Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
OATS-CADC
ac
Commits
6405cb34
Commit
6405cb34
authored
Mar 30, 2016
by
Jeff Burke
Browse files
t72796: check for presence of nsaccountlock when getting users
parent
94e68b6b
Changes
1
Show whitespace changes
Inline
Side-by-side
cadcAccessControl-Server/src/ca/nrc/cadc/ac/server/ldap/LdapUserDAO.java
View file @
6405cb34
...
@@ -473,7 +473,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
...
@@ -473,7 +473,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
Filter
filter
=
null
;
Filter
filter
=
null
;
try
try
{
{
filter
=
Filter
.
createEqualityFilter
(
searchField
,
userID
.
getName
());
Filter
notFilter
=
Filter
.
createNOTFilter
(
Filter
.
createPresenceFilter
(
LDAP_NSACCOUNTLOCK
));
Filter
equalsFilter
=
Filter
.
createEqualityFilter
(
searchField
,
userID
.
getName
());
filter
=
Filter
.
createANDFilter
(
notFilter
,
equalsFilter
);
logger
.
debug
(
"search filter: "
+
filter
);
logger
.
debug
(
"search filter: "
+
filter
);
SearchRequest
searchRequest
=
SearchRequest
searchRequest
=
...
@@ -571,7 +573,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
...
@@ -571,7 +573,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
Filter
filter
=
null
;
Filter
filter
=
null
;
try
try
{
{
filter
=
Filter
.
createEqualityFilter
(
"email"
,
emailAddress
);
Filter
notFilter
=
Filter
.
createNOTFilter
(
Filter
.
createPresenceFilter
(
LDAP_NSACCOUNTLOCK
));
Filter
equalsFilter
=
Filter
.
createEqualityFilter
(
"email"
,
emailAddress
);
filter
=
Filter
.
createANDFilter
(
notFilter
,
equalsFilter
);
logger
.
debug
(
"search filter: "
+
filter
);
logger
.
debug
(
"search filter: "
+
filter
);
SearchRequest
searchRequest
=
SearchRequest
searchRequest
=
...
@@ -683,7 +687,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
...
@@ -683,7 +687,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
try
try
{
{
Filter
filter
=
Filter
.
createEqualityFilter
(
searchField
,
userID
.
getName
());
Filter
notFilter
=
Filter
.
createNOTFilter
(
Filter
.
createPresenceFilter
(
LDAP_NSACCOUNTLOCK
));
Filter
equalsFilter
=
Filter
.
createEqualityFilter
(
searchField
,
userID
.
getName
());
Filter
filter
=
Filter
.
createANDFilter
(
notFilter
,
equalsFilter
);
profiler
.
checkpoint
(
"getAugmentedUser.createFilter"
);
profiler
.
checkpoint
(
"getAugmentedUser.createFilter"
);
logger
.
debug
(
"search filter: "
+
filter
);
logger
.
debug
(
"search filter: "
+
filter
);
...
@@ -792,7 +798,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
...
@@ -792,7 +798,9 @@ public class LdapUserDAO<T extends Principal> extends LdapDAO
{
{
final
Collection
<
User
<
Principal
>>
users
=
new
ArrayList
<
User
<
Principal
>>();
final
Collection
<
User
<
Principal
>>
users
=
new
ArrayList
<
User
<
Principal
>>();
Filter
filter
=
Filter
.
createPresenceFilter
(
LDAP_UID
);
Filter
notFilter
=
Filter
.
createNOTFilter
(
Filter
.
createPresenceFilter
(
LDAP_NSACCOUNTLOCK
));
Filter
presenceFilter
=
Filter
.
createPresenceFilter
(
LDAP_UID
);
Filter
filter
=
Filter
.
createANDFilter
(
notFilter
,
presenceFilter
);
logger
.
debug
(
"search filter: "
+
filter
);
logger
.
debug
(
"search filter: "
+
filter
);
final
String
[]
attributes
=
new
String
[]
final
String
[]
attributes
=
new
String
[]
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment