bind rule. */
private static final String BIND_RULE_USERDN_PROXY =
"userdn=\"ldap:///" + PROXY_USER_DN + "\"";
private static final String BIND_RULE_USERDN_ANYONE = "userdn=\"ldap:///anyone\"";
private static final String BIND_RULE_USERDN_PARENT = "userdn=\"ldap:///parent\"";
private static final String BIND_RULE_USERDN_CN_RDN = "userdn=\"ldap:///CN=*,dc=example,dc=com\"";
private static final String BIND_RULE_USERDN_NOT_UID_RDN = "userdn!=\"ldap:///uid=*,dc=example,dc=com\"";
private static final String BIND_RULE_USERDN_UID_OR_CN_RDN = "userdn=\"ldap:///uid=*,dc=example,dc=com || ldap:///cn=*,dc=example,dc=com\"";
private static final String BIND_RULE_USERDN_ALL_CN_ADMINS = "userdn=\"ldap:///dc=example,dc=com??sub?(cn=*admin*)\"";
/** TODO: this might be invalid? */
private static final String BIND_RULE_USERDN_TOP_LEVEL_CN_ADMINS = "userdn=\"ldap:///dc=example,dc=com??one?(cn=*admin*)\"";
private static final String BIND_RULE_GROUPDN_GROUP_1 =
"groupdn=\"ldap:///" + OU_GROUP_1_DN + "\"";
private static final String BIND_RULE_IP_LOCALHOST = "ip=\"127.0.0.1\"";
private static final String BIND_RULE_IP_LOCALHOST_WITH_MASK = "ip=\"127.0.0.1+255.255.255.254\"";
private static final String BIND_RULE_IP_LOCALHOST_SUBNET = "ip=\"127.0.0.*\"";
private static final String BIND_RULE_IP_LOCALHOST_SUBNET_WITH_MASK = "ip=\"127.0.0.*+255.255.255.254\"";
private static final String BIND_RULE_IP_NOT_LOCALHOST = "ip!=\"127.0.0.1\"";
private static final String BIND_RULE_IP_MISC_AND_LOCALHOST = "ip=\"72.5.124.61,127.0.0.1\"";
private static final String BIND_RULE_IP_NOT_MISC_AND_LOCALHOST = "ip!=\"72.5.124.61,127.0.0.1\"";
private static final String BIND_RULE_DNS_LOCALHOST = "dns=\"localhost\"";
private static final String BIND_RULE_DNS_NOT_LOCALHOST = "dns!=\"localhost\"";
private static final String BIND_RULE_DNS_ALL= "dns=\"*\"";
private static final String BIND_RULE_THIS_HOUR = getTimeOfDayRuleNextHour();
private static final String BIND_RULE_PREVIOUS_HOUR = getTimeOfDayRulePreviousHour();
private static final String BIND_RULE_AUTHMETHOD_SIMPLE = "authmethod=\"simple\"";
private static final String BIND_RULE_AUTHMETHOD_SSL = "authmethod=\"ssl\"";
private static final String BIND_RULE_AUTHMETHOD_SASL_DIGEST_MD5 = "authmethod=\"sasl DIGEST-MD5\"";
/** Admin, but not anonymous. */
private static final String BIND_RULE_USERDN_NOT_ADMIN = and(not(BIND_RULE_USERDN_ADMIN), BIND_RULE_AUTHMETHOD_SIMPLE);
private static final String BIND_RULE_TODAY = "dayofweek=\"" + getThisDayOfWeek() + "\"";
private static final String BIND_RULE_TODAY_AND_TOMORROW = "dayofweek=\"" + getThisDayOfWeek() + "," + getTomorrowDayOfWeek() + "\"";
private static final String BIND_RULE_NOT_TODAY = "dayofweek=\"" + getNotThisDayOfWeek() + "\"";
private static final String BIND_RULE_USERDN_ADMIN_AND_SSL = and(BIND_RULE_USERDN_ADMIN, BIND_RULE_AUTHMETHOD_SSL);
private static final String BIND_RULE_IP_NOT_LOCALHOST_OR_USERDN_ADMIN = or(BIND_RULE_IP_NOT_LOCALHOST, BIND_RULE_USERDN_ADMIN);
private static final String BIND_RULE_ADMIN_AND_LOCALHOST_OR_SSL = and(BIND_RULE_USERDN_ADMIN, or(BIND_RULE_AUTHMETHOD_SSL, BIND_RULE_DNS_LOCALHOST));
// These are made up
private static final String BIND_RULE_GROUPDN_1 = "groupdn=\"ldap:///cn=SomeGroup,dc=example,dc=com\"";
private static final String BIND_RULE_GROUPDN_2 = "groupdn=\"ldap:///cn=SomeGroup,dc=example,dc=com || ldap:///cn=SomeOtherGroup,dc=example,dc=com\"";
private static final String BIND_RULE_GROUPDN_3 = "groupdn=\"ldap:///cn=SomeGroup,dc=example,dc=com || ldap:///cn=SomeOtherGroup,dc=example,dc=com || ldap:///cn=SomeThirdGroup,dc=example,dc=com\"";
private static final String BIND_RULE_USERDN_FILTER = "userdn=\"ldap:///dc=example,dc=com??one?(|(ou=eng)(ou=acct))\"";
//bind rule user attr ACIs
private static final String BIND_RULE_USERATTR_USERDN = "userattr=\"manager#USERDN\"";
private static final String BIND_RULE_USERATTR_USERDN_1 = "userattr=\"ldap:///dc=example,dc=com?owner#USERDN\"";
private static final String BIND_RULE_USERATTR_URL = "userattr=\"cn#LDAPURL\"";
private static final String BIND_RULE_USERATTR_GROUPDN = "userattr=\"manager#GROUPDN\"";
private static final String BIND_RULE_USERATTR_GROUPDN_1 = "userattr=\"ldap:///dc=example,dc=com?owner#GROUPDN\"";
private static final String BIND_RULE_USERATTR_USERDN_INHERITANCE = "userattr=\"parent[0,1,2].cn#USERDN\"";
private static final String BIND_RULE_USERATTR_GROUPDN_INHERITANCE = "userattr=\"parent[0,1,2].cn#GROUPDN\"";
private static final String BIND_RULE_USERATTR_VALUE = "userattr=\"manager#a manager\"";
private static final String BIND_RULE_INVALID_DAY = "dayofweek=\"sumday\"";
private static final String BIND_RULE_ONLY_AT_NOON = "timeofday=\"1200\"";
private static final String BIND_RULE_NOT_AT_NOON = "timeofday!=\"1200\"";
private static final String BIND_RULE_AFTERNOON = "timeofday>\"1200\"";
private static final String BIND_RULE_NOON_AND_AFTER = "timeofday>=\"1200\"";
private static final String BIND_RULE_BEFORE_NOON = "timeofday<\"1200\"";
private static final String BIND_RULE_NOON_AND_BEFORE = "timeofday<=\"1200\"";
//targattrfilters
private static final String TARG_ATTR_FILTERS = "add=cn:(!(cn=superAdmin))";
private static final String TARG_ATTR_FILTERS_1 = "add=cn:(!(cn=superAdmin)) && telephoneNumber:(telephoneNumber=123*)";
private static final String TARG_ATTR_FILTERS_2 = "add=cn:(!(cn=superAdmin)), del=sn:(!(sn=nonSuperAdmin))";
private static final String TARG_ATTR_FILTERS_4 = "del=cn:(&(cn=foo)(cn=f*)) && sn:(sn=joe*)";
private static final String TARG_ATTR_FILTERS_5 = TARG_ATTR_FILTERS_1 + "," + TARG_ATTR_FILTERS_4 ;
//targattrfilters invalids
private static final String TARG_ATTR_FILTERS_INVALID_FILTER = "del=cn:(&(cnfoo)(cn=f*)) && sn:(snjoe*)";
private static final String TARG_ATTR_FILTERS_BAD_OP = "delete=cn:(&(cn=foo)(cn=f*)) && sn:(sn=joe*)";
private static final String TARG_ATTR_FILTERS_BAD_OP_MATCH = TARG_ATTR_FILTERS_1 + "," + TARG_ATTR_FILTERS_1 ;
private static final String TARG_ATTR_FILTERS_BAD_FILTER_ATTR = "del=cn:(&(cn=foo)(cn=f*)) && sn:(cn=joe*)";
private static final String TARG_ATTR_FILTERS_BAD_FORMAT = "delete=cn;(&(cn=foo)(cn=f*)) && sn:(sn=joe*)";
private static final String TARG_ATTR_FILTERS_TOO_MANY_LISTS = TARG_ATTR_FILTERS_1 + "," + TARG_ATTR_FILTERS_4 + "," + TARG_ATTR_FILTERS_1;
private static final String TARG_ATTR_FILTERS_BAD_TOK = "delete=cn:(&(cn=foo)(cn=f*)) && sn:(sn=joe*) || pager:(pager=123-*)";
private static final String TARG_ATTR_FILTERS_ATTR_TYPE_NAME = "del=cn:(&(cn=foo)(cn=f*)) && 1sn_:(1sn_=joe*)";
private static final String SELF_MODIFY_ACI = "aci: (targetattr=\"*\")(version 3.0; acl \"self modify\";allow(all) userdn=\"userdn=\"ldap:///self\";)";
private static final String ALLOW_ALL_TO_ALL =
buildAciValue("name", "allow all", "targetattr", "*", "allow(all)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_COMPARE =
buildAciValue("name", "allow compare", "targetattr", "*", "target", "ldap:///cn=*," + OU_LEAF_DN, "allow(compare)", BIND_RULE_USERDN_ALL);
private static final String DENY_READ_CN_SN_IF_PERSON = buildAciValue("name",
"deny read cn sn if person", "targetfilter", "objectClass=person",
"targetattr", "cn || sn", "deny(read)", BIND_RULE_USERDN_ALL);
//The ACIs for the proxy tests.
private static final String ALLOW_PROXY_CONTROL_TO_LEVEL_1=
buildAciValue("name", "allow proxy control", "targetcontrol",
OID_PROXIED_AUTH_V2, "allow(read)",
BIND_RULE_USERDN_LEVEL_1);
private static final String ALLOW_PROXY_TO_IMPORT_MGR_NEW =
buildAciValue("name", "allow proxy import new mgr new tree", "target",
MGR_NEW_DN_URL, "allow(import)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_IMPORT_MGR=
buildAciValue("name", "allow proxy import mgr tree", "target",
MGR_DN_URL, "allow(import)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_EXPORT_MGR_NEW =
buildAciValue("name", "allow proxy export new mgr new tree", "target",
MGR_NEW_DN_URL, "allow(export)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_EXPORT_MGR=
buildAciValue("name", "allow proxy export mgr tree", "target",
MGR_DN_URL, "allow(export)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_WRITE_RDN_ATTRS=
buildAciValue("name", "allow proxy write to RDN attrs", "targetattr",
"uid || cn || sn", "allow(write)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_MOVED_ENTRY =
buildAciValue("name", "allow proxy to moved entry", "targetattr", "*",
"allow(search,read)", BIND_RULE_USERDN_PROXY);
private static final String ALLOW_PROXY_TO_LEVEL1 =
buildAciValue("name", "allow proxy to userdn level1", "targetattr", "*",
"allow(proxy)", BIND_RULE_USERDN_LEVEL_1);
private static final String ALLOW_ALL_TO_IMPORT_MGR_NEW =
buildAciValue("name", "allow import mgr new tree", "target", MGR_NEW_DN_URL, "allow(import)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_IMPORT_MGR=
buildAciValue("name", "allow import mgr tree", "target", MGR_DN_URL, "allow(import)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_EXPORT_MGR_NEW =
buildAciValue("name", "allow export mgr new tree", "target", MGR_NEW_DN_URL, "allow(export)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_EXPORT_MGR=
buildAciValue("name", "allow export mgr tree", "target", MGR_DN_URL, "allow(export)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_WRITE_RDN_ATTRS=
buildAciValue("name", "allow write to RDN attrs", "targetattr", "uid || cn || sn", "allow(write)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_MOVED_ENTRY =
buildAciValue("name", "allow all to moved", "targetattr", "*", "allow(search,read)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_SELFWRITE =
buildAciValue("name", "allow selfwrite", "targetattr", "member", "allow(selfwrite)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_ALL_TO_ADMIN =
buildAciValue("name", "allow all to admin", "targetattr", "*", "allow(all)", BIND_RULE_USERDN_ADMIN);
private static final String ALLOW_ALL_TO_ANYONE =
buildAciValue("name", "allow all to anyone", "targetattr", "*", "allow(all)", BIND_RULE_USERDN_ANYONE);
private static final String ALLOW_SEARCH_TO_GROUP1_GROUPDN =
buildAciValue("name", "allow search to group1 groupdn", "targetattr",
"*", "allow(search, read)", BIND_RULE_GROUPDN_GROUP_1);
private static final String ALLOW_SEARCH_TO_ADMIN =
buildAciValue("name", "allow search to admin", "targetattr", "*", "allow(search, read)", BIND_RULE_USERDN_ADMIN);
private static final String DENY_ALL_TO_ALL =
buildAciValue("name", "deny all", "targetattr", "*", "deny(all)", BIND_RULE_USERDN_ALL);
private static final String DENY_READ_TO_ALL =
buildAciValue("name", "deny read", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_ALL);
private static final String DENY_SEARCH_TO_ALL =
buildAciValue("name", "deny search", "targetattr", "*", "deny(search)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_SEARCH_TO_ALL =
buildAciValue("name", "allow search", "targetattr", "*", "allow(search, read)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_READ_TO_ALL =
buildAciValue("name", "allow read", "targetattr", "*", "allow(read)", BIND_RULE_USERDN_ALL);
private static final String DENY_ALL_TO_ADMIN =
buildAciValue("name", "deny to admin", "targetattr", "*", "deny(all)", BIND_RULE_USERDN_ADMIN);
private static final String DENY_PERSON_OU_TO_ALL =
buildAciValue("name", "deny person, ou to all", "targetfilter", "(|(objectclass=person)(objectclass=*))", "deny(all)", BIND_RULE_USERDN_ALL);
private static final String DENY_ALL_OU_INNER =
buildAciValue("name", "deny inner to all", "target", LDAP_URL_OU_INNER, "deny(all)", BIND_RULE_USERDN_ALL);
private static final String DENY_ALL_REAL_ATTRS_VALUE =
buildAciValue("name", "deny all attrs but 'bogus'", "targetattr!=", "bogusAttr", "deny(all)", BIND_RULE_USERDN_ALL);
private static final String DENY_READ_REAL_ATTRS_VALUE =
buildAciValue("name", "deny read attrs but 'bogus'", "targetattr!=", "bogusAttr", "deny(read)", BIND_RULE_USERDN_ALL);
private static final String ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES =
buildAciValue("name", "allow all to non ou person", "targetattr", "*", "targetfilter", "(!(|(objectclass=organizationalunit)(objectclass=person)))", "allow(all)", BIND_RULE_USERDN_ALL);
private static final String ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_ALT =
buildAciValue("name", "allow all to non ou person", "targetattr", "*", "targetfilter!=", "(|(objectclass=organizationalunit)(objectclass=person))", "allow(all)", BIND_RULE_USERDN_ALL);
private static final String ALLOW_WRITE_DELETE_SEARCH_TO_ALL =
buildAciValue("name", "allow write, delete, and search,", "targetattr", "*", "allow(write, delete, search, read)", BIND_RULE_USERDN_ALL);
private static final String DENY_WRITE_DELETE_READ_TO_ALL =
buildAciValue("name", "deny write delete read to all", "targetattr", "*", "deny(write, delete, read)", BIND_RULE_USERDN_ALL);
private static final String DENY_READ_TO_CN_RDN_USERS =
buildAciValue("name", "deny read to cn rdn", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_CN_RDN);
private static final String DENY_READ_TO_UID_OR_CN_RDN_USERS =
buildAciValue("name", "deny read to uid or cn rdn", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_UID_OR_CN_RDN);
private static final String DENY_READ_TO_NON_UID_RDN_USERS =
buildAciValue("name", "deny read to non uid rdn users", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_NOT_UID_RDN);
private static final String DENY_READ_TO_CN_ADMINS =
buildAciValue("name", "deny read to users with 'admin' in their cn", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_ALL_CN_ADMINS);
private static final String ALLOW_SEARCH_TO_CN_ADMINS =
buildAciValue("name", "allow search to users with 'admin' in their cn", "targetattr", "*", "allow(search, read)", BIND_RULE_USERDN_ALL_CN_ADMINS);
private static final String DENY_READ_TO_TOP_LEVEL_CN_ADMINS =
buildAciValue("name", "deny read to users with 'admin' in their cn", "targetattr", "*", "deny(read)", BIND_RULE_USERDN_TOP_LEVEL_CN_ADMINS);
private static final String DENY_ALL_TO_LOCALHOST =
buildAciValue("name", "deny all to localhost", "targetattr", "*", "deny(all)", BIND_RULE_IP_LOCALHOST);
private static final String DENY_ALL_TO_LOCALHOST_WITH_MASK =
buildAciValue("name", "deny all to localhost with mask", "targetattr", "*", "deny(all)", BIND_RULE_IP_LOCALHOST_WITH_MASK);
private static final String DENY_ALL_TO_LOCALHOST_SUBNET =
buildAciValue("name", "deny all to localhost subnet", "targetattr", "*", "deny(all)", BIND_RULE_IP_LOCALHOST_SUBNET);
private static final String DENY_ALL_TO_LOCALHOST_SUBNET_WITH_MASK =
buildAciValue("name", "deny all to localhost subnet", "targetattr", "*", "deny(all)", BIND_RULE_IP_LOCALHOST_SUBNET_WITH_MASK);
private static final String DENY_ALL_TO_MISC_AND_LOCALHOST =
buildAciValue("name", "deny all to misc and localhost", "targetattr", "*", "deny(all)", BIND_RULE_IP_MISC_AND_LOCALHOST);
private static final String ALLOW_ALL_TO_NON_LOCALHOST =
buildAciValue("name", "allow all to non-localhost", "targetattr", "*", "allow(all)", BIND_RULE_IP_NOT_LOCALHOST);
private static final String ALLOW_ALL_TO_NON_MISC_AND_LOCALHOST =
buildAciValue("name", "allow all to non misc and localhost", "targetattr", "*", "allow(all)", BIND_RULE_IP_NOT_MISC_AND_LOCALHOST);
private static final String ALLOW_ALL_TO_NON_DNS_LOCALHOST =
buildAciValue("name", "allow all to non localhost", "targetattr", "*", "allow(all)", BIND_RULE_DNS_NOT_LOCALHOST);
private static final String ALLOW_ALL_TO_DNS_ALL =
buildAciValue("name", "allow all to dns all", "targetattr", "*", "allow(all)", BIND_RULE_DNS_ALL);
private static final String DENY_ALL_TO_DNS_LOCALHOST =
buildAciValue("name", "deny all to localhost", "targetattr", "*", "deny(all)", BIND_RULE_DNS_LOCALHOST);
private static final String ALLOW_ALL_TO_SSL =
buildAciValue("name", "allow all to ssl", "targetattr", "*", "allow(all)", BIND_RULE_AUTHMETHOD_SSL);
private static final String ALLOW_ALL_TO_SASL_DIGEST_MD5 =
buildAciValue("name", "allow all to sasl DIGEST-MD5", "targetattr", "*", "allow(all)", BIND_RULE_AUTHMETHOD_SASL_DIGEST_MD5);
private static final String DENY_ALL_TO_SIMPLE =
buildAciValue("name", "deny all to simple", "targetattr", "*", "deny(all)", BIND_RULE_AUTHMETHOD_SIMPLE);
private static final String ALLOW_ALL_TO_SIMPLE =
buildAciValue("name", "allow all to simple", "targetattr", "*", "allow(all)", BIND_RULE_AUTHMETHOD_SIMPLE);
private static final String DENY_ALL_TODAY =
buildAciValue("name", "deny all today", "targetattr", "*", "deny(all)", BIND_RULE_TODAY);
private static final String ALLOW_ALL_TODAY =
buildAciValue("name", "allow all today", "targetattr", "*", "allow(all)", BIND_RULE_TODAY);
private static final String DENY_ALL_TODAY_AND_TOMORROW =
buildAciValue("name", "deny all today and tomorrow", "targetattr", "*", "deny(all)", BIND_RULE_TODAY_AND_TOMORROW);
private static final String ALLOW_ALL_NOT_TODAY =
buildAciValue("name", "allow all not today", "targetattr", "*", "allow(all)", BIND_RULE_NOT_TODAY);
private static final String DENY_ALL_THIS_HOUR =
buildAciValue("name", "deny this hour", "targetattr", "*", "deny(all)", BIND_RULE_THIS_HOUR);
private static final String ALLOW_ALL_THIS_HOUR =
buildAciValue("name", "allow this hour", "targetattr", "*", "allow(all)", BIND_RULE_THIS_HOUR);
private static final String ALLOW_ALL_PREVIOUS_HOUR =
buildAciValue("name", "allow previous hour", "targetattr", "*", "allow(all)", BIND_RULE_PREVIOUS_HOUR);
private static final String ALLOW_ALL_ADMIN_AND_SSL =
buildAciValue("name", "allow if admin and ssl", "targetattr", "*", "allow(all)", BIND_RULE_USERDN_ADMIN_AND_SSL);
private static final String DENY_ALL_NOT_LOCALHOST_OR_ADMIN =
buildAciValue("name", "deny if not localhost or admin", "targetattr", "*", "deny(all)", BIND_RULE_IP_NOT_LOCALHOST_OR_USERDN_ADMIN);
/** This makes more sense as an allow all. */
private static final String DENY_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL =
buildAciValue("name", "deny if admin and localhost or ssl", "targetattr", "*", "deny(all)", BIND_RULE_ADMIN_AND_LOCALHOST_OR_SSL);
private static final String ALLOW_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL =
buildAciValue("name", "allow if admin and localhost or ssl", "targetattr", "*", "allow(all)", BIND_RULE_ADMIN_AND_LOCALHOST_OR_SSL);
private static final String ALLOW_ALL_NOT_ADMIN =
buildAciValue("name", "allow not admin", "targetattr", "*", "allow(all)", BIND_RULE_USERDN_NOT_ADMIN);
private static final String ALLOW_SEARCH_TO_LOCALHOST =
buildAciValue("name", "allow search to localhost", "targetattr", "*", "allow(search, read)", BIND_RULE_IP_LOCALHOST);
private static final String ALLOW_SEARCH_REALATTRS_TO_LOCALHOST =
buildAciValue("name", "allow search to localhost", "targetattr!=", "bogusAttr", "allow(search, read)", BIND_RULE_IP_LOCALHOST);
private static final String ALLOW_SEARCH_OUR_ATTRS_TO_ADMIN =
buildAciValue("name", "allow search to our attributes to admin", "targetattr", "objectclass||ou||cn||sn||givenname", "target", LDAP_URL_OU_INNER, "allow(search, read)", BIND_RULE_USERDN_ADMIN);
private static final String ALLOW_SEARCH_TARGET_INNER_TO_LOCALHOST =
buildAciValue("name", "allow search inner to localhost", "targetattr", "*", "target", LDAP_URL_OU_INNER, "allow(search, read)", BIND_RULE_IP_LOCALHOST);
private static final String ALLOW_SEARCH_OU_AND_PERSON_TO_SIMPLE =
buildAciValue("name", "allow search ou and person to localhost", "targetattr", "*", "targetfilter", "(|(objectclass=organizationalunit)(objectclass=person))", "allow(search, read)", BIND_RULE_AUTHMETHOD_SIMPLE);
// -----------------------------------------------------------------------------
// -----------------------------------------------------------------------------
//
// S E T U P
//
// -----------------------------------------------------------------------------
// -----------------------------------------------------------------------------
@BeforeClass
public void setupClass() throws Exception {
deleteAttrFromEntry(ACCESS_HANDLER_DN, ATTR_AUTHZ_GLOBAL_ACI, true);
}
@BeforeMethod
public void clearBackend() throws Exception {
deleteAllTestEntries();
}
// -----------------------------------------------------------------------------
// -----------------------------------------------------------------------------
//
// T E S T S
//
// -----------------------------------------------------------------------------
// -----------------------------------------------------------------------------
// -----------------------------------------------------------------------------
// VALID AND INVALID ACIS
// -----------------------------------------------------------------------------
private static final String ADMIN_LDIF_VALIDITY_TESTS = TestCaseUtils.makeLdif(
"dn: " + ADMIN_DN,
"objectclass: person",
"cn: aci admin",
"sn: admin",
"userpassword: " + ADMIN_PW,
"ds-privilege-name: modify-acl" );
/** By default aci admin can do anything! */
private static final String OU_LDIF_VALDITY_TESTS = TestCaseUtils.makeLdif(
"dn: " + OU_BASE_DN,
"objectclass: organizationalunit",
"ou: acitest",
"aci: (targetattr=\"*\")(version 3.0; acl \"test\";allow(all) userdn=\"" + ADMIN_DN_LDAP_URL + "\";)"
);
private static final String VALIDITY_TESTS_DIT = ADMIN_LDIF_VALIDITY_TESTS + OU_LDIF_VALDITY_TESTS;
private static final String[] VALID_ACIS = {
// Test each feature in isolation.
//
// // TARGETS
buildAciValue("name", "self mod", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "parenthesis (dummy) and ( ) and () test", "allow (read)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ target", "target", LDAP_URL_OU_INNER, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ 1 targetattr", "targetattr", "cn", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ 2 targetattr", "targetattr", "cn || sn", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ 3 targetattr", "targetattr", "cn || sn || uid", "allow (write)", BIND_RULE_USERDN_SELF),
//These are four are OpenDS specific attr names
buildAciValue("name", "opends targetattr", "targetattr", "1-digitinfirst", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "opendstargetattr", "targetattr", "this_has_underscores", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "oid targetattr", "targetattr", " 2.16.840.1.113730.3.3.2.18.1.4", "allow (write)", BIND_RULE_USERDN_SELF),
// OpenDJ 2.5 doesn't support acis with options
// buildAciValue("name", "locality targetattr", "targetattr", "locality;lang-fr-ca", "allow (write)", BIND_RULE_USERDN_SELF),
// buildAciValue("name", "complicated targetattr", "targetattr", "1ocal_ity;lang-fr-ca", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ * targetattr", "targetattr", "*", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ non-existing attr", "targetattr", "notanattr", "allow (write)", BIND_RULE_USERDN_SELF), // DS 5.2p4 accepts this so we should too.
buildAciValue("name", "w/ non-existing attr", "targetattr", "cn || notanattr", "allow (write)", BIND_RULE_USERDN_SELF), // DS 5.2p4 accepts this so we should too.
buildAciValue("name", "w/ targetfilter", "targetfilter", "(sn=admin)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(objectclass=*)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(objectclass=inetorgperson)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(cn;lang-en=Jonathan Smith)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(cn=\\4Aohn*)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(title~=tattoos)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(labeledUri=http://opends.org/john)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(cn>=J)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(2.5.4.4=Smith)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter", "(sn:caseExactMatch:=Smith)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetScope", "targetScope", "base", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetScope", "targetScope", "onelevel", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetScope", "targetScope", "subtree", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetScope", "targetScope", "subordinate", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ !target", "target!=", LDAP_URL_OU_INNER, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ 1 !targetattr", "targetattr!=", "cn", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ 2 !targetattr", "targetattr!=", "cn || sn", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targetfilter", "targetfilter!=", "(sn=admin)", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targattrfilters", "targattrfilters=", TARG_ATTR_FILTERS, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targattrfilters", "targattrfilters=", TARG_ATTR_FILTERS_1 , "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targattrfilters", "targattrfilters=", TARG_ATTR_FILTERS_2 , "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "w/ targattrfilters", "targattrfilters=", TARG_ATTR_FILTERS_5 , "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_ATTR_TYPE_NAME", "targattrfilters",TARG_ATTR_FILTERS_ATTR_TYPE_NAME, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read", "targetattr", "*", "allow (read)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "write", "targetattr", "*", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "add", "targetattr", "*", "allow (add)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "delete", "targetattr", "*", "allow (delete)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "search", "targetattr", "*", "allow (search, read)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "compare", "targetattr", "*", "allow (compare)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "selfwrite", "targetattr", "*", "allow (selfwrite)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "all", "targetattr", "*", "allow (all)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "proxy", "targetattr", "*", "allow (proxy)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read|write", "targetattr", "*", "allow (read, write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read|write", "targetattr", "*", "allow (read, write, add)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read|write", "targetattr", "*", "allow (read, write, add, delete, search, compare, selfwrite, all, proxy)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read", "targetattr", "*", "deny (read)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "write", "targetattr", "*", "deny (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "add", "targetattr", "*", "deny (add)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "delete", "targetattr", "*", "deny (delete)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "search", "targetattr", "*", "deny (search)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "compare", "targetattr", "*", "deny (compare)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "selfwrite", "targetattr", "*", "deny (selfwrite)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "all", "targetattr", "*", "deny (all)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "proxy", "targetattr", "*", "deny (proxy)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read|write", "targetattr", "*", "deny (read, write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read|write|add", "targetattr", "*", "deny (read, write, add)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "all", "targetattr", "*", "deny (read, write, add, delete, search, compare, selfwrite, all, proxy)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "read all", "targetattr", "*", "allow (read)", BIND_RULE_USERDN_ALL),
buildAciValue("name", "read anyone", "targetattr", "*", "allow (read)", BIND_RULE_USERDN_ANYONE),
buildAciValue("name", "read filter", "targetattr", "*", "allow (read)", BIND_RULE_USERDN_FILTER),
buildAciValue("name", "read parent", "targetattr", "*", "allow (read)", BIND_RULE_USERDN_PARENT),
buildAciValue("name", "read group dn 1", "targetattr", "*", "allow (read)", BIND_RULE_GROUPDN_1),
buildAciValue("name", "read group dn 2", "targetattr", "*", "allow (read)", BIND_RULE_GROUPDN_2),
buildAciValue("name", "read group dn 3", "targetattr", "*", "allow (read)", BIND_RULE_GROUPDN_3),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_USERDN),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_USERDN_1),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_URL),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_GROUPDN),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_GROUPDN_1),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_USERDN_INHERITANCE),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_GROUPDN_INHERITANCE),
buildAciValue("name", "userattr", "targetattr", "*", "allow (read)", BIND_RULE_USERATTR_VALUE),
// BUG! These work with DS 5.2p4, but not with OpenDS.
//
// DENY_ALL_TO_LOCALHOST_SUBNET,
// ALLOW_ALL_TO_NON_MISC_AND_LOCALHOST,
// DENY_ALL_TO_LOCALHOST_WITH_MASK,
// DENY_ALL_TO_LOCALHOST_SUBNET_WITH_MASK,
//
ALLOW_ALL_TO_NON_DNS_LOCALHOST,
DENY_ALL_TO_DNS_LOCALHOST,
buildAciValue("name", "deny all to example.com", "targetattr", "*", "deny(all)", "dns=\"*.example.com\""),
ALLOW_ALL_TO_SSL,
ALLOW_ALL_TO_SASL_DIGEST_MD5,
DENY_ALL_TO_SIMPLE,
DENY_ALL_TODAY,
DENY_ALL_TODAY_AND_TOMORROW,
ALLOW_ALL_NOT_TODAY,
buildAciValue("name", "allow at noon", "targetattr", "*", "allow(all)", BIND_RULE_ONLY_AT_NOON),
buildAciValue("name", "allow at non-noon", "targetattr", "*", "allow(all)", BIND_RULE_NOT_AT_NOON),
buildAciValue("name", "allow at afternoon", "targetattr", "*", "allow(all)", BIND_RULE_AFTERNOON),
buildAciValue("name", "allow at noon and after", "targetattr", "*", "allow(all)", BIND_RULE_NOON_AND_AFTER),
buildAciValue("name", "allow at before noon", "targetattr", "*", "allow(all)", BIND_RULE_BEFORE_NOON),
buildAciValue("name", "allow at noon and before", "targetattr", "*", "allow(all)", BIND_RULE_NOON_AND_BEFORE),
buildAciValue("name", "allow at next hour", "targetattr", "*", "allow(all)", BIND_RULE_THIS_HOUR),
buildAciValue("name", "allow at next hour", "targetattr", "*", "allow(all)", BIND_RULE_PREVIOUS_HOUR),
ALLOW_ALL_ADMIN_AND_SSL,
DENY_ALL_NOT_LOCALHOST_OR_ADMIN,
DENY_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL,
ALLOW_ALL_NOT_ADMIN
//
// TODO: bind rules for 'ip', 'dns', 'dayofweek', 'timeofday', 'authmethod'
// TODO: combinations of these things, including multiple bind rules.
// TODO: need to test wild cards!
};
private static final String[] INVALID_ACIS = {
// Test each feature in isolation.
//
"aci: ",
buildAciValue("allow (write)", BIND_RULE_USERDN_SELF), // No name
buildAciValue("name", "invalid", "target", "ldap:///", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "target", "ldap:///not a DN", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "target", "ldap:///cn=", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "not an attr", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "cn ||", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "not/an/attr", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "cn", "allow (write)", BIND_RULE_INVALID_DAY),
/* Test cases for OPENDJ-433 */
buildAciValue("name", "invalid", "targetattr", "cn", "garbage allow (read)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "cn", "allow (read)", BIND_RULE_USERDN_SELF, "garbage allow (search)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "cn", "allow (read)", BIND_RULE_USERDN_SELF, "allow (search)", BIND_RULE_USERDN_SELF, "garbage allow (compare)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "invalid", "targetattr", "cn", "allow (read)", BIND_RULE_USERDN_SELF, "allow (search)", BIND_RULE_USERDN_SELF, "allow (compare)", BIND_RULE_USERDN_SELF, "garbage allow (delete)", BIND_RULE_USERDN_SELF),
// Add tests with invalid keywords : typos in "targetattr", "targattfilters", "targetfilter"
buildAciValue("name", "bad_filters", "targattrfilters",TARG_ATTR_FILTERS_INVALID_FILTER, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_op", "targattrfilters",TARG_ATTR_FILTERS_BAD_OP, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_op_match", "targattrfilters",TARG_ATTR_FILTERS_BAD_OP_MATCH, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_filter_attr", "targattrfilters",TARG_ATTR_FILTERS_BAD_FILTER_ATTR, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_format", "targattrfilters",TARG_ATTR_FILTERS_BAD_FORMAT, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "too_many_lists", "targattrfilters",TARG_ATTR_FILTERS_TOO_MANY_LISTS, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_tok", "targattrfilters",TARG_ATTR_FILTERS_BAD_TOK, "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad_targetfilter", "targetfilter","this is a bad filter", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad targetScope", "targetScope", "sub_tree", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad right", "targetattr", "*", "allow (read, write, add, delete, search, compare, selfwrite, all, foo)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad access type", "targetattr", "*", "allows (read, write, add, delete, search, compare, selfwrite, all)", BIND_RULE_USERDN_SELF),
//no name
buildAciValue("targetattr", "*", "allows (read, write, add, delete, search, compare, selfwrite, all)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "bad groupdn url", "targetattr", "*", "allow (read, write, add, delete, search, compare, selfwrite, all)", "groupdn=\"ldap:///bogus\""),
buildAciValue("name", "bad groupdn url2", "targetattr", "*", "allow (read, write, add, delete, search, compare, selfwrite, all)", "groupdn=\"ldap1:///bogus\""),
//Roledn keyword is not supported anymore.
buildAciValue("name", "unsupported roledn", "targetattr", "*", "allow (all)", "roledn=\"ldap:///cn=foo, dc=bar\""),
// OpenDJ 2.5 doesn't support acis with options
buildAciValue("name", "unsupported option in targetattr", "targetattr", "locality;lang-fr-ca", "allow (write)", BIND_RULE_USERDN_SELF),
buildAciValue("name", "complicated unsupported option in targetattr", "targetattr", "1ocal_ity;lang-fr-ca", "allow (write)", BIND_RULE_USERDN_SELF),
//
};
/**
* This is a little bit confusing. The first element of each array of two elements contains
* the aci that is valid but becomes invalid if any single character is removed.
* There has to be a lot of redundancy between the two arrays because of what
* it takes for an aci to be minimally valid, and hence we end up doing a lot of
* work twice. This takes time and also reports some identical failures.
* Therefore, we also provide a mask in the second element in the array
* But since the aci has \" characters that are single characters, taking up
* the space of two, we have to use another "two-column" character in the mask.
* By convention, a character is removed if the corresponding mask character
* is a - or a \" character. X and \' imply that it was previously tested and
* does not need to be tested again.
*/
private static final String[][] INVALID_ACIS_IF_ANY_CHAR_REMOVED =
{
// TODO: this generates some failures.
// {"(version3.0;acl\"\";deny(all)ip=\"1.1.1.1\";)",
// "---------------\"\"-------------\"-------\"--"},
// TODO: this generates some failures.
// {"(version3.0;acl\"\";allow(read,write,add,delete,search,compare,selfwrite,all,proxy)userdn=\"ldap:///self\";)",
// "XXXXXXXXXXXXXXX\'\'X----------------------------------------------------------------------\"-----XX-----\"XX"},
// TODO: this generates some failures.
// {"(version3.0;acl\"\";allow(read)userdn=\"ldap:///o=b\";)",
// "XXXXXXXXXXXXXXX\'\'XXXXXXX----XXXXXXXX\'XXXXXXX---\'XX"},
// TODO: this generates some failures.
// {"(version3.0;acl\"\";allow(read)userdn=\"ldap:///o=*,o=b\";)",
// "XXXXXXXXXXXXXXX\'\'XXXXXXXXXXXXXXXXXXX\'XXXXXXXX-------\'XX"},
// I don't know what's wrong with this one, but OpenDS thinks the unmodified filter is not valid.
// {"(version3.0;acl\"\";deny(all)ip=\"1.1.1.1+1.1.1.0\";)",
// "XXXXXXXXXXXXXXX\'\'XXXXXXXXXXXXX\"---------------\"XX"},
{"(version3.0;acl\"\";deny(all)dns=\"a\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXX----\"-\"XX"},
{"(version3.0;acl\"\";deny(all)timeofday>\"2300\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXX----------\"----\"XX"},
{"(version3.0;acl\"\";deny(all)authmethod=\"simple\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXX-----------\"------\"XX"},
{"(version3.0;acl\"\";deny(all)not authmethod=\"simple\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXX----XXXXXXXXXXX\'XXXXXX\'XX"},
{"(version3.0;acl\"\";deny(all)not authmethod=\"simple\"and not authmethod=\"ssl\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXXXXXXXXXXXXXXXXX\'XXXXXX\'--------XXXXXXXXXXX\'XXX\'XX"},
{"(version3.0;acl\"\";deny(all)dayofweek=\"sun\";)",
"XXXXXXXXXXXXXXX\'\'XXXXXXXXXX----------\"---\"XX"},
{"(targetattr=\"*\")(version3.0;acl\"\";deny(all)dns=\"a\";)",
"------------\"-\"-XXXXXXXXXXXXXXX\'\'XXXXXXXXXXXXXX\'X\'XX"},
};
@DataProvider
public Object[][] validBasisOfValidityTests() throws Exception {
TestCaseUtils.startServer(); // This appears to be necessary since the DataProviders can be called before @BeforeClass.
List acis = new ArrayList<>();
for (String[] aciAndMask: INVALID_ACIS_IF_ANY_CHAR_REMOVED) {
acis.add("aci: " + aciAndMask[0]);
}
return buildAciValidationParams(acis, false /*test once per aci*/);
}
/**
* This makes sure that all of the acis in the INVALID_ACIS_IF_ANY_CHAR_REMOVED
* tests are valid acis.
*/
@Test(dataProvider = "validBasisOfValidityTests")
public void testBasisOfInvalidityTestsAreValid(String modifierDn, String modifierPw, String aciModLdif) throws Throwable {
if (TESTS_ARE_DISABLED) { // This is a hack to make sure we can disable the tests.
return;
}
testValidAcisHelper(modifierDn, modifierPw, aciModLdif);
}
@DataProvider
public Object[][] validAcis() throws Exception {
TestCaseUtils.startServer(); // This appears to be necessary since the DataProviders can be called before @BeforeClass.
return buildAciValidationParams(Arrays.asList(VALID_ACIS), false /*test once per aci*/);
}
@DataProvider
public Object[][] invalidAcis() throws Exception {
TestCaseUtils.startServer(); // This appears to be necessary since the DataProviders can be called before @BeforeClass.
List invalid = newArrayList(INVALID_ACIS);
for (String[] aciAndMask: INVALID_ACIS_IF_ANY_CHAR_REMOVED) {
invalid.addAll(getAciMissingCharCombos(aciAndMask[0], aciAndMask[1]));
}
return buildAciValidationParams(invalid, false /*test once per aci*/);
}
/**
* We use this with acis that are crafted in such a way so that they are
* invalid if any character is removed. By convention, the character
* is only removed if the corresponding mask character is a - or \"
*/
protected List getAciMissingCharCombos(String aci, String mask) {
List acisMissingOneChar = new ArrayList<>();
for (int i = 0; i < aci.length(); i++) {
// Add this test only if the mask tells us we haven't seen it before.
// Also guard against ArrayIndexOutOfBoundsExceptions in case the
// mask isn't long enough.
if (i < mask.length()
&& (mask.charAt(i) == '-' || mask.charAt(i) == '\"')) {
acisMissingOneChar.add("aci: " + aci.substring(0, i) + aci.substring(i + 1, aci.length()));
}
}
return acisMissingOneChar;
}
/** Common between validAcis and invalidAcis. */
private Object[][] buildAciValidationParams(List acis, boolean testMultipleCombos) {
List paramsList = new ArrayList<>();
for (String aci: acis) {
List aciLdifs = new ArrayList<>();
// aci set in Add
aciLdifs.add(TestCaseUtils.makeLdif(
"dn: " + OU_INNER_DN,
"changetype: add",
"objectclass: organizationalunit",
"ou: inner",
aci));
if (testMultipleCombos) {
String ouLdif = TestCaseUtils.makeLdif(
"dn: " + OU_INNER_DN,
"changetype: add",
"objectclass: organizationalunit",
"ou: inner");
// aci set in modify via add
aciLdifs.add(ouLdif +
TestCaseUtils.makeLdif(
"dn: " + OU_INNER_DN,
"changetype: modify",
"add: aci",
aci));
// aci set in modify via replace
aciLdifs.add(ouLdif +
TestCaseUtils.makeLdif(
"dn: " + OU_INNER_DN,
"changetype: modify",
"replace: aci",
aci));
}
// Test each one with a user where ACI's aren't enforced and one where they are.
// This is in particularly useful for invalid acis.
for (String aciLdif: aciLdifs) {
if (testMultipleCombos) {
paramsList.add(new String[]{DIR_MGR_DN, DIR_MGR_PW, aciLdif});
}
paramsList.add(new String[]{ADMIN_DN, ADMIN_PW, aciLdif});
}
}
return paramsList.toArray(new Object[][]{});
}
@Test(dataProvider = "validAcis")
public void testValidAcis(String modifierDn, String modifierPw, String aciModLdif) throws Throwable {
if (TESTS_ARE_DISABLED) { // This is a hack to make sure we can disable the tests.
return;
}
testValidAcisHelper(modifierDn, modifierPw, aciModLdif);
}
private void testValidAcisHelper(String modifierDn, String modifierPw, String aciModLdif) throws Throwable {
try {
// Setup the basic DIT
addEntries(VALIDITY_TESTS_DIT, DIR_MGR_DN, DIR_MGR_PW);
// Test that we can add entries with valid ACIs as well as set valid ACIs on a an entry
modEntries(aciModLdif, modifierDn, modifierPw);
} catch (Throwable e) {
System.err.println("Started with dit:\nldapmodify -a -D \"cn=Directory Manager\" -w etegrity -p 13324\n" + VALIDITY_TESTS_DIT +
"and as '" + modifierDn + "' failed to perform these modifications:\n" +
"ldapmodify -D \"" + modifierDn + "\" -w " + modifierPw + " -p 13324\n" +
aciModLdif);
throw e;
}
}
// I'd like to make this dependsOnMethods = {"testBasisOfInvalidityTestsAreValid(String,String,String)"}
// but I can't figure out how.
@Test(dataProvider = "invalidAcis")
public void testInvalidAcis(String modifierDn, String modifierPw, String aciModLdif) throws Throwable {
if (TESTS_ARE_DISABLED) { // This is a hack to make sure we can disable the tests.
return;
}
try {
// Setup the basic DIT
addEntries(VALIDITY_TESTS_DIT, DIR_MGR_DN, DIR_MGR_PW);
// Test that we can add entries with valid ACIs as well as set valid ACIs on a an entry
modEntriesExpectFailure(aciModLdif, modifierDn, modifierPw);
} catch (Throwable e) {
System.err.println("Started with dit:\nldapmodify -a -D \"cn=Directory Manager\" -w etegrity -p 13324\n" + VALIDITY_TESTS_DIT +
"and as '" + modifierDn + "' successfully added an invalid aci:\n" +
"ldapmodify -D \"" + modifierDn + "\" -w " + modifierPw + " -p 13324\n" +
aciModLdif);
throw e;
}
}
@DataProvider
public Object[][] invalidAcisMultiCombos() throws Exception {
TestCaseUtils.startServer(); // This appears to be necessary since the DataProviders can be called before @BeforeClass.
List invalid = new ArrayList<>();
invalid.add(INVALID_ACIS[0]);
invalid.add(INVALID_ACIS[1]);
return buildAciValidationParams(invalid, true /*test multiple combos*/);
}
/** Runs invalidity checks as DirectoryManager and by setting them
* different ways. We don't check as many this way since the combinations
* get expensive, and if these detect any problem, then they will all probably be okay. */
@Test(dataProvider = "invalidAcisMultiCombos")
public void testInvalidAcisXX(String modifierDn, String modifierPw, String aciModLdif) throws Throwable {
if (TESTS_ARE_DISABLED) { // This is a hack to make sure we can disable the tests.
return;
}
testInvalidAcis(modifierDn, modifierPw, aciModLdif);
}
// -----------------------------------------------------------------------------
// SEARCHING
// -----------------------------------------------------------------------------
private static final String BASE_OU_LDIF__SEARCH_TESTS = makeOuLdif(OU_BASE_DN, "acitest");
private static final String INNER_OU_LDIF__SEARCH_TESTS = makeOuLdif(OU_INNER_DN, "inner");
private static final String LEAF_OU_LDIF__SEARCH_TESTS = makeOuLdif(OU_LEAF_DN, "leaf");
private static final String ADMIN_LDIF__SEARCH_TESTS = makeUserLdif(ADMIN_DN, "aci", "admin", ADMIN_PW);
private static final String USER_LDIF__SEARCH_TESTS = makeUserLdif(USER_DN, "some", "user", USER_PW);
private static final String LEVEL_1_USER_LDIF__SEARCH_TESTS = makeUserLdif(LEVEL_1_USER_DN, "level1", "user", "pa$$word");
private static final String LEVEL_2_USER_LDIF__SEARCH_TESTS = makeUserLdif(LEVEL_2_USER_DN, "level2", "user", "pa$$word");
private static final String LEVEL_3_USER_LDIF__SEARCH_TESTS = makeUserLdif(LEVEL_3_USER_DN, "level3", "user", "pa$$word");
private static final String PROXY_USER_LDIF__SEARCH_TESTS =
makeUserLdif(PROXY_USER_DN, "proxy", "user", "pa$$word");
private static final String SALES_USER_1__SEARCH_TESTS =
makeUserLdif(SALES_USER_1, "sales1", "person", "pa$$word" );
private static final String SALES_USER_2__SEARCH_TESTS =
makeUserLdif(SALES_USER_2, "sales2", "person", "pa$$word" );
private static final String SALES_USER_3__SEARCH_TESTS =
makeUserLdif(SALES_USER_3, "sales3", "person", "pa$$word" );
private static final String MANAGER__SEARCH_TESTS =
makeUserLdif(MANAGER_DN, "the", "managers", "pa$$word",
ADMIN_DN, OU_GROUP_2_DN );
private static final String MANAGER_NEW__SEARCH_TESTS =
makeUserLdif(MANAGER_NEW_DN, "new", "managers", "pa$$word",
ADMIN_DN, OU_GROUP_2_DN );
private static final String SALES__SEARCH_TESTS =
makeUserLdif(SALES_DN, "sales", "dept", "pa$$word",
LEVEL_2_USER_DN, LEVEL_1_USER_URL);
//LDIF entries used to test group stuff.
private static final String GROUP_LDIF__SEARCH_TESTS =
makeOuLdif(OU_GROUPS_DN, "groups");
private static final
String GROUP_1_LDIF__SEARCH_TESTS = makeGroupLdif(OU_GROUP_1_DN,
LEVEL_1_USER_DN,
LEVEL_3_USER_DN);
private static final
String GROUP_2_LDIF__SEARCH_TESTS = makeGroupLdif(OU_GROUP_2_DN,
LEVEL_2_USER_DN,
ADMIN_DN);
//ACI are used to test global ACI stuff.
private static final String ACCESS_HANDLER_DN =
"cn=Access Control Handler,cn=config";
private static final String GLOBAL_ALLOW_ALL_TO_ADMIN_ACI =
buildGlobalAciValue("name", "allow all to admin", "targetattr",
"*", "allow(all)", BIND_RULE_USERDN_ADMIN);
private static final String GLOBAL_ALLOW_MONITOR_TO_ADMIN_ACI =
buildGlobalAciValue("name", "monitor all to admin", "targetattr",
"*", "target", "ldap:///cn=monitor",
"allow(all)", BIND_RULE_USERDN_ADMIN);
private static final String GLOBAL_ALLOW_BASE_DN_TO_LEVEL_1_ACI =
buildGlobalAciValue("name", "monitor all to admin", "targetattr",
"*", "target", "ldap:///" + OU_BASE_DN,
"allow(all)", BIND_RULE_USERDN_LEVEL_1);
private static final String ALLOW_ALL_GLOBAL_TO_ADMIN_MOD =
makeAttrAddAciLdif(ATTR_AUTHZ_GLOBAL_ACI,ACCESS_HANDLER_DN,
GLOBAL_ALLOW_ALL_TO_ADMIN_ACI);
private static final String GLOBAL_MODS =
makeAttrAddAciLdif(ATTR_AUTHZ_GLOBAL_ACI,ACCESS_HANDLER_DN,
GLOBAL_ALLOW_MONITOR_TO_ADMIN_ACI,
GLOBAL_ALLOW_BASE_DN_TO_LEVEL_1_ACI);
//Global defaults
private static final String GLOBAL_ANONYMOUS_READ_ACI =
buildGlobalAciValue("name", "Anonymous read access", "targetattr!=",
"userPassword||authPassword",
"allow(read, search, compare)", BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_SELF_WRITE_ACI =
buildGlobalAciValue("name", "Self entry modification", "targetattr",
"*",
"allow(write)", BIND_RULE_USERDN_SELF);
private static final String GLOBAL_SCHEMA_ACI =
buildGlobalAciValue("name",
"User-Visible Schema Operational Attributes",
"target", "ldap:///cn=schema", "targetscope", "base",
"targetattr",
"attributeTypes||dITContentRules||dITStructureRules||" +
"ldapSyntaxes||matchingRules||matchingRuleUse||nameForms||" +
"objectClasses",
"allow(read, search, compare)", BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_DSE_ACI = buildGlobalAciValue(
"name","User-Visible Root DSE Operational Attributes",
"target", "ldap:///", "targetscope", "base",
"targetattr",
"namingContexts||supportedAuthPasswordSchemes||supportedControl||" +
"supportedExtension||supportedFeatures||supportedSASLMechanisms||" +
"vendorName||vendorVersion",
"allow(read, search, compare)",BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_USER_OP_ATTRS_ACI = buildGlobalAciValue(
"name", "User-Visible Operational Attributes", "targetattr",
"createTimestamp||creatorsName||modifiersName||modifyTimestamp||" +
"entryDN||entryUUID||subschemaSubentry",
"allow(read, search, compare)", BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_CONTROL_ACI = buildGlobalAciValue(
"name", "Anonymous control access", "targetcontrol",
"*",
"allow(read)", BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_EXT_OP_ACI = buildGlobalAciValue(
"name", "Anonymous extend op access", "extop",
"*",
"allow(read)", BIND_RULE_USERDN_ANYONE);
private static final String GLOBAL_DEFAULT_ACIS =
makeAttrAddAciLdif(ATTR_AUTHZ_GLOBAL_ACI,ACCESS_HANDLER_DN,
GLOBAL_ANONYMOUS_READ_ACI,
GLOBAL_SELF_WRITE_ACI, GLOBAL_SCHEMA_ACI,
GLOBAL_DSE_ACI, GLOBAL_USER_OP_ATTRS_ACI,
GLOBAL_CONTROL_ACI, GLOBAL_EXT_OP_ACI);
/** ACI used to test LDAP compare. */
private static final String COMPARE_ACI = makeAddAciLdif(OU_LEAF_DN, ALLOW_ALL_TO_COMPARE);
/** ACI used to test LDAP search with attributes. */
private static final String SEARCH_ATTRIBUTES_ALLOW_ACI = makeAddAciLdif(
OU_LEAF_DN, ALLOW_ALL_TO_ALL);
private static final String SEARCH_ATTRIBUTES_DENY_ACI = makeAddAciLdif(
OU_LEAF_DN, DENY_READ_CN_SN_IF_PERSON);
/** ACI used to test selfwrite. */
private static final String SELFWRITE_ACI = makeAddAciLdif(
OU_GROUP_1_DN, ALLOW_ALL_TO_SELFWRITE);
//ACIs used for standard modDN tests (export, import)
private static final String ACI_IMPORT_MGR_NEW =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_IMPORT_MGR_NEW);
private static final String ACI_IMPORT_MGR =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_IMPORT_MGR);
private static final String ACI_EXPORT_MGR_NEW =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_EXPORT_MGR_NEW);
private static final String ACI_EXPORT_MGR =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_EXPORT_MGR);
private static final String ACI_WRITE_RDN_ATTRS =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_WRITE_RDN_ATTRS);
private static final String ACI_MOVED_ENTRY =
makeAddAciLdif(SALES_USER_1, ALLOW_ALL_TO_MOVED_ENTRY);
//ACIs used for proxied auth modDN tests
private static final String ACI_PROXY_IMPORT_MGR_NEW =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_IMPORT_MGR_NEW);
private static final String ACI_PROXY_CONTROL_LEVEL_1 =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_CONTROL_TO_LEVEL_1);
private static final String ACI_PROXY_IMPORT_MGR =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_IMPORT_MGR);
private static final String ACI_PROXY_EXPORT_MGR_NEW =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_EXPORT_MGR_NEW);
private static final String ACI_PROXY_EXPORT_MGR =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_EXPORT_MGR);
private static final String ACI_PROXY_WRITE_RDN_ATTRS =
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_WRITE_RDN_ATTRS);
private static final String ACI_PROXY_LEVEL_1=
makeAddAciLdif(OU_BASE_DN, ALLOW_PROXY_TO_LEVEL1);
private static final String ACI_PROXY_MOVED_ENTRY =
makeAddAciLdif(SALES_USER_1, ALLOW_PROXY_TO_MOVED_ENTRY);
/** ACI used in testing the groupdn bind rule keywords. */
private static final
String GROUP1_GROUPDN_MODS = makeAddAciLdif(OU_LEAF_DN,
ALLOW_SEARCH_TO_GROUP1_GROUPDN);
/** Aci to test dns="*". */
private static final
String DNS_ALL_ACI = makeAddAciLdif(OU_LEAF_DN, ALLOW_ALL_TO_DNS_ALL);
/** ou=leaf,ou=inner,ou=acitest,dc=example,dc=com and everything under it */
private static final String LEAF_OU_FULL_LDIF__SEARCH_TESTS =
LEAF_OU_LDIF__SEARCH_TESTS +
LEVEL_3_USER_LDIF__SEARCH_TESTS;
/** ou=inner,ou=acitest,dc=example,dc=com and everything under it */
private static final String INNER_OU_FULL_LDIF__SEARCH_TESTS =
INNER_OU_LDIF__SEARCH_TESTS +
LEVEL_2_USER_LDIF__SEARCH_TESTS +
LEAF_OU_FULL_LDIF__SEARCH_TESTS;
/** ou=acitest,dc=example,dc=com and everything under it */
private static final String BASE_OU_FULL_LDIF__SEARCH_TESTS =
BASE_OU_LDIF__SEARCH_TESTS +
LEVEL_1_USER_LDIF__SEARCH_TESTS +
INNER_OU_FULL_LDIF__SEARCH_TESTS;
private static final String BASIC_LDIF__SEARCH_TESTS =
ADMIN_LDIF__SEARCH_TESTS +
USER_LDIF__SEARCH_TESTS +
BASE_OU_FULL_LDIF__SEARCH_TESTS;
private static final String BASIC_LDIF__GROUP_SEARCH_TESTS =
ADMIN_LDIF__SEARCH_TESTS +
USER_LDIF__SEARCH_TESTS +
BASE_OU_LDIF__SEARCH_TESTS +
MANAGER__SEARCH_TESTS +
MANAGER_NEW__SEARCH_TESTS +
SALES__SEARCH_TESTS +
SALES_USER_1__SEARCH_TESTS +
SALES_USER_2__SEARCH_TESTS +
SALES_USER_3__SEARCH_TESTS +
GROUP_LDIF__SEARCH_TESTS +
GROUP_1_LDIF__SEARCH_TESTS +
GROUP_2_LDIF__SEARCH_TESTS +
LEVEL_1_USER_LDIF__SEARCH_TESTS +
PROXY_USER_LDIF__SEARCH_TESTS +
INNER_OU_FULL_LDIF__SEARCH_TESTS;
private static final String NO_ACIS_LDIF = "";
// ------------------------------------------------------------
// THESE ALL WILL RETURN NO RESULTS FOR ADMINS AND ANONYMOUS
// ------------------------------------------------------------
private static final String ALLOW_ALL_BASE_DENY_ALL_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_ALL_BASE_DENY_READ_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_READ_TO_ALL);
private static final String ALLOW_READ_BASE_DENY_ALL_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_READ_BASE_DENY_ALL_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_ALL_BASE_DENY_READ_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_SEARCH_BASE_DENY_ALL_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_ALL_BASE_DENY_SEARCH_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_ALL_BASE_DENY_ALL_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ALL);
private static final String ALLOW_ALL_BASE_DENY_ADMIN_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_ADMIN);
private static final String ALLOW_ALL_BASE_DENY_OU_PERSON_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_PERSON_OU_TO_ALL);
private static final String DENY_ADMIN_BASE_ALLOW_ALL_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_ADMIN) +
makeAddAciLdif(OU_INNER_DN, ALLOW_ALL_TO_ALL);
private static final String ALL0W_ALL_BASE_DENY_OU_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_OU_INNER);
private static final String ALL0W_ALL_BASE_DENY_READ_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_OU_INNER);
private static final String ALL0W_SEARCH_BASE_DENY_READ_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_OU_INNER);
private static final String ALL0W_ALL_BASE_DENY_ALL_REAL_ATTRS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_REAL_ATTRS_VALUE);
private static final String ALL0W_ALL_BASE_DENY_READ_REAL_ATTRS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_READ_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_READ_REAL_ATTRS_VALUE);
private static final String ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_BASE_LDIF =
makeAddAciLdif(OU_BASE_DN, ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES);
private static final String ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_BASE_LDIF_ALT =
makeAddAciLdif(OU_BASE_DN, ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_ALT);
private static final String ALL0W_ALL_BASE_DENY_WRITE_DELETE_READ_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_WRITE_DELETE_READ_TO_ALL);
private static final String ALL0W_ALL_BASE_DENY_READ_TO_CN_RDN_USERS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_READ_TO_CN_RDN_USERS);
private static final String ALL0W_ALL_BASE_DENY_READ_TO_UID_OR_CN_RDN_USERS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_READ_TO_UID_OR_CN_RDN_USERS);
private static final String ALL0W_ALL_BASE_DENY_READ_TO_NON_UID_RDN_USERS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_READ_TO_NON_UID_RDN_USERS);
private static final String ALL0W_ALL_BASE_DENY_READ_TO_CN_ADMINS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_READ_TO_CN_ADMINS);
private static final String ALL0W_ALL_BASE_DENY_READ_TO_TOP_LEVEL_CN_ADMINS_INNER_LDIF =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_READ_TO_TOP_LEVEL_CN_ADMINS);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_LOCALHOST);
private static final String ALLOW_ALL_NON_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_NON_LOCALHOST);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_MISC_AND_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_MISC_AND_LOCALHOST);
private static final String ALLOW_ALL_NON_MISC_AND_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_NON_MISC_AND_LOCALHOST);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_MISC_AND_LOCALHOST_SUBNET =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_LOCALHOST_SUBNET);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST_WITH_MASK =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_LOCALHOST_WITH_MASK);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST_SUBNET_WITH_MASK =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_LOCALHOST_SUBNET_WITH_MASK);
private static final String ALLOW_ALL_BASE_TO_NON_DNS_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_NON_DNS_LOCALHOST);
private static final String ALLOW_ALL_BASE_TO_SSL_AUTH =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_SSL);
private static final String ALLOW_ALL_BASE_TO_SASL_DIGEST_MD5_AUTH =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_SASL_DIGEST_MD5);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_SIMPLE_AUTH =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TO_SIMPLE);
private static final String ALLOW_ALL_BASE_DENY_ALL_TODAY =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TODAY);
private static final String ALLOW_ALL_BASE_DENY_ALL_TODAY_AND_TOMORROW =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_TODAY_AND_TOMORROW);
private static final String ALLOW_ALL_BASE_NOT_TODAY =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_NOT_TODAY);
private static final String ALLOW_ALL_BASE_DENY_ALL_THIS_HOUR =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_INNER_DN, DENY_ALL_THIS_HOUR);
private static final String ALLOW_ALL_BASE_PREVIOUS_HOUR =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_NOT_TODAY);
private static final String ALLOW_ALL_BASE_ADMIN_AND_SSL =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_ADMIN_AND_SSL);
private static final String ALLOW_ALL_BASE_DENY_ALL_NOT_LOCALHOST_OR_ADMIN =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_NOT_LOCALHOST_OR_ADMIN);
private static final String ALLOW_ALL_BASE_DENY_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL) +
makeAddAciLdif(OU_BASE_DN, DENY_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL);
private static final String ALLOW_ALL_BASE_NOT_ADMIN =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_NOT_ADMIN);
// -----------------------------------------------------------------
// THESE ALL WILL RETURN EVERYTHING IN AT LEAST OU=INNER FOR ADMINS
// -----------------------------------------------------------------
private static final String ALLOW_ALL_BASE_TO_ADMIN =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ADMIN);
private static final String ALLOW_ALL_BASE_TO_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_TO_LOCALHOST);
private static final String ALLOW_ALL_BASE_TO_ANYONE =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ANYONE);
private static final String ALLOW_ALL_BASE_TO_ALL =
makeAddAciLdif(OU_BASE_DN, ALLOW_ALL_TO_ALL);
private static final String ALL0W_SEARCH_INNER_TO_ADMIN =
makeAddAciLdif(OU_INNER_DN, ALLOW_SEARCH_TO_ADMIN);
private static final String ALL0W_WRITE_DELETE_SEARCH_INNER_TO_ALL =
makeAddAciLdif(OU_INNER_DN, ALLOW_WRITE_DELETE_SEARCH_TO_ALL);
private static final String ALLOW_INNER_SEARCH_TO_CN_ADMINS =
makeAddAciLdif(OU_INNER_DN, ALLOW_SEARCH_TO_CN_ADMINS);
private static final String ALLOW_INNER_ALL_TO_SIMPLE =
makeAddAciLdif(OU_INNER_DN, ALLOW_ALL_TO_SIMPLE);
private static final String ALLOW_INNER_ALL_TODAY =
makeAddAciLdif(OU_INNER_DN, ALLOW_ALL_TODAY);
private static final String ALLOW_INNER_ALL_THIS_HOUR =
makeAddAciLdif(OU_INNER_DN, ALLOW_ALL_THIS_HOUR);
private static final String ALLOW_INNER_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL =
makeAddAciLdif(OU_INNER_DN, ALLOW_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL);
private static final String ALLOW_INNER_SEARCH_FROM_BASE_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_TARGET_INNER_TO_LOCALHOST);
private static final String ALLOW_BASE_SEARCH_REALATTRS_TO_LOCALHOST =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_REALATTRS_TO_LOCALHOST);
private static final String ALLOW_BASE_SEARCH_OUR_ATTRS_TO_ADMIN =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_OUR_ATTRS_TO_ADMIN);
private static final String ALLOW_BASE_SEARCH_OU_AND_PERSON_TO_SIMPLE =
makeAddAciLdif(OU_BASE_DN, ALLOW_SEARCH_OU_AND_PERSON_TO_SIMPLE);
// ------------------------------------------------------------
//
// ------------------------------------------------------------
private static final String NO_SEARCH_RESULTS = "";
// Potential dimensions
// * Who sets the ACIs to start with
// * Whether the entries were created with the ACIs or they were added later. LDIFModify would work here.
private static List SEARCH_TEST_PARAMS = new ArrayList<>();
private static SearchTestParams registerNewTestParams(String initialDitLdif, String... aciLdif) {
SearchTestParams testParams = new SearchTestParams(initialDitLdif, aciLdif);
SEARCH_TEST_PARAMS.add(testParams);
return testParams;
}
static {
SearchTestParams testParams;
// ACIs that allow 'cn=Directory Manager' but deny the searches below to everyone else
// in some way.
testParams = registerNewTestParams(BASIC_LDIF__SEARCH_TESTS,
NO_ACIS_LDIF,
ALLOW_ALL_BASE_DENY_ALL_BASE_LDIF,
ALLOW_ALL_BASE_DENY_READ_BASE_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_CN_ADMINS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_TOP_LEVEL_CN_ADMINS_INNER_LDIF,
ALLOW_ALL_BASE_NOT_ADMIN
);
testParams.addSingleSearch(DIR_MGR_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, INNER_OU_FULL_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ANNONYMOUS_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(DIR_MGR_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_SUB, LEAF_OU_FULL_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ANNONYMOUS_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(DIR_MGR_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, INNER_OU_FULL_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_ONE, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ANNONYMOUS_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_ONE, NO_SEARCH_RESULTS);
// ------------------------------------------------------------------------
// ACIs that allow 'cn=Directory Manager' but deny the searches below to everyone else
// in some way.
testParams = registerNewTestParams(BASIC_LDIF__SEARCH_TESTS,
// These ACIs are all equivalent for the single search test cases below
// (but most likely not equivalent in general).
NO_ACIS_LDIF,
ALLOW_ALL_BASE_DENY_ALL_BASE_LDIF,
ALLOW_ALL_BASE_DENY_READ_BASE_LDIF,
ALLOW_READ_BASE_DENY_ALL_BASE_LDIF,
ALLOW_ALL_BASE_DENY_ALL_INNER_LDIF,
ALLOW_READ_BASE_DENY_ALL_INNER_LDIF,
ALLOW_ALL_BASE_DENY_READ_INNER_LDIF,
ALLOW_SEARCH_BASE_DENY_ALL_INNER_LDIF,
ALLOW_ALL_BASE_DENY_SEARCH_INNER_LDIF,
ALLOW_ALL_BASE_DENY_ADMIN_INNER_LDIF,
ALLOW_ALL_BASE_DENY_OU_PERSON_INNER_LDIF,
DENY_ADMIN_BASE_ALLOW_ALL_INNER_LDIF,
ALL0W_ALL_BASE_DENY_OU_INNER_LDIF,
ALL0W_SEARCH_BASE_DENY_READ_BASE_LDIF,
ALL0W_ALL_BASE_DENY_ALL_REAL_ATTRS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_REAL_ATTRS_INNER_LDIF,
ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_BASE_LDIF,
ALL0W_ALL_TO_ALL_OTHER_OBJECTCLASSES_BASE_LDIF_ALT,
ALL0W_ALL_BASE_DENY_WRITE_DELETE_READ_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_CN_RDN_USERS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_UID_OR_CN_RDN_USERS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_NON_UID_RDN_USERS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_CN_ADMINS_INNER_LDIF,
ALL0W_ALL_BASE_DENY_READ_TO_TOP_LEVEL_CN_ADMINS_INNER_LDIF,
ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST,
ALLOW_ALL_NON_LOCALHOST,
ALLOW_ALL_BASE_DENY_ALL_TO_MISC_AND_LOCALHOST,
ALLOW_ALL_BASE_TO_NON_DNS_LOCALHOST,
ALLOW_ALL_BASE_TO_SSL_AUTH,
ALLOW_ALL_BASE_TO_SASL_DIGEST_MD5_AUTH,
ALLOW_ALL_BASE_DENY_ALL_TO_SIMPLE_AUTH,
ALLOW_ALL_BASE_DENY_ALL_TODAY,
ALLOW_ALL_BASE_DENY_ALL_TODAY_AND_TOMORROW,
ALLOW_ALL_BASE_NOT_TODAY,
ALLOW_ALL_BASE_DENY_ALL_THIS_HOUR,
ALLOW_ALL_BASE_PREVIOUS_HOUR,
ALLOW_ALL_BASE_ADMIN_AND_SSL,
ALLOW_ALL_BASE_DENY_ALL_NOT_LOCALHOST_OR_ADMIN,
ALLOW_ALL_BASE_DENY_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL,
ALLOW_ALL_BASE_NOT_ADMIN
//
// ALLOW_ALL_NON_MISC_AND_LOCALHOST,
// ALLOW_ALL_BASE_DENY_ALL_TO_MISC_AND_LOCALHOST_SUBNET,
// ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST_WITH_MASK
// ALLOW_ALL_BASE_DENY_ALL_TO_LOCALHOST_SUBNET_WITH_MASK
//
);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_ONE, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ADMIN_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
testParams.addSingleSearch(ANNONYMOUS_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, NO_SEARCH_RESULTS);
// ------------------------------------------------------------------------
// ACIs that allow cn=admin, but deny the searches below to anonymous
// in some way.
testParams = registerNewTestParams(BASIC_LDIF__SEARCH_TESTS,
ALLOW_ALL_BASE_TO_ADMIN,
ALLOW_ALL_BASE_TO_LOCALHOST,
ALLOW_ALL_BASE_TO_ALL,
ALLOW_ALL_BASE_TO_ANYONE,
ALL0W_SEARCH_INNER_TO_ADMIN,
ALL0W_WRITE_DELETE_SEARCH_INNER_TO_ALL,
ALLOW_INNER_SEARCH_TO_CN_ADMINS,
ALLOW_INNER_ALL_TO_SIMPLE,
ALLOW_INNER_ALL_TODAY,
ALLOW_INNER_ALL_THIS_HOUR,
ALLOW_INNER_ALL_TO_ADMIN_AND_LOCALHOST_OR_SSL,
ALLOW_INNER_SEARCH_FROM_BASE_LOCALHOST,
ALLOW_BASE_SEARCH_REALATTRS_TO_LOCALHOST,
ALLOW_BASE_SEARCH_OUR_ATTRS_TO_ADMIN,
ALLOW_BASE_SEARCH_OU_AND_PERSON_TO_SIMPLE
);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_SUB, INNER_OU_FULL_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_SUB, LEAF_OU_FULL_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_LEAF_DN, OBJECTCLASS_STAR, SCOPE_ONE, LEVEL_3_USER_LDIF__SEARCH_TESTS);
testParams.addSingleSearch(ADMIN_DN, OU_INNER_DN, OBJECTCLASS_STAR, SCOPE_BASE, INNER_OU_LDIF__SEARCH_TESTS);
}
/** TODO: add explicit attribute list support to this. */
private static class SingleSearchParams {
private final String _bindDn;
private final String _bindPw;
private final String _proxyDN;
private final String _searchBaseDn;
private final String _searchFilter;
private final String _searchScope;
private final String _expectedResultsLdif;
private final String _initialDitLdif;
private final String _aciLdif;
private final String[] _attributes;
public static SingleSearchParams proxiedSearch(String bindDn,
String bindPw, String proxyDN, String searchBaseDn,
String searchFilter, String searchScope, String expectedResultsLdif,
String initialDitLdif, String aciLdif, String... attributes)
{
return new SingleSearchParams(bindDn, bindPw, proxyDN, searchBaseDn,
searchFilter, searchScope, expectedResultsLdif, initialDitLdif,
aciLdif, attributes);
}
public static SingleSearchParams nonProxiedSearch(String bindDn,
String bindPw, String searchBaseDn, String searchFilter,
String searchScope, String expectedResultsLdif, String initialDitLdif,
String aciLdif, String... attributes)
{
return new SingleSearchParams(bindDn, bindPw, null, searchBaseDn,
searchFilter, searchScope, expectedResultsLdif, initialDitLdif,
aciLdif, attributes);
}
private SingleSearchParams(String bindDn, String bindPw,
String proxyDN, String searchBaseDn, String searchFilter, String searchScope,
String expectedResultsLdif, String initialDitLdif, String aciLdif,
String... attributes)
{
_bindDn = bindDn;
_bindPw = bindPw;
_proxyDN = proxyDN;
_searchBaseDn = searchBaseDn;
_searchFilter = searchFilter;
_searchScope = searchScope;
_expectedResultsLdif = expectedResultsLdif;
_initialDitLdif = initialDitLdif;
_aciLdif = aciLdif;
_attributes = attributes;
}
public SingleSearchParams(SingleSearchParams that, String initialDitLdif, String aciLdif) {
_bindDn = that._bindDn;
_bindPw = that._bindPw;
_proxyDN = null;
_searchBaseDn = that._searchBaseDn;
_searchFilter = that._searchFilter;
_searchScope = that._searchScope;
_expectedResultsLdif = that._expectedResultsLdif;
_initialDitLdif = initialDitLdif;
_aciLdif = aciLdif;
_attributes = new String[0];
}
public String[] getLdapSearchArgs()
{
final List args = new ArrayList<>();
if (_bindDn.equals(ANNONYMOUS_DN))
{
args.addAll(Arrays.asList(
"-h", "127.0.0.1",
"-p", getServerLdapPort(),
"-b", _searchBaseDn,
"-s", _searchScope,
_searchFilter));
}
else if (_proxyDN != null)
{
args.addAll(Arrays.asList(
"-h", "127.0.0.1",
"-p", getServerLdapPort(),
"-D", _bindDn,
"-w", _bindPw,
"-b", _searchBaseDn,
"-s", _searchScope,
"-Y", "dn:" + _proxyDN,
_searchFilter));
}
else
{
args.addAll(Arrays.asList(
"-h", "127.0.0.1",
"-p", getServerLdapPort(),
"-D", _bindDn,
"-w", _bindPw,
"-b", _searchBaseDn,
"-s", _searchScope,
_searchFilter));
}
Collections.addAll(args, _attributes);
return args.toArray(new String[args.size()]);
}
/** This is primarily used for debug output on a failure. */
public String getCombinedSearchArgs() {
return "-h 127.0.0.1" +
" -p " + getServerLdapPort() +
" -D " + _bindDn +
" -w " + _bindPw +
" -b " + _searchBaseDn +
" -s " + _searchScope +
" \"" + _searchFilter + "\"";
}
public String[] getLdapCompareArgs(String attrAssertion) {
return new String[] {
"-h", "127.0.0.1",
"-p", getServerLdapPort(),
"-D", _bindDn,
"-w", _bindPw,
"--useCompareResultCode",
attrAssertion,
_searchBaseDn};
}
}
private static class SearchTestParams {
/** The server DIT to run the tests against. */
private final String _initialDitLdif;
/** ACIs that will produce the same search results for the above DIT. */
private final List _equivalentAciLdifs;
private final List _searchTests = new ArrayList<>();
public SearchTestParams(String initialDitLdif, String... equivalentAciLdifs) {
_initialDitLdif = initialDitLdif;
_equivalentAciLdifs = Arrays.asList(equivalentAciLdifs);
}
private void addSingleSearch(String bindDn, String searchBaseDn, String searchFilter, String searchScope, String expectedResultsLdif) {
for (String equivalentAci: _equivalentAciLdifs) {
_searchTests.add(SingleSearchParams.nonProxiedSearch(bindDn, DN_TO_PW.get(bindDn), searchBaseDn, searchFilter, searchScope, expectedResultsLdif, _initialDitLdif, equivalentAci));
}
}
/**
* @return the LDIF result of applying changesLdif to changesLdif
*/
private String applyChangesToLdif(String baseLdif, String changesLdif) throws Exception {
LDIFReader baseReader = new LDIFReader(new LDIFImportConfig(new StringReader(baseLdif)));
LDIFReader changesReader = new LDIFReader(new LDIFImportConfig(new StringReader(changesLdif)));
ByteArrayOutputStream updatedEntriesStream = new ByteArrayOutputStream();
LDIFWriter ldifWriter = new LDIFWriter(new LDIFExportConfig(updatedEntriesStream));
List errors = new ArrayList<>();
LDIFModify.modifyLDIF(baseReader, changesReader, ldifWriter, errors);
Assert.assertTrue(errors.isEmpty(), "Unexpected errors applying LDIF changes: " + errors);
ldifWriter.flush();
return updatedEntriesStream.toString();
}
}
@DataProvider
private Object[][] searchTestParams() throws Throwable {
TestCaseUtils.startServer(); // This appears to be necessary since the DataProviders can be called before @BeforeClass.
try {
List