Here are the examples of the java api com.ibm.ws.com.unboundid.InMemorySunLDAPServer taken from open source projects. By voting up you can indicate which examples are most useful and appropriate.
1 Examples
14
Source : URAPIs_SUNLDAP_SSLTest.java
with Eclipse Public License 1.0
from OpenLiberty
with Eclipse Public License 1.0
from OpenLiberty
@RunWith(FATRunner.clreplaced)
@Mode(TestMode.FULL)
public clreplaced URAPIs_SUNLDAP_SSLTest {
private static LibertyServer server = LibertyServerFactory.getLibertyServer("com.ibm.ws.security.wim.adapter.ldap.fat.sun.ssl");
private static final Clreplaced<?> c = URAPIs_SUNLDAP_SSLTest.clreplaced;
private static UserRegistryServletConnection servlet;
/**
* Test rule for testing for expected exceptions.
*/
@Rule
public ExpectedException expectedException = ExpectedException.none();
private static InMemorySunLDAPServer ldapServer;
// private final LeakedPreplacedwordChecker preplacedwordChecker = new LeakedPreplacedwordChecker(server);
/**
* Updates the sample, which is expected to be at the hard-coded path.
* If this test is failing, check this path is correct.
*/
@BeforeClreplaced
public static void setUp() throws Exception {
setupLdapServer();
setupLibertyServer();
}
/**
* Setup the Liberty server. This server will start with very basic configuration. The tests
* will configure the server dynamically.
*
* @throws Exception If there was an issue setting up the Liberty server.
*/
public static void setupLibertyServer() throws Exception {
Log.info(c, "setUp", "Starting the server... (will wait for userRegistry servlet to start)");
server.copyFileToLibertyInstallRoot("lib/features", "internalfeatures/securitylibertyinternals-1.0.mf");
server.addInstalledAppForValidation("userRegistry");
/*
* Update LDAP configuration with In-Memory Server
*/
ServerConfiguration serverConfig = server.getServerConfiguration();
LdapRegistry ldap = serverConfig.getLdapRegistries().get(0);
ldap.setHost("localhost");
ldap.setPort(String.valueOf(ldapServer.getLdapsPort()));
ldap.setBindDN(InMemorySunLDAPServer.getBindDN());
ldap.setBindPreplacedword(InMemorySunLDAPServer.getBindPreplacedword());
server.updateServerConfiguration(serverConfig);
/*
* Make sure the application has come up before proceeding
*/
server.startServer(c.getName() + ".log");
// Make sure the application has come up before proceeding
replacedertNotNull("Application userRegistry does not appear to have started.", server.waitForStringInLog("CWWKZ0001I:.*userRegistry"));
replacedertNotNull("Security service did not report it was ready", server.waitForStringInLog("CWWKS0008I"));
replacedertNotNull("Server did not came up", server.waitForStringInLog("CWWKF0011I"));
Log.info(c, "setUp", "Creating servlet connection the server");
servlet = new UserRegistryServletConnection(server.getHostname(), server.getHttpDefaultPort());
if (servlet.getRealm() == null) {
Thread.sleep(5000);
servlet.getRealm();
}
}
/**
* Configure the embedded LDAP server.
*
* @throws Exception If the server failed to start for some reason.
*/
private static void setupLdapServer() throws Exception {
ldapServer = new InMemorySunLDAPServer();
}
@AfterClreplaced
public static void tearDown() throws Exception {
Log.info(c, "tearDown", "Stopping the server...");
try {
if (server != null) {
server.stopServer("CWIML4529E", "CWIML4537E", "CWPKI0041W");
}
} finally {
try {
if (ldapServer != null) {
ldapServer.shutDown(true);
}
} catch (Exception e) {
Log.error(c, "teardown", e, "LDAP server threw error while shutting down. " + e.getMessage());
}
server.deleteFileFromLibertyInstallRoot("lib/features/internalfeatures/securitylibertyinternals-1.0.mf");
}
}
/**
* Hit the test servlet to see if getUsersForGroup works when supplied with a valid group.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersForGroupWithValidGroup() throws Exception {
String group = "vmmgroup1";
Log.info(c, "getUsersForGroupWithValidGroup", "Checking with a valid group.");
SearchResult result = servlet.getUsersForGroup(group, 0);
List<String> list = result.getList();
replacedertTrue(list.contains("[email protected]"));
replacedertTrue(list.contains("[email protected]"));
}
/**
* Hit the test servlet to see if getUsersForGroup works when supplied with a valid group.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersForGroupWithValidGroupWithLimit() throws Exception {
String group = "vmmgroup1";
Log.info(c, "getUsersForGroupWithValidGroupWithLimit", "Checking with a valid group.");
SearchResult result = servlet.getUsersForGroup(group, 1);
List<String> list = result.getList();
replacedertEquals("There should be one entries", 1, list.size());
}
/**
* Hit the test servlet to see if getUsersForGroup works when supplied with a valid group.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersForGroupWithLimitWithNestedGroup() throws Exception {
// This test will only be executed when using physical LDAP server
replacedume.replacedumeTrue(!LDAPUtils.USE_LOCAL_LDAP_SERVER);
String group = "vmm_nestedGrp";
Log.info(c, "getUsersForGroupWithLimitWithNestedGroup", "Checking with a valid group.");
SearchResult result = servlet.getUsersForGroup(group, 10);
List<String> list = result.getList();
replacedertTrue(list.contains("[email protected]"));
}
/**
* Hit the test servlet to see if getUsersForGroup works when supplied with a valid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersForGroupWithInvalidGroup() throws Exception {
String group = "invalidGroup";
Log.info(c, "getUsersForGroupWithInvalidGroup", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getUsersForGroup(group, 0);
}
/**
* Hit the test servlet to see if getRealm works.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getRealm() throws Exception {
Log.info(c, "getRealm", "Checking expected realm");
replacedertEquals("SUNLDAPRealm_SSL", servlet.getRealm());
}
/**
* Hit the test servlet to see if checkPreplacedword works when preplaceded in a valid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void checkPreplacedword() throws Exception {
String user = "[email protected]";
String preplacedword = "ppersona1";
Log.info(c, "checkPreplacedword", "Checking good credentials");
replacedertEquals("Authentication should succeed.", "[email protected]", servlet.checkPreplacedword(user, preplacedword));
// preplacedwordChecker.checkForPreplacedwordInAnyFormat(preplacedword);
}
/**
* Hit the test servlet to see if checkPreplacedword fails when preplaceded in a invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void checkPreplacedwordWithInvalidUser() throws Exception {
String user = "invalid";
String preplacedword = "ppersona1";
Log.info(c, "checkPreplacedwordWithInvalidUser", "Checking good credentials");
replacedertNull("Authentication should fail.", servlet.checkPreplacedword(user, preplacedword));
replacedertNotNull("An invalid user should cause RegistryException with No principal is found message", server.waitForStringInLog("CWIML4537E"));
// preplacedwordChecker.checkForPreplacedwordInAnyFormat(preplacedword);
}
/**
* Hit the test servlet to see if checkPreplacedword works when preplaceded in an invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void checkPreplacedwordWithBadCredentials() throws Exception {
String user = "[email protected]";
String preplacedword = "badPreplacedword";
Log.info(c, "checkPreplacedwordWithBadCredentials", "Checking bad credentials");
replacedertNull("Authentication should not succeed.", servlet.checkPreplacedword(user, preplacedword));
replacedertNotNull("Expected message CWIML4529E.", server.waitForStringInLog("CWIML4529E"));
// preplacedwordChecker.checkForPreplacedwordInAnyFormat(preplacedword);
}
/**
* Hit the test servlet to see if isValidUser works with a valid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void isValidUser() throws Exception {
String user = "[email protected]";
Log.info(c, "isValidUser", "Checking with a valid user");
replacedertTrue("User validation should succeed.", servlet.isValidUser(user));
}
/**
* Hit the test servlet to see if isValidUser works with an invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void isValidUserWithInvalidUser() throws Exception {
String user = "invalidUser";
Log.info(c, "isValidUserWithInvalidUser", "Checking with an invalid user");
replacedertFalse("User validation should fail.", servlet.isValidUser(user));
}
/**
* Hit the test servlet to see if getUsers works when preplaceded in a valid user pattern
* and a limit of 2; should only expect to find one entry
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsers() throws Exception {
String user = "[email protected]";
Log.info(c, "getUsers", "Checking with a valid pattern and limit of 2.");
SearchResult result = servlet.getUsers(user, 2);
replacedertEquals("There should only be one entry", 1, result.getList().size());
}
/**
* Hit the test servlet to see if getUsers works when preplaceded in a valid user pattern
* and a limit of 2; should only expect to find one entry
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersWithAsteriskWildcard1() throws Exception {
String user = "*";
Log.info(c, "getUsersWithAsteriskWildcard1", "Checking with a valid pattern and limit of 2.");
SearchResult result = servlet.getUsers(user, 2);
replacedertEquals("There should only be two entries", 2, result.getList().size());
}
/**
* Hit the test servlet to see if getUsers works when preplaceded in a invalid user pattern
* and a limit of 2; should only expect to find no entry
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersWithInvalidUser() throws Exception {
String user = "invalid";
Log.info(c, "getUsersWithInvalidUser", "Checking with a invalid pattern and limit of 2.");
SearchResult result = servlet.getUsers(user, 2);
replacedertEquals("There should only be no entries", 0, result.getList().size());
}
/**
* Hit the test servlet to see if getUsers works when supplied with an invalid pattern for
* the user pattern and a limit of 2; should expect to find no entries
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUsersWithValidPatternLimitLessThanZero() throws Exception {
String user = "*";
Log.info(c, "getUsersWithValidPatternLimitLessThanZero", "Checking with a valid pattern and limit of -1.");
SearchResult result = servlet.getUsers(user, -1);
replacedertEquals("There should be no entries", 0, result.getList().size());
}
/**
* Hit the test servlet to see if getUserDisplayName works when supplied with a valid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUserDisplayName() throws Exception {
String user = "[email protected]";
// <userDisplayNameMapping propertyForInput="principalName" propertyForOutput="cn"/> and <attribute name="telephoneNumber" propertyName="cn" enreplacedyType="PersonAccount" />
String displayName = "1 919 555 5555";
Log.info(c, "getUserDisplayName", "Checking with a valid user.");
replacedertEquals(displayName, servlet.getUserDisplayName(user));
}
/**
* Hit the test servlet to see if getUserDisplayName works(Throws exception) when supplied with an invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUserDisplayNameWithInvalidUser() throws Exception {
String user = "invalidUser";
Log.info(c, "getUserDisplayNameWithInvalidUser", "Checking with an invalid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getUserDisplayName(user);
}
/**
* Hit the test servlet to see if getUniqueUserId works when supplied with a valid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueUserId() throws Exception {
String user = "[email protected]";
String uniqueUserId = "uid=vmmtestuser,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getUniqueUserId", "Checking with a valid user.");
replacedertDNsEqual("", uniqueUserId, servlet.getUniqueUserId(user));
}
/**
* Hit the test servlet to see if getUniqueUserId works when supplied with an invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueUserIdWithInvalidUser() throws Exception {
String user = "invalidUser";
Log.info(c, "getUniqueUserIdWithInvalidUser", "Checking with an invalid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getUniqueUserId(user);
}
/**
* Hit the test servlet to see if getUserSecurityName works when supplied with a valid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUserSecurityName() throws Exception {
String user = "[email protected]";
String securityName = "[email protected]";
Log.info(c, "getUserSecurityName", "Checking with a valid user.");
replacedertEquals(securityName, servlet.getUserSecurityName(user));
}
/**
* Hit the test servlet to see if getUserSecurityName works when supplied with an invalid user
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUserSecurityNameWithInvalidUser() throws Exception {
String user = "uid=invalid,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getUserSecurityNameWithInvalidUser", "Checking with an invalid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4527E");
servlet.getUserSecurityName(user);
}
/**
* Hit the test servlet to see if isValidGroup works with a valid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void isValidGroup() throws Exception {
String group = "vmmgroup1";
Log.info(c, "isValidGroup", "Checking with a valid group");
replacedertTrue("Group validation should succeed.", servlet.isValidGroup(group));
}
/**
* Hit the test servlet to see if isValidGroup works with an invalid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void isValidGroupWithInvalidGroup() throws Exception {
String group = "invalidGroup";
Log.info(c, "isValidGroupWithInvalidGroup", "Checking with an invalid group");
replacedertFalse("Group validation should fail.", servlet.isValidGroup(group));
}
/**
* Hit the test servlet to see if getGroups works when preplaceded in a valid group pattern
* and a limit of 2; should only expect to find one entry
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroups() throws Exception {
String group = "vmmgroup1";
Log.info(c, "getGroups", "Checking with a valid pattern and limit of 2.");
SearchResult result = servlet.getGroups(group, 2);
replacedertEquals("There should only be one entry", 1, result.getList().size());
}
/**
* Hit the test servlet to see if getGroups works when preplaceded in a valid group pattern
* and a limit of 2; should only expect to find more entries but as limit 2, we should only get 2 groups
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsWithAsteriskWildcard() throws Exception {
String group = "*";
Log.info(c, "getGroupsWithAsteriskWildcard", "Checking with a valid pattern and limit of 2.");
SearchResult result = servlet.getGroups(group, 2);
replacedertEquals("There should only be 2 entries", 2, result.getList().size());
}
/**
* Hit the test servlet to see if getGroups works when preplaceded in a valid group pattern
* and a limit of 6; we should only get 5 groups
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsWithAsteriskWildcard2() throws Exception {
String group = "vmmg*p*";
Log.info(c, "getGroupsWithAsteriskWildcard1", "Checking with a valid pattern and limit of 2.");
SearchResult result = servlet.getGroups(group, 6);
replacedertEquals("There should only be 5 entries", 5, result.getList().size());
}
/**
* Hit the test servlet to see if getGroups works when preplaceded in a invalid group pattern
* and a limit of 2; should only expect to find no entry
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsWithInvalidGroup() throws Exception {
String group = "invalidgroup";
Log.info(c, "getGroupsWithInvalidGroup", "Checking with a invalid pattern and limit of 2.");
SearchResult result = servlet.getGroups(group, 2);
replacedertEquals("There should only be one entry", 0, result.getList().size());
}
/**
* Hit the test servlet to see if getGroups works when preplaceded in a invalid group pattern
* and a limit of 2; should only expect to find no entry
* This verifies the various required bundles got installed and are working.
*/
/*
* @Test
*
* @ExpectedFFDC(value = { "com.ibm.ws.security.registry.RegistryException", "com.ibm.websphere.wim.exception.SearchControlException" })
* public void getGroupsWithInvalidLimit() {
* String group = "group1";
* Log.info(c, "getGroupsWithInvalidLimit", "Checking with a valid pattern and limit of -1.");
* try {
* servlet.getGroups(group, -1);
* } catch (RegistryException e) {
* // Do you need FFDC here? Remember FFDC instrumentation and @FFDCIgnore
* e.printStackTrace();
* }
* server.waitForStringInLog("CWIML1022E"); //CWIML1022E The '-1' count limit specified in the SearchControl data object is invalid.
* replacedertTrue("An invalid limit should cause RegistryException in SearchControl", true);
* }
*/
/**
* Hit the test servlet to see if getGroups works when supplied with an invalid pattern for
* the group pattern and a limit of 2; should expect to find no entries
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsWithValidPatternLimitLessThanZero() throws Exception {
String group = "vmmgroup1";
Log.info(c, "getGroupsWithValidPatternLimitLessThanZero", "Checking with a valid pattern and limit of -1.");
SearchResult result = servlet.getGroups(group, -1);
replacedertEquals("There should be no entries", 0, result.getList().size());
}
/**
* Hit the test servlet to see if getGroupDisplayName works when supplied with a valid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupDisplayName() throws Exception {
String group = "vmmgroup1";
Log.info(c, "getGroupDisplayName", "Checking with a valid group.");
replacedertEquals("vmmgroup1", servlet.getGroupDisplayName(group));
}
/**
* Hit the test servlet to see if getGroupDisplayName works when supplied with an invalid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupDisplayNameWithInvalidGroup() throws Exception {
String group = "cn=invalidgroup,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getGroupDisplayNameWithInvalidGroup", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4527E");
servlet.getGroupDisplayName(group);
}
/**
* Hit the test servlet to see if getGroupDisplayName works when supplied with an invalid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupDisplayNameWithEnreplacedyOutOfRealmScope() throws Exception {
String group = "cn=invalidgroup";
Log.info(c, "getGroupDisplayNameWithEnreplacedyOutOfRealmScope", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML0515E");
servlet.getGroupDisplayName(group);
}
/**
* Hit the test servlet to see if getUniqueGroupId works when supplied with a valid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueGroupId() throws Exception {
String group = "vmmgroup1";
String uniqueGroupId = "cn=vmmgroup1,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getUniqueGroupId", "Checking with a valid group.");
replacedertDNsEqual(null, uniqueGroupId, servlet.getUniqueGroupId(group));
}
/**
* Hit the test servlet to see if getUniqueGroupId works when supplied with an invalid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueGroupIdWithInvalidGroup() throws Exception {
String group = "invalidGroup";
Log.info(c, "getUniqueGroupIdWithInvalidGroup", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getUniqueGroupId(group);
}
/**
* Hit the test servlet to see if getGroupSecurityName works when supplied with a valid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupSecurityName() throws Exception {
String uniqueGroupId = "cn=vmmgroup1,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getGroupSecurityName", "Checking with a valid group.");
replacedertEquals("vmmgroup1", servlet.getGroupSecurityName(uniqueGroupId));
}
/**
* Hit the test servlet to see if getGroupSecurityName works when supplied with an invalid group
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupSecurityNameWithInvalidGroup() throws Exception {
String group = "cn=invalid,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getGroupSecurityNameWithInvalidGroup", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4527E");
servlet.getGroupSecurityName(group);
}
/**
* Hit the test servlet to see if getGroupSecurityName works when supplied with an invalid group (InvalidUniqueName)
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupSecurityNameWithInvalidUniqueName() throws Exception {
String group = "invalid";
Log.info(c, "getGroupSecurityNameWithUniqueName", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getGroupSecurityName(group);
}
/**
* Hit the test servlet to see if getGroupSecurityName works when supplied with an invalid group (EnreplacedyOutOfRealmScope)
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupSecurityNameWithEnreplacedyOutOfRealmScope() throws Exception {
String group = "uid=invalid";
Log.info(c, "getGroupSecurityNameWithUniqueName", "Checking with an invalid group.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML0515E");
servlet.getGroupSecurityName(group);
}
/**
* Hit the test servlet to see if getGroupsForUser works when supplied with a valid user.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsForUser() throws Exception {
String user = "[email protected]";
Log.info(c, "getGroupsForUser", "Checking with a valid user.");
List<String> list = servlet.getGroupsForUser(user);
replacedertTrue(list.contains("vmmgroup1"));
}
/**
* Hit the test servlet to see if getGroupsForUser works when supplied with a valid user.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsForUserWithNoMembershipForUser() throws Exception {
String user = "[email protected]";
Log.info(c, "getGroupsForUserWithNoMembershipForUser", "Checking with a valid user.");
List<String> list = servlet.getGroupsForUser(user);
replacedertEquals("There should not be any entry", 0, list.size());
}
/**
* Hit the test servlet to see if getGroupsForUser works when supplied with a invalid user.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getGroupsForUserWithInvalidUser() throws Exception {
String user = "invalidUser";
Log.info(c, "getGroupsForUserWithInvalidUser", "Checking with an invalid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getGroupsForUser(user);
}
/**
* Hit the test servlet to see if getUniqueGroupIdsForUser works when supplied with a valid user.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueGroupIds() throws Exception {
String user = "uid=vmmuser1,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getUniqueGroupIds", "Checking with a valid user.");
List<String> list = servlet.getUniqueGroupIdsForUser(user);
replacedertEquals("There should only be 2 entries. Returned: " + list, 2, list.size());
}
/**
* Hit the test servlet to see if getUniqueGroupIdsForUser works when supplied with a invalid user.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueGroupIdsWithInvalidUser() throws Exception {
String user = "uid=invalid,ou=users,dc=rtp,dc=raleigh,dc=ibm,dc=com";
Log.info(c, "getUniqueGroupIdsForUser", "Checking with a valid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4527E");
servlet.getUniqueGroupIdsForUser(user);
}
/**
* Hit the test servlet to see if getUniqueGroupIdsForUser works when supplied with a invalid uniqueName.
* This verifies the various required bundles got installed and are working.
*/
@Test
public void getUniqueGroupIdsWithInvalidUniqueName() throws Exception {
String user = "invalid";
Log.info(c, "getUniqueGroupIdsForUser", "Checking with a valid user.");
expectedException.expect(EntryNotFoundException.clreplaced);
expectedException.expectMessage("CWIML4001E");
servlet.getUniqueGroupIdsForUser(user);
}
}