mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-11-04 00:11:04 +00:00 
			
		
		
		
	urfave/cli v2 will eventually become unmaintained, switch over to v3 which is the latest supported version. Note: the `docs` command would be a lot of work to restore with v3 ([the package is still in alpha](https://github.com/urfave/cli-docs)) An alternative to avoid a breaking change would be to not upgrade from v2 to v3 for that reason alone. Note: these commits were cherry-picked from https://code.forgejo.org/forgefriends/forgefriends Note: it is best reviewed side by side with no display of whitespace changes (there are a lot of those when converting vars to func). - a few functional changes were necessary and are noted in context in the file changes tab - https://cli.urfave.org/migrate-v2-to-v3/ upgrade instructions were followed in the most minimal way possible - upgrade gof3 to v3.10.8 which includes and upgrade from urfave/cli v2 to urfave/cli v3 - upgrade gitlab.com/gitlab-org/api/client-go v0.129.0 because it is an indirect dependency of gof3 and requires a change because of a deprecated field that otherwise triggers a lint error but nothing else otherwise - verified that the [script](https://codeberg.org/forgejo/docs/src/branch/next/scripts/cli-docs.sh) that generates the [CLI documentation](https://codeberg.org/forgejo/docs/src/branch/next/scripts/cli-docs.sh) still works. There are cosmetic differences and the **help** subcommand is no longer advertised (although it is still supported) but the `--help` option is advertised as expected so it is fine. - end-to-end tests [passed](https://code.forgejo.org/forgejo/end-to-end/pulls/667) (they use the Forgejo CLI to some extent) ## Checklist The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org). ### Tests - I added test coverage for Go changes... - [ ] in their respective `*_test.go` for unit tests. - [ ] in the `tests/integration` directory if it involves interactions with a live Forgejo server. - I added test coverage for JavaScript changes... - [ ] in `web_src/js/*.test.js` if it can be unit tested. - [ ] in `tests/e2e/*.test.e2e.js` if it requires interactions with a live Forgejo server (see also the [developer guide for JavaScript testing](https://codeberg.org/forgejo/forgejo/src/branch/forgejo/tests/e2e/README.md#end-to-end-tests)). ### Documentation - [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change. - [x] I did not document these changes and I do not expect someone else to do it. ### Release notes - [ ] I do not want this change to show in the release notes. - [ ] I want the title to show in the release notes with a link to this pull request. - [x] I want the content of the `release-notes/<pull request number>.md` to be be used for the release notes instead of the title. <!--start release-notes-assistant--> ## Release notes <!--URL:https://codeberg.org/forgejo/forgejo--> - Breaking features - [PR](https://codeberg.org/forgejo/forgejo/pulls/8035): <!--number 8035 --><!--line 0 --><!--description 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-->The `forgejo docs` command is deprecated and CLI errors are now displayed on stderr instead of stdout. These breaking changes happened because the package used to parse the command line arguments was [upgraded from v2 to v3](https://cli.urfave.org/migrate-v2-to-v3/). A [separate project was initiated](https://github.com/urfave/cli-docs) to re-implement the `docs` command, but it is not yet production ready.<!--description--> <!--end release-notes-assistant--> Co-authored-by: limiting-factor <limiting-factor@posteo.com> Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/8035 Reviewed-by: Gusted <gusted@noreply.codeberg.org>
		
			
				
	
	
		
			1319 lines
		
	
	
	
		
			33 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1319 lines
		
	
	
	
		
			33 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2019 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"forgejo.org/models/auth"
 | 
						|
	"forgejo.org/modules/test"
 | 
						|
	"forgejo.org/services/auth/source/ldap"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	"github.com/stretchr/testify/require"
 | 
						|
	"github.com/urfave/cli/v3"
 | 
						|
)
 | 
						|
 | 
						|
func TestAddLdapBindDn(t *testing.T) {
 | 
						|
	// Mock cli functions to do not exit on error
 | 
						|
	defer test.MockVariableValue(&cli.OsExiter, func(code int) {})()
 | 
						|
 | 
						|
	// Test cases
 | 
						|
	cases := []struct {
 | 
						|
		args   []string
 | 
						|
		source *auth.Source
 | 
						|
		errMsg string
 | 
						|
	}{
 | 
						|
		// case 0
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source full",
 | 
						|
				"--not-active",
 | 
						|
				"--security-protocol", "ldaps",
 | 
						|
				"--skip-tls-verify",
 | 
						|
				"--host", "ldap-bind-server full",
 | 
						|
				"--port", "9876",
 | 
						|
				"--user-search-base", "ou=Users,dc=full-domain-bind,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--restricted-filter", "(memberOf=cn=restricted-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--username-attribute", "uid-bind full",
 | 
						|
				"--firstname-attribute", "givenName-bind full",
 | 
						|
				"--surname-attribute", "sn-bind full",
 | 
						|
				"--email-attribute", "mail-bind full",
 | 
						|
				"--public-ssh-key-attribute", "publickey-bind full",
 | 
						|
				"--avatar-attribute", "avatar-bind full",
 | 
						|
				"--bind-dn", "cn=readonly,dc=full-domain-bind,dc=org",
 | 
						|
				"--bind-password", "secret-bind-full",
 | 
						|
				"--attributes-in-bind",
 | 
						|
				"--synchronize-users",
 | 
						|
				"--page-size", "99",
 | 
						|
			},
 | 
						|
			source: &auth.Source{
 | 
						|
				Type:          auth.LDAP,
 | 
						|
				Name:          "ldap (via Bind DN) source full",
 | 
						|
				IsActive:      false,
 | 
						|
				IsSyncEnabled: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:                  "ldap (via Bind DN) source full",
 | 
						|
					Host:                  "ldap-bind-server full",
 | 
						|
					Port:                  9876,
 | 
						|
					SecurityProtocol:      ldap.SecurityProtocol(1),
 | 
						|
					SkipVerify:            true,
 | 
						|
					BindDN:                "cn=readonly,dc=full-domain-bind,dc=org",
 | 
						|
					BindPassword:          "secret-bind-full",
 | 
						|
					UserBase:              "ou=Users,dc=full-domain-bind,dc=org",
 | 
						|
					AttributeUsername:     "uid-bind full",
 | 
						|
					AttributeName:         "givenName-bind full",
 | 
						|
					AttributeSurname:      "sn-bind full",
 | 
						|
					AttributeMail:         "mail-bind full",
 | 
						|
					AttributesInBind:      true,
 | 
						|
					AttributeSSHPublicKey: "publickey-bind full",
 | 
						|
					AttributeAvatar:       "avatar-bind full",
 | 
						|
					SearchPageSize:        99,
 | 
						|
					Filter:                "(memberOf=cn=user-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					AdminFilter:           "(memberOf=cn=admin-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					RestrictedFilter:      "(memberOf=cn=restricted-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					Enabled:               true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 1
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source min",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-bind-server min",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=min-domain-bind,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=min-domain-bind,dc=org)",
 | 
						|
				"--email-attribute", "mail-bind min",
 | 
						|
			},
 | 
						|
			source: &auth.Source{
 | 
						|
				Type:     auth.LDAP,
 | 
						|
				Name:     "ldap (via Bind DN) source min",
 | 
						|
				IsActive: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:             "ldap (via Bind DN) source min",
 | 
						|
					Host:             "ldap-bind-server min",
 | 
						|
					Port:             1234,
 | 
						|
					SecurityProtocol: ldap.SecurityProtocol(0),
 | 
						|
					UserBase:         "ou=Users,dc=min-domain-bind,dc=org",
 | 
						|
					AttributeMail:    "mail-bind min",
 | 
						|
					Filter:           "(memberOf=cn=user-group,ou=example,dc=min-domain-bind,dc=org)",
 | 
						|
					Enabled:          true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 2
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--security-protocol", "zzzzz",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "Unknown security protocol name: zzzzz",
 | 
						|
		},
 | 
						|
		// case 3
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "name is not set",
 | 
						|
		},
 | 
						|
		// case 4
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "security-protocol is not set",
 | 
						|
		},
 | 
						|
		// case 5
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "host is not set",
 | 
						|
		},
 | 
						|
		// case 6
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "port is not set",
 | 
						|
		},
 | 
						|
		// case 7
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "user-filter is not set",
 | 
						|
		},
 | 
						|
		// case 8
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "1234",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
			},
 | 
						|
			errMsg: "email-attribute is not set",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for n, c := range cases {
 | 
						|
		// Mock functions.
 | 
						|
		var createdAuthSource *auth.Source
 | 
						|
		service := &authService{
 | 
						|
			initDB: func(context.Context) error {
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			createAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				createdAuthSource = authSource
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			updateAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				assert.FailNow(t, "should not call updateAuthSource", "case: %d", n)
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			getAuthSourceByID: func(ctx context.Context, id int64) (*auth.Source, error) {
 | 
						|
				assert.FailNow(t, "should not call getAuthSourceByID", "case: %d", n)
 | 
						|
				return nil, nil
 | 
						|
			},
 | 
						|
		}
 | 
						|
 | 
						|
		// Create a copy of command to test
 | 
						|
		app := cli.Command{}
 | 
						|
		app.Flags = microcmdAuthAddLdapBindDn().Flags
 | 
						|
		app.Action = service.addLdapBindDn
 | 
						|
 | 
						|
		// Run it
 | 
						|
		err := app.Run(t.Context(), c.args)
 | 
						|
		if c.errMsg != "" {
 | 
						|
			assert.EqualError(t, err, c.errMsg, "case %d: error should match", n)
 | 
						|
		} else {
 | 
						|
			require.NoError(t, err, "case %d: should have no errors", n)
 | 
						|
			assert.Equal(t, c.source, createdAuthSource, "case %d: wrong authSource", n)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAddLdapSimpleAuth(t *testing.T) {
 | 
						|
	// Mock cli functions to do not exit on error
 | 
						|
	defer test.MockVariableValue(&cli.OsExiter, func(code int) {})()
 | 
						|
 | 
						|
	// Test cases
 | 
						|
	cases := []struct {
 | 
						|
		args       []string
 | 
						|
		authSource *auth.Source
 | 
						|
		errMsg     string
 | 
						|
	}{
 | 
						|
		// case 0
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source full",
 | 
						|
				"--not-active",
 | 
						|
				"--security-protocol", "starttls",
 | 
						|
				"--skip-tls-verify",
 | 
						|
				"--host", "ldap-simple-server full",
 | 
						|
				"--port", "987",
 | 
						|
				"--user-search-base", "ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(full-simple-cn=%s))",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
				"--restricted-filter", "(memberOf=cn=restricted-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
				"--username-attribute", "uid-simple full",
 | 
						|
				"--firstname-attribute", "givenName-simple full",
 | 
						|
				"--surname-attribute", "sn-simple full",
 | 
						|
				"--email-attribute", "mail-simple full",
 | 
						|
				"--public-ssh-key-attribute", "publickey-simple full",
 | 
						|
				"--avatar-attribute", "avatar-simple full",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				Name:     "ldap (simple auth) source full",
 | 
						|
				IsActive: false,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:                  "ldap (simple auth) source full",
 | 
						|
					Host:                  "ldap-simple-server full",
 | 
						|
					Port:                  987,
 | 
						|
					SecurityProtocol:      ldap.SecurityProtocol(2),
 | 
						|
					SkipVerify:            true,
 | 
						|
					UserDN:                "cn=%s,ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
					UserBase:              "ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
					AttributeUsername:     "uid-simple full",
 | 
						|
					AttributeName:         "givenName-simple full",
 | 
						|
					AttributeSurname:      "sn-simple full",
 | 
						|
					AttributeMail:         "mail-simple full",
 | 
						|
					AttributeSSHPublicKey: "publickey-simple full",
 | 
						|
					AttributeAvatar:       "avatar-simple full",
 | 
						|
					Filter:                "(&(objectClass=posixAccount)(full-simple-cn=%s))",
 | 
						|
					AdminFilter:           "(memberOf=cn=admin-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
					RestrictedFilter:      "(memberOf=cn=restricted-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
					Enabled:               true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 1
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source min",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-simple-server min",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(min-simple-cn=%s))",
 | 
						|
				"--email-attribute", "mail-simple min",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=min-domain-simple,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				Name:     "ldap (simple auth) source min",
 | 
						|
				IsActive: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:             "ldap (simple auth) source min",
 | 
						|
					Host:             "ldap-simple-server min",
 | 
						|
					Port:             123,
 | 
						|
					SecurityProtocol: ldap.SecurityProtocol(0),
 | 
						|
					UserDN:           "cn=%s,ou=Users,dc=min-domain-simple,dc=org",
 | 
						|
					AttributeMail:    "mail-simple min",
 | 
						|
					Filter:           "(&(objectClass=posixAccount)(min-simple-cn=%s))",
 | 
						|
					Enabled:          true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 2
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "zzzzz",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "Unknown security protocol name: zzzzz",
 | 
						|
		},
 | 
						|
		// case 3
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "name is not set",
 | 
						|
		},
 | 
						|
		// case 4
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "security-protocol is not set",
 | 
						|
		},
 | 
						|
		// case 5
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "host is not set",
 | 
						|
		},
 | 
						|
		// case 6
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "port is not set",
 | 
						|
		},
 | 
						|
		// case 7
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "user-filter is not set",
 | 
						|
		},
 | 
						|
		// case 8
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			errMsg: "email-attribute is not set",
 | 
						|
		},
 | 
						|
		// case 9
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
				"--security-protocol", "unencrypted",
 | 
						|
				"--host", "ldap-server",
 | 
						|
				"--port", "123",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			errMsg: "user-dn is not set",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for n, c := range cases {
 | 
						|
		// Mock functions.
 | 
						|
		var createdAuthSource *auth.Source
 | 
						|
		service := &authService{
 | 
						|
			initDB: func(context.Context) error {
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			createAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				createdAuthSource = authSource
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			updateAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				assert.FailNow(t, "should not call updateAuthSource", "case: %d", n)
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			getAuthSourceByID: func(ctx context.Context, id int64) (*auth.Source, error) {
 | 
						|
				assert.FailNow(t, "should not call getAuthSourceByID", "case: %d", n)
 | 
						|
				return nil, nil
 | 
						|
			},
 | 
						|
		}
 | 
						|
 | 
						|
		// Create a copy of command to test
 | 
						|
		app := cli.Command{}
 | 
						|
		app.Flags = microcmdAuthAddLdapSimpleAuth().Flags
 | 
						|
		app.Action = service.addLdapSimpleAuth
 | 
						|
 | 
						|
		// Run it
 | 
						|
		err := app.Run(t.Context(), c.args)
 | 
						|
		if c.errMsg != "" {
 | 
						|
			assert.EqualError(t, err, c.errMsg, "case %d: error should match", n)
 | 
						|
		} else {
 | 
						|
			require.NoError(t, err, "case %d: should have no errors", n)
 | 
						|
			assert.Equal(t, c.authSource, createdAuthSource, "case %d: wrong authSource", n)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateLdapBindDn(t *testing.T) {
 | 
						|
	// Mock cli functions to do not exit on error
 | 
						|
	defer test.MockVariableValue(&cli.OsExiter, func(code int) {})()
 | 
						|
 | 
						|
	// Test cases
 | 
						|
	cases := []struct {
 | 
						|
		args               []string
 | 
						|
		id                 int64
 | 
						|
		existingAuthSource *auth.Source
 | 
						|
		authSource         *auth.Source
 | 
						|
		errMsg             string
 | 
						|
	}{
 | 
						|
		// case 0
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "23",
 | 
						|
				"--name", "ldap (via Bind DN) source full",
 | 
						|
				"--not-active",
 | 
						|
				"--security-protocol", "LDAPS",
 | 
						|
				"--skip-tls-verify",
 | 
						|
				"--host", "ldap-bind-server full",
 | 
						|
				"--port", "9876",
 | 
						|
				"--user-search-base", "ou=Users,dc=full-domain-bind,dc=org",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--restricted-filter", "(memberOf=cn=restricted-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
				"--username-attribute", "uid-bind full",
 | 
						|
				"--firstname-attribute", "givenName-bind full",
 | 
						|
				"--surname-attribute", "sn-bind full",
 | 
						|
				"--email-attribute", "mail-bind full",
 | 
						|
				"--public-ssh-key-attribute", "publickey-bind full",
 | 
						|
				"--avatar-attribute", "avatar-bind full",
 | 
						|
				"--bind-dn", "cn=readonly,dc=full-domain-bind,dc=org",
 | 
						|
				"--bind-password", "secret-bind-full",
 | 
						|
				"--synchronize-users",
 | 
						|
				"--page-size", "99",
 | 
						|
			},
 | 
						|
			id: 23,
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type:     auth.LDAP,
 | 
						|
				IsActive: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Enabled: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:          auth.LDAP,
 | 
						|
				Name:          "ldap (via Bind DN) source full",
 | 
						|
				IsActive:      false,
 | 
						|
				IsSyncEnabled: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:                  "ldap (via Bind DN) source full",
 | 
						|
					Host:                  "ldap-bind-server full",
 | 
						|
					Port:                  9876,
 | 
						|
					SecurityProtocol:      ldap.SecurityProtocol(1),
 | 
						|
					SkipVerify:            true,
 | 
						|
					BindDN:                "cn=readonly,dc=full-domain-bind,dc=org",
 | 
						|
					BindPassword:          "secret-bind-full",
 | 
						|
					UserBase:              "ou=Users,dc=full-domain-bind,dc=org",
 | 
						|
					AttributeUsername:     "uid-bind full",
 | 
						|
					AttributeName:         "givenName-bind full",
 | 
						|
					AttributeSurname:      "sn-bind full",
 | 
						|
					AttributeMail:         "mail-bind full",
 | 
						|
					AttributesInBind:      false,
 | 
						|
					AttributeSSHPublicKey: "publickey-bind full",
 | 
						|
					AttributeAvatar:       "avatar-bind full",
 | 
						|
					SearchPageSize:        99,
 | 
						|
					Filter:                "(memberOf=cn=user-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					AdminFilter:           "(memberOf=cn=admin-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					RestrictedFilter:      "(memberOf=cn=restricted-group,ou=example,dc=full-domain-bind,dc=org)",
 | 
						|
					Enabled:               true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 1
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg:  &ldap.Source{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 2
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--name", "ldap (via Bind DN) source",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Name: "ldap (via Bind DN) source",
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name: "ldap (via Bind DN) source",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 3
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--not-active",
 | 
						|
			},
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type:     auth.LDAP,
 | 
						|
				IsActive: true,
 | 
						|
				Cfg:      &ldap.Source{},
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.LDAP,
 | 
						|
				IsActive: false,
 | 
						|
				Cfg:      &ldap.Source{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 4
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--security-protocol", "LDAPS",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					SecurityProtocol: ldap.SecurityProtocol(1),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 5
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--skip-tls-verify",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					SkipVerify: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 6
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--host", "ldap-server",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Host: "ldap-server",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 7
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--port", "389",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Port: 389,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 8
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					UserBase: "ou=Users,dc=domain,dc=org",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 9
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--user-filter", "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Filter: "(memberOf=cn=user-group,ou=example,dc=domain,dc=org)",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 10
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=domain,dc=org)",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AdminFilter: "(memberOf=cn=admin-group,ou=example,dc=domain,dc=org)",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 11
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--username-attribute", "uid",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeUsername: "uid",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 12
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--firstname-attribute", "givenName",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeName: "givenName",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 13
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--surname-attribute", "sn",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeSurname: "sn",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 14
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeMail: "mail",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 15
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--attributes-in-bind",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributesInBind: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 16
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--public-ssh-key-attribute", "publickey",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeSSHPublicKey: "publickey",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 17
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--bind-dn", "cn=readonly,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					BindDN: "cn=readonly,dc=domain,dc=org",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 18
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--bind-password", "secret",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					BindPassword: "secret",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 19
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--synchronize-users",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:          auth.LDAP,
 | 
						|
				IsSyncEnabled: true,
 | 
						|
				Cfg:           &ldap.Source{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 20
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--page-size", "12",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.LDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					SearchPageSize: 12,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 21
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--security-protocol", "xxxxx",
 | 
						|
			},
 | 
						|
			errMsg: "Unknown security protocol name: xxxxx",
 | 
						|
		},
 | 
						|
		// case 22
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
			},
 | 
						|
			errMsg: "id is not set",
 | 
						|
		},
 | 
						|
		// case 23
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
			},
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type: auth.OAuth2,
 | 
						|
				Cfg:  &ldap.Source{},
 | 
						|
			},
 | 
						|
			errMsg: "Invalid authentication type. expected: LDAP (via BindDN), actual: OAuth2",
 | 
						|
		},
 | 
						|
		// case 24
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "24",
 | 
						|
				"--name", "ldap (via Bind DN) flip 'active' and 'user sync' attributes",
 | 
						|
				"--active",
 | 
						|
				"--disable-synchronize-users",
 | 
						|
			},
 | 
						|
			id: 24,
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type:          auth.LDAP,
 | 
						|
				IsActive:      false,
 | 
						|
				IsSyncEnabled: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:    "ldap (via Bind DN) flip 'active' and 'user sync' attributes",
 | 
						|
					Enabled: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:          auth.LDAP,
 | 
						|
				Name:          "ldap (via Bind DN) flip 'active' and 'user sync' attributes",
 | 
						|
				IsActive:      true,
 | 
						|
				IsSyncEnabled: false,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:    "ldap (via Bind DN) flip 'active' and 'user sync' attributes",
 | 
						|
					Enabled: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for n, c := range cases {
 | 
						|
		// Mock functions.
 | 
						|
		var updatedAuthSource *auth.Source
 | 
						|
		service := &authService{
 | 
						|
			initDB: func(context.Context) error {
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			createAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				assert.FailNow(t, "should not call createAuthSource", "case: %d", n)
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			updateAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				updatedAuthSource = authSource
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			getAuthSourceByID: func(ctx context.Context, id int64) (*auth.Source, error) {
 | 
						|
				if c.id != 0 {
 | 
						|
					assert.Equal(t, c.id, id, "case %d: wrong id", n)
 | 
						|
				}
 | 
						|
				if c.existingAuthSource != nil {
 | 
						|
					return c.existingAuthSource, nil
 | 
						|
				}
 | 
						|
				return &auth.Source{
 | 
						|
					Type: auth.LDAP,
 | 
						|
					Cfg:  &ldap.Source{},
 | 
						|
				}, nil
 | 
						|
			},
 | 
						|
		}
 | 
						|
 | 
						|
		// Create a copy of command to test
 | 
						|
		app := cli.Command{}
 | 
						|
		app.Flags = microcmdAuthUpdateLdapBindDn().Flags
 | 
						|
		app.Action = service.updateLdapBindDn
 | 
						|
 | 
						|
		// Run it
 | 
						|
		err := app.Run(t.Context(), c.args)
 | 
						|
		if c.errMsg != "" {
 | 
						|
			assert.EqualError(t, err, c.errMsg, "case %d: error should match", n)
 | 
						|
		} else {
 | 
						|
			require.NoError(t, err, "case %d: should have no errors", n)
 | 
						|
			assert.Equal(t, c.authSource, updatedAuthSource, "case %d: wrong authSource", n)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateLdapSimpleAuth(t *testing.T) {
 | 
						|
	// Mock cli functions to do not exit on error
 | 
						|
	defer test.MockVariableValue(&cli.OsExiter, func(code int) {})()
 | 
						|
 | 
						|
	// Test cases
 | 
						|
	cases := []struct {
 | 
						|
		args               []string
 | 
						|
		id                 int64
 | 
						|
		existingAuthSource *auth.Source
 | 
						|
		authSource         *auth.Source
 | 
						|
		errMsg             string
 | 
						|
	}{
 | 
						|
		// case 0
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "7",
 | 
						|
				"--name", "ldap (simple auth) source full",
 | 
						|
				"--not-active",
 | 
						|
				"--security-protocol", "starttls",
 | 
						|
				"--skip-tls-verify",
 | 
						|
				"--host", "ldap-simple-server full",
 | 
						|
				"--port", "987",
 | 
						|
				"--user-search-base", "ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(full-simple-cn=%s))",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
				"--restricted-filter", "(memberOf=cn=restricted-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
				"--username-attribute", "uid-simple full",
 | 
						|
				"--firstname-attribute", "givenName-simple full",
 | 
						|
				"--surname-attribute", "sn-simple full",
 | 
						|
				"--email-attribute", "mail-simple full",
 | 
						|
				"--public-ssh-key-attribute", "publickey-simple full",
 | 
						|
				"--avatar-attribute", "avatar-simple full",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
			},
 | 
						|
			id: 7,
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				Name:     "ldap (simple auth) source full",
 | 
						|
				IsActive: false,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:                  "ldap (simple auth) source full",
 | 
						|
					Host:                  "ldap-simple-server full",
 | 
						|
					Port:                  987,
 | 
						|
					SecurityProtocol:      ldap.SecurityProtocol(2),
 | 
						|
					SkipVerify:            true,
 | 
						|
					UserDN:                "cn=%s,ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
					UserBase:              "ou=Users,dc=full-domain-simple,dc=org",
 | 
						|
					AttributeUsername:     "uid-simple full",
 | 
						|
					AttributeName:         "givenName-simple full",
 | 
						|
					AttributeSurname:      "sn-simple full",
 | 
						|
					AttributeMail:         "mail-simple full",
 | 
						|
					AttributeSSHPublicKey: "publickey-simple full",
 | 
						|
					AttributeAvatar:       "avatar-simple full",
 | 
						|
					Filter:                "(&(objectClass=posixAccount)(full-simple-cn=%s))",
 | 
						|
					AdminFilter:           "(memberOf=cn=admin-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
					RestrictedFilter:      "(memberOf=cn=restricted-group,ou=example,dc=full-domain-simple,dc=org)",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 1
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg:  &ldap.Source{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 2
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--name", "ldap (simple auth) source",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Name: "ldap (simple auth) source",
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name: "ldap (simple auth) source",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 3
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--not-active",
 | 
						|
			},
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				IsActive: true,
 | 
						|
				Cfg:      &ldap.Source{},
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				IsActive: false,
 | 
						|
				Cfg:      &ldap.Source{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 4
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--security-protocol", "starttls",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					SecurityProtocol: ldap.SecurityProtocol(2),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 5
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--skip-tls-verify",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					SkipVerify: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 6
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--host", "ldap-server",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Host: "ldap-server",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 7
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--port", "987",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Port: 987,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 8
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--user-search-base", "ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					UserBase: "ou=Users,dc=domain,dc=org",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 9
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--user-filter", "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Filter: "(&(objectClass=posixAccount)(cn=%s))",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 10
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--admin-filter", "(memberOf=cn=admin-group,ou=example,dc=domain,dc=org)",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AdminFilter: "(memberOf=cn=admin-group,ou=example,dc=domain,dc=org)",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 11
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--username-attribute", "uid",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeUsername: "uid",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 12
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--firstname-attribute", "givenName",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeName: "givenName",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 13
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--surname-attribute", "sn",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeSurname: "sn",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 14
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--email-attribute", "mail",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeMail: "mail",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 15
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--public-ssh-key-attribute", "publickey",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					AttributeSSHPublicKey: "publickey",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 16
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--user-dn", "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type: auth.DLDAP,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					UserDN: "cn=%s,ou=Users,dc=domain,dc=org",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		// case 17
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
				"--security-protocol", "xxxxx",
 | 
						|
			},
 | 
						|
			errMsg: "Unknown security protocol name: xxxxx",
 | 
						|
		},
 | 
						|
		// case 18
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
			},
 | 
						|
			errMsg: "id is not set",
 | 
						|
		},
 | 
						|
		// case 19
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "1",
 | 
						|
			},
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type: auth.PAM,
 | 
						|
				Cfg:  &ldap.Source{},
 | 
						|
			},
 | 
						|
			errMsg: "Invalid authentication type. expected: LDAP (simple auth), actual: PAM",
 | 
						|
		},
 | 
						|
		// case 20
 | 
						|
		{
 | 
						|
			args: []string{
 | 
						|
				"ldap-test",
 | 
						|
				"--id", "20",
 | 
						|
				"--name", "ldap (simple auth) flip 'active' attribute",
 | 
						|
				"--active",
 | 
						|
			},
 | 
						|
			id: 20,
 | 
						|
			existingAuthSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				IsActive: false,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:    "ldap (simple auth) flip 'active' attribute",
 | 
						|
					Enabled: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			authSource: &auth.Source{
 | 
						|
				Type:     auth.DLDAP,
 | 
						|
				Name:     "ldap (simple auth) flip 'active' attribute",
 | 
						|
				IsActive: true,
 | 
						|
				Cfg: &ldap.Source{
 | 
						|
					Name:    "ldap (simple auth) flip 'active' attribute",
 | 
						|
					Enabled: true,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for n, c := range cases {
 | 
						|
		// Mock functions.
 | 
						|
		var updatedAuthSource *auth.Source
 | 
						|
		service := &authService{
 | 
						|
			initDB: func(context.Context) error {
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			createAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				assert.FailNow(t, "should not call createAuthSource", "case: %d", n)
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			updateAuthSource: func(ctx context.Context, authSource *auth.Source) error {
 | 
						|
				updatedAuthSource = authSource
 | 
						|
				return nil
 | 
						|
			},
 | 
						|
			getAuthSourceByID: func(ctx context.Context, id int64) (*auth.Source, error) {
 | 
						|
				if c.id != 0 {
 | 
						|
					assert.Equal(t, c.id, id, "case %d: wrong id", n)
 | 
						|
				}
 | 
						|
				if c.existingAuthSource != nil {
 | 
						|
					return c.existingAuthSource, nil
 | 
						|
				}
 | 
						|
				return &auth.Source{
 | 
						|
					Type: auth.DLDAP,
 | 
						|
					Cfg:  &ldap.Source{},
 | 
						|
				}, nil
 | 
						|
			},
 | 
						|
		}
 | 
						|
 | 
						|
		// Create a copy of command to test
 | 
						|
		app := cli.Command{}
 | 
						|
		app.Flags = microcmdAuthUpdateLdapSimpleAuth().Flags
 | 
						|
		app.Action = service.updateLdapSimpleAuth
 | 
						|
 | 
						|
		// Run it
 | 
						|
		err := app.Run(t.Context(), c.args)
 | 
						|
		if c.errMsg != "" {
 | 
						|
			assert.EqualError(t, err, c.errMsg, "case %d: error should match", n)
 | 
						|
		} else {
 | 
						|
			require.NoError(t, err, "case %d: should have no errors", n)
 | 
						|
			assert.Equal(t, c.authSource, updatedAuthSource, "case %d: wrong authSource", n)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |