Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/**
* ====================
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright 2008-2009 Sun Microsystems, Inc. All rights reserved.
* Copyright 2011-2013 Tirasa. All rights reserved.
*
* The contents of this file are subject to the terms of the Common Development
* and Distribution License("CDDL") (the "License"). You may not use this file
* except in compliance with the License.
*
* You can obtain a copy of the License at https://oss.oracle.com/licenses/CDDL
* See the License for the specific language governing permissions and limitations
* under the License.
*
* When distributing the Covered Code, include this CDDL Header Notice in each file
* and include the License file at https://oss.oracle.com/licenses/CDDL.
* If applicable, add the following below this CDDL Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyrighted [year] [name of copyright owner]"
* ====================
*/
package org.identityconnectors.contract.test;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
import java.util.Date;
import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;
import org.identityconnectors.common.logging.Log;
import org.identityconnectors.common.security.GuardedString;
import org.identityconnectors.contract.exceptions.ObjectNotFoundException;
import org.identityconnectors.framework.api.operations.APIOperation;
import org.identityconnectors.framework.api.operations.AuthenticationApiOp;
import org.identityconnectors.framework.api.operations.CreateApiOp;
import org.identityconnectors.framework.api.operations.DeleteApiOp;
import org.identityconnectors.framework.api.operations.GetApiOp;
import org.identityconnectors.framework.api.operations.UpdateApiOp;
import org.identityconnectors.framework.common.exceptions.InvalidCredentialException;
import org.identityconnectors.framework.common.exceptions.PasswordExpiredException;
import org.identityconnectors.framework.common.objects.Attribute;
import org.identityconnectors.framework.common.objects.AttributeBuilder;
import org.identityconnectors.framework.common.objects.AttributeInfo;
import org.identityconnectors.framework.common.objects.ConnectorObject;
import org.identityconnectors.framework.common.objects.ObjectClass;
import org.identityconnectors.framework.common.objects.ObjectClassInfo;
import org.identityconnectors.framework.common.objects.OperationOptionsBuilder;
import org.identityconnectors.framework.common.objects.OperationalAttributes;
import org.identityconnectors.framework.common.objects.PredefinedAttributes;
import org.identityconnectors.framework.common.objects.Uid;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
/**
* Contract test of {@link AuthenticationApiOp}
*/
@RunWith(Parameterized.class)
public class AuthenticationApiOpTests extends ObjectClassRunner {
/**
* Logging..
*/
private static final Log LOG = Log.getLog(AuthenticationApiOpTests.class);
static final String TEST_NAME = "Authentication";
static final String USERNAME_PROP = "username";
private static final String WRONG_PASSWORD_PROP = "wrong.password";
private static final String MAX_ITERATIONS = "maxIterations";
private static final String SLEEP_MILLISECONDS = "sleepMilliseconds";
public AuthenticationApiOpTests(ObjectClass oclass) {
super(oclass);
}
/**
* {@inheritDoc}
*/
@Override
public Set> getAPIOperations() {
Set> requiredOps = new HashSet>();
// list of required operations by this test:
requiredOps.add(CreateApiOp.class);
requiredOps.add(AuthenticationApiOp.class);
requiredOps.add(GetApiOp.class);
return requiredOps;
}
/**
* {@inheritDoc}
*/
@Override
public void testRun() {
Uid uid = null;
try {
// create a user
Set attrs = ConnectorHelper.getCreateableAttributes(getDataProvider(),
getObjectClassInfo(), getTestName(), 0, true, false);
// Remove enabled and password_expired, connector must create valid account then
for (Iterator i = attrs.iterator(); i.hasNext();) {
Attribute attr = i.next();
if (attr.is(OperationalAttributes.PASSWORD_EXPIRED_NAME)
|| attr.is(OperationalAttributes.PASSWORD_EXPIRATION_DATE_NAME)
|| attr.is(OperationalAttributes.ENABLE_DATE_NAME)
|| attr.is(OperationalAttributes.ENABLE_NAME)) {
if (!ConnectorHelper.isRequired(getObjectClassInfo(), attr)) {
i.remove();
}
}
}
uid = getConnectorFacade().create(getObjectClass(), attrs, getOperationOptionsByOp(CreateApiOp.class));
// get the user to make sure it exists now
ConnectorObject obj = getConnectorFacade().getObject(getObjectClass(), uid,
getOperationOptionsByOp(GetApiOp.class));
assertNotNull("Unable to retrieve newly created object", obj);
// get username
String name = (String) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + USERNAME_PROP,
TEST_NAME);
// test negative case with valid user, but wrong password
boolean authenticateFailed = false;
// get wrong password
GuardedString wrongPassword = (GuardedString) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + WRONG_PASSWORD_PROP,
TEST_NAME);
authenticateFailed = authenticateExpectingInvalidCredentials(name, wrongPassword);
assertTrue("Negative test case for Authentication failed, should throw InvalidCredentialException",
authenticateFailed);
// now try with the right password
GuardedString password = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, getObjectClass().getObjectClassValue(), 0, false);
Uid authenticatedUid = authenticateExpectingSuccess(name, password);
String MSG = "Authenticate returned wrong Uid, expected: %s, returned: %s.";
assertEquals(String.format(MSG, uid, authenticatedUid), uid, authenticatedUid);
// test that PASSWORD change works, CURRENT_PASSWORD should be set
// to old password value if supported
if (isOperationalAttributeUpdateable(OperationalAttributes.PASSWORD_NAME)) {
GuardedString newpassword = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, UpdateApiOpTests.MODIFIED, getObjectClass().getObjectClassValue(), 0, false);
Set replaceAttrs = new HashSet();
replaceAttrs.add(AttributeBuilder.buildPassword(newpassword));
if (ConnectorHelper.isAttrSupported(getObjectClassInfo(),
OperationalAttributes.CURRENT_PASSWORD_NAME)) {
// CURRENT_PASSWORD must be set to old password
replaceAttrs.add(AttributeBuilder.buildCurrentPassword(password));
}
// update to new password
uid = getConnectorFacade().update(getObjectClass(),
uid, replaceAttrs, getOperationOptionsByOp(UpdateApiOp.class));
// authenticate with new password
authenticatedUid = authenticateExpectingSuccess(name, newpassword);
assertEquals(String.format(MSG, uid, authenticatedUid), uid, authenticatedUid);
// LAST_PASSWORD_CHANGE_DATE
if (ConnectorHelper.isAttrSupported(getObjectClassInfo(),
PredefinedAttributes.LAST_PASSWORD_CHANGE_DATE_NAME)) {
LOG.info("LAST_PASSWORD_CHANGE_DATE test.");
// LAST_PASSWORD_CHANGE_DATE must be readable, we suppose it is
// add LAST_PASSWORD_CHANGE_DATE to ATTRS_TO_GET
OperationOptionsBuilder builder = new OperationOptionsBuilder();
builder.setAttributesToGet(PredefinedAttributes.LAST_PASSWORD_CHANGE_DATE_NAME);
ConnectorObject lastPasswordChange = getConnectorFacade().getObject(
getObjectClass(), uid, builder.build());
// check that LAST_PASSWORD_CHANGE_DATE was set to a value
assertNotNull("LAST_PASSWORD_CHANGE_DATE attribute is null.",
lastPasswordChange.getAttributeByName(PredefinedAttributes.LAST_PASSWORD_CHANGE_DATE_NAME));
} else {
LOG.info("Skipping LAST_PASSWORD_CHANGE_DATE test.");
}
}
// LAST_LOGIN_DATE
if (ConnectorHelper.isAttrSupported(getObjectClassInfo(), PredefinedAttributes.LAST_LOGIN_DATE_NAME)) {
LOG.info("LAST_LOGIN_DATE test.");
// LAST_LOGIN_DATE must be readable, we suppose it is
// add LAST_LOGIN_DATE to ATTRS_TO_GET
OperationOptionsBuilder builder = new OperationOptionsBuilder();
builder.setAttributesToGet(PredefinedAttributes.LAST_LOGIN_DATE_NAME);
ConnectorObject lastLogin = getConnectorFacade().getObject(getObjectClass(), uid,
builder.build());
// check that LAST_LOGIN_DATE was set to some value
assertNotNull("LAST_LOGIN_DATE attribute is null.", lastLogin.getAttributeByName(PredefinedAttributes.LAST_LOGIN_DATE_NAME));
}
else {
LOG.info("Skipping LAST_LOGIN_DATE test.");
}
} finally {
if (uid != null) {
// delete the object
ConnectorHelper.deleteObject(getConnectorFacade(), getSupportedObjectClass(), uid,
false, getOperationOptionsByOp(DeleteApiOp.class));
}
}
}
/**
* Tests that disabled user cannot authenticate.
* RuntimeException should be thrown.
*/
@Test
public void testOpEnable() {
// now try to set the password to be expired and authenticate again
// it's possible only in case Update and PASSWORD_EXPIRED are supported
if (ConnectorHelper.operationsSupported(getConnectorFacade(), getObjectClass(), getAPIOperations())
&& isOperationalAttributeUpdateable(OperationalAttributes.ENABLE_NAME)) {
Uid uid = null;
try {
// create an user
Set attrs = ConnectorHelper.getCreateableAttributes(getDataProvider(),
getObjectClassInfo(), getTestName(), 0, true, false);
// Remove enabled and password_expired, connector must create valid account then
for (Iterator i = attrs.iterator(); i.hasNext();) {
Attribute attr = i.next();
if (attr.is(OperationalAttributes.PASSWORD_EXPIRED_NAME)
|| attr.is(OperationalAttributes.PASSWORD_EXPIRATION_DATE_NAME)
|| attr.is(OperationalAttributes.ENABLE_DATE_NAME)) {
if (!ConnectorHelper.isRequired(getObjectClassInfo(), attr)) {
i.remove();
}
}
}
uid = getConnectorFacade().create(getObjectClass(), attrs,
getOperationOptionsByOp(CreateApiOp.class));
// get username
String name = (String) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + USERNAME_PROP,
TEST_NAME);
Set updateAttrs = new HashSet();
updateAttrs.add(AttributeBuilder.buildEnabled(false));
Uid newUid = getConnectorFacade().update(getObjectClass(), uid,
updateAttrs, null);
if (!uid.equals(newUid) && newUid != null) {
uid = newUid;
}
// get the right password
GuardedString password = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, getObjectClassInfo().getType(), 0, false);
// and now authenticate
assertTrue("Authenticate must throw for disabled account",
authenticateExpectingRuntimeException(name, password));
} finally {
// delete the object
ConnectorHelper.deleteObject(getConnectorFacade(), getSupportedObjectClass(), uid,
false, getOperationOptionsByOp(DeleteApiOp.class));
}
} else {
LOG.info("Skipping testOpEnable test.");
}
}
/**
* Tests that PasswordExpiredException is thrown in case PasswordExpirationDate is set to today.
*/
@Test
public void testOpPasswordExpirationDate() {
// now try to set the password to be expired and authenticate again
// it's possible only in case Update and PASSWORD_EXPIRED
if (ConnectorHelper.operationsSupported(getConnectorFacade(), getObjectClass(), getAPIOperations())
&& isOperationalAttributeUpdateable(OperationalAttributes.PASSWORD_EXPIRATION_DATE_NAME)) {
Uid uid = null;
try {
// create an user
Set attrs = ConnectorHelper.getCreateableAttributes(getDataProvider(),
getObjectClassInfo(), getTestName(), 0, true, false);
// Remove enabled and password_expired, connector must create valid account then
for (Iterator i = attrs.iterator(); i.hasNext();) {
Attribute attr = i.next();
if (attr.is(OperationalAttributes.ENABLE_NAME)
|| attr.is(OperationalAttributes.ENABLE_DATE_NAME)
|| attr.is(OperationalAttributes.PASSWORD_EXPIRED_NAME)) {
if (!ConnectorHelper.isRequired(getObjectClassInfo(), attr)) {
i.remove();
}
}
}
uid = getConnectorFacade().create(getObjectClass(), attrs,
getOperationOptionsByOp(CreateApiOp.class));
// get username
String name = (String) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + USERNAME_PROP,
TEST_NAME);
Set updateAttrs = new HashSet();
updateAttrs.add(AttributeBuilder.buildPasswordExpirationDate(new Date()));
Uid newUid = getConnectorFacade().update(getObjectClass(), uid,
updateAttrs, null);
if (!uid.equals(newUid) && newUid != null) {
uid = newUid;
}
// get the right password
GuardedString password = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, getObjectClassInfo().getType(), 0, false);
// and now authenticate
PasswordExpiredException pwe = authenticateExpectingPasswordExpired(name, password);
assertNotNull("Authenticate should throw PasswordExpiredException.",
pwe);
final String MSG = "PasswordExpiredException contains wrong Uid, expected: %s, returned: %s";
assertEquals(String.format(MSG, uid, pwe.getUid()), uid, pwe.getUid());
} finally {
// delete the object
ConnectorHelper.deleteObject(getConnectorFacade(), getSupportedObjectClass(), uid,
false, getOperationOptionsByOp(DeleteApiOp.class));
}
} else {
LOG.info("Skipping testOpPasswordExpirationDate test.");
}
}
/**
* Tests that PasswordExpiredException is thrown in case PasswordExpired is updated to true.
*/
@Test
public void testOpPasswordExpired() {
// now try to set the password to be expired and authenticate again
// it's possible only in case Update and PASSWORD_EXPIRED
if (ConnectorHelper.operationsSupported(getConnectorFacade(), getObjectClass(), getAPIOperations())
&& isOperationalAttributeUpdateable(OperationalAttributes.PASSWORD_EXPIRED_NAME)) {
Uid uid = null;
try {
// create an user
Set attrs = ConnectorHelper.getCreateableAttributes(getDataProvider(),
getObjectClassInfo(), getTestName(), 0, true, false);
// Remove enabled and password_expired, connector must create valid account then
for (Iterator i = attrs.iterator(); i.hasNext();) {
Attribute attr = i.next();
if (attr.is(OperationalAttributes.ENABLE_NAME)
|| attr.is(OperationalAttributes.ENABLE_DATE_NAME)
|| attr.is(OperationalAttributes.PASSWORD_EXPIRATION_DATE_NAME)) {
if (!ConnectorHelper.isRequired(getObjectClassInfo(), attr)) {
i.remove();
}
}
}
uid = getConnectorFacade().create(getObjectClass(), attrs,
getOperationOptionsByOp(CreateApiOp.class));
// get username
String name = (String) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + USERNAME_PROP,
TEST_NAME);
Set updateAttrs = new HashSet();
updateAttrs.add(AttributeBuilder.buildPasswordExpired(true));
Uid newUid = getConnectorFacade().update(getObjectClass(), uid,
updateAttrs, null);
if (!uid.equals(newUid) && newUid != null) {
uid = newUid;
}
// get the right password
GuardedString password = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, getObjectClassInfo().getType(), 0, false);
// and now authenticate
PasswordExpiredException pwe = authenticateExpectingPasswordExpired(name, password);
assertNotNull("Authenticate should throw PasswordExpiredException.",
pwe);
final String MSG = "PasswordExpiredException contains wrong Uid, expected: %s, returned: %s";
assertEquals(String.format(MSG, uid, pwe.getUid()), uid, pwe.getUid());
} finally {
// delete the object
ConnectorHelper.deleteObject(getConnectorFacade(), getSupportedObjectClass(), uid,
false, getOperationOptionsByOp(DeleteApiOp.class));
}
} else {
LOG.info("Skipping testOpPasswordExpired test.");
}
}
/**
* Tests that connector respects order of PASSWORD and PASSWORD_EXPIRED
* attributes during update. PASSWORD should be performed before
* PASSWORD_EXPIRED.
*/
@Test
public void testPasswordBeforePasswordExpired() {
// run test only in case operation is supported and both PASSWORD and PASSWORD_EXPIRED are supported
if (ConnectorHelper.operationsSupported(getConnectorFacade(), getObjectClass(), getAPIOperations())
&& isOperationalAttributeUpdateable(OperationalAttributes.PASSWORD_NAME)
&& isOperationalAttributeUpdateable(OperationalAttributes.PASSWORD_EXPIRED_NAME)) {
Uid uid = null;
try {
// create an user
Set attrs = ConnectorHelper.getCreateableAttributes(getDataProvider(),
getObjectClassInfo(), getTestName(), 0, true, false);
// Remove enabled and password_expired, connector must create valid account then
for (Iterator i = attrs.iterator(); i.hasNext();) {
Attribute attr = i.next();
if (attr.is(OperationalAttributes.ENABLE_NAME)
|| attr.is(OperationalAttributes.ENABLE_DATE_NAME)
|| attr.is(OperationalAttributes.PASSWORD_EXPIRATION_DATE_NAME)) {
if (!ConnectorHelper.isRequired(getObjectClassInfo(), attr)) {
i.remove();
}
}
}
uid = getConnectorFacade().create(getObjectClass(), attrs,
getOperationOptionsByOp(CreateApiOp.class));
// get username
String name = (String) getDataProvider().getTestSuiteAttribute(getObjectClass().getObjectClassValue() + "." + USERNAME_PROP,
TEST_NAME);
// get new password
GuardedString newpassword = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, UpdateApiOpTests.MODIFIED, getObjectClassInfo().getType(), 0, false);
// change password and expire password
Set replaceAttrs = new HashSet();
replaceAttrs.add(AttributeBuilder.buildPassword(newpassword));
replaceAttrs.add(AttributeBuilder.buildPasswordExpired(true));
if (ConnectorHelper.isAttrSupported(getObjectClassInfo(), OperationalAttributes.CURRENT_PASSWORD_NAME)) {
// get old password
GuardedString password = (GuardedString) ConnectorHelper.get(getDataProvider(), getTestName(), GuardedString.class, OperationalAttributes.PASSWORD_NAME, getObjectClassInfo().getType(), 0, false);
// CURRENT_PASSWORD must be set to old password
replaceAttrs.add(AttributeBuilder.buildCurrentPassword(password));
}
// update to new password and expire password
uid = getConnectorFacade().update(getObjectClass(),
uid, replaceAttrs, getOperationOptionsByOp(UpdateApiOp.class));
PasswordExpiredException pwe = authenticateExpectingPasswordExpired(name, newpassword);
assertNotNull("Authenticate should throw PasswordExpiredException.", pwe);
} finally {
// delete the object
ConnectorHelper.deleteObject(getConnectorFacade(), getSupportedObjectClass(), uid,
false, getOperationOptionsByOp(DeleteApiOp.class));
}
}
else {
LOG.info("Skipping test ''testPasswordBeforePasswordExpired'' for object class {0}", getObjectClass());
}
}
/**
* Returns true if operational attribute is supported and updateable.
*/
private boolean isOperationalAttributeUpdateable(String name) {
ObjectClassInfo oinfo = getObjectClassInfo();
for (AttributeInfo ainfo : oinfo.getAttributeInfo()) {
if (ainfo.is(name)) {
return ainfo.isUpdateable();
}
}
return false;
}
/**
* {@inheritDoc}
*/
@Override
public String getTestName() {
return TEST_NAME;
}
private long getLongTestParam(String name, long defaultValue) {
long longValue = defaultValue;
try {
Object valueObject = getDataProvider().getTestSuiteAttribute(name,
TEST_NAME);
if(valueObject != null) {
longValue = Long.parseLong(valueObject.toString());
}
} catch (ObjectNotFoundException ex) {
}
return longValue;
}
private void sleepIngoringInterruption(long sleepTime) {
try {
Thread.sleep(sleepTime);
} catch (InterruptedException e) {
}
}
private boolean authenticateExpectingRuntimeException(String name, GuardedString password) {
boolean authenticateFailed = false;
for(int i=0;i