1 package org
.argeo
.cms
.directory
.ldap
;
3 import java
.io
.IOException
;
4 import java
.net
.InetAddress
;
6 import java
.net
.URISyntaxException
;
7 import java
.util
.ArrayList
;
8 import java
.util
.Dictionary
;
9 import java
.util
.Hashtable
;
10 import java
.util
.List
;
11 import java
.util
.StringJoiner
;
13 import javax
.naming
.InvalidNameException
;
14 import javax
.naming
.ldap
.LdapName
;
16 import org
.argeo
.api
.acr
.ldap
.LdapAttr
;
17 import org
.argeo
.cms
.dns
.DnsBrowser
;
18 import org
.argeo
.cms
.runtime
.DirectoryConf
;
20 /** Free IPA specific conventions. */
21 public class IpaUtils
{
22 public final static String IPA_USER_BASE
= "cn=users";
23 public final static String IPA_GROUP_BASE
= "cn=groups";
24 public final static String IPA_ROLE_BASE
= "cn=roles";
25 public final static String IPA_SERVICE_BASE
= "cn=services";
27 public final static String IPA_ACCOUNTS_BASE
= "cn=accounts";
29 private final static String KRB_PRINCIPAL_NAME
= LdapAttr
.krbPrincipalName
.name().toLowerCase();
31 public final static String IPA_USER_DIRECTORY_CONFIG
= DirectoryConf
.userBase
+ "=" + IPA_USER_BASE
+ "&"
32 + DirectoryConf
.groupBase
+ "=" + IPA_GROUP_BASE
+ "&" + DirectoryConf
.systemRoleBase
+ "=" + IPA_ROLE_BASE
33 + "&" + DirectoryConf
.readOnly
+ "=true";
36 static String
domainToUserDirectoryConfigPath(String realm
) {
37 return domainToBaseDn(realm
) + "?" + IPA_USER_DIRECTORY_CONFIG
+ "&" + DirectoryConf
.realm
.name() + "=" + realm
;
40 public static void addIpaConfig(String realm
, Dictionary
<String
, Object
> properties
) {
41 properties
.put(DirectoryConf
.baseDn
.name(), domainToBaseDn(realm
));
42 properties
.put(DirectoryConf
.realm
.name(), realm
);
43 properties
.put(DirectoryConf
.userBase
.name(), IPA_USER_BASE
);
44 properties
.put(DirectoryConf
.groupBase
.name(), IPA_GROUP_BASE
);
45 properties
.put(DirectoryConf
.systemRoleBase
.name(), IPA_ROLE_BASE
);
46 properties
.put(DirectoryConf
.readOnly
.name(), Boolean
.TRUE
.toString());
49 public static String
domainToBaseDn(String domain
) {
50 String
[] dcs
= domain
.split("\\.");
51 StringJoiner sj
= new StringJoiner(",");
52 for (int i
= 0; i
< dcs
.length
; i
++) {
54 sj
.add(LdapAttr
.dc
.name() + '=' + dc
.toLowerCase());
56 return IPA_ACCOUNTS_BASE
+ ',' + sj
.toString();
59 public static LdapName
kerberosToDn(String kerberosName
) {
60 String
[] kname
= kerberosName
.split("@");
61 String username
= kname
[0];
62 String baseDn
= domainToBaseDn(kname
[1]);
64 if (!username
.contains("/"))
65 dn
= LdapAttr
.uid
+ "=" + username
+ "," + IPA_USER_BASE
+ "," + baseDn
;
67 dn
= KRB_PRINCIPAL_NAME
+ "=" + kerberosName
+ "," + IPA_SERVICE_BASE
+ "," + baseDn
;
69 return new LdapName(dn
);
70 } catch (InvalidNameException e
) {
71 throw new IllegalArgumentException("Badly formatted name for " + kerberosName
+ ": " + dn
);
79 public static String
kerberosDomainFromDns() {
80 String kerberosDomain
;
81 try (DnsBrowser dnsBrowser
= new DnsBrowser()) {
82 InetAddress localhost
= InetAddress
.getLocalHost();
83 String hostname
= localhost
.getHostName();
84 String dnsZone
= hostname
.substring(hostname
.indexOf('.') + 1);
85 kerberosDomain
= dnsBrowser
.getRecord("_kerberos." + dnsZone
, "TXT");
86 return kerberosDomain
;
87 } catch (IOException e
) {
88 throw new IllegalStateException("Cannot determine Kerberos domain from DNS", e
);
93 public static Dictionary
<String
, Object
> convertIpaUri(URI uri
) {
94 String path
= uri
.getPath();
96 if (path
== null || path
.length() <= 1) {
97 kerberosRealm
= kerberosDomainFromDns();
99 kerberosRealm
= path
.substring(1);
102 if (kerberosRealm
== null)
103 throw new IllegalStateException("No Kerberos domain available for " + uri
);
104 // TODO intergrate CA certificate in truststore
105 // String schemeToUse = SCHEME_LDAPS;
106 String schemeToUse
= DirectoryConf
.SCHEME_LDAP
;
107 List
<String
> ldapHosts
;
108 String ldapHostsStr
= uri
.getHost();
109 if (ldapHostsStr
== null || ldapHostsStr
.trim().equals("")) {
110 try (DnsBrowser dnsBrowser
= new DnsBrowser()) {
111 ldapHosts
= dnsBrowser
.getSrvRecordsAsHosts("_ldap._tcp." + kerberosRealm
.toLowerCase(),
112 schemeToUse
.equals(DirectoryConf
.SCHEME_LDAP
) ?
true : false);
113 if (ldapHosts
== null || ldapHosts
.size() == 0) {
114 throw new IllegalStateException("Cannot configure LDAP for IPA " + uri
);
116 ldapHostsStr
= ldapHosts
.get(0);
118 } catch (IOException e
) {
119 throw new IllegalStateException("Cannot convert IPA uri " + uri
, e
);
122 ldapHosts
= new ArrayList
<>();
123 ldapHosts
.add(ldapHostsStr
);
126 StringBuilder uriStr
= new StringBuilder();
128 for (String host
: ldapHosts
) {
129 URI convertedUri
= new URI(schemeToUse
+ "://" + host
+ "/");
130 uriStr
.append(convertedUri
).append(' ');
132 } catch (URISyntaxException e
) {
133 throw new IllegalStateException("Cannot convert IPA uri " + uri
, e
);
136 Hashtable
<String
, Object
> res
= new Hashtable
<>();
137 res
.put(DirectoryConf
.uri
.name(), uriStr
.toString());
138 addIpaConfig(kerberosRealm
, res
);