PasswordExpirationTimeVirtualAttributeProvider.java revision 1213c76646ee52dee5230cb219a7af951e8433b9
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at
* trunk/opends/resource/legal-notices/CDDLv1_0.txt
* or http://forgerock.org/license/CDDLv1.0.html.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at
* trunk/opends/resource/legal-notices/CDDLv1_0.txt. If applicable,
* add the following below this CDDL HEADER, with the fields enclosed
* by brackets "[]" replaced with your own identifying information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2012 profiq s.r.o.
* Portions Copyright 2012 ForgeRock AS
*/
package org.opends.server.extensions;
import java.util.Collections;
import org.opends.server.core.PasswordPolicyState;
import java.util.Set;
import org.opends.messages.Message;
import
org.opends.server.admin.std.server.PasswordExpirationTimeVirtualAttributeCfg;
import org.opends.server.api.AuthenticationPolicy;
import org.opends.server.api.VirtualAttributeProvider;
import org.opends.server.core.SearchOperation;
import org.opends.server.config.ConfigException;
import org.opends.server.loggers.ErrorLogger;
import org.opends.server.loggers.debug.DebugTracer;
import org.opends.server.schema.GeneralizedTimeSyntax;
import org.opends.server.types.*;
import static org.opends.messages.ExtensionMessages.*;
import static org.opends.server.loggers.debug.DebugLogger.*;
import static org.opends.server.util.StaticUtils.*;
/**
* Provider for the password expiration time virtual attribute.
*/
public class PasswordExpirationTimeVirtualAttributeProvider
extends VirtualAttributeProvider<PasswordExpirationTimeVirtualAttributeCfg>
{
/**
* Debug tracer to log debugging information.
*/
private static final DebugTracer TRACER = getTracer();
/**
* Default constructor.
*/
public PasswordExpirationTimeVirtualAttributeProvider()
{
super();
}
/**
* {@inheritDoc}
*/
@Override
public void
initializeVirtualAttributeProvider(
PasswordExpirationTimeVirtualAttributeCfg configuration)
throws ConfigException, InitializationException
{
// No initialization needed
}
/**
* {@inheritDoc}
*/
@Override
public boolean isMultiValued()
{
return false;
}
/**
* {@inheritDoc}
*/
@Override
public Set<AttributeValue> getValues(Entry entry,
VirtualAttributeRule rule)
{
// Do not process LDAP operational entries.
if (!entry.isSubentry() && !entry.isLDAPSubentry())
{
long expirationTime = getPasswordExpirationTime(entry);
if (expirationTime == -1)
{
// It does not expire.
return Collections.emptySet();
}
AttributeValue value =
GeneralizedTimeSyntax.createGeneralizedTimeValue(expirationTime);
return Collections.singleton(value);
}
return Collections.emptySet();
}
/**
* {@inheritDoc}
*/
@Override
public boolean isSearchable(VirtualAttributeRule rule,
SearchOperation searchOperation,
boolean isPreIndexed)
{
return false;
}
/**
* {@inheritDoc}
*/
@Override
public void processSearch(VirtualAttributeRule rule,
SearchOperation searchOperation)
{
searchOperation.setResultCode(ResultCode.UNWILLING_TO_PERFORM);
Message message =
ERR_PWDEXPTIME_VATTR_NOT_SEARCHABLE.get(
rule.getAttributeType().getNameOrOID());
searchOperation.appendErrorMessage(message);
}
/**
* {@inheritDoc}
*/
@Override
public boolean hasValue(Entry entry, VirtualAttributeRule rule)
{
// Do not process LDAP operational entries.
if (entry.isSubentry() || entry.isLDAPSubentry()
|| (getPasswordExpirationTime(entry) == -1))
{
return false;
}
return true;
}
/**
* Utility method to wrap the PasswordPolicyState.getExpirationTime().
*
* @param entry LDAP entry
* @return Expiration time in milliseconds since the epoch.
*/
private long getPasswordExpirationTime(Entry entry)
{
// Do not process LDAP operational entries.
AuthenticationPolicy policy = null;
try
{
policy = AuthenticationPolicy.forUser(entry, false);
}
catch (DirectoryException de)
{
ErrorLogger.logError(de.getMessageObject());
if (debugEnabled())
{
TRACER.debugError("Failed to retrieve password " +
"policy for user %s: %s",
entry.getDN().toString(),
stackTraceToSingleLineString(de));
}
}
if (policy == null)
{
// No authentication policy: debug log this as an error since all
// entries should have at least the default password policy.
if (debugEnabled())
{
TRACER.debugError("No applicable password policy for user %s", entry
.getDN().toString());
}
}
else if (policy.isPasswordPolicy())
{
PasswordPolicyState pwpState = null;
try
{
pwpState =
(PasswordPolicyState) policy.createAuthenticationPolicyState(entry);
}
catch (DirectoryException de)
{
ErrorLogger.logError(de.getMessageObject());
if (debugEnabled())
{
TRACER.debugError("Failed to retrieve password " +
"policy state for user %s: %s",
entry.getDN().toString(),
stackTraceToSingleLineString(de));
}
}
return pwpState.getPasswordExpirationTime();
}
else
{
// Not a password policy, could be PTA, etc.
if (debugEnabled())
{
TRACER.debugVerbose("Authentication policy %s found for user %s is "
+ "not a password policy", policy.getDN().toString(), entry
.getDN().toString());
}
}
return -1L;
}
}