#! /bin/sh
# $OpenLDAP$
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
##
## Copyright 1998-2021 The OpenLDAP Foundation.
## All rights reserved.
##
## Redistribution and use in source and binary forms, with or without
## modification, are permitted only as authorized by the OpenLDAP
## Public License.
##
## A copy of this license is available in the file LICENSE in the
## top-level directory of the distribution or, alternatively, at
## <http://www.OpenLDAP.org/license.html>.
echo "running defines.sh"
. $SRCDIR/scripts/defines.sh
if test $WITH_TLS = no ; then
echo "TLS support not available, test skipped"
exit 0
fi
if test $BACKLDAP = "ldapno" ; then
echo "LDAP backend not available, test skipped"
exit 0
fi
if test "$BACKEND" = "ldap"; then
echo "LDAP backend not valid, test skipped"
exit 0
fi
mkdir -p $TESTDIR $DBDIR1
cp -r $DATADIR/tls $TESTDIR
$SLAPPASSWD -g -n >$CONFIGPWF
echo "rootpw `$SLAPPASSWD -T $CONFIGPWF`" >$TESTDIR/configpw.conf
ITS=8427
ITSDIR=$DATADIR/regressions/its$ITS
echo "Running slapadd to build slapd database..."
. $CONFFILTER $BACKEND < $TLSCONF > $CONF1
$SLAPADD -f $CONF1 -l $LDIFORDERED
RC=$?
if test $RC != 0 ; then
echo "slapadd failed ($RC)!"
exit $RC
fi
echo "database config" >> $CONF1
echo "include $TESTDIR/configpw.conf" >> $CONF1
echo "Starting slapd listening on $URIP1 and $SURIP2..."
$SLAPD -f $CONF1 -h "$URIP1 $SURIP2" -d $LVL > $LOG1 2>&1 &
SERVERPID=$!
if test $WAIT != 0 ; then
echo SERVERPID $SERVERPID
read foo
fi
KILLPIDS="$SERVERPID"
sleep 1
echo "Using ldapsearch to check that slapd is running..."
for i in 0 1 2 3 4 5; do
$LDAPSEARCH -s base -b "$MONITOR" -H $URI1 \
'objectclass=*' > /dev/null 2>&1
RC=$?
if test $RC = 0 ; then
break
fi
echo "Waiting 5 seconds for slapd to start..."
sleep 5
done
if test $RC != 0 ; then
echo "ldapsearch failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "database config" >> $CONF2
echo "include $TESTDIR/configpw.conf" >> $CONF2
echo "Starting proxy slapd on TCP/IP port $PORT3..."
. $CONFFILTER $BACKEND < $ITSDIR/slapd.conf > $CONF2
$SLAPD -f $CONF2 -h $URI3 -d $LVL > $LOG2 2>&1 &
PROXYPID=$!
if test $WAIT != 0 ; then
echo PROXYPID $PROXYPID
read foo
fi
KILLPIDS="$KILLPIDS $PROXYPID"
sleep 1
echo "Using ldapsearch to check that proxy slapd is running..."
for i in 0 1 2 3 4 5; do
$LDAPSEARCH -s base -b "$MONITOR" -H $URI3 \
'objectclass=*' > /dev/null 2>&1
RC=$?
if test $RC = 0 ; then
break
fi
echo "Waiting 5 seconds for slapd to start..."
sleep 5
done
if test $RC != 0 ; then
echo "ldapsearch failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Configuring proxy..."
$LDAPMODIFY -D cn=config -H $URI3 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={2}ldap,cn=config
changetype: add
objectClass: olcLDAPConfig
olcDbUri: $URI1
olcSuffix: $BASEDN
olcRootDN: $MANAGERDN
olcRootPW: $PASSWD
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Privileged WhoAmI (proxy uses plain ldap://)..."
$LDAPWHOAMI -H $URI3 -D "$MANAGERDN" -w $PASSWD
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "WhoAmI (proxy uses plain ldap://)..."
$LDAPWHOAMI -H $URI3 -D "$BABSDN" -w bjensen
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Searching (proxy uses plain ldap://)..."
echo "# Searching (proxy uses plain ldap://)..." > $SEARCHOUT
$LDAPSEARCH -b "$BASEDN" -H $URI3 \
-D "$BABSDN" -w bjensen \
'(objectClass=*)' >> $SEARCHOUT 2>&1
RC=$?
if test $RC != 0 ; then
echo "ldapsearch failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Filtering ldapsearch results..."
$LDIFFILTER < $SEARCHOUT > $SEARCHFLT
echo "Filtering original ldif used to create database..."
$LDIFFILTER < $LDIFORDERED > $LDIFFLT
echo "" >> $LDIFFLT
echo "Comparing filter output..."
$CMP $SEARCHFLT $LDIFFLT > $CMPOUT
if test $? != 0 ; then
echo "Comparison failed"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1
fi
echo "Reconfiguring database to only allow TLS binds..."
$LDAPMODIFY -D cn=config -H $URI1 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={1}$BACKEND,cn=config
changetype: modify
add: olcAccess
olcAccess: to attrs=userPassword by anonymous ssf=2 auth by users read
olcAccess: to * by users read
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Re-configuring proxy to use ldaps:// on privileged connections only..."
$LDAPMODIFY -D cn=config -H $URI3 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={2}ldap,cn=config
changetype: delete
dn: olcDatabase={2}ldap,cn=config
changetype: add
objectClass: olcLDAPConfig
olcDbUri: $SURIP2
olcSuffix: $BASEDN
olcRootDN: $MANAGERDN
olcRootPW: $PASSWD
olcDbIDAssertBind: bindmethod=simple binddn="$MANAGERDN" credentials="$PASSWD" tls_cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Privileged WhoAmI (proxy uses ldaps://)..."
$LDAPWHOAMI -H $URI3 -D "$MANAGERDN" -w $PASSWD
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "WhoAmI (proxy uses ldaps://), which should fail..."
$LDAPWHOAMI -H $URI3 -D "$BABSDN" -w bjensen
RC=$?
case $RC in
52)
;;
0)
echo "ldapwhoami should have failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1
;;
*)
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
;;
esac
# FIXME: just adding olcDbStartTLS to the DB doesn't have an effect, why?
echo "Re-configuring proxy to use ldaps:// everywhere..."
$LDAPMODIFY -D cn=config -H $URI3 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={2}ldap,cn=config
changetype: modify
add: olcDbStartTLS
olcDbStartTLS: ldaps tls_cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "WhoAmI again (proxy uses ldaps://)..."
$LDAPWHOAMI -H $URI3 -D "$BABSDN" -w bjensen
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Searching (proxy uses ldaps://)..."
echo "# Searching (proxy uses ldaps://)..." > $SEARCHOUT
$LDAPSEARCH -b "$BASEDN" -H $URI3 \
-D "$BABSDN" -w bjensen \
'(objectClass=*)' >> $SEARCHOUT 2>&1
RC=$?
if test $RC != 0 ; then
echo "ldapsearch failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Filtering ldapsearch results..."
$LDIFFILTER < $SEARCHOUT > $SEARCHFLT
echo "Comparing filter output..."
$CMP $SEARCHFLT $LDIFFLT > $CMPOUT
if test $? != 0 ; then
echo "Comparison failed"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1
fi
echo "Re-configuring proxy to use LDAP+StartTLS correctly on privileged connections..."
$LDAPMODIFY -D cn=config -H $URI3 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={2}ldap,cn=config
changetype: delete
dn: olcDatabase={2}ldap,cn=config
changetype: add
objectClass: olcLDAPConfig
olcDbUri: $URIP1
olcSuffix: $BASEDN
olcRootDN: $MANAGERDN
olcRootPW: $PASSWD
olcDbIDAssertBind: bindmethod=none tls_cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Privileged WhoAmI (proxy requests StartTLS)..."
$LDAPWHOAMI -H $URI3 -D "$MANAGERDN" -w $PASSWD
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "WhoAmI (proxy requests StartTLS), which should fail..."
$LDAPWHOAMI -H $URI3 -D "$BABSDN" -w bjensen
RC=$?
case $RC in
49|52) # ACL forbids plaintext binds against userPassword
;;
0)
echo "ldapwhoami should have failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1
;;
*)
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
;;
esac
# FIXME: just adding olcDbStartTLS to the DB doesn't have an effect, why?
echo "Re-configuring proxy to use ldaps:// everywhere..."
$LDAPMODIFY -D cn=config -H $URI3 -y $CONFIGPWF \
> $TESTOUT 2>&1 <<EOF
dn: olcDatabase={2}ldap,cn=config
changetype: modify
add: olcDbStartTLS
olcDbStartTLS: start tls_cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt
EOF
RC=$?
if test $RC != 0 ; then
echo "modification failed ($RC)"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "WhoAmI (proxy requests StartTLS)..."
$LDAPWHOAMI -H $URI3 -D "$BABSDN" -w bjensen
RC=$?
if test $RC != 0 ; then
echo "ldapwhoami failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Searching (proxy requests StartTLS)..."
echo "# Searching (proxy requests StartTLS)..." > $SEARCHOUT
$LDAPSEARCH -b "$BASEDN" -H $URI3 \
-D "$BABSDN" -w bjensen \
'(objectClass=*)' >> $SEARCHOUT 2>&1
RC=$?
if test $RC != 0 ; then
echo "ldapsearch failed ($RC)!"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit $RC
fi
echo "Filtering ldapsearch results..."
$LDIFFILTER < $SEARCHOUT > $SEARCHFLT
echo "Comparing filter output..."
$CMP $SEARCHFLT $LDIFFLT > $CMPOUT
if test $? != 0 ; then
echo "Comparison failed"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1
fi
test $KILLSERVERS != no && kill -HUP $KILLPIDS
echo ">>>>> Test succeeded"
test $KILLSERVERS != no && wait
exit 0