blob: 3ec94cd78608ec2e12f1fcf6182adc475cd10b3c [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.server.core.operational;
import java.util.Iterator;
import java.util.List;
import java.util.UUID;
import org.apache.directory.api.ldap.model.constants.SchemaConstants;
import org.apache.directory.api.ldap.model.entry.Attribute;
import org.apache.directory.api.ldap.model.entry.DefaultAttribute;
import org.apache.directory.api.ldap.model.entry.DefaultModification;
import org.apache.directory.api.ldap.model.entry.Entry;
import org.apache.directory.api.ldap.model.entry.Modification;
import org.apache.directory.api.ldap.model.entry.ModificationOperation;
import org.apache.directory.api.ldap.model.entry.Value;
import org.apache.directory.api.ldap.model.exception.LdapException;
import org.apache.directory.api.ldap.model.exception.LdapNoPermissionException;
import org.apache.directory.api.ldap.model.name.Ava;
import org.apache.directory.api.ldap.model.name.Dn;
import org.apache.directory.api.ldap.model.name.Rdn;
import org.apache.directory.api.ldap.model.schema.AttributeType;
import org.apache.directory.api.util.DateUtils;
import org.apache.directory.server.constants.ApacheSchemaConstants;
import org.apache.directory.server.constants.ServerDNConstants;
import org.apache.directory.server.core.api.DirectoryService;
import org.apache.directory.server.core.api.InterceptorEnum;
import org.apache.directory.server.core.api.entry.ClonedServerEntry;
import org.apache.directory.server.core.api.filtering.EntryFilter;
import org.apache.directory.server.core.api.filtering.EntryFilteringCursor;
import org.apache.directory.server.core.api.interceptor.BaseInterceptor;
import org.apache.directory.server.core.api.interceptor.Interceptor;
import org.apache.directory.server.core.api.interceptor.context.AddOperationContext;
import org.apache.directory.server.core.api.interceptor.context.DeleteOperationContext;
import org.apache.directory.server.core.api.interceptor.context.LookupOperationContext;
import org.apache.directory.server.core.api.interceptor.context.ModifyOperationContext;
import org.apache.directory.server.core.api.interceptor.context.MoveAndRenameOperationContext;
import org.apache.directory.server.core.api.interceptor.context.MoveOperationContext;
import org.apache.directory.server.core.api.interceptor.context.RenameOperationContext;
import org.apache.directory.server.core.api.interceptor.context.SearchOperationContext;
import org.apache.directory.server.core.shared.SchemaService;
import org.apache.directory.server.i18n.I18n;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* An {@link Interceptor} that adds or modifies the default attributes
* of entries. There are six default attributes for now;
* <tt>'creatorsName'</tt>, <tt>'createTimestamp'</tt>, <tt>'modifiersName'</tt>,
* <tt>'modifyTimestamp'</tt>, <tt>entryUUID</tt> and <tt>entryCSN</tt>.
*
* @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
*/
public class OperationalAttributeInterceptor extends BaseInterceptor
{
/** The LoggerFactory used by this Interceptor */
private static Logger LOG = LoggerFactory.getLogger( OperationalAttributeInterceptor.class );
private final EntryFilter DENORMALIZING_SEARCH_FILTER = new OperationalAttributeDenormalizingSearchFilter();
/** The subschemasubentry Dn */
private Dn subschemaSubentryDn;
/** The admin Dn */
private Dn adminDn;
/**
* the search result filter to use for collective attribute injection
*/
private class OperationalAttributeDenormalizingSearchFilter implements EntryFilter
{
/**
* {@inheritDoc}
*/
public boolean accept( SearchOperationContext operation, Entry entry ) throws LdapException
{
if ( operation.getReturningAttributesString() == null )
{
return true;
}
// Denormalize the operational Attributes
denormalizeEntryOpAttrs( entry );
return true;
}
/**
* {@inheritDoc}
*/
public String toString( String tabs )
{
return tabs + "OperationalAttributeDenormalizingSearchFilter";
}
}
/**
* Creates the operational attribute management service interceptor.
*/
public OperationalAttributeInterceptor()
{
super( InterceptorEnum.OPERATIONAL_ATTRIBUTE_INTERCEPTOR );
}
public void init( DirectoryService directoryService ) throws LdapException
{
super.init( directoryService );
// stuff for dealing with subentries (garbage for now)
Value<?> subschemaSubentry = directoryService.getPartitionNexus().getRootDseValue( SUBSCHEMA_SUBENTRY_AT );
subschemaSubentryDn = dnFactory.create( subschemaSubentry.getString() );
// Create the Admin Dn
adminDn = dnFactory.create( ServerDNConstants.ADMIN_SYSTEM_DN );
}
public void destroy()
{
}
/**
* Check if we have to add an operational attribute, or if the admin has injected one
*/
private boolean checkAddOperationalAttribute( boolean isAdmin, Entry entry, AttributeType attribute )
throws LdapException
{
if ( entry.containsAttribute( attribute ) )
{
if ( !isAdmin )
{
// Wrong !
String message = I18n.err( I18n.ERR_30, attribute );
LOG.error( message );
throw new LdapNoPermissionException( message );
}
else
{
return true;
}
}
else
{
return false;
}
}
/**
* Adds extra operational attributes to the entry before it is added.
*
* We add those attributes :
* - creatorsName
* - createTimestamp
* - entryCSN
* - entryUUID
*/
/**
* {@inheritDoc}
*/
public void add( AddOperationContext addContext ) throws LdapException
{
String principal = getPrincipal( addContext ).getName();
Entry entry = addContext.getEntry();
// If we are using replication, the below four OAs may already be present and we retain
// those values if the user is admin.
boolean isAdmin = addContext.getSession().getAuthenticatedPrincipal().getName().equals(
ServerDNConstants.ADMIN_SYSTEM_DN_NORMALIZED );
// The EntryUUID attribute
if ( !checkAddOperationalAttribute( isAdmin, entry, ENTRY_UUID_AT ) )
{
entry.put( ENTRY_UUID_AT, UUID.randomUUID().toString() );
}
// The EntryCSN attribute
if ( !checkAddOperationalAttribute( isAdmin, entry, ENTRY_CSN_AT ) )
{
entry.put( ENTRY_CSN_AT, directoryService.getCSN().toString() );
}
// The CreatorsName attribute
if ( !checkAddOperationalAttribute( isAdmin, entry, CREATORS_NAME_AT ) )
{
entry.put( CREATORS_NAME_AT, principal );
}
// The CreateTimeStamp attribute
if ( !checkAddOperationalAttribute( isAdmin, entry, CREATE_TIMESTAMP_AT ) )
{
entry.put( CREATE_TIMESTAMP_AT, DateUtils.getGeneralizedTime() );
}
// Now, check that the user does not add operational attributes
// The accessControlSubentries attribute
checkAddOperationalAttribute( isAdmin, entry, ACCESS_CONTROL_SUBENTRIES_AT );
// The CollectiveAttributeSubentries attribute
checkAddOperationalAttribute( isAdmin, entry, COLLECTIVE_ATTRIBUTE_SUBENTRIES_AT );
// The TriggerExecutionSubentries attribute
checkAddOperationalAttribute( isAdmin, entry, TRIGGER_EXECUTION_SUBENTRIES_AT );
// The SubSchemaSybentry attribute
checkAddOperationalAttribute( isAdmin, entry, SUBSCHEMA_SUBENTRY_AT );
next( addContext );
}
/**
* {@inheritDoc}
*/
public Entry lookup( LookupOperationContext lookupContext ) throws LdapException
{
Dn dn = lookupContext.getDn();
if ( dn.equals( subschemaSubentryDn ) )
{
Entry serverEntry = SchemaService.getSubschemaEntry( directoryService, lookupContext );
serverEntry.setDn( dn );
return serverEntry;
}
Entry result = next( lookupContext );
denormalizeEntryOpAttrs( result );
return result;
}
/**
* {@inheritDoc}
*/
public void modify( ModifyOperationContext modifyContext ) throws LdapException
{
// We must check that the user hasn't injected either the modifiersName
// or the modifyTimestamp operational attributes : they are not supposed to be
// added at this point EXCEPT in cases of replication by a admin user.
// If so, remove them, and if there are no more attributes, simply return.
// otherwise, inject those values into the list of modifications
List<Modification> mods = modifyContext.getModItems();
boolean isAdmin = modifyContext.getSession().getAuthenticatedPrincipal().getDn().equals( adminDn );
boolean modifierAtPresent = false;
boolean modifiedTimeAtPresent = false;
boolean entryCsnAtPresent = false;
Dn dn = modifyContext.getDn();
for ( Modification modification : mods )
{
AttributeType attributeType = modification.getAttribute().getAttributeType();
if ( attributeType.equals( MODIFIERS_NAME_AT ) )
{
if ( !isAdmin )
{
String message = I18n.err( I18n.ERR_31 );
LOG.error( message );
throw new LdapNoPermissionException( message );
}
else
{
modifierAtPresent = true;
}
}
if ( attributeType.equals( MODIFY_TIMESTAMP_AT ) )
{
if ( !isAdmin )
{
String message = I18n.err( I18n.ERR_30, attributeType );
LOG.error( message );
throw new LdapNoPermissionException( message );
}
else
{
modifiedTimeAtPresent = true;
}
}
if ( attributeType.equals( ENTRY_CSN_AT ) )
{
if ( !isAdmin )
{
String message = I18n.err( I18n.ERR_30, attributeType );
LOG.error( message );
throw new LdapNoPermissionException( message );
}
else
{
entryCsnAtPresent = true;
}
}
if ( PWD_POLICY_STATE_ATTRIBUTE_TYPES.contains( attributeType ) && !isAdmin )
{
String message = I18n.err( I18n.ERR_30, attributeType );
LOG.error( message );
throw new LdapNoPermissionException( message );
}
}
// Add the modification AT only if we are not trying to modify the SubentrySubschema
if ( !dn.equals( subschemaSubentryDn ) )
{
if ( !modifierAtPresent )
{
// Inject the ModifiersName AT if it's not present
Attribute attribute = new DefaultAttribute( MODIFIERS_NAME_AT, getPrincipal( modifyContext )
.getName() );
Modification modifiersName = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE,
attribute );
mods.add( modifiersName );
}
if ( !modifiedTimeAtPresent )
{
// Inject the ModifyTimestamp AT if it's not present
Attribute attribute = new DefaultAttribute( MODIFY_TIMESTAMP_AT, DateUtils
.getGeneralizedTime() );
Modification timestamp = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE, attribute );
mods.add( timestamp );
}
if ( !entryCsnAtPresent )
{
String csn = directoryService.getCSN().toString();
Attribute attribute = new DefaultAttribute( ENTRY_CSN_AT, csn );
Modification updatedCsn = new DefaultModification( ModificationOperation.REPLACE_ATTRIBUTE, attribute );
mods.add( updatedCsn );
}
}
// Go down in the chain
next( modifyContext );
}
/**
* {@inheritDoc}
*/
public void move( MoveOperationContext moveContext ) throws LdapException
{
Entry modifiedEntry = moveContext.getOriginalEntry().clone();
modifiedEntry.put( SchemaConstants.MODIFIERS_NAME_AT, getPrincipal( moveContext ).getName() );
modifiedEntry.put( SchemaConstants.MODIFY_TIMESTAMP_AT, DateUtils.getGeneralizedTime() );
Attribute csnAt = new DefaultAttribute( ENTRY_CSN_AT, directoryService.getCSN().toString() );
modifiedEntry.put( csnAt );
modifiedEntry.setDn( moveContext.getNewDn() );
moveContext.setModifiedEntry( modifiedEntry );
next( moveContext );
}
/**
* {@inheritDoc}
*/
public void moveAndRename( MoveAndRenameOperationContext moveAndRenameContext ) throws LdapException
{
Entry modifiedEntry = moveAndRenameContext.getOriginalEntry().clone();
modifiedEntry.put( SchemaConstants.MODIFIERS_NAME_AT, getPrincipal( moveAndRenameContext ).getName() );
modifiedEntry.put( SchemaConstants.MODIFY_TIMESTAMP_AT, DateUtils.getGeneralizedTime() );
modifiedEntry.setDn( moveAndRenameContext.getNewDn() );
Attribute csnAt = new DefaultAttribute( ENTRY_CSN_AT, directoryService.getCSN().toString() );
modifiedEntry.put( csnAt );
moveAndRenameContext.setModifiedEntry( modifiedEntry );
next( moveAndRenameContext );
}
/**
* {@inheritDoc}
*/
public void rename( RenameOperationContext renameContext ) throws LdapException
{
Entry entry = ( ( ClonedServerEntry ) renameContext.getEntry() ).getClonedEntry();
entry.put( SchemaConstants.MODIFIERS_NAME_AT, getPrincipal( renameContext ).getName() );
entry.put( SchemaConstants.MODIFY_TIMESTAMP_AT, DateUtils.getGeneralizedTime() );
Entry modifiedEntry = renameContext.getOriginalEntry().clone();
modifiedEntry.put( SchemaConstants.MODIFIERS_NAME_AT, getPrincipal( renameContext ).getName() );
modifiedEntry.put( SchemaConstants.MODIFY_TIMESTAMP_AT, DateUtils.getGeneralizedTime() );
Attribute csnAt = new DefaultAttribute( ENTRY_CSN_AT, directoryService.getCSN().toString() );
modifiedEntry.put( csnAt );
renameContext.setModifiedEntry( modifiedEntry );
next( renameContext );
}
/**
* {@inheritDoc}
*/
public EntryFilteringCursor search( SearchOperationContext searchContext ) throws LdapException
{
EntryFilteringCursor cursor = next( searchContext );
if ( searchContext.isAllOperationalAttributes()
|| ( searchContext.getReturningAttributes() != null && !searchContext.getReturningAttributes().isEmpty() ) )
{
if ( directoryService.isDenormalizeOpAttrsEnabled() )
{
cursor.addEntryFilter( DENORMALIZING_SEARCH_FILTER );
}
return cursor;
}
return cursor;
}
@Override
public void delete( DeleteOperationContext deleteContext ) throws LdapException
{
// insert a new CSN into the entry, this is for replication
Entry entry = deleteContext.getEntry();
Attribute csnAt = new DefaultAttribute( ENTRY_CSN_AT, directoryService.getCSN().toString() );
entry.put( csnAt );
next( deleteContext );
}
private void denormalizeEntryOpAttrs( Entry entry ) throws LdapException
{
if ( directoryService.isDenormalizeOpAttrsEnabled() )
{
Attribute attr = entry.get( SchemaConstants.CREATORS_NAME_AT );
if ( attr != null )
{
Dn creatorsName = dnFactory.create( attr.getString() );
attr.clear();
attr.add( denormalizeTypes( creatorsName ).getName() );
}
attr = entry.get( SchemaConstants.MODIFIERS_NAME_AT );
if ( attr != null )
{
Dn modifiersName = dnFactory.create( attr.getString() );
attr.clear();
attr.add( denormalizeTypes( modifiersName ).getName() );
}
attr = entry.get( ApacheSchemaConstants.SCHEMA_MODIFIERS_NAME_AT );
if ( attr != null )
{
Dn modifiersName = dnFactory.create( attr.getString() );
attr.clear();
attr.add( denormalizeTypes( modifiersName ).getName() );
}
}
}
/**
* Does not create a new Dn but alters existing Dn by using the first
* short name for an attributeType definition.
*
* @param dn the normalized distinguished name
* @return the distinuished name denormalized
* @throws Exception if there are problems denormalizing
*/
private Dn denormalizeTypes( Dn dn ) throws LdapException
{
Dn newDn = new Dn( schemaManager );
int size = dn.size();
for ( int pos = 0; pos < size; pos++ )
{
Rdn rdn = dn.getRdn( size - 1 - pos );
if ( rdn.size() == 0 )
{
newDn = newDn.add( new Rdn() );
continue;
}
else if ( rdn.size() == 1 )
{
String name = schemaManager.lookupAttributeTypeRegistry( rdn.getNormType() ).getName();
String value = rdn.getNormValue().getString();
newDn = newDn.add( new Rdn( name, value ) );
continue;
}
// below we only process multi-valued rdns
StringBuffer buf = new StringBuffer();
for ( Iterator<Ava> atavs = rdn.iterator(); atavs.hasNext(); /**/)
{
Ava atav = atavs.next();
String type = schemaManager.lookupAttributeTypeRegistry( rdn.getNormType() ).getName();
buf.append( type ).append( '=' ).append( atav.getNormValue() );
if ( atavs.hasNext() )
{
buf.append( '+' );
}
}
newDn = newDn.add( new Rdn( buf.toString() ) );
}
return newDn;
}
}