Package org.projectforge.ldap

Source Code of org.projectforge.ldap.LdapSlaveLoginHandler

/////////////////////////////////////////////////////////////////////////////
//
// Project ProjectForge Community Edition
//         www.projectforge.org
//
// Copyright (C) 2001-2014 Kai Reinhard (k.reinhard@micromata.de)
//
// ProjectForge is dual-licensed.
//
// This community edition is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as published
// by the Free Software Foundation; version 3 of the License.
//
// This community edition is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
// Public License for more details.
//
// You should have received a copy of the GNU General Public License along
// with this program; if not, see http://www.gnu.org/licenses/.
//
/////////////////////////////////////////////////////////////////////////////

package org.projectforge.ldap;

import java.util.ArrayList;
import java.util.Collection;
import java.util.List;

import javax.naming.NameNotFoundException;

import org.apache.commons.lang.StringUtils;
import org.projectforge.core.ModificationStatus;
import org.projectforge.registry.Registry;
import org.projectforge.user.GroupDO;
import org.projectforge.user.LoginDefaultHandler;
import org.projectforge.user.LoginResult;
import org.projectforge.user.LoginResultStatus;
import org.projectforge.user.PFUserDO;

/**
* This LDAP login handler acts as a LDAP slave, meaning, that LDAP will be accessed in read-only mode. There are 3 modes available: simple,
* users and users-groups. <h4>Simple mode</h4> The simple mode is assumed if no ldap managerUser is given in the config.xml.
* <ul>
* <li>Simple means that only username and password is checked, all other user settings such as assigned groups and user name etc. are
* managed by ProjectForge.</li>
* <li>
* No ldap user is needed for accessing users or groups of LDAP, only the user's login-name and password is checked by trying to
* authenticate!</li>
* <li>If a user is deactivated in LDAP the user has the possibility to work with ProjectForge unlimited as long as he uses his
* stay-logged-in-method! (If not acceptable please use the normal user mode instead.)</li>
* <li>For local users any LDAP setting is ignored.</li>
* </ul>
* <h4>Normal users mode</h4> The normal user mode is assumed if a ldap managerUser is given in the config.xml.
* <ul>
* <li>Normal means that username and password is checked and all other user settings such as user name etc. are read by a given ldap
* manager user.</li>
* <li>If a user is deleted in LDAP the user will be marked as deleted also in ProjectForge's data-base. Any login after synchronizing isn't
* allowed (the stay-logged-in-feature fails also for deleted users).</li>
* <li>For local users any LDAP setting is ignored.</li>
* <li>All known ldap user fields of the users are synchronized (given name, surname, e-mail etc.).</li>
* </ul>
* <h4>Users-groups mode</h4> Not yet supported. No groups will be synchronized.
*
* @author Kai Reinhard (k.reinhard@micromata.de)
*
*/
public class LdapSlaveLoginHandler extends LdapLoginHandler
{
  private static final org.apache.log4j.Logger log = org.apache.log4j.Logger.getLogger(LdapSlaveLoginHandler.class);

  enum Mode
  {
    SIMPLE, USERS, USER_GROUPS
  };

  private Mode mode;

  private boolean refreshInProgress;

  /**
   * Only for test cases.
   * @param mode
   */
  void setMode(final Mode mode)
  {
    this.mode = mode;
  }

  /**
   * @see org.projectforge.ldap.LdapLoginHandler#initialize()
   */
  @Override
  public void initialize()
  {
    super.initialize();
    if (StringUtils.isBlank(ldapConfig.getManagerUser()) == true) {
      mode = Mode.SIMPLE;
    } else if (StringUtils.isNotBlank(ldapConfig.getGroupBase()) == true) {
      mode = Mode.USERS;// Mode.USER_GROUPS;
      log.warn("Groups aren't yet supported by this LDAP handler.");
    } else {
      mode = Mode.USERS;
    }
    switch (mode) {
      case SIMPLE:
        log.info("LDAP slave login handler works in mode 'simple'.");
        break;
      case USERS:
        log.info("LDAP slave login handler works in mode 'users'.");
        break;
      case USER_GROUPS:
        log.info("LDAP slave login handler works in mode 'user_groups'.");
        break;
    }
  }

  /**
   * Uses the standard implementation {@link LoginDefaultHandler#checkLogin(String, String)} for local users. For all other users a LDAP
   * authentication is checked. If the LDAP authentication fails then {@link LoginResultStatus#FAILED} is returned. If successful then
   * {@link LoginResultStatus#SUCCESS} is returned with the user settings of ProjectForge database. If the user doesn't yet exist in
   * ProjectForge's data-base, it will be created after and then returned.
   * @see org.projectforge.user.LoginHandler#checkLogin(java.lang.String, java.lang.String, boolean)
   */
  @Override
  public LoginResult checkLogin(final String username, final String password)
  {
    PFUserDO user = userDao.getInternalByName(username);
    if (user != null && user.isLocalUser() == true) {
      return loginDefaultHandler.checkLogin(username, password);
    }
    final LoginResult loginResult = new LoginResult();
    final String organizationalUnits = ldapConfig.getUserBase();
    final LdapUser ldapUser = ldapUserDao.authenticate(username, password, organizationalUnits);
    if (ldapUser == null) {
      log.info("User login failed: " + username);
      return loginResult.setLoginResultStatus(LoginResultStatus.FAILED);
    }
    log.info("LDAP authentication was successful for: " + username);
    user = userDao.getInternalByName(username); // Get again (may-be the user does no exist since last call of getInternalByName(String).
    if (user == null) {
      log.info("LDAP user '" + username + "' doesn't yet exist in ProjectForge's data base. Creating new user...");
      user = PFUserDOConverter.convert(ldapUser);
      user.setId(null); // Force new id.
      if (mode == Mode.SIMPLE || ldapConfig.isStorePasswords() == false) {
        user.setNoPassword();
      } else {
        userDao.createEncryptedPassword(user, password);
      }
      userDao.internalSave(user);
    } else if (mode != Mode.SIMPLE) {
      PFUserDOConverter.copyUserFields(PFUserDOConverter.convert(ldapUser), user);
      if (ldapConfig.isStorePasswords() == true) {
        userDao.createEncryptedPassword(user, password);
      }
      userDao.internalUpdate(user);
      if (user.hasSystemAccess() == false) {
        log.info("User has no system access (is deleted/deactivated): " + user.getDisplayUsername());
        return loginResult.setLoginResultStatus(LoginResultStatus.LOGIN_EXPIRED);
      }
    }
    loginResult.setUser(user);
    if (mode == Mode.USER_GROUPS) {
      // TODO: Groups: Get groups of user.
    }
    return loginResult.setLoginResultStatus(LoginResultStatus.SUCCESS).setUser(user);
  }

  /**
   * Currently return all ProjectForge groups (done by loginDefaultHandler). Not yet implemented: Updates also any (in LDAP) modified group
   * in ProjectForge's data-base.
   * @see org.projectforge.user.LoginHandler#getAllGroups()
   */
  @Override
  public List<GroupDO> getAllGroups()
  {
    final List<GroupDO> groups = loginDefaultHandler.getAllGroups();
    return groups;
  }

  /**
   * Updates also any (in LDAP) modified user in ProjectForge's data-base. New users will be created and ProjectForge users which are not
   * available in ProjectForge's data-base will be created.
   * @see org.projectforge.user.LoginHandler#getAllUsers()
   */
  @Override
  public List<PFUserDO> getAllUsers()
  {
    final List<PFUserDO> users = loginDefaultHandler.getAllUsers();
    return users;
  }

  private PFUserDO getUser(final Collection<PFUserDO> col, final String username)
  {
    if (col == null || username == null) {
      return null;
    }
    for (final PFUserDO user : col) {
      if (username.equals(user.getUsername()) == true) {
        return user;
      }
    }
    return null;
  }

  /**
   * @see org.projectforge.user.LoginHandler#isPasswordChangeSupported(org.projectforge.user.PFUserDO)
   * @return true for local users only, false for ldap users.
   */
  @Override
  public boolean isPasswordChangeSupported(final PFUserDO user)
  {
    return user.isLocalUser();
  }

  /**
   * Refreshes the LDAP.
   * @see org.projectforge.user.LoginHandler#afterUserGroupCacheRefresh(java.util.List, java.util.List)
   */
  @Override
  public void afterUserGroupCacheRefresh(final Collection<PFUserDO> users, final Collection<GroupDO> groups)
  {
    if (mode == Mode.SIMPLE || refreshInProgress == true) {
      return;
    }
    new Thread() {
      @Override
      public void run()
      {
        synchronized (LdapSlaveLoginHandler.this) {
          if (refreshInProgress == true) {
            return;
          }
          try {
            refreshInProgress = true;
            updateLdap(users, groups);
            Registry.instance().getUserGroupCache().internalGetNumberOfUsers(); // Force refresh of UserGroupCache.
          } finally {
            refreshInProgress = false;
          }
        }
      }
    }.start();
  }

  /**
   * @return true if currently a cache refresh is running, otherwise false.
   */
  public boolean isRefreshInProgress()
  {
    return refreshInProgress;
  }

  private void updateLdap(final Collection<PFUserDO> users, final Collection<GroupDO> groups)
  {
    new LdapTemplate(ldapConnector) {
      @Override
      protected Object call() throws NameNotFoundException, Exception
      {
        log.info("Updating LDAP...");
        final List<LdapUser> ldapUsers = getAllLdapUsers(ctx);
        final List<PFUserDO> dbUsers = userDao.internalLoadAll();
        final List<PFUserDO> users = new ArrayList<PFUserDO>(ldapUsers.size());
        int error = 0, unmodified = 0, created = 0, updated = 0, deleted = 0, undeleted = 0, ignoredLocalUsers = 0, localUsers = 0;
        for (final LdapUser ldapUser : ldapUsers) {
          try {
            final PFUserDO user = PFUserDOConverter.convert(ldapUser);
            users.add(user);
            PFUserDO dbUser = getUser(dbUsers, user.getUsername());
            if (dbUser == null) {
              // Double check if added between internalLoadAll() and here:
              dbUser = userDao.getInternalByName(user.getUsername());
            }
            if (dbUser != null) {
              if (dbUser.isLocalUser() == true) {
                // Ignore local users.
                log.warn("Please note: the user '"
                    + dbUser.getUsername()
                    + "' is declared as local user. LDAP settings of the same LDAP user are ignored!");
                ++ignoredLocalUsers;
                continue;
              }
              PFUserDOConverter.copyUserFields(user, dbUser);
              if (dbUser.isDeleted() == true) {
                userDao.internalUndelete(dbUser);
                ++undeleted;
              }
              final ModificationStatus modificationStatus = userDao.internalUpdate(dbUser);
              if (modificationStatus != ModificationStatus.NONE) {
                ++updated;
              } else {
                ++unmodified;
              }
            } else {
              // New user:
              user.setId(null);
              userDao.internalSave(user);
              ++created;
            }
          } catch (final Exception ex) {
            log.error("Error while proceeding LDAP user '" + ldapUser.getUid() + "'. Continuing with next user.", ex);
            error++;
          }
        }
        for (final PFUserDO dbUser : dbUsers) {
          try {
            if (dbUser.isLocalUser() == true) {
              // Ignore local users.
              ++localUsers;
              continue;
            }
            final PFUserDO user = getUser(users, dbUser.getUsername());
            if (user == null) {
              if (dbUser.isDeleted() == false) {
                // User isn't available in LDAP, therefore mark the db user as deleted.
                userDao.internalMarkAsDeleted(dbUser);
                ++deleted;
              } else {
                ++unmodified;
              }
            }
          } catch (final Exception ex) {
            log.error("Error while proceeding data-base user '" + dbUser.getUsername() + "'. Continuing with next user.", ex);
            error++;
          }
        }
        log.info("Update of LDAP users: "
            + (error > 0 ? "*** " + error + " errors ***, " : "")
            + unmodified
            + " unmodified, "
            + created
            + " created, "
            + updated
            + " updated, "
            + deleted
            + " deleted, "
            + undeleted
            + " undeleted, "
            + ignoredLocalUsers
            + " ignored ldap users (local users), "
            + localUsers
            + " local users.");
        return null;
      }
    }.excecute();
  }
}
TOP

Related Classes of org.projectforge.ldap.LdapSlaveLoginHandler

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.