/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * See LICENSE.txt included in this distribution for the specific * language governing permissions and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at LICENSE.txt. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright (c) 2016, 2018 Oracle and/or its affiliates. All rights reserved. */ package opengrok.auth.plugin; import java.util.HashMap; import java.util.Map; import java.util.Set; import java.util.logging.Level; import java.util.logging.Logger; import java.util.regex.Matcher; import java.util.regex.Pattern; import javax.servlet.http.HttpServletRequest; import opengrok.auth.entity.LdapUser; import opengrok.auth.plugin.entity.User; import opengrok.auth.plugin.ldap.LdapException; import org.opengrok.indexer.authorization.AuthorizationException; import org.opengrok.indexer.configuration.Group; import org.opengrok.indexer.configuration.Project; import org.opengrok.indexer.util.StringUtils; /** * Authorization plug-in to extract user's LDAP attributes. * The attributes can be then used by the other LDAP plugins down the stack. * * @author Krystof Tulinger */ public class LdapUserPlugin extends AbstractLdapPlugin { private static final Logger LOGGER = Logger.getLogger(LdapUserPlugin.class.getName()); public static final String SESSION_ATTR = "opengrok-ldap-plugin-user"; /** * configuration names * */ protected static final String OBJECT_CLASS = "objectclass"; protected static final String ATTRIBUTES = "attributes"; private String objectClass; private String[] attributes; private final Pattern usernameCnPattern = Pattern.compile("(cn=[a-zA-Z0-9_-]+)"); @Override public void load(Map parameters) { super.load(parameters); if ((objectClass = (String) parameters.get(OBJECT_CLASS)) == null) { throw new NullPointerException("Missing param [" + OBJECT_CLASS + "] in the setup"); } if (!StringUtils.isAlphanumeric(objectClass)) { throw new NullPointerException("object class '" + objectClass + "' contains non-alphanumeric characters"); } String attributesVal; if ((attributesVal = (String) parameters.get(ATTRIBUTES)) == null) { throw new NullPointerException("Missing param [" + ATTRIBUTES + "] in the setup"); } attributes = attributesVal.split(","); LOGGER.log(Level.FINE, "LdapUser plugin loaded with objectclass={0}, " + "attributes={1}", new Object[]{objectClass, String.join(", ", attributes)}); } /** * Check if the session exists and contains all necessary fields required by * this plug-in. * * @param req the HTTP request * @return true if it does; false otherwise */ @Override protected boolean sessionExists(HttpServletRequest req) { return super.sessionExists(req) && req.getSession().getAttribute(SESSION_ATTR) != null; } protected String getFilter(User user) { String commonName; Matcher matcher = usernameCnPattern.matcher(user.getUsername()); if (matcher.find()) { commonName = matcher.group(1); LOGGER.log(Level.FINEST, "extracted common name {0} from {1}", new Object[]{commonName, user.getUsername()}); } else { throw new AuthorizationException(String.format("cannot get common name out of %s", user.getUsername())); } return "(&(objectclass=" + this.objectClass + ")(" + commonName + "))"; } @Override public void fillSession(HttpServletRequest req, User user) { Map> records; updateSession(req, null); if (getLdapProvider() == null) { LOGGER.log(Level.WARNING, "cannot get LDAP provider for LdapUser plugin"); return; } String filter = getFilter(user); try { if ((records = getLdapProvider().lookupLdapContent(null, filter, attributes)) == null) { LOGGER.log(Level.WARNING, "failed to get LDAP attributes ''{3}'' for user ''{0}'' " + "with filter ''{1}''", new Object[]{user, filter, String.join(", ", attributes)}); return; } } catch (LdapException ex) { throw new AuthorizationException(ex); } if (records.isEmpty()) { LOGGER.log(Level.WARNING, "LDAP records for user {0} are empty", user); return; } for (String attrName : attributes) { if (!records.containsKey(attrName) || records.get(attrName).isEmpty()) { LOGGER.log(Level.WARNING, "{0} record for user {1} is not present or empty", new Object[]{attrName, user}); } } Map> attrSet = new HashMap<>(); for (String attrName : attributes) { attrSet.put(attrName, records.get(attrName)); } updateSession(req, new LdapUser(attrSet)); } /** * Add a new user value into the session. * * @param req the request * @param user the new value for user */ protected void updateSession(HttpServletRequest req, LdapUser user) { req.getSession().setAttribute(SESSION_ATTR, user); } @Override public boolean checkEntity(HttpServletRequest request, Project project) { return request.getSession().getAttribute(SESSION_ATTR) != null; } @Override public boolean checkEntity(HttpServletRequest request, Group group) { return request.getSession().getAttribute(SESSION_ATTR) != null; } }