Skip to content

Commit b394aac

Browse files
authored
Merge pull request #36 from datadrivers/support-ldap-server
Support LDAP server
2 parents 7937bad + 3d98f2c commit b394aac

File tree

3 files changed

+219
-2
lines changed

3 files changed

+219
-2
lines changed

client.go

+7-2
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,22 @@ type Client interface {
2222
BlobstoreDelete(string) error
2323
BlobstoreRead(string) (*Blobstore, error)
2424
BlobstoreUpdate(string, Blobstore) error
25-
CertificateList() (*[]Certificate, error)
26-
CertificateGet(*CertificateRequest) (*Certificate, error)
2725
CertificateCreate(*Certificate) error
2826
CertificateDelete(string) error
27+
CertificateGet(*CertificateRequest) (*Certificate, error)
28+
CertificateList() (*[]Certificate, error)
2929
ContentSelectorCreate(ContentSelector) error
3030
ContentSelectorDelete(string) error
3131
ContentSelectorRead(string) (*ContentSelector, error)
3232
ContentSelectorUpdate(string, ContentSelector) error
3333
ContentType() string
3434
ContentTypeJSON()
3535
ContentTypeTextPlain()
36+
LDAPList() ([]LDAP, error)
37+
LDAPCreate(LDAP) error
38+
LDAPDelete(string) error
39+
LDAPRead(string) (*LDAP, error)
40+
LDAPUpdate(string, LDAP) error
3641
PrivilegeCreate(Privilege) error
3742
PrivilegeDelete(string) error
3843
PrivilegeRead(string) (*Privilege, error)

ldap.go

+131
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
package client
2+
3+
import (
4+
"encoding/json"
5+
"fmt"
6+
"net/http"
7+
)
8+
9+
const (
10+
ldapAPIEndpoint = "service/rest/beta/security/ldap"
11+
)
12+
13+
// LDAP data structure
14+
type LDAP struct {
15+
AuthPassword string `json:"authPassword"`
16+
AuthRealm string `json:"authRealm,omitempty"`
17+
AuthSchema string `json:"authScheme"`
18+
AuthUserName string `json:"authUsername,omitempty"`
19+
ConnectionRetryDelaySeconds uint `json:"connectionRetryDelaySeconds"`
20+
ConnectionTimeoutSeconds uint `json:"connectionTimeoutSeconds"`
21+
GroupBaseDn string `json:"groupBaseDn,omitempty"`
22+
GroupIDAttribute string `json:"groupIdAttribute,omitempty"`
23+
GroupMemberAttribute string `json:"groupMemberAttribute,omitempty"`
24+
GroupMemberFormat string `json:"groupMemberFormat,omitempty"`
25+
GroupObjectClass string `json:"groupObjectClass,omitempty"`
26+
GroupSubtree bool `json:"groupSubtree,omitempty"`
27+
GroupType string `json:"groupType"`
28+
Host string `json:"host"`
29+
ID string `json:"id"`
30+
LDAPGroupsAsRoles bool `json:"ldapGroupsAsRoles,omitempty"`
31+
MaxIncidentCount uint `json:"maxIncidentsCount"`
32+
Name string `json:"name"`
33+
Port uint `json:"port"`
34+
Protocol string `json:"protocol"`
35+
SearchBase string `json:"searchBase"`
36+
UseBaseCon string `json:"userBaseDn,omitempty"`
37+
UseSubtree bool `json:"userSubtree,omitempty"`
38+
UseTrustStore bool `json:"useTrustStore,omitempty"`
39+
UserEmailAddressAttribute string `json:"userEmailAddressAttribute,omitempty"`
40+
UserIDAttribute string `json:"userIdAttribute,omitempty"`
41+
UserLDAPFilter string `json:"userLdapFilter,omitempty"`
42+
UserMemberOffAttribute string `json:"userMemberOfAttribute,omitempty"`
43+
UserObjectClass string `json:"userObjectClass,omitempty"`
44+
UserPasswordAttribute string `json:"userPasswordAttribute,omitempty"`
45+
UserRealNameAttribute string `json:"userRealNameAttribute,omitempty"`
46+
}
47+
48+
func (c *client) LDAPList() ([]LDAP, error) {
49+
body, resp, err := c.Get(ldapAPIEndpoint, nil)
50+
if err != nil {
51+
return nil, err
52+
}
53+
54+
if resp.StatusCode != http.StatusOK {
55+
return nil, fmt.Errorf("could not get LDAP server: HTTP: %d, %v", resp.StatusCode, string(body))
56+
}
57+
58+
var result []LDAP
59+
if err := json.Unmarshal(body, &result); err != nil {
60+
return nil, fmt.Errorf("could not unmarshal LDAP server: %v", err)
61+
}
62+
63+
return result, nil
64+
}
65+
66+
func (c *client) LDAPCreate(ldap LDAP) error {
67+
ioReader, err := jsonMarshalInterfaceToIOReader(ldap)
68+
if err != nil {
69+
return err
70+
}
71+
72+
body, resp, err := c.Post(ldapAPIEndpoint, ioReader)
73+
if err != nil {
74+
return err
75+
}
76+
77+
if resp.StatusCode != http.StatusCreated {
78+
return fmt.Errorf("could not create LDAP server: HTTP: %d, %v", resp.StatusCode, string(body))
79+
}
80+
81+
return nil
82+
}
83+
84+
func (c *client) LDAPRead(name string) (*LDAP, error) {
85+
body, resp, err := c.Get(fmt.Sprintf("%s/%s", ldapAPIEndpoint, name), nil)
86+
if err != nil {
87+
return nil, err
88+
}
89+
90+
if resp.StatusCode != http.StatusOK {
91+
return nil, fmt.Errorf("could not get LDAP server '%s': HTTP: %d, %v", name, resp.StatusCode, string(body))
92+
}
93+
94+
ldapServer := &LDAP{}
95+
if err := json.Unmarshal(body, ldapServer); err != nil {
96+
return nil, fmt.Errorf("could not unmarshal LDAP server '%s': %v", name, err)
97+
}
98+
99+
return ldapServer, nil
100+
}
101+
102+
func (c *client) LDAPUpdate(name string, ldap LDAP) error {
103+
ioReader, err := jsonMarshalInterfaceToIOReader(ldap)
104+
if err != nil {
105+
return err
106+
}
107+
108+
body, resp, err := c.Put(fmt.Sprintf("%s/%s", ldapAPIEndpoint, name), ioReader)
109+
if err != nil {
110+
return err
111+
}
112+
113+
if resp.StatusCode != http.StatusNoContent {
114+
return fmt.Errorf("could not update LDAP server `%s`: HTTP: %d, :%v", name, resp.StatusCode, string(body))
115+
}
116+
117+
return nil
118+
}
119+
120+
func (c *client) LDAPDelete(name string) error {
121+
body, resp, err := c.Delete(fmt.Sprintf("%s/%s", ldapAPIEndpoint, name))
122+
if err != nil {
123+
return err
124+
}
125+
126+
if resp.StatusCode != http.StatusNoContent {
127+
return fmt.Errorf("could not delete LDAP server '%s': HTTP: %d, %v", name, resp.StatusCode, string(body))
128+
}
129+
130+
return nil
131+
}

ldap_test.go

+81
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
package client
2+
3+
import (
4+
"testing"
5+
6+
"github.com/stretchr/testify/assert"
7+
)
8+
9+
func TestLDAPList(t *testing.T) {
10+
client := getTestClient()
11+
12+
ldapServer, err := client.LDAPList()
13+
assert.Nil(t, err)
14+
assert.NotNil(t, ldapServer)
15+
}
16+
17+
func TestLDAP(t *testing.T) {
18+
client := getTestClient()
19+
20+
// https://hub.docker.com/r/mwaeckerlin/openldap/
21+
ldap := LDAP{
22+
AuthPassword: "1234567890",
23+
AuthSchema: "SIMPLE",
24+
AuthUserName: "admin",
25+
ConnectionTimeoutSeconds: uint(1),
26+
GroupType: "STATIC",
27+
Host: "127.0.0.1",
28+
Name: "ci-test",
29+
Port: 389,
30+
Protocol: "LDAP",
31+
SearchBase: "dc=example,dc=com",
32+
UserEmailAddressAttribute: "mail",
33+
UserIDAttribute: "uid",
34+
UserObjectClass: "inetOrgPerson",
35+
UserRealNameAttribute: "cn",
36+
}
37+
err := client.LDAPCreate(ldap)
38+
assert.Nil(t, err)
39+
40+
if err == nil {
41+
createdLDAP, err := client.LDAPRead(ldap.Name)
42+
assert.Nil(t, err)
43+
assert.NotNil(t, createdLDAP)
44+
assert.NotNil(t, createdLDAP.ID)
45+
assert.Equal(t, ldap.AuthSchema, createdLDAP.AuthSchema)
46+
assert.Equal(t, ldap.AuthUserName, createdLDAP.AuthUserName)
47+
assert.Equal(t, ldap.Host, createdLDAP.Host)
48+
assert.Equal(t, ldap.Port, createdLDAP.Port)
49+
assert.Equal(t, ldap.ConnectionTimeoutSeconds, createdLDAP.ConnectionTimeoutSeconds)
50+
// GroupType is not returned :-/
51+
// assert.Equal(t, ldap.GroupType, createdLDAP.GroupType)
52+
assert.Equal(t, ldap.Name, createdLDAP.Name)
53+
assert.Equal(t, ldap.Protocol, createdLDAP.Protocol)
54+
assert.Equal(t, ldap.SearchBase, createdLDAP.SearchBase)
55+
assert.Equal(t, ldap.UserEmailAddressAttribute, createdLDAP.UserEmailAddressAttribute)
56+
assert.Equal(t, ldap.UserIDAttribute, createdLDAP.UserIDAttribute)
57+
assert.Equal(t, ldap.UserObjectClass, createdLDAP.UserObjectClass)
58+
assert.Equal(t, ldap.UserRealNameAttribute, createdLDAP.UserRealNameAttribute)
59+
60+
createdLDAP.Host = "127.0.0.2"
61+
// As GroupType is not returned while read, it needs to be set again
62+
createdLDAP.GroupType = "DYNAMIC"
63+
// As AuthPassword is not returned while read, it needs to be set again
64+
createdLDAP.AuthPassword = ldap.AuthPassword
65+
err = client.LDAPUpdate(ldap.Name, *createdLDAP)
66+
assert.Nil(t, err)
67+
68+
updatedLDAP, err := client.LDAPRead(createdLDAP.Name)
69+
assert.Nil(t, err)
70+
assert.NotNil(t, updatedLDAP)
71+
assert.Equal(t, createdLDAP.Host, updatedLDAP.Host)
72+
73+
err = client.LDAPDelete(ldap.Name)
74+
assert.Nil(t, err)
75+
76+
deletedLDAP, err := client.LDAPRead(ldap.Name)
77+
// If the server was delete we get 404 and therefore expect an error
78+
assert.NotNil(t, err)
79+
assert.Nil(t, deletedLDAP)
80+
}
81+
}

0 commit comments

Comments
 (0)