|
| 1 | +require_relative '../test_helper' |
| 2 | + |
| 3 | +class TestPasswordModifyIntegration < LDAPIntegrationTestCase |
| 4 | + def setup |
| 5 | + super |
| 6 | + @ldap.authenticate 'cn=admin,dc=rubyldap,dc=com', 'passworD1' |
| 7 | + |
| 8 | + @dn = 'uid=modify-password-user1,ou=People,dc=rubyldap,dc=com' |
| 9 | + |
| 10 | + attrs = { |
| 11 | + objectclass: %w(top inetOrgPerson organizationalPerson person), |
| 12 | + uid: 'modify-password-user1', |
| 13 | + cn: 'modify-password-user1', |
| 14 | + sn: 'modify-password-user1', |
| 15 | + |
| 16 | + userPassword: 'passworD1' |
| 17 | + } |
| 18 | + unless @ldap.search(base: @dn, scope: Net::LDAP::SearchScope_BaseObject) |
| 19 | + assert @ldap.add(dn: @dn, attributes: attrs), @ldap.get_operation_result.inspect |
| 20 | + end |
| 21 | + assert @ldap.search(base: @dn, scope: Net::LDAP::SearchScope_BaseObject) |
| 22 | + |
| 23 | + @auth = { |
| 24 | + method: :simple, |
| 25 | + username: @dn, |
| 26 | + password: 'passworD1' |
| 27 | + } |
| 28 | + end |
| 29 | + |
| 30 | + def test_password_modify |
| 31 | + assert @ldap.password_modify(dn: @dn, |
| 32 | + auth: @auth, |
| 33 | + old_password: 'passworD1', |
| 34 | + new_password: 'passworD2') |
| 35 | + |
| 36 | + assert @ldap.get_operation_result.extended_response.nil?, |
| 37 | + 'Should not have generated a new password' |
| 38 | + |
| 39 | + refute @ldap.bind(username: @dn, password: 'passworD1', method: :simple), |
| 40 | + 'Old password should no longer be valid' |
| 41 | + |
| 42 | + assert @ldap.bind(username: @dn, password: 'passworD2', method: :simple), |
| 43 | + 'New password should be valid' |
| 44 | + end |
| 45 | + |
| 46 | + def test_password_modify_generate |
| 47 | + assert @ldap.password_modify(dn: @dn, |
| 48 | + auth: @auth, |
| 49 | + old_password: 'passworD1') |
| 50 | + |
| 51 | + generated_password = @ldap.get_operation_result.extended_response[0][0] |
| 52 | + |
| 53 | + assert generated_password, 'Should have generated a password' |
| 54 | + |
| 55 | + refute @ldap.bind(username: @dn, password: 'passworD1', method: :simple), |
| 56 | + 'Old password should no longer be valid' |
| 57 | + |
| 58 | + assert @ldap.bind(username: @dn, password: generated_password, method: :simple), |
| 59 | + 'New password should be valid' |
| 60 | + end |
| 61 | + |
| 62 | + def test_password_modify_generate_no_old_password |
| 63 | + assert @ldap.password_modify(dn: @dn, |
| 64 | + auth: @auth) |
| 65 | + |
| 66 | + generated_password = @ldap.get_operation_result.extended_response[0][0] |
| 67 | + |
| 68 | + assert generated_password, 'Should have generated a password' |
| 69 | + |
| 70 | + refute @ldap.bind(username: @dn, password: 'passworD1', method: :simple), |
| 71 | + 'Old password should no longer be valid' |
| 72 | + |
| 73 | + assert @ldap.bind(username: @dn, password: generated_password, method: :simple), |
| 74 | + 'New password should be valid' |
| 75 | + end |
| 76 | + |
| 77 | + def teardown |
| 78 | + @ldap.delete dn: @dn |
| 79 | + end |
| 80 | +end |
0 commit comments