1 package org
.argeo
.util
.directory
.ldap
;
3 import java
.io
.IOException
;
4 import java
.net
.InetAddress
;
6 import java
.net
.URISyntaxException
;
7 import java
.util
.ArrayList
;
8 import java
.util
.Dictionary
;
9 import java
.util
.Hashtable
;
10 import java
.util
.List
;
12 import javax
.naming
.InvalidNameException
;
13 import javax
.naming
.ldap
.LdapName
;
14 import javax
.naming
.ldap
.Rdn
;
16 import org
.argeo
.util
.directory
.DirectoryConf
;
17 import org
.argeo
.util
.naming
.LdapAttrs
;
18 import org
.argeo
.util
.naming
.dns
.DnsBrowser
;
20 /** Free IPA specific conventions. */
21 public class IpaUtils
{
22 public final static String IPA_USER_BASE
= "cn=users";
23 public final static String IPA_GROUP_BASE
= "cn=groups";
24 public final static String IPA_ROLE_BASE
= "cn=roles";
25 public final static String IPA_SERVICE_BASE
= "cn=services,cn=accounts";
27 public final static Rdn IPA_ACCOUNTS_RDN
;
30 IPA_ACCOUNTS_RDN
= new Rdn(LdapAttrs
.cn
.name(), "accounts");
31 } catch (InvalidNameException e
) {
33 throw new IllegalStateException(e
);
37 private final static String KRB_PRINCIPAL_NAME
= LdapAttrs
.krbPrincipalName
.name().toLowerCase();
39 public final static String IPA_USER_DIRECTORY_CONFIG
= DirectoryConf
.userBase
+ "=" + IPA_USER_BASE
+ "&"
40 + DirectoryConf
.groupBase
+ "=" + IPA_GROUP_BASE
+ "&" + DirectoryConf
.systemRoleBase
+ "=" + IPA_ROLE_BASE
41 + "&" + DirectoryConf
.readOnly
+ "=true";
44 static String
domainToUserDirectoryConfigPath(String realm
) {
45 return domainToBaseDn(realm
) + "?" + IPA_USER_DIRECTORY_CONFIG
+ "&" + DirectoryConf
.realm
.name() + "=" + realm
;
48 public static void addIpaConfig(String realm
, Dictionary
<String
, Object
> properties
) {
49 properties
.put(DirectoryConf
.baseDn
.name(), domainToBaseDn(realm
));
50 properties
.put(DirectoryConf
.realm
.name(), realm
);
51 properties
.put(DirectoryConf
.userBase
.name(), IPA_USER_BASE
);
52 properties
.put(DirectoryConf
.groupBase
.name(), IPA_GROUP_BASE
);
53 properties
.put(DirectoryConf
.systemRoleBase
.name(), IPA_ROLE_BASE
);
54 properties
.put(DirectoryConf
.readOnly
.name(), Boolean
.TRUE
.toString());
57 public static String
domainToBaseDn(String domain
) {
58 String
[] dcs
= domain
.split("\\.");
59 StringBuilder sb
= new StringBuilder();
60 for (int i
= 0; i
< dcs
.length
; i
++) {
64 sb
.append(LdapAttrs
.dc
.name()).append('=').append(dc
.toLowerCase());
69 public static LdapName
kerberosToDn(String kerberosName
) {
70 String
[] kname
= kerberosName
.split("@");
71 String username
= kname
[0];
72 String baseDn
= domainToBaseDn(kname
[1]);
74 if (!username
.contains("/"))
75 dn
= LdapAttrs
.uid
+ "=" + username
+ "," + IPA_USER_BASE
+ "," + IPA_ACCOUNTS_RDN
+ "," + baseDn
;
77 dn
= KRB_PRINCIPAL_NAME
+ "=" + kerberosName
+ "," + IPA_SERVICE_BASE
+ "," + baseDn
;
79 return new LdapName(dn
);
80 } catch (InvalidNameException e
) {
81 throw new IllegalArgumentException("Badly formatted name for " + kerberosName
+ ": " + dn
);
89 public static String
kerberosDomainFromDns() {
90 String kerberosDomain
;
91 try (DnsBrowser dnsBrowser
= new DnsBrowser()) {
92 InetAddress localhost
= InetAddress
.getLocalHost();
93 String hostname
= localhost
.getHostName();
94 String dnsZone
= hostname
.substring(hostname
.indexOf('.') + 1);
95 kerberosDomain
= dnsBrowser
.getRecord("_kerberos." + dnsZone
, "TXT");
96 return kerberosDomain
;
97 } catch (IOException e
) {
98 throw new IllegalStateException("Cannot determine Kerberos domain from DNS", e
);
103 public static Dictionary
<String
, Object
> convertIpaUri(URI uri
) {
104 String path
= uri
.getPath();
105 String kerberosRealm
;
106 if (path
== null || path
.length() <= 1) {
107 kerberosRealm
= kerberosDomainFromDns();
109 kerberosRealm
= path
.substring(1);
112 if (kerberosRealm
== null)
113 throw new IllegalStateException("No Kerberos domain available for " + uri
);
114 // TODO intergrate CA certificate in truststore
115 // String schemeToUse = SCHEME_LDAPS;
116 String schemeToUse
= DirectoryConf
.SCHEME_LDAP
;
117 List
<String
> ldapHosts
;
118 String ldapHostsStr
= uri
.getHost();
119 if (ldapHostsStr
== null || ldapHostsStr
.trim().equals("")) {
120 try (DnsBrowser dnsBrowser
= new DnsBrowser()) {
121 ldapHosts
= dnsBrowser
.getSrvRecordsAsHosts("_ldap._tcp." + kerberosRealm
.toLowerCase(),
122 schemeToUse
.equals(DirectoryConf
.SCHEME_LDAP
) ?
true : false);
123 if (ldapHosts
== null || ldapHosts
.size() == 0) {
124 throw new IllegalStateException("Cannot configure LDAP for IPA " + uri
);
126 ldapHostsStr
= ldapHosts
.get(0);
128 } catch (IOException e
) {
129 throw new IllegalStateException("Cannot convert IPA uri " + uri
, e
);
132 ldapHosts
= new ArrayList
<>();
133 ldapHosts
.add(ldapHostsStr
);
136 StringBuilder uriStr
= new StringBuilder();
138 for (String host
: ldapHosts
) {
139 URI convertedUri
= new URI(schemeToUse
+ "://" + host
+ "/");
140 uriStr
.append(convertedUri
).append(' ');
142 } catch (URISyntaxException e
) {
143 throw new IllegalStateException("Cannot convert IPA uri " + uri
, e
);
146 Hashtable
<String
, Object
> res
= new Hashtable
<>();
147 res
.put(DirectoryConf
.uri
.name(), uriStr
.toString());
148 addIpaConfig(kerberosRealm
, res
);