rubinius-net-ldap 0.11
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/.rubocop.yml +5 -0
- data/.rubocop_todo.yml +462 -0
- data/.travis.yml +19 -0
- data/CONTRIBUTING.md +54 -0
- data/Contributors.rdoc +24 -0
- data/Gemfile +2 -0
- data/Hacking.rdoc +63 -0
- data/History.rdoc +260 -0
- data/License.rdoc +29 -0
- data/README.rdoc +65 -0
- data/Rakefile +17 -0
- data/lib/net-ldap.rb +2 -0
- data/lib/net/ber.rb +320 -0
- data/lib/net/ber/ber_parser.rb +182 -0
- data/lib/net/ber/core_ext.rb +55 -0
- data/lib/net/ber/core_ext/array.rb +96 -0
- data/lib/net/ber/core_ext/false_class.rb +10 -0
- data/lib/net/ber/core_ext/integer.rb +74 -0
- data/lib/net/ber/core_ext/string.rb +66 -0
- data/lib/net/ber/core_ext/true_class.rb +11 -0
- data/lib/net/ldap.rb +1229 -0
- data/lib/net/ldap/connection.rb +702 -0
- data/lib/net/ldap/dataset.rb +168 -0
- data/lib/net/ldap/dn.rb +225 -0
- data/lib/net/ldap/entry.rb +193 -0
- data/lib/net/ldap/error.rb +38 -0
- data/lib/net/ldap/filter.rb +778 -0
- data/lib/net/ldap/instrumentation.rb +23 -0
- data/lib/net/ldap/password.rb +38 -0
- data/lib/net/ldap/pdu.rb +297 -0
- data/lib/net/ldap/version.rb +5 -0
- data/lib/net/snmp.rb +264 -0
- data/rubinius-net-ldap.gemspec +37 -0
- data/script/install-openldap +112 -0
- data/script/package +7 -0
- data/script/release +16 -0
- data/test/ber/core_ext/test_array.rb +22 -0
- data/test/ber/core_ext/test_string.rb +25 -0
- data/test/ber/test_ber.rb +99 -0
- data/test/fixtures/cacert.pem +20 -0
- data/test/fixtures/openldap/memberof.ldif +33 -0
- data/test/fixtures/openldap/retcode.ldif +76 -0
- data/test/fixtures/openldap/slapd.conf.ldif +67 -0
- data/test/fixtures/seed.ldif +374 -0
- data/test/integration/test_add.rb +28 -0
- data/test/integration/test_ber.rb +30 -0
- data/test/integration/test_bind.rb +34 -0
- data/test/integration/test_delete.rb +31 -0
- data/test/integration/test_open.rb +88 -0
- data/test/integration/test_return_codes.rb +38 -0
- data/test/integration/test_search.rb +77 -0
- data/test/support/vm/openldap/.gitignore +1 -0
- data/test/support/vm/openldap/README.md +32 -0
- data/test/support/vm/openldap/Vagrantfile +33 -0
- data/test/test_dn.rb +44 -0
- data/test/test_entry.rb +65 -0
- data/test/test_filter.rb +223 -0
- data/test/test_filter_parser.rb +20 -0
- data/test/test_helper.rb +66 -0
- data/test/test_ldap.rb +60 -0
- data/test/test_ldap_connection.rb +404 -0
- data/test/test_ldif.rb +104 -0
- data/test/test_password.rb +10 -0
- data/test/test_rename.rb +77 -0
- data/test/test_search.rb +39 -0
- data/test/test_snmp.rb +119 -0
- data/test/test_ssl_ber.rb +40 -0
- data/test/testdata.ldif +101 -0
- data/testserver/ldapserver.rb +210 -0
- data/testserver/testdata.ldif +101 -0
- metadata +204 -0
data/test/test_ldif.rb
ADDED
@@ -0,0 +1,104 @@
|
|
1
|
+
# $Id: testldif.rb 61 2006-04-18 20:55:55Z blackhedd $
|
2
|
+
|
3
|
+
require File.expand_path('../test_helper', __FILE__)
|
4
|
+
|
5
|
+
require 'digest/sha1'
|
6
|
+
require 'base64'
|
7
|
+
|
8
|
+
class TestLdif < Test::Unit::TestCase
|
9
|
+
TestLdifFilename = "#{File.dirname(__FILE__)}/testdata.ldif"
|
10
|
+
|
11
|
+
def test_empty_ldif
|
12
|
+
ds = Net::LDAP::Dataset.read_ldif(StringIO.new)
|
13
|
+
assert_equal(true, ds.empty?)
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_ldif_with_version
|
17
|
+
io = StringIO.new("version: 1")
|
18
|
+
ds = Net::LDAP::Dataset.read_ldif(io)
|
19
|
+
assert_equal "1", ds.version
|
20
|
+
end
|
21
|
+
|
22
|
+
def test_ldif_with_comments
|
23
|
+
str = ["# Hello from LDIF-land", "# This is an unterminated comment"]
|
24
|
+
io = StringIO.new(str[0] + "\r\n" + str[1])
|
25
|
+
ds = Net::LDAP::Dataset::read_ldif(io)
|
26
|
+
assert_equal(str, ds.comments)
|
27
|
+
end
|
28
|
+
|
29
|
+
def test_ldif_with_password
|
30
|
+
psw = "goldbricks"
|
31
|
+
hashed_psw = "{SHA}" + Base64::encode64(Digest::SHA1.digest(psw)).chomp
|
32
|
+
|
33
|
+
ldif_encoded = Base64::encode64(hashed_psw).chomp
|
34
|
+
ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: Goldbrick\r\nuserPassword:: #{ldif_encoded}\r\n\r\n"))
|
35
|
+
recovered_psw = ds["Goldbrick"][:userpassword].shift
|
36
|
+
assert_equal(hashed_psw, recovered_psw)
|
37
|
+
end
|
38
|
+
|
39
|
+
def test_ldif_with_continuation_lines
|
40
|
+
ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
|
41
|
+
assert_equal(true, ds.has_key?("abcdefghijklmn"))
|
42
|
+
end
|
43
|
+
|
44
|
+
def test_ldif_with_continuation_lines_and_extra_whitespace
|
45
|
+
ds1 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
|
46
|
+
assert_equal(true, ds1.has_key?("abcdefg hijklmn"))
|
47
|
+
ds2 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hij klmn\r\n\r\n"))
|
48
|
+
assert_equal(true, ds2.has_key?("abcdefghij klmn"))
|
49
|
+
end
|
50
|
+
|
51
|
+
def test_ldif_tab_is_not_continuation
|
52
|
+
ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: key\r\n\tnotcontinued\r\n\r\n"))
|
53
|
+
assert_equal(true, ds.has_key?("key"))
|
54
|
+
end
|
55
|
+
|
56
|
+
def test_ldif_with_base64_dn
|
57
|
+
str = "dn:: Q049QmFzZTY0IGRuIHRlc3QsT1U9VGVzdCxPVT1Vbml0cyxEQz1leGFtcGxlLERDPWNvbQ==\r\n\r\n"
|
58
|
+
ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
|
59
|
+
assert_equal(true, ds.has_key?("CN=Base64 dn test,OU=Test,OU=Units,DC=example,DC=com"))
|
60
|
+
end
|
61
|
+
|
62
|
+
def test_ldif_with_base64_dn_and_continuation_lines
|
63
|
+
str = "dn:: Q049QmFzZTY0IGRuIHRlc3Qgd2l0aCBjb250aW51YXRpb24gbGluZSxPVT1UZXN0LE9VPVVua\r\n XRzLERDPWV4YW1wbGUsREM9Y29t\r\n\r\n"
|
64
|
+
ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
|
65
|
+
assert_equal(true, ds.has_key?("CN=Base64 dn test with continuation line,OU=Test,OU=Units,DC=example,DC=com"))
|
66
|
+
end
|
67
|
+
|
68
|
+
# TODO, INADEQUATE. We need some more tests
|
69
|
+
# to verify the content.
|
70
|
+
def test_ldif
|
71
|
+
File.open(TestLdifFilename, "r") {|f|
|
72
|
+
ds = Net::LDAP::Dataset::read_ldif(f)
|
73
|
+
assert_equal(13, ds.length)
|
74
|
+
}
|
75
|
+
end
|
76
|
+
|
77
|
+
# Must test folded lines and base64-encoded lines as well as normal ones.
|
78
|
+
def test_to_ldif
|
79
|
+
data = File.open(TestLdifFilename, "rb") { |f| f.read }
|
80
|
+
io = StringIO.new(data)
|
81
|
+
|
82
|
+
# added .lines to turn to array because 1.9 doesn't have
|
83
|
+
# .grep on basic strings
|
84
|
+
entries = data.lines.grep(/^dn:\s*/) { $'.chomp }
|
85
|
+
dn_entries = entries.dup
|
86
|
+
|
87
|
+
ds = Net::LDAP::Dataset::read_ldif(io) { |type, value|
|
88
|
+
case type
|
89
|
+
when :dn
|
90
|
+
assert_equal(dn_entries.first, value)
|
91
|
+
dn_entries.shift
|
92
|
+
end
|
93
|
+
}
|
94
|
+
assert_equal(entries.size, ds.size)
|
95
|
+
assert_equal(entries.sort, ds.to_ldif.grep(/^dn:\s*/) { $'.chomp })
|
96
|
+
end
|
97
|
+
|
98
|
+
def test_to_ldif_with_version
|
99
|
+
ds = Net::LDAP::Dataset.new
|
100
|
+
ds.version = "1"
|
101
|
+
|
102
|
+
assert_equal "version: 1", ds.to_ldif_string.chomp
|
103
|
+
end
|
104
|
+
end
|
@@ -0,0 +1,10 @@
|
|
1
|
+
# $Id: testpsw.rb 72 2006-04-24 21:58:14Z blackhedd $
|
2
|
+
|
3
|
+
require File.expand_path('../test_helper', __FILE__)
|
4
|
+
|
5
|
+
class TestPassword < Test::Unit::TestCase
|
6
|
+
def test_psw
|
7
|
+
assert_equal("{MD5}xq8jwrcfibi0sZdZYNkSng==", Net::LDAP::Password.generate( :md5, "cashflow" ))
|
8
|
+
assert_equal("{SHA}YE4eGkN4BvwNN1f5R7CZz0kFn14=", Net::LDAP::Password.generate( :sha, "cashflow" ))
|
9
|
+
end
|
10
|
+
end
|
data/test/test_rename.rb
ADDED
@@ -0,0 +1,77 @@
|
|
1
|
+
require File.expand_path('../test_helper', __FILE__)
|
2
|
+
|
3
|
+
# Commented out since it assumes you have a live LDAP server somewhere. This
|
4
|
+
# will be migrated to the integration specs, as soon as they are ready.
|
5
|
+
=begin
|
6
|
+
class TestRename < Test::Unit::TestCase
|
7
|
+
HOST= '10.10.10.71'
|
8
|
+
PORT = 389
|
9
|
+
BASE = "o=test"
|
10
|
+
AUTH = { :method => :simple, :username => "cn=testadmin,#{BASE}", :password => 'password' }
|
11
|
+
BASIC_USER = "cn=jsmith,ou=sales,#{BASE}"
|
12
|
+
RENAMED_USER = "cn=jbrown,ou=sales,#{BASE}"
|
13
|
+
MOVED_USER = "cn=jsmith,ou=marketing,#{BASE}"
|
14
|
+
RENAMED_MOVED_USER = "cn=jjones,ou=marketing,#{BASE}"
|
15
|
+
|
16
|
+
def setup
|
17
|
+
# create the entries we're going to manipulate
|
18
|
+
Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
|
19
|
+
if ldap.add(:dn => "ou=sales,#{BASE}", :attributes => { :ou => "sales", :objectclass => "organizationalUnit" })
|
20
|
+
puts "Add failed: #{ldap.get_operation_result.message} - code: #{ldap.get_operation_result.code}"
|
21
|
+
end
|
22
|
+
ldap.add(:dn => "ou=marketing,#{BASE}", :attributes => { :ou => "marketing", :objectclass => "organizationalUnit" })
|
23
|
+
ldap.add(:dn => BASIC_USER, :attributes => { :cn => "jsmith", :objectclass => "inetOrgPerson", :sn => "Smith" })
|
24
|
+
end
|
25
|
+
end
|
26
|
+
|
27
|
+
def test_rename_entry
|
28
|
+
dn = nil
|
29
|
+
Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
|
30
|
+
ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jbrown")
|
31
|
+
|
32
|
+
ldap.search(:base => RENAMED_USER) do |entry|
|
33
|
+
dn = entry.dn
|
34
|
+
end
|
35
|
+
end
|
36
|
+
assert_equal(RENAMED_USER, dn)
|
37
|
+
end
|
38
|
+
|
39
|
+
def test_move_entry
|
40
|
+
dn = nil
|
41
|
+
Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
|
42
|
+
ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jsmith", :new_superior => "ou=marketing,#{BASE}")
|
43
|
+
|
44
|
+
ldap.search(:base => MOVED_USER) do |entry|
|
45
|
+
dn = entry.dn
|
46
|
+
end
|
47
|
+
end
|
48
|
+
assert_equal(MOVED_USER, dn)
|
49
|
+
end
|
50
|
+
|
51
|
+
def test_move_and_rename_entry
|
52
|
+
dn = nil
|
53
|
+
Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
|
54
|
+
ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jjones", :new_superior => "ou=marketing,#{BASE}")
|
55
|
+
|
56
|
+
ldap.search(:base => RENAMED_MOVED_USER) do |entry|
|
57
|
+
dn = entry.dn
|
58
|
+
end
|
59
|
+
end
|
60
|
+
assert_equal(RENAMED_MOVED_USER, dn)
|
61
|
+
end
|
62
|
+
|
63
|
+
def teardown
|
64
|
+
# delete the entries
|
65
|
+
# note: this doesn't always completely clear up on eDirectory as objects get locked while
|
66
|
+
# the rename/move is being completed on the server and this prevents the delete from happening
|
67
|
+
Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
|
68
|
+
ldap.delete(:dn => BASIC_USER)
|
69
|
+
ldap.delete(:dn => RENAMED_USER)
|
70
|
+
ldap.delete(:dn => MOVED_USER)
|
71
|
+
ldap.delete(:dn => RENAMED_MOVED_USER)
|
72
|
+
ldap.delete(:dn => "ou=sales,#{BASE}")
|
73
|
+
ldap.delete(:dn => "ou=marketing,#{BASE}")
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
77
|
+
=end
|
data/test/test_search.rb
ADDED
@@ -0,0 +1,39 @@
|
|
1
|
+
# -*- ruby encoding: utf-8 -*-
|
2
|
+
require File.expand_path('../test_helper', __FILE__)
|
3
|
+
|
4
|
+
class TestSearch < Test::Unit::TestCase
|
5
|
+
class FakeConnection
|
6
|
+
def search(args)
|
7
|
+
OpenStruct.new(:result_code => Net::LDAP::ResultCodeOperationsError, :message => "error", :success? => false)
|
8
|
+
end
|
9
|
+
end
|
10
|
+
|
11
|
+
def setup
|
12
|
+
@service = MockInstrumentationService.new
|
13
|
+
@connection = Net::LDAP.new :instrumentation_service => @service
|
14
|
+
@connection.instance_variable_set(:@open_connection, FakeConnection.new)
|
15
|
+
end
|
16
|
+
|
17
|
+
def test_true_result
|
18
|
+
assert_nil @connection.search(:return_result => true)
|
19
|
+
end
|
20
|
+
|
21
|
+
def test_false_result
|
22
|
+
assert !@connection.search(:return_result => false)
|
23
|
+
end
|
24
|
+
|
25
|
+
def test_no_result
|
26
|
+
assert_nil @connection.search
|
27
|
+
end
|
28
|
+
|
29
|
+
def test_instrumentation_publishes_event
|
30
|
+
events = @service.subscribe "search.net_ldap"
|
31
|
+
|
32
|
+
@connection.search(:filter => "test")
|
33
|
+
|
34
|
+
payload, result = events.pop
|
35
|
+
assert payload.has_key?(:result)
|
36
|
+
assert payload.has_key?(:filter)
|
37
|
+
assert_equal "test", payload[:filter]
|
38
|
+
end
|
39
|
+
end
|
data/test/test_snmp.rb
ADDED
@@ -0,0 +1,119 @@
|
|
1
|
+
# $Id: testsnmp.rb 231 2006-12-21 15:09:29Z blackhedd $
|
2
|
+
|
3
|
+
require File.expand_path('../test_helper', __FILE__)
|
4
|
+
require 'net/snmp'
|
5
|
+
|
6
|
+
class TestSnmp < Test::Unit::TestCase
|
7
|
+
def self.raw_string(s)
|
8
|
+
# Conveniently, String#b only needs to be called when it exists
|
9
|
+
s.respond_to?(:b) ? s.b : s
|
10
|
+
end
|
11
|
+
|
12
|
+
SnmpGetRequest = raw_string("0'\002\001\000\004\006public\240\032\002\002?*\002\001\000\002\001\0000\0160\f\006\b+\006\001\002\001\001\001\000\005\000")
|
13
|
+
SnmpGetResponse = raw_string("0+\002\001\000\004\006public\242\036\002\002'\017\002\001\000\002\001\0000\0220\020\006\b+\006\001\002\001\001\001\000\004\004test")
|
14
|
+
|
15
|
+
SnmpGetRequestXXX = raw_string("0'\002\001\000\004\006xxxxxx\240\032\002\002?*\002\001\000\002\001\0000\0160\f\006\b+\006\001\002\001\001\001\000\005\000")
|
16
|
+
|
17
|
+
def test_invalid_packet
|
18
|
+
data = "xxxx"
|
19
|
+
assert_raise(Net::BER::BerError) {
|
20
|
+
ary = data.read_ber(Net::SNMP::AsnSyntax)
|
21
|
+
}
|
22
|
+
end
|
23
|
+
|
24
|
+
# The method String#read_ber! added by Net::BER consumes a well-formed BER
|
25
|
+
# object from the head of a string. If it doesn't find a complete,
|
26
|
+
# well-formed BER object, it returns nil and leaves the string unchanged.
|
27
|
+
# If it finds an object, it returns the object and removes it from the
|
28
|
+
# head of the string. This is good for handling partially-received data
|
29
|
+
# streams, such as from network connections.
|
30
|
+
def _test_consume_string
|
31
|
+
data = "xxx"
|
32
|
+
assert_equal(nil, data.read_ber!)
|
33
|
+
assert_equal("xxx", data)
|
34
|
+
|
35
|
+
data = SnmpGetRequest + "!!!"
|
36
|
+
ary = data.read_ber!(Net::SNMP::AsnSyntax)
|
37
|
+
assert_equal("!!!", data)
|
38
|
+
assert ary.is_a?(Array)
|
39
|
+
assert ary.is_a?(Net::BER::BerIdentifiedArray)
|
40
|
+
end
|
41
|
+
|
42
|
+
def test_weird_packet
|
43
|
+
assert_raise(Net::SnmpPdu::Error) {
|
44
|
+
Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
|
45
|
+
}
|
46
|
+
end
|
47
|
+
|
48
|
+
def test_get_request
|
49
|
+
data = SnmpGetRequest.dup
|
50
|
+
pkt = data.read_ber(Net::SNMP::AsnSyntax)
|
51
|
+
assert pkt.is_a?(Net::BER::BerIdentifiedArray)
|
52
|
+
assert_equal(48, pkt.ber_identifier) # Constructed [0], signifies GetRequest
|
53
|
+
|
54
|
+
pdu = Net::SnmpPdu.parse(pkt)
|
55
|
+
assert_equal(:get_request, pdu.pdu_type)
|
56
|
+
assert_equal(16170, pdu.request_id) # whatever was in the test data. 16170 is not magic.
|
57
|
+
assert_equal([[[1, 3, 6, 1, 2, 1, 1, 1, 0], nil]], pdu.variables)
|
58
|
+
|
59
|
+
assert_equal(pdu.to_ber_string, SnmpGetRequest)
|
60
|
+
end
|
61
|
+
|
62
|
+
def test_empty_pdu
|
63
|
+
pdu = Net::SnmpPdu.new
|
64
|
+
assert_raise(Net::SnmpPdu::Error) { pdu.to_ber_string }
|
65
|
+
end
|
66
|
+
|
67
|
+
def test_malformations
|
68
|
+
pdu = Net::SnmpPdu.new
|
69
|
+
pdu.version = 0
|
70
|
+
pdu.version = 2
|
71
|
+
assert_raise(Net::SnmpPdu::Error) { pdu.version = 100 }
|
72
|
+
|
73
|
+
pdu.pdu_type = :get_request
|
74
|
+
pdu.pdu_type = :get_next_request
|
75
|
+
pdu.pdu_type = :get_response
|
76
|
+
pdu.pdu_type = :set_request
|
77
|
+
pdu.pdu_type = :trap
|
78
|
+
assert_raise(Net::SnmpPdu::Error) { pdu.pdu_type = :something_else }
|
79
|
+
end
|
80
|
+
|
81
|
+
def test_make_response
|
82
|
+
pdu = Net::SnmpPdu.new
|
83
|
+
pdu.version = 0
|
84
|
+
pdu.community = "public"
|
85
|
+
pdu.pdu_type = :get_response
|
86
|
+
pdu.request_id = 9999
|
87
|
+
pdu.error_status = 0
|
88
|
+
pdu.error_index = 0
|
89
|
+
pdu.add_variable_binding [1, 3, 6, 1, 2, 1, 1, 1, 0], "test"
|
90
|
+
|
91
|
+
assert_equal(SnmpGetResponse, pdu.to_ber_string)
|
92
|
+
end
|
93
|
+
|
94
|
+
def test_make_bad_response
|
95
|
+
pdu = Net::SnmpPdu.new
|
96
|
+
assert_raise(Net::SnmpPdu::Error) {pdu.to_ber_string}
|
97
|
+
pdu.pdu_type = :get_response
|
98
|
+
pdu.request_id = 999
|
99
|
+
pdu.to_ber_string
|
100
|
+
# Not specifying variables doesn't create an error. (Maybe it should?)
|
101
|
+
end
|
102
|
+
|
103
|
+
def test_snmp_integers
|
104
|
+
c32 = Net::SNMP::Counter32.new(100)
|
105
|
+
assert_equal("A\001d", c32.to_ber)
|
106
|
+
g32 = Net::SNMP::Gauge32.new(100)
|
107
|
+
assert_equal("B\001d", g32.to_ber)
|
108
|
+
t32 = Net::SNMP::TimeTicks32.new(100)
|
109
|
+
assert_equal("C\001d", t32.to_ber)
|
110
|
+
end
|
111
|
+
|
112
|
+
def test_community
|
113
|
+
data = SnmpGetRequestXXX.dup
|
114
|
+
ary = data.read_ber(Net::SNMP::AsnSyntax)
|
115
|
+
pdu = Net::SnmpPdu.parse(ary)
|
116
|
+
assert_equal("xxxxxx", pdu.community)
|
117
|
+
end
|
118
|
+
|
119
|
+
end
|
@@ -0,0 +1,40 @@
|
|
1
|
+
require File.expand_path('../test_helper', __FILE__)
|
2
|
+
require 'timeout'
|
3
|
+
|
4
|
+
class TestSSLBER < Test::Unit::TestCase
|
5
|
+
# Transmits str to @to and reads it back from @from.
|
6
|
+
#
|
7
|
+
def transmit(str)
|
8
|
+
Timeout::timeout(1) do
|
9
|
+
@to.write(str)
|
10
|
+
@to.close
|
11
|
+
|
12
|
+
@from.read
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
def setup
|
17
|
+
@from, @to = IO.pipe
|
18
|
+
|
19
|
+
# The production code operates on sockets, which do need #connect called
|
20
|
+
# on them to work. Pipes are more robust for this test, so we'll skip
|
21
|
+
# the #connect call since it fails.
|
22
|
+
#
|
23
|
+
# TODO: Replace test with real socket
|
24
|
+
# https://github.com/ruby-ldap/ruby-net-ldap/pull/121#discussion_r18746386
|
25
|
+
flexmock(OpenSSL::SSL::SSLSocket).
|
26
|
+
new_instances.should_receive(:connect => nil)
|
27
|
+
|
28
|
+
@to = Net::LDAP::Connection.wrap_with_ssl(@to)
|
29
|
+
@from = Net::LDAP::Connection.wrap_with_ssl(@from)
|
30
|
+
end
|
31
|
+
|
32
|
+
def test_transmit_strings
|
33
|
+
assert_equal "foo", transmit("foo")
|
34
|
+
end
|
35
|
+
|
36
|
+
def test_transmit_ber_encoded_numbers
|
37
|
+
@to.write 1234.to_ber
|
38
|
+
assert_equal 1234, @from.read_ber
|
39
|
+
end
|
40
|
+
end
|
data/test/testdata.ldif
ADDED
@@ -0,0 +1,101 @@
|
|
1
|
+
# $Id: testdata.ldif 50 2006-04-17 17:57:33Z blackhedd $
|
2
|
+
#
|
3
|
+
# This is test-data for an LDAP server in LDIF format.
|
4
|
+
#
|
5
|
+
dn: dc=bayshorenetworks,dc=com
|
6
|
+
objectClass: dcObject
|
7
|
+
objectClass: organization
|
8
|
+
o: Bayshore Networks LLC
|
9
|
+
dc: bayshorenetworks
|
10
|
+
|
11
|
+
dn: cn=Manager,dc=bayshorenetworks,dc=com
|
12
|
+
objectClass: organizationalrole
|
13
|
+
cn: Manager
|
14
|
+
|
15
|
+
dn: ou=people,dc=bayshorenetworks,dc=com
|
16
|
+
objectClass: organizationalunit
|
17
|
+
ou: people
|
18
|
+
|
19
|
+
dn: ou=privileges,dc=bayshorenetworks,dc=com
|
20
|
+
objectClass: organizationalunit
|
21
|
+
ou: privileges
|
22
|
+
|
23
|
+
dn: ou=roles,dc=bayshorenetworks,dc=com
|
24
|
+
objectClass: organizationalunit
|
25
|
+
ou: roles
|
26
|
+
|
27
|
+
dn: ou=office,dc=bayshorenetworks,dc=com
|
28
|
+
objectClass: organizationalunit
|
29
|
+
ou: office
|
30
|
+
|
31
|
+
dn: mail=nogoodnik@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
|
32
|
+
cn: Bob Fosse
|
33
|
+
mail: nogoodnik@steamheat.net
|
34
|
+
sn: Fosse
|
35
|
+
ou: people
|
36
|
+
objectClass: top
|
37
|
+
objectClass: inetorgperson
|
38
|
+
objectClass: authorizedperson
|
39
|
+
hasAccessRole: uniqueIdentifier=engineer,ou=roles
|
40
|
+
hasAccessRole: uniqueIdentifier=ldapadmin,ou=roles
|
41
|
+
hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
|
42
|
+
hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
|
43
|
+
hasAccessRole: uniqueIdentifier=ogilvy_eagle_user,ou=roles
|
44
|
+
hasAccessRole: uniqueIdentifier=greenplug_user,ou=roles
|
45
|
+
hasAccessRole: uniqueIdentifier=brandplace_logging_user,ou=roles
|
46
|
+
hasAccessRole: uniqueIdentifier=brandplace_report_user,ou=roles
|
47
|
+
hasAccessRole: uniqueIdentifier=workorder_user,ou=roles
|
48
|
+
hasAccessRole: uniqueIdentifier=bayshore_eagle_user,ou=roles
|
49
|
+
hasAccessRole: uniqueIdentifier=bayshore_eagle_superuser,ou=roles
|
50
|
+
hasAccessRole: uniqueIdentifier=kledaras_user,ou=roles
|
51
|
+
|
52
|
+
dn: mail=elephant@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
|
53
|
+
cn: Gwen Verdon
|
54
|
+
mail: elephant@steamheat.net
|
55
|
+
sn: Verdon
|
56
|
+
ou: people
|
57
|
+
objectClass: top
|
58
|
+
objectClass: inetorgperson
|
59
|
+
objectClass: authorizedperson
|
60
|
+
hasAccessRole: uniqueIdentifier=brandplace_report_user,ou=roles
|
61
|
+
hasAccessRole: uniqueIdentifier=engineer,ou=roles
|
62
|
+
hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
|
63
|
+
hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
|
64
|
+
hasAccessRole: uniqueIdentifier=ldapadmin,ou=roles
|
65
|
+
|
66
|
+
dn: uniqueIdentifier=engineering,ou=privileges,dc=bayshorenetworks,dc=com
|
67
|
+
uniqueIdentifier: engineering
|
68
|
+
ou: privileges
|
69
|
+
objectClass: accessPrivilege
|
70
|
+
|
71
|
+
dn: uniqueIdentifier=engineer,ou=roles,dc=bayshorenetworks,dc=com
|
72
|
+
uniqueIdentifier: engineer
|
73
|
+
ou: roles
|
74
|
+
objectClass: accessRole
|
75
|
+
hasAccessPrivilege: uniqueIdentifier=engineering,ou=privileges
|
76
|
+
|
77
|
+
dn: uniqueIdentifier=ldapadmin,ou=roles,dc=bayshorenetworks,dc=com
|
78
|
+
uniqueIdentifier: ldapadmin
|
79
|
+
ou: roles
|
80
|
+
objectClass: accessRole
|
81
|
+
|
82
|
+
dn: uniqueIdentifier=ldapsuperadmin,ou=roles,dc=bayshorenetworks,dc=com
|
83
|
+
uniqueIdentifier: ldapsuperadmin
|
84
|
+
ou: roles
|
85
|
+
objectClass: accessRole
|
86
|
+
|
87
|
+
dn: mail=catperson@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
|
88
|
+
cn: Sid Sorokin
|
89
|
+
mail: catperson@steamheat.net
|
90
|
+
sn: Sorokin
|
91
|
+
ou: people
|
92
|
+
objectClass: top
|
93
|
+
objectClass: inetorgperson
|
94
|
+
objectClass: authorizedperson
|
95
|
+
hasAccessRole: uniqueIdentifier=engineer,ou=roles
|
96
|
+
hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
|
97
|
+
hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
|
98
|
+
hasAccessRole: uniqueIdentifier=ogilvy_eagle_user,ou=roles
|
99
|
+
hasAccessRole: uniqueIdentifier=greenplug_user,ou=roles
|
100
|
+
hasAccessRole: uniqueIdentifier=workorder_user,ou=roles
|
101
|
+
|