]>
git.argeo.org Git - lgpl/argeo-commons.git/blob - org.argeo.security.core/src/org/argeo/osgi/useradmin/LdifUserAdmin.java
1 package org
.argeo
.osgi
.useradmin
;
4 import java
.io
.FileOutputStream
;
5 import java
.io
.IOException
;
6 import java
.io
.InputStream
;
7 import java
.io
.OutputStream
;
8 import java
.util
.ArrayList
;
9 import java
.util
.Dictionary
;
10 import java
.util
.Hashtable
;
11 import java
.util
.List
;
12 import java
.util
.SortedMap
;
13 import java
.util
.TreeMap
;
15 import javax
.naming
.InvalidNameException
;
16 import javax
.naming
.NamingEnumeration
;
17 import javax
.naming
.directory
.Attributes
;
18 import javax
.naming
.ldap
.LdapName
;
19 import javax
.transaction
.TransactionManager
;
21 import org
.apache
.commons
.io
.IOUtils
;
22 import org
.osgi
.framework
.Filter
;
23 import org
.osgi
.service
.useradmin
.Role
;
24 import org
.osgi
.service
.useradmin
.User
;
27 * A user admin based on a LDIF files. Requires a {@link TransactionManager} and
28 * an open transaction for write access.
30 public class LdifUserAdmin
extends AbstractUserDirectory
{
31 private SortedMap
<LdapName
, DirectoryUser
> users
= new TreeMap
<LdapName
, DirectoryUser
>();
32 private SortedMap
<LdapName
, DirectoryGroup
> groups
= new TreeMap
<LdapName
, DirectoryGroup
>();
34 public LdifUserAdmin(String uri
, String baseDn
) {
35 this(fromUri(uri
, baseDn
));
38 public LdifUserAdmin(Dictionary
<String
, ?
> properties
) {
42 public LdifUserAdmin(InputStream in
) {
43 super(new Hashtable
<String
, Object
>());
49 private static Dictionary
<String
, Object
> fromUri(String uri
, String baseDn
) {
50 Hashtable
<String
, Object
> res
= new Hashtable
<String
, Object
>();
51 res
.put(UserAdminConf
.uri
.property(), uri
);
52 res
.put(UserAdminConf
.baseDn
.property(), baseDn
);
58 if (getUri().getScheme().equals("file")) {
59 File file
= new File(getUri());
63 load(getUri().toURL().openStream());
64 } catch (Exception e
) {
65 throw new UserDirectoryException("Cannot open URL " + getUri(), e
);
70 if (getUri() == null || isReadOnly())
71 throw new UserDirectoryException("Cannot save LDIF user admin");
72 try (FileOutputStream out
= new FileOutputStream(new File(getUri()))) {
74 } catch (IOException e
) {
75 throw new UserDirectoryException("Cannot save user admin to "
80 public void save(OutputStream out
) throws IOException
{
82 LdifWriter ldifWriter
= new LdifWriter(out
);
83 for (LdapName name
: groups
.keySet())
84 ldifWriter
.writeEntry(name
, groups
.get(name
).getAttributes());
85 for (LdapName name
: users
.keySet())
86 ldifWriter
.writeEntry(name
, users
.get(name
).getAttributes());
88 IOUtils
.closeQuietly(out
);
92 protected void load(InputStream in
) {
97 LdifParser ldifParser
= new LdifParser();
98 SortedMap
<LdapName
, Attributes
> allEntries
= ldifParser
.read(in
);
99 for (LdapName key
: allEntries
.keySet()) {
100 Attributes attributes
= allEntries
.get(key
);
101 NamingEnumeration
<?
> objectClasses
= attributes
.get(
102 "objectClass").getAll();
103 objectClasses
: while (objectClasses
.hasMore()) {
104 String objectClass
= objectClasses
.next().toString();
105 if (objectClass
.equals("inetOrgPerson")) {
106 users
.put(key
, new LdifUser(this, key
, attributes
));
108 } else if (objectClass
.equals("groupOfNames")) {
109 groups
.put(key
, new LdifGroup(this, key
, attributes
));
114 } catch (Exception e
) {
115 throw new UserDirectoryException(
116 "Cannot load user admin service from LDIF", e
);
120 public void destroy() {
127 protected DirectoryUser
daoGetRole(LdapName key
) {
128 if (groups
.containsKey(key
))
129 return groups
.get(key
);
130 if (users
.containsKey(key
))
131 return users
.get(key
);
135 protected Boolean
daoHasRole(LdapName dn
) {
136 return users
.containsKey(dn
) || groups
.containsKey(dn
);
139 @SuppressWarnings("unchecked")
140 protected List
<DirectoryUser
> doGetRoles(Filter f
) {
141 ArrayList
<DirectoryUser
> res
= new ArrayList
<DirectoryUser
>();
143 res
.addAll(users
.values());
144 res
.addAll(groups
.values());
146 // Filter f = FrameworkUtil.createFilter(filter);
147 for (DirectoryUser user
: users
.values())
148 if (f
.match(user
.getProperties()))
150 for (DirectoryUser group
: groups
.values())
151 if (f
.match(group
.getProperties()))
158 protected List
<DirectoryGroup
> getDirectGroups(User user
) {
160 if (user
instanceof LdifUser
)
161 dn
= ((LdifUser
) user
).getDn();
164 dn
= new LdapName(user
.getName());
165 } catch (InvalidNameException e
) {
166 throw new UserDirectoryException("Badly formatted user name "
167 + user
.getName(), e
);
170 List
<DirectoryGroup
> directGroups
= new ArrayList
<DirectoryGroup
>();
171 for (LdapName name
: groups
.keySet()) {
172 DirectoryGroup group
= groups
.get(name
);
173 if (group
.getMemberNames().contains(dn
))
174 directGroups
.add(group
);
180 protected void prepare(WorkingCopy wc
) {
182 for (LdapName dn
: wc
.getDeletedUsers().keySet()) {
183 if (users
.containsKey(dn
))
185 else if (groups
.containsKey(dn
))
188 throw new UserDirectoryException("User to delete no found "
192 for (LdapName dn
: wc
.getNewUsers().keySet()) {
193 DirectoryUser user
= wc
.getNewUsers().get(dn
);
194 if (Role
.USER
== user
.getType())
196 else if (Role
.GROUP
== user
.getType())
197 groups
.put(dn
, (DirectoryGroup
) user
);
199 throw new UserDirectoryException("Unsupported role type "
200 + user
.getType() + " for new user " + dn
);
203 for (LdapName dn
: wc
.getModifiedUsers().keySet()) {
204 Attributes modifiedAttrs
= wc
.getModifiedUsers().get(dn
);
206 if (users
.containsKey(dn
))
207 user
= users
.get(dn
);
208 else if (groups
.containsKey(dn
))
209 user
= groups
.get(dn
);
211 throw new UserDirectoryException("User to modify no found "
213 user
.publishAttributes(modifiedAttrs
);
218 protected void commit(WorkingCopy wc
) {
223 protected void rollback(WorkingCopy wc
) {