Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
/*
************************************************************************
******************* CANADIAN ASTRONOMY DATA CENTRE *******************
************** CENTRE CANADIEN DE DONNÉES ASTRONOMIQUES **************
*
* (c) 2014. (c) 2014.
* Government of Canada Gouvernement du Canada
* National Research Council Conseil national de recherches
* Ottawa, Canada, K1A 0R6 Ottawa, Canada, K1A 0R6
* All rights reserved Tous droits réservés
*
* NRC disclaims any warranties, Le CNRC dénie toute garantie
* expressed, implied, or énoncée, implicite ou légale,
* statutory, of any kind with de quelque nature que ce
* respect to the software, soit, concernant le logiciel,
* including without limitation y compris sans restriction
* any warranty of merchantability toute garantie de valeur
* or fitness for a particular marchande ou de pertinence
* purpose. NRC shall not be pour un usage particulier.
* liable in any event for any Le CNRC ne pourra en aucun cas
* damages, whether direct or être tenu responsable de tout
* indirect, special or general, dommage, direct ou indirect,
* consequential or incidental, particulier ou général,
* arising from the use of the accessoire ou fortuit, résultant
* software. Neither the name de l'utilisation du logiciel. Ni
* of the National Research le nom du Conseil National de
* Council of Canada nor the Recherches du Canada ni les noms
* names of its contributors may de ses participants ne peuvent
* be used to endorse or promote être utilisés pour approuver ou
* products derived from this promouvoir les produits dérivés
* software without specific prior de ce logiciel sans autorisation
* written permission. préalable et particulière
* par écrit.
*
* This file is part of the Ce fichier fait partie du projet
* OpenCADC project. OpenCADC.
*
* OpenCADC is free software: OpenCADC est un logiciel libre ;
* you can redistribute it and/or vous pouvez le redistribuer ou le
* modify it under the terms of modifier suivant les termes de
* the GNU Affero General Public la “GNU Affero General Public
* License as published by the License” telle que publiée
* Free Software Foundation, par la Free Software Foundation
* either version 3 of the : soit la version 3 de cette
* License, or (at your option) licence, soit (à votre gré)
* any later version. toute version ultérieure.
*
* OpenCADC is distributed in the OpenCADC est distribué
* hope that it will be useful, dans l’espoir qu’il vous
* but WITHOUT ANY WARRANTY; sera utile, mais SANS AUCUNE
* without even the implied GARANTIE : sans même la garantie
* warranty of MERCHANTABILITY implicite de COMMERCIALISABILITÉ
* or FITNESS FOR A PARTICULAR ni d’ADÉQUATION À UN OBJECTIF
* PURPOSE. See the GNU Affero PARTICULIER. Consultez la Licence
* General Public License for Générale Publique GNU Affero
* more details. pour plus de détails.
*
* You should have received Vous devriez avoir reçu une
* a copy of the GNU Affero copie de la Licence Générale
* General Public License along Publique GNU Affero avec
* with OpenCADC. If not, see OpenCADC ; si ce n’est
* <http://www.gnu.org/licenses/>. pas le cas, consultez :
* <http://www.gnu.org/licenses/>.
*
* $Revision: 4 $
*
************************************************************************
*/
package ca.nrc.cadc.ac.server.ldap;
import ca.nrc.cadc.ac.Group;
import ca.nrc.cadc.ac.GroupAlreadyExistsException;
import ca.nrc.cadc.ac.GroupNotFoundException;
import ca.nrc.cadc.ac.User;
import ca.nrc.cadc.ac.UserNotFoundException;
import ca.nrc.cadc.net.TransientException;
import com.unboundid.ldap.sdk.AddRequest;
import com.unboundid.ldap.sdk.Attribute;
import com.unboundid.ldap.sdk.DN;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.LDAPResult;
import com.unboundid.ldap.sdk.Modification;
import com.unboundid.ldap.sdk.ModificationType;
import com.unboundid.ldap.sdk.ModifyRequest;
import com.unboundid.ldap.sdk.SearchRequest;
import com.unboundid.ldap.sdk.SearchResult;
import com.unboundid.ldap.sdk.SearchResultEntry;
import com.unboundid.ldap.sdk.SearchScope;
import com.unboundid.ldap.sdk.controls.ProxiedAuthorizationV2RequestControl;
import java.security.AccessControlException;
import java.security.Principal;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Date;
import java.util.List;
import org.apache.log4j.Logger;
public class LdapGroupDAO<T extends Principal> extends LdapDAO
{
private static final Logger logger = Logger.getLogger(LdapGroupDAO.class);
private static final String ACTUAL_GROUP_TOKEN = "<ACTUAL_GROUP>";
private static final String GROUP_READ_ACI = "(targetattr = \"*\") " +
"(version 3.0;acl \"Group Read\";allow (read,compare,search)" +
"(groupdn = \"ldap:///<ACTUAL_GROUP>\");)";
private static final String GROUP_WRITE_ACI = "(targetattr = \"*\") " +
"(version 3.0;acl \"Group Write\";allow " +
"(read,compare,search,selfwrite,write,add)" +
"(groupdn = \"ldap:///<ACTUAL_GROUP>\");)";
private static final String PUB_GROUP_ACI = "(targetattr = \"*\") " +
"(version 3.0;acl \"Group Public\";" +
"allow (read,compare,search)userdn=\"ldap:///anyone\";)";
private LdapUserDAO<T> userPersist;
public LdapGroupDAO(LdapConfig config, LdapUserDAO<T> userPersist)
{
super(config);
if (userPersist == null)
{
throw new IllegalArgumentException(
"User persistence instance required");
}
this.userPersist = userPersist;
}
/**
* Get the group with the given Group ID.
*
* @param groupID The Group unique ID.
*
* @return A Group instance
*
* @throws GroupNotFoundException If the group was not found.
* @throws TransientException If an temporary, unexpected problem occurred.
*/
throws GroupNotFoundException, TransientException,
AccessControlException
{
return getGroup(groupID, true);
}
/**
* Creates the group.
*
* @param group The group to create
*
* @return created group
*
* @throws GroupAlreadyExistsException If a group with the same ID already
* exists.
* @throws TransientException If an temporary, unexpected problem occurred.
* @throws UserNotFoundException If owner or a member not valid user.
*/
throws GroupAlreadyExistsException, TransientException,
UserNotFoundException, AccessControlException
{
try
{
getGroup(group.getID());
throw new GroupAlreadyExistsException(group.getID());
}
catch (GroupNotFoundException ex)
{
try
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
{
try
{
Group inactiveGroup = getInactiveGroup(group.getID());
// Check requestor owns the group.
DN ownerDN = userPersist.getUserDN(group.getOwner());
if (!ownerDN.equals(getSubjectDN()))
{
throw new AccessControlException(
"Unable to activate group " + group.getID() +
" because " + group.getOwner().getUserID().getName()
+ " is not the owner");
}
List<Modification> mods = new ArrayList<Modification>();
Modification mod =
new Modification(ModificationType.DELETE,
"nsaccountlock");
mods.add(mod);
Group activatedGroup =
modifyGroup(group, inactiveGroup, mods);
return new ActivatedGroup(activatedGroup.getID(),
activatedGroup.getOwner());
}
catch (GroupNotFoundException ignore) {}
throw new UnsupportedOperationException(
"Support for groups properties not available");
DN ownerDN = userPersist.getUserDN(group.getOwner());
String groupWriteAci = null;
String groupReadAci = null;
if (group.groupWrite != null)
{
DN groupWrite = getGroupDN(group.groupWrite.getID());
groupWriteAci = GROUP_WRITE_ACI.replace(
ACTUAL_GROUP_TOKEN,
groupWrite.toNormalizedString());
}
if (group.groupRead != null)
{
DN groupRead = getGroupDN(group.groupRead.getID());
groupReadAci = GROUP_READ_ACI.replace(
ACTUAL_GROUP_TOKEN,
groupRead.toNormalizedString());
// add new group
List<Attribute> attributes = new ArrayList<Attribute>();
attributes.add(new Attribute("objectClass",
"groupofuniquenames"));
attributes.add(new Attribute("cn", group.getID()));
if (group.description != null)
{
attributes.add(new Attribute("description",
group.description));
attributes.add(new Attribute("owner",
ownerDN.toNormalizedString()));
// acis
List<String> acis = new ArrayList<String>();
}
if (groupWriteAci != null)
{
acis.add(groupWriteAci);
}
if (groupReadAci != null)
{
acis.add(groupReadAci);
}
attributes.add(new Attribute("aci",
(String[]) acis.toArray(new String[acis.size()])));
for (User<?> member : group.getUserMembers())
{
DN memberDN = this.userPersist.getUserDN(member);
members.add(memberDN.toNormalizedString());
}
for (Group gr : group.getGroupMembers())
{
DN grDN = getGroupDN(gr.getID());
members.add(grDN.toNormalizedString());
}
attributes.add(new Attribute("uniquemember",
(String[]) members.toArray(new String[members.size()])));
AddRequest addRequest =
new AddRequest(getGroupDN(group.getID()), attributes);
addRequest.addControl(
new ProxiedAuthorizationV2RequestControl(
"dn:" + getSubjectDN().toNormalizedString()));
LDAPResult result = getConnection().add(addRequest);
try
{
return getGroup(group.getID());
}
catch (GroupNotFoundException e)
{
throw new RuntimeException("BUG: new group not found");
}
}
catch (LDAPException e)
{
throw new RuntimeException(e);
}
}
}
/**
* Deletes the group.
*
* @param groupID The group to delete
*
* @throws GroupNotFoundException If the group was not found.
* @throws TransientException If an temporary, unexpected problem occurred.
*/
throws GroupNotFoundException, TransientException,
AccessControlException
Group group = getGroup(groupID);
List<Modification> modifs = new ArrayList<Modification>();
modifs.add(new Modification(ModificationType.ADD, "nsaccountlock", "true"));
if (group.description != null)
modifs.add(new Modification(ModificationType.DELETE, "description"));
}
if (group.groupRead != null ||
group.groupWrite != null ||
group.publicRead)
{
modifs.add(new Modification(ModificationType.DELETE, "aci"));
}
if (!group.getGroupMembers().isEmpty() ||
!group.getUserMembers().isEmpty())
{
modifs.add(new Modification(ModificationType.DELETE, "uniquemember"));
}
ModifyRequest modifyRequest =
new ModifyRequest(getGroupDN(group.getID()), modifs);
try
{
modifyRequest.addControl(
new ProxiedAuthorizationV2RequestControl(
"dn:" + getSubjectDN().toNormalizedString()));
LDAPResult result = getConnection().modify(modifyRequest);
}
catch (LDAPException e1)
{
throw new RuntimeException("LDAP problem", e1);
}
throw new RuntimeException("BUG: group not deleted " +
group.getID());
}
catch (GroupNotFoundException ignore) {}
}
/**
* Obtain a Collection of Groups that fit the given query.
*
* @param role Role of the user, either owner, member, or read/write.
*
* @return Collection of Groups
* matching GROUP_READ_ACI.replace(ACTUAL_GROUP_TOKEN,
* readGrDN.toNormalizedString()) the query, or empty
* Collection. Never null.
* @throws TransientException If an temporary, unexpected problem occurred.
* @throws UserNotFoundException
public Collection<Group> searchGroups(T userID, Role role, String groupID)
throws TransientException, AccessControlException,
User<T> user = new User<T>(userID);
DN userDN;
// TODO check which LDAP exceptions are transient and which
// ones are
// access control
throw new TransientException("Error getting user", e);
if (role == Role.OWNER)
{
return getOwnerGroups(user, userDN, groupID);
}
else if (role == Role.MEMBER)
{
return getMemberGroups(user, userDN, groupID);
}
else if (role == Role.RW)
{
return getRWGroups(user, userDN, groupID);
}
throw new IllegalArgumentException("Unknown role " + role);
private Group getGroup(String groupID, boolean withMembers)
throws GroupNotFoundException, TransientException,
AccessControlException
Filter filter = Filter.createANDFilter(
Filter.createEqualityFilter("cn", groupID),
Filter.createNOTFilter(
Filter.createEqualityFilter("nsaccountlock", "true")));
SearchRequest searchRequest = new SearchRequest(
config.getGroupsDN(), SearchScope.SUB,
filter, new String[] {"entrydn", "cn", "description",
"owner", "uniquemember", "aci",
"modifytimestamp"});
searchRequest.addControl(
new ProxiedAuthorizationV2RequestControl("dn:" +
getSubjectDN().toNormalizedString()));
SearchResultEntry group =
getConnection().searchForEntry(searchRequest);
if (group == null)
{
String msg = "Group not found " + groupID;
logger.debug(msg);
throw new GroupNotFoundException(groupID);
}
String groupCN = group.getAttributeValue("cn");
DN groupOwner = group.getAttributeValueAsDN("owner");
Date lastModified =
group.getAttributeValueAsDate("modifytimestamp");
User<X500Principal> owner;
}
catch (UserNotFoundException e)
{
throw new RuntimeException("BUG: group owner not found");
}
Group ldapGroup = new Group(groupCN, owner);
ldapGroup.description = group.getAttributeValue("description");
ldapGroup.lastModified = lastModified;
if (withMembers)
{
if (group.getAttributeValues("uniquemember") != null)
{
for (String member : group
.getAttributeValues("uniquemember"))
if (memberDN.isDescendantOf(config.getUsersDN(), false))
}
catch (UserNotFoundException e)
{
throw new RuntimeException(
"BUG: group member not found");
}
ldapGroup.getUserMembers().add(usr);
}
else if (memberDN.isDescendantOf(config.getGroupsDN(),
false))
{
Group memberGroup = getGroup(memberDN);
ldapGroup.getGroupMembers().add(memberGroup);
}
else
{
throw new RuntimeException(
"BUG: unknown member DN type: " + memberDN);
if (group.getAttributeValues("aci") != null)
{
for (String aci : group.getAttributeValues("aci"))
{
if (aci.contains("Group Read"))
{
// TODO it's gotta be a better way to do this.
String grRead = aci.substring(
aci.indexOf("ldap:///"));
grRead = grRead.substring(grRead.indexOf("cn"),
grRead.lastIndexOf('"'));
Group groupRead = getGroup(new DN(grRead));
ldapGroup.groupRead = groupRead;
}
else if (aci.contains("Group Write"))
{
// TODO it's gotta be a better way to do this.
String grWrite = aci.substring(
aci.indexOf("ldap:///"));
grWrite = grWrite.substring(grWrite.indexOf("cn"),
grWrite.lastIndexOf('"'));
Group groupWrite = getGroup(new DN(grWrite));
ldapGroup.groupWrite = groupWrite;
}
{
ldapGroup.publicRead = true;
}
}
}
}
return ldapGroup;
}
catch (LDAPException e1)
{
// TODO check which LDAP exceptions are transient and which
// ones are
// access control
throw new TransientException("Error getting the group", e1);
}
catch (UserNotFoundException e2)
{
throw new RuntimeException("BUG - owner or member not found", e2);
}
}
/**
* Modify the given group.
*
* @param group The group to update.
*
* @return The newly updated group.
*
* @throws GroupNotFoundException If the group was not found.
* @throws TransientException If an temporary, unexpected problem occurred.
* @throws AccessControlException If the operation is not permitted.
* @throws UserNotFoundException If owner or group members not valid users.
*/
throws GroupNotFoundException, TransientException,
AccessControlException, UserNotFoundException
return modifyGroup(group, oldGroup, null);
}
private Group modifyGroup(Group newGroup, Group oldGroup,
List<Modification> modifications)
throws UserNotFoundException, TransientException,
AccessControlException
{
if (!newGroup.getProperties().isEmpty())
throw new UnsupportedOperationException(
"Support for groups properties not available");
List<Modification> modifs = new ArrayList<Modification>();
if (modifications != null)
{
modifs.addAll(modifications);
}
if (newGroup.description == null && oldGroup.description != null)
modifs.add(new Modification(ModificationType.DELETE,
"description"));
modifs.add(new Modification(ModificationType.REPLACE, "description",
throw new IllegalArgumentException(
"cyclical reference from groupRead to group");
DN readGrDN = getGroupDN(newGroup.groupRead.getID());
acis.add(GROUP_READ_ACI.replace(ACTUAL_GROUP_TOKEN,
readGrDN.toNormalizedString()));
throw new IllegalArgumentException(
"cyclical reference from groupWrite to group");
DN writeGrDN = getGroupDN(newGroup.groupWrite.getID());
acis.add(GROUP_WRITE_ACI.replace(ACTUAL_GROUP_TOKEN,
writeGrDN.toNormalizedString()));
modifs.add(new Modification(ModificationType.REPLACE, "aci", (String[])
acis.toArray(new String[acis.size()])));
List<String> newMembers = new ArrayList<String>();
{
if (!oldGroup.getUserMembers().remove(member))
{
DN memberDN;
try
{
throw new UserNotFoundException(
"User not found " + member.getUserID());
}
newMembers.add(memberDN.toNormalizedString());
}
}
throw new IllegalArgumentException(
"cyclical reference from group member to group");
}
if (!oldGroup.getGroupMembers().remove(gr))
{
DN grDN = getGroupDN(gr.getID());
newMembers.add(grDN.toNormalizedString());
}
}
modifs.add(new Modification(ModificationType.ADD, "uniquemember",
(String[]) newMembers.toArray(new String[newMembers.size()])));
List<String> delMembers = new ArrayList<String>();
for (User<?> member : oldGroup.getUserMembers())
{
DN memberDN;
try
{
memberDN = this.userPersist.getUserDN(member);
}
catch (LDAPException e)
{
throw new UserNotFoundException(
"User not found " + member.getUserID());
}
delMembers.add(memberDN.toNormalizedString());
}
for (Group gr : oldGroup.getGroupMembers())
{
DN grDN = getGroupDN(gr.getID());
delMembers.add(grDN.toNormalizedString());
}
modifs.add(new Modification(ModificationType.DELETE, "uniquemember",
(String[]) delMembers.toArray(new String[delMembers.size()])));
new ModifyRequest(getGroupDN(newGroup.getID()), modifs);
modifyRequest.addControl(
new ProxiedAuthorizationV2RequestControl(
"dn:" + getSubjectDN().toNormalizedString()));
LDAPResult result = getConnection().modify(modifyRequest);
}
catch (LDAPException e1)
{
throw new RuntimeException("LDAP problem", e1);
}
try
{
}
catch (GroupNotFoundException e)
{
throw new RuntimeException("BUG: new group not found");
/**
* Returns a group based on its LDAP DN. The returned group is bared
* (contains only group ID, owner and description).
*
* @param groupDN
* @return
* @throws com.unboundid.ldap.sdk.LDAPException
* @throws ca.nrc.cadc.ac.GroupNotFoundException
* @throws ca.nrc.cadc.ac.UserNotFoundException
*/
protected Group getGroup(DN groupDN)
throws LDAPException, GroupNotFoundException, UserNotFoundException
{
getConnection().getEntry(groupDN.toNormalizedString(),
new String[] {"cn", "description", "owner",
"modifytimestamp"});
if (searchResult == null)
{
String msg = "Group not found " + groupDN;
logger.debug(msg);
throw new GroupNotFoundException(groupDN.toNormalizedString());
}
DN ownerDN = searchResult.getAttributeValueAsDN("owner");
User<X500Principal> owner = userPersist.getMember(ownerDN);
Group group = new Group(searchResult.getAttributeValue("cn"), owner);
group.description = searchResult.getAttributeValue("description");
group.lastModified =
searchResult.getAttributeValueAsDate("modifytimestamp");
return group;
}
protected DN getGroupDN(String groupID)
{
try
{
return new DN("cn=" + groupID + "," + config.getGroupsDN());
}
catch (LDAPException e)
{
}
throw new IllegalArgumentException(groupID + " not a valid group ID");
}
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
protected Collection<Group> getOwnerGroups(User<T> user, DN userDN,
String groupID)
throws TransientException, AccessControlException,
GroupNotFoundException, UserNotFoundException
{
try
{
Filter filter = Filter.createEqualityFilter("owner",
userDN.toString());
if (groupID != null)
{
getGroup(groupID);
filter = Filter.createANDFilter(filter,
Filter.createEqualityFilter("cn", groupID));
}
SearchRequest searchRequest = new SearchRequest(
config.getGroupsDN(), SearchScope.SUB, filter,
new String[] {"cn", "description", "modifytimestamp"});
searchRequest.addControl(
new ProxiedAuthorizationV2RequestControl("dn:" +
getSubjectDN().toNormalizedString()));
Collection<Group> groups = new ArrayList<Group>();
SearchResult results = getConnection().search(searchRequest);
for (SearchResultEntry result : results.getSearchEntries())
{
String groupName = result.getAttributeValue("cn");
// Ignore existing illegal group names.
try
{
Group group = new Group(groupName, user);
group.description = result.getAttributeValue("description");
group.lastModified =
result.getAttributeValueAsDate("modifytimestamp");
groups.add(group);
}
catch (IllegalArgumentException ignore) { }
}
return groups;
}
catch (LDAPException e1)
{
// TODO check which LDAP exceptions are transient and which
// ones are
// access control
throw new TransientException("Error getting groups", e1);
}
}
protected Collection<Group> getMemberGroups(User<T> user, DN userDN,
String groupID)
throws TransientException, AccessControlException,
GroupNotFoundException, UserNotFoundException
{
if (groupID != null)
{
Collection<Group> groups = new ArrayList<Group>();
if (userPersist.isMember(user.getUserID(), groupID))
{
groups.add(getGroup(groupID));
}
return groups;
}
else
{
return userPersist.getUserGroups(user.getUserID());
}
}
protected Collection<Group> getRWGroups(User<T> user, DN userDN,
String groupID)
throws TransientException, AccessControlException,
GroupNotFoundException, UserNotFoundException
{
try
{
Collection<Group> queryGroups = new ArrayList<Group>();
if (groupID != null)
{
queryGroups.add(new Group(groupID, user));
}
else
{
// List of Groups the user belongs to.
queryGroups.addAll(getMemberGroups(user, userDN, groupID));
// List of Groups the user owns;
queryGroups.addAll(getOwnerGroups(user, userDN, groupID));
}
System.out.println("# groups: " + queryGroups.size());
List<Filter> filters = new ArrayList<Filter>();
for (Group member : queryGroups)
{
// Require both groupRead and groupWrite
if (member.groupRead != null && member.groupWrite != null)
{
DN groupRead = getGroupDN(member.groupRead.getID());
String groupReadAci =
GROUP_READ_ACI.replace(ACTUAL_GROUP_TOKEN,
groupRead.toNormalizedString());
DN groupWrite = getGroupDN(member.groupRead.getID());
String groupWriteAci =
GROUP_WRITE_ACI.replace(ACTUAL_GROUP_TOKEN,
groupWrite.toNormalizedString());
System.out.println(groupReadAci);
System.out.println(groupWriteAci);
Filter filter = Filter.createANDFilter(
Filter.createEqualityFilter("aci", groupReadAci),
Filter.createEqualityFilter("aci", groupWriteAci));
filters.add(filter);
}
}
Collection<Group> groups = new ArrayList<Group>();
if (filters.isEmpty())
{
return groups;
}
Filter filter = Filter.createORFilter(filters);
SearchRequest searchRequest = new SearchRequest(
config.getGroupsDN(), SearchScope.SUB, filter,
new String[] {"cn", "owner", "description",
"modifytimestamp"});
searchRequest.addControl(
new ProxiedAuthorizationV2RequestControl("dn:" +
getSubjectDN().toNormalizedString()));
SearchResult results = getConnection().search(searchRequest);
for (SearchResultEntry result : results.getSearchEntries())
{
String groupName = result.getAttributeValue("cn");
DN ownerDN = result.getAttributeValueAsDN("owner");
User<X500Principal> owner = userPersist.getMember(ownerDN);
// Ignore existing illegal group names.
try
{
Group group = new Group(groupName, owner);
group.description = result.getAttributeValue("description");
group.lastModified =
result.getAttributeValueAsDate("modifytimestamp");
groups.add(group);
}
catch (IllegalArgumentException ignore) { }
}
return groups;
}
catch (LDAPException e)
{
// TODO check which LDAP exceptions are transient and which
// ones are
// access control
throw new TransientException("Error getting groups", e);
}
}
protected Collection<Group> getRWGroups2(User<T> user, DN userDN,
String groupID)
throws TransientException, AccessControlException,
GroupNotFoundException, UserNotFoundException
{
try
{
Collection<Group> groups = new ArrayList<Group>();
Collection<Group> queryGroups = new ArrayList<Group>();
if (groupID != null)
{
queryGroups.add(new Group(groupID, user));
}
else
{
// List of Groups the user belongs to.
queryGroups.addAll(getMemberGroups(user, userDN, groupID));
// List of Groups the user owns;
queryGroups.addAll(getOwnerGroups(user, userDN, groupID));
}
for (Group member : queryGroups)
{
// Require both groupRead and groupWrite
if (member.groupRead != null && member.groupWrite != null)
{
DN groupRead = getGroupDN(member.groupRead.getID());
String groupReadAci =
GROUP_READ_ACI.replace(ACTUAL_GROUP_TOKEN,
groupRead.toNormalizedString());
DN groupWrite = getGroupDN(member.groupWrite.getID());
String groupWriteAci =
GROUP_WRITE_ACI.replace(ACTUAL_GROUP_TOKEN,
groupWrite.toNormalizedString());
Filter filter = Filter.createANDFilter(
Filter.createEqualityFilter("aci", groupReadAci),
Filter.createEqualityFilter("aci", groupWriteAci));
SearchRequest searchRequest = new SearchRequest(
config.getGroupsDN(), SearchScope.SUB, filter,
new String[] {"cn", "owner", "description",
"modifytimestamp"});
searchRequest.addControl(
new ProxiedAuthorizationV2RequestControl("dn:" +
getSubjectDN().toNormalizedString()));
SearchResult results = getConnection().search(searchRequest);
for (SearchResultEntry result : results.getSearchEntries())
{
String groupName = result.getAttributeValue("cn");
DN ownerDN = result.getAttributeValueAsDN("owner");
User<X500Principal> owner = userPersist.getMember(ownerDN);
// Ignore existing illegal group names.
try
{
Group group = new Group(groupName, owner);
group.description = result.getAttributeValue("description");
group.lastModified =
result.getAttributeValueAsDate("modifytimestamp");
groups.add(group);
}
catch (IllegalArgumentException ignore) { }
}
}
}
return groups;
}
catch (LDAPException e1)
{
// TODO check which LDAP exceptions are transient and which
// ones are
// access control
throw new TransientException("Error getting groups", e1);
}