s3 swat: Allow getting the user's HTTP auth password
[Samba.git] / source4 / torture / ldap / basic.c
blob358bf535905b869c776ce02be1587b6a34017117
1 /*
2 Unix SMB/CIFS mplementation.
3 LDAP protocol helper functions for SAMBA
5 Copyright (C) Stefan Metzmacher 2004
6 Copyright (C) Simo Sorce 2004
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "libcli/ldap/ldap_client.h"
25 #include "lib/cmdline/popt_common.h"
27 #include "torture/torture.h"
28 #include "torture/ldap/proto.h"
30 #include "param/param.h"
32 static bool test_bind_simple(struct ldap_connection *conn, const char *userdn, const char *password)
34 NTSTATUS status;
35 bool ret = true;
37 status = torture_ldap_bind(conn, userdn, password);
38 if (!NT_STATUS_IS_OK(status)) {
39 ret = false;
42 return ret;
45 static bool test_bind_sasl(struct torture_context *tctx,
46 struct ldap_connection *conn, struct cli_credentials *creds)
48 NTSTATUS status;
49 bool ret = true;
51 printf("Testing sasl bind as user\n");
53 status = torture_ldap_bind_sasl(conn, creds, tctx->lp_ctx);
54 if (!NT_STATUS_IS_OK(status)) {
55 ret = false;
58 return ret;
61 static bool test_multibind(struct ldap_connection *conn, const char *userdn, const char *password)
63 bool ret = true;
65 printf("Testing multiple binds on a single connnection as anonymous and user\n");
67 ret = test_bind_simple(conn, NULL, NULL);
68 if (!ret) {
69 printf("1st bind as anonymous failed\n");
70 return ret;
73 ret = test_bind_simple(conn, userdn, password);
74 if (!ret) {
75 printf("2nd bind as authenticated user failed\n");
78 return ret;
81 static bool test_search_rootDSE(struct ldap_connection *conn, char **basedn)
83 bool ret = true;
84 struct ldap_message *msg, *result;
85 struct ldap_request *req;
86 int i;
87 struct ldap_SearchResEntry *r;
88 NTSTATUS status;
90 printf("Testing RootDSE Search\n");
92 *basedn = NULL;
94 msg = new_ldap_message(conn);
95 if (!msg) {
96 return false;
99 msg->type = LDAP_TAG_SearchRequest;
100 msg->r.SearchRequest.basedn = "";
101 msg->r.SearchRequest.scope = LDAP_SEARCH_SCOPE_BASE;
102 msg->r.SearchRequest.deref = LDAP_DEREFERENCE_NEVER;
103 msg->r.SearchRequest.timelimit = 0;
104 msg->r.SearchRequest.sizelimit = 0;
105 msg->r.SearchRequest.attributesonly = false;
106 msg->r.SearchRequest.tree = ldb_parse_tree(msg, "(objectclass=*)");
107 msg->r.SearchRequest.num_attributes = 0;
108 msg->r.SearchRequest.attributes = NULL;
110 req = ldap_request_send(conn, msg);
111 if (req == NULL) {
112 printf("Could not setup ldap search\n");
113 return false;
116 status = ldap_result_one(req, &result, LDAP_TAG_SearchResultEntry);
117 if (!NT_STATUS_IS_OK(status)) {
118 printf("search failed - %s\n", nt_errstr(status));
119 return false;
122 printf("received %d replies\n", req->num_replies);
124 r = &result->r.SearchResultEntry;
126 DEBUG(1,("\tdn: %s\n", r->dn));
127 for (i=0; i<r->num_attributes; i++) {
128 int j;
129 for (j=0; j<r->attributes[i].num_values; j++) {
130 DEBUG(1,("\t%s: %d %.*s\n", r->attributes[i].name,
131 (int)r->attributes[i].values[j].length,
132 (int)r->attributes[i].values[j].length,
133 (char *)r->attributes[i].values[j].data));
134 if (!(*basedn) &&
135 strcasecmp("defaultNamingContext",r->attributes[i].name)==0) {
136 *basedn = talloc_asprintf(conn, "%.*s",
137 (int)r->attributes[i].values[j].length,
138 (char *)r->attributes[i].values[j].data);
143 talloc_free(req);
145 return ret;
148 static bool test_compare_sasl(struct ldap_connection *conn, const char *basedn)
150 struct ldap_message *msg, *rep;
151 struct ldap_request *req;
152 const char *val;
153 NTSTATUS status;
155 printf("Testing SASL Compare: %s\n", basedn);
157 if (!basedn) {
158 return false;
161 msg = new_ldap_message(conn);
162 if (!msg) {
163 return false;
166 msg->type = LDAP_TAG_CompareRequest;
167 msg->r.CompareRequest.dn = basedn;
168 msg->r.CompareRequest.attribute = talloc_strdup(msg, "objectClass");
169 val = "domain";
170 msg->r.CompareRequest.value = data_blob_talloc(msg, val, strlen(val));
172 req = ldap_request_send(conn, msg);
173 if (!req) {
174 return false;
177 status = ldap_result_one(req, &rep, LDAP_TAG_CompareResponse);
178 if (!NT_STATUS_IS_OK(status)) {
179 printf("error in ldap compare request - %s\n", nt_errstr(status));
180 return false;
183 DEBUG(5,("Code: %d DN: [%s] ERROR:[%s] REFERRAL:[%s]\n",
184 rep->r.CompareResponse.resultcode,
185 rep->r.CompareResponse.dn,
186 rep->r.CompareResponse.errormessage,
187 rep->r.CompareResponse.referral));
189 return true;
193 bool torture_ldap_basic(struct torture_context *torture)
195 NTSTATUS status;
196 struct ldap_connection *conn;
197 TALLOC_CTX *mem_ctx;
198 bool ret = true;
199 const char *host = torture_setting_string(torture, "host", NULL);
200 const char *userdn = torture_setting_string(torture, "ldap_userdn", NULL);
201 const char *secret = torture_setting_string(torture, "ldap_secret", NULL);
202 char *url;
203 char *basedn;
205 mem_ctx = talloc_init("torture_ldap_basic");
207 url = talloc_asprintf(mem_ctx, "ldap://%s/", host);
209 status = torture_ldap_connection(torture, &conn, url);
210 if (!NT_STATUS_IS_OK(status)) {
211 return false;
214 if (!test_search_rootDSE(conn, &basedn)) {
215 ret = false;
218 /* other basic tests here */
220 if (!test_multibind(conn, userdn, secret)) {
221 ret = false;
224 if (!test_bind_sasl(torture, conn, cmdline_credentials)) {
225 ret = false;
228 if (!test_compare_sasl(conn, basedn)) {
229 ret = false;
232 /* no more test we are closing */
233 torture_ldap_close(conn);
234 talloc_free(mem_ctx);
237 return ret;