2 * Copyright (C) 2010 Mathieu Baudier <mbaudier@argeo.org>
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 package org
.argeo
.security
.ldap
;
19 import static org
.argeo
.security
.core
.ArgeoUserDetails
.createSimpleArgeoUser
;
21 import java
.security
.NoSuchAlgorithmException
;
22 import java
.security
.SecureRandom
;
23 import java
.util
.ArrayList
;
24 import java
.util
.List
;
25 import java
.util
.Random
;
27 import javax
.naming
.Name
;
28 import javax
.naming
.NamingException
;
29 import javax
.naming
.directory
.DirContext
;
31 import org
.argeo
.security
.ArgeoSecurityDao
;
32 import org
.argeo
.security
.ArgeoUser
;
33 import org
.argeo
.security
.SimpleArgeoUser
;
34 import org
.argeo
.security
.core
.ArgeoUserDetails
;
35 import org
.springframework
.beans
.factory
.InitializingBean
;
36 import org
.springframework
.ldap
.core
.ContextExecutor
;
37 import org
.springframework
.ldap
.core
.ContextMapper
;
38 import org
.springframework
.ldap
.core
.DirContextAdapter
;
39 import org
.springframework
.ldap
.core
.DistinguishedName
;
40 import org
.springframework
.ldap
.core
.LdapTemplate
;
41 import org
.springframework
.ldap
.core
.support
.BaseLdapPathContextSource
;
42 import org
.springframework
.security
.context
.SecurityContextHolder
;
43 import org
.springframework
.security
.ldap
.DefaultLdapUsernameToDnMapper
;
44 import org
.springframework
.security
.ldap
.LdapAuthoritiesPopulator
;
45 import org
.springframework
.security
.ldap
.LdapUsernameToDnMapper
;
46 import org
.springframework
.security
.ldap
.LdapUtils
;
47 import org
.springframework
.security
.ldap
.populator
.DefaultLdapAuthoritiesPopulator
;
48 import org
.springframework
.security
.ldap
.search
.FilterBasedLdapUserSearch
;
49 import org
.springframework
.security
.providers
.UsernamePasswordAuthenticationToken
;
50 import org
.springframework
.security
.providers
.ldap
.authenticator
.LdapShaPasswordEncoder
;
51 import org
.springframework
.security
.userdetails
.UserDetails
;
52 import org
.springframework
.security
.userdetails
.UserDetailsManager
;
53 import org
.springframework
.security
.userdetails
.UserDetailsService
;
54 import org
.springframework
.security
.userdetails
.ldap
.LdapUserDetailsManager
;
55 import org
.springframework
.security
.userdetails
.ldap
.LdapUserDetailsService
;
56 import org
.springframework
.security
.userdetails
.ldap
.UserDetailsContextMapper
;
58 public class ArgeoSecurityDaoLdap
implements ArgeoSecurityDao
, InitializingBean
{
59 // private final static Log log = LogFactory.getLog(UserDaoLdap.class);
61 private UserDetailsManager userDetailsManager
;
62 private LdapAuthoritiesPopulator authoritiesPopulator
;
63 private String userBase
= "ou=People";
64 private String usernameAttributeName
= "uid";
65 private String groupBase
= "ou=Roles";
66 private String
[] groupClasses
= { "top", "groupOfNames" };
67 private String groupRoleAttributeName
= "cn";
68 private String groupMemberAttributeName
= "member";
69 private String defaultRole
= "ROLE_USER";
70 private String rolePrefix
= "ROLE_";
72 private final BaseLdapPathContextSource contextSource
;
73 private final LdapTemplate ldapTemplate
;
75 private LdapUsernameToDnMapper usernameMapper
= null;
77 private UserDetailsContextMapper userDetailsMapper
;
78 private LdapUserDetailsService ldapUserDetailsService
;
79 private List
<UserNatureMapper
> userNatureMappers
;
81 private LdapShaPasswordEncoder ldapShaPasswordEncoder
= new LdapShaPasswordEncoder();
82 private Random random
;
84 public ArgeoSecurityDaoLdap(BaseLdapPathContextSource contextSource
) {
85 this.contextSource
= contextSource
;
86 ldapTemplate
= new LdapTemplate(this.contextSource
);
88 random
= SecureRandom
.getInstance("SHA1PRNG");
89 } catch (NoSuchAlgorithmException e
) {
90 random
= new Random(System
.currentTimeMillis());
94 public void afterPropertiesSet() throws Exception
{
95 if (usernameMapper
== null)
96 usernameMapper
= new DefaultLdapUsernameToDnMapper(userBase
,
97 usernameAttributeName
);
99 if (authoritiesPopulator
== null) {
100 DefaultLdapAuthoritiesPopulator ap
= new DefaultLdapAuthoritiesPopulator(
101 ldapTemplate
.getContextSource(), groupBase
);
102 ap
.setDefaultRole(defaultRole
);
103 ap
.setGroupSearchFilter(groupMemberAttributeName
+ "={0}");
104 authoritiesPopulator
= ap
;
107 if (userDetailsMapper
== null) {
108 ArgeoUserDetailsContextMapper audm
= new ArgeoUserDetailsContextMapper();
109 audm
.setUserNatureMappers(userNatureMappers
);
110 userDetailsMapper
= audm
;
113 if (userDetailsManager
== null) {
114 LdapUserDetailsManager ludm
= new LdapUserDetailsManager(
115 ldapTemplate
.getContextSource());
116 ludm
.setGroupSearchBase(groupBase
);
117 ludm
.setUserDetailsMapper(userDetailsMapper
);
118 ludm
.setUsernameMapper(usernameMapper
);
119 ludm
.setGroupMemberAttributeName(groupMemberAttributeName
);
120 userDetailsManager
= ludm
;
123 if (ldapUserDetailsService
== null) {
124 FilterBasedLdapUserSearch ldapUserSearch
= new FilterBasedLdapUserSearch(
125 userBase
, "(" + usernameAttributeName
+ "={0})",
127 ldapUserDetailsService
= new LdapUserDetailsService(ldapUserSearch
,
128 authoritiesPopulator
);
129 ldapUserDetailsService
.setUserDetailsMapper(userDetailsMapper
);
133 public synchronized void create(ArgeoUser user
) {
134 userDetailsManager
.createUser(new ArgeoUserDetails(user
));
137 public synchronized ArgeoUser
getUser(String uname
) {
138 SimpleArgeoUser user
= createSimpleArgeoUser(getDetails(uname
));
139 user
.setPassword(null);
143 public synchronized ArgeoUser
getUserWithPassword(String uname
) {
144 return createSimpleArgeoUser(getDetails(uname
));
147 // public ArgeoUser getCurrentUser() {
148 // ArgeoUser argeoUser = ArgeoUserDetails.securityContextUser();
149 // if (argeoUser == null)
151 // if (argeoUser.getRoles().contains(defaultRole))
152 // argeoUser.getRoles().remove(defaultRole);
156 @SuppressWarnings("unchecked")
157 public synchronized List
<ArgeoUser
> listUsers() {
158 List
<String
> usernames
= (List
<String
>) ldapTemplate
.listBindings(
159 new DistinguishedName(userBase
), new ContextMapper() {
160 public Object
mapFromContext(Object ctxArg
) {
161 DirContextAdapter ctx
= (DirContextAdapter
) ctxArg
;
162 return ctx
.getStringAttribute(usernameAttributeName
);
166 List
<ArgeoUser
> lst
= new ArrayList
<ArgeoUser
>();
167 for (String username
: usernames
) {
168 lst
.add(createSimpleArgeoUser(getDetails(username
)));
173 @SuppressWarnings("unchecked")
174 public List
<String
> listEditableRoles() {
175 return (List
<String
>) ldapTemplate
.listBindings(groupBase
,
176 new ContextMapper() {
177 public Object
mapFromContext(Object ctxArg
) {
178 String groupName
= ((DirContextAdapter
) ctxArg
)
179 .getStringAttribute(groupRoleAttributeName
);
180 String roleName
= convertGroupToRole(groupName
);
186 public synchronized void update(ArgeoUser user
) {
187 ArgeoUserDetails argeoUserDetails
= new ArgeoUserDetails(user
);
188 userDetailsManager
.updateUser(new ArgeoUserDetails(user
));
189 // refresh logged in user
190 if (ArgeoUserDetails
.securityContextUser().getUsername()
191 .equals(argeoUserDetails
.getUsername())) {
192 SecurityContextHolder
.getContext().setAuthentication(
193 new UsernamePasswordAuthenticationToken(argeoUserDetails
,
194 null, argeoUserDetails
.getAuthorities()));
198 public synchronized void delete(String username
) {
199 userDetailsManager
.deleteUser(username
);
202 public synchronized Boolean
userExists(String username
) {
203 return userDetailsManager
.userExists(username
);
206 public void createRole(String role
, final String superuserName
) {
207 String group
= convertRoleToGroup(role
);
208 DistinguishedName superuserDn
= (DistinguishedName
) ldapTemplate
209 .executeReadWrite(new ContextExecutor() {
210 public Object
executeWithContext(DirContext ctx
)
211 throws NamingException
{
212 return LdapUtils
.getFullDn(
213 usernameMapper
.buildDn(superuserName
), ctx
);
217 Name groupDn
= buildGroupDn(group
);
218 DirContextAdapter context
= new DirContextAdapter();
219 context
.setAttributeValues("objectClass", groupClasses
);
220 context
.setAttributeValue("cn", group
);
222 // Add superuser because cannot create empty group
223 context
.setAttributeValue(groupMemberAttributeName
,
224 superuserDn
.toString());
226 ldapTemplate
.bind(groupDn
, context
, null);
229 public void deleteRole(String role
) {
230 String group
= convertRoleToGroup(role
);
231 Name dn
= buildGroupDn(group
);
232 ldapTemplate
.unbind(dn
);
235 public Boolean
isPasswordValid(String encoded
, String raw
) {
236 return ldapShaPasswordEncoder
.isPasswordValid(encoded
, raw
, null);
239 public String
encodePassword(String raw
) {
241 // TODO: check that Linux auth supports SSHA
242 // byte[] salt = new byte[16];
243 // random.nextBytes(salt);
244 return ldapShaPasswordEncoder
.encodePassword(raw
, salt
);
247 protected String
convertRoleToGroup(String role
) {
249 if (group
.startsWith(rolePrefix
)) {
250 group
= group
.substring(rolePrefix
.length());
251 group
= group
.toLowerCase();
256 public String
convertGroupToRole(String groupName
) {
257 groupName
= groupName
.toUpperCase();
259 return rolePrefix
+ groupName
;
262 protected Name
buildGroupDn(String name
) {
263 return new DistinguishedName(groupRoleAttributeName
+ "=" + name
+ ","
267 public void setUserDetailsManager(UserDetailsManager userDetailsManager
) {
268 this.userDetailsManager
= userDetailsManager
;
271 public void setUserBase(String userBase
) {
272 this.userBase
= userBase
;
275 public void setUsernameAttributeName(String usernameAttribute
) {
276 this.usernameAttributeName
= usernameAttribute
;
279 public void setAuthoritiesPopulator(
280 LdapAuthoritiesPopulator authoritiesPopulator
) {
281 this.authoritiesPopulator
= authoritiesPopulator
;
284 protected UserDetails
getDetails(String username
) {
285 return userDetailsManager
.loadUserByUsername(username
);
288 public void setGroupBase(String groupBase
) {
289 this.groupBase
= groupBase
;
292 public void setGroupRoleAttributeName(String groupRoleAttributeName
) {
293 this.groupRoleAttributeName
= groupRoleAttributeName
;
296 public void setGroupMemberAttributeName(String groupMemberAttributeName
) {
297 this.groupMemberAttributeName
= groupMemberAttributeName
;
300 public void setDefaultRole(String defaultRole
) {
301 this.defaultRole
= defaultRole
;
304 public void setRolePrefix(String rolePrefix
) {
305 this.rolePrefix
= rolePrefix
;
308 public void setUsernameMapper(LdapUsernameToDnMapper usernameMapper
) {
309 this.usernameMapper
= usernameMapper
;
312 public void setUserDetailsMapper(UserDetailsContextMapper userDetailsMapper
) {
313 this.userDetailsMapper
= userDetailsMapper
;
316 public LdapAuthoritiesPopulator
getAuthoritiesPopulator() {
317 return authoritiesPopulator
;
320 public UserDetailsContextMapper
getUserDetailsMapper() {
321 return userDetailsMapper
;
324 public void setUserNatureMappers(List
<UserNatureMapper
> userNatureMappers
) {
325 this.userNatureMappers
= userNatureMappers
;
328 public String
getDefaultRole() {
332 public void setGroupClasses(String
[] groupClasses
) {
333 this.groupClasses
= groupClasses
;
336 public UserDetailsService
getUserDetailsService() {
337 return ldapUserDetailsService
;