Defer LDAP server type discovery until first authentication
By deferring the LDAP discovery until the first authenticate request we can better detect a secured Microsoft Active Directory server by querying its indicators using an actual end-user's credentials rather than the anonymous bind we were trying before. Bug: issue 423 Change-Id: Ic62dccfc48283d9b4f7f27c86c8a404c4c05d3b2 Signed-off-by: Shawn O. Pearce <sop@google.com>
This commit is contained in:
@@ -70,30 +70,22 @@ class LdapRealm implements Realm {
|
|||||||
private static final String USERNAME = "username";
|
private static final String USERNAME = "username";
|
||||||
private static final String GROUPNAME = "groupname";
|
private static final String GROUPNAME = "groupname";
|
||||||
|
|
||||||
|
private final Config config;
|
||||||
private final String server;
|
private final String server;
|
||||||
private final String username;
|
private final String username;
|
||||||
private final String password;
|
private final String password;
|
||||||
private final LdapType type;
|
|
||||||
private final boolean sslVerify;
|
private final boolean sslVerify;
|
||||||
|
|
||||||
private final AuthConfig authConfig;
|
private final AuthConfig authConfig;
|
||||||
private final SchemaFactory<ReviewDb> schema;
|
private final SchemaFactory<ReviewDb> schema;
|
||||||
private final EmailExpander emailExpander;
|
private final EmailExpander emailExpander;
|
||||||
private final ParamertizedString accountFullName;
|
|
||||||
private final ParamertizedString accountEmailAddress;
|
|
||||||
private final ParamertizedString accountSshUserName;
|
|
||||||
private final String accountMemberField;
|
|
||||||
private final List<LdapQuery> accountQueryList;
|
|
||||||
private final SelfPopulatingCache<String, Account.Id> usernameCache;
|
private final SelfPopulatingCache<String, Account.Id> usernameCache;
|
||||||
|
|
||||||
private final GroupCache groupCache;
|
private final GroupCache groupCache;
|
||||||
private boolean groupNeedsAccount;
|
|
||||||
private final List<String> groupBases;
|
|
||||||
private final SearchScope groupScope;
|
|
||||||
private final ParamertizedString groupPattern;
|
|
||||||
private final List<LdapQuery> groupMemberQueryList;
|
|
||||||
private final SelfPopulatingCache<String, Set<AccountGroup.Id>> membershipCache;
|
private final SelfPopulatingCache<String, Set<AccountGroup.Id>> membershipCache;
|
||||||
|
|
||||||
|
private volatile LdapSchema ldapSchema;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
LdapRealm(
|
LdapRealm(
|
||||||
final AuthConfig authConfig,
|
final AuthConfig authConfig,
|
||||||
@@ -103,6 +95,7 @@ class LdapRealm implements Realm {
|
|||||||
@Named(LdapModule.GROUP_CACHE) final Cache<String, Set<AccountGroup.Id>> rawGroup,
|
@Named(LdapModule.GROUP_CACHE) final Cache<String, Set<AccountGroup.Id>> rawGroup,
|
||||||
@Named(LdapModule.USERNAME_CACHE) final Cache<String, Account.Id> rawUsername,
|
@Named(LdapModule.USERNAME_CACHE) final Cache<String, Account.Id> rawUsername,
|
||||||
@GerritServerConfig final Config config) {
|
@GerritServerConfig final Config config) {
|
||||||
|
this.config = config;
|
||||||
this.authConfig = authConfig;
|
this.authConfig = authConfig;
|
||||||
this.groupCache = groupCache;
|
this.groupCache = groupCache;
|
||||||
this.emailExpander = emailExpander;
|
this.emailExpander = emailExpander;
|
||||||
@@ -112,42 +105,6 @@ class LdapRealm implements Realm {
|
|||||||
this.username = optional(config, "username");
|
this.username = optional(config, "username");
|
||||||
this.password = optional(config, "password");
|
this.password = optional(config, "password");
|
||||||
this.sslVerify = config.getBoolean("ldap", "sslverify", true);
|
this.sslVerify = config.getBoolean("ldap", "sslverify", true);
|
||||||
this.type = discoverLdapType();
|
|
||||||
|
|
||||||
groupMemberQueryList = new ArrayList<LdapQuery>();
|
|
||||||
accountQueryList = new ArrayList<LdapQuery>();
|
|
||||||
|
|
||||||
final Set<String> accountAtts = new HashSet<String>();
|
|
||||||
|
|
||||||
// Group query
|
|
||||||
//
|
|
||||||
|
|
||||||
groupBases = optionalList(config, "groupBase");
|
|
||||||
groupScope = scope(config, "groupScope");
|
|
||||||
groupPattern = paramString(config, "groupPattern", type.groupPattern());
|
|
||||||
final String groupMemberPattern =
|
|
||||||
optdef(config, "groupMemberPattern", type.groupMemberPattern());
|
|
||||||
|
|
||||||
for (String groupBase : groupBases) {
|
|
||||||
if (groupMemberPattern != null) {
|
|
||||||
final LdapQuery groupMemberQuery =
|
|
||||||
new LdapQuery(groupBase, groupScope, new ParamertizedString(
|
|
||||||
groupMemberPattern), Collections.<String> emptySet());
|
|
||||||
if (groupMemberQuery.getParameters().isEmpty()) {
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
"No variables in ldap.groupMemberPattern");
|
|
||||||
}
|
|
||||||
|
|
||||||
for (final String name : groupMemberQuery.getParameters()) {
|
|
||||||
if (!USERNAME.equals(name)) {
|
|
||||||
groupNeedsAccount = true;
|
|
||||||
accountAtts.add(name);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
groupMemberQueryList.add(groupMemberQuery);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
membershipCache =
|
membershipCache =
|
||||||
new SelfPopulatingCache<String, Set<AccountGroup.Id>>(rawGroup) {
|
new SelfPopulatingCache<String, Set<AccountGroup.Id>>(rawGroup) {
|
||||||
@@ -163,44 +120,6 @@ class LdapRealm implements Realm {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
// Account query
|
|
||||||
//
|
|
||||||
accountFullName =
|
|
||||||
paramString(config, "accountFullName", type.accountFullName());
|
|
||||||
if (accountFullName != null) {
|
|
||||||
accountAtts.addAll(accountFullName.getParameterNames());
|
|
||||||
}
|
|
||||||
accountEmailAddress =
|
|
||||||
paramString(config, "accountEmailAddress", type.accountEmailAddress());
|
|
||||||
if (accountEmailAddress != null) {
|
|
||||||
accountAtts.addAll(accountEmailAddress.getParameterNames());
|
|
||||||
}
|
|
||||||
accountSshUserName =
|
|
||||||
paramString(config, "accountSshUserName", type.accountSshUserName());
|
|
||||||
if (accountSshUserName != null) {
|
|
||||||
accountAtts.addAll(accountSshUserName.getParameterNames());
|
|
||||||
}
|
|
||||||
accountMemberField =
|
|
||||||
optdef(config, "accountMemberField", type.accountMemberField());
|
|
||||||
if (accountMemberField != null) {
|
|
||||||
accountAtts.add(accountMemberField);
|
|
||||||
}
|
|
||||||
|
|
||||||
final SearchScope accountScope = scope(config, "accountScope");
|
|
||||||
final String accountPattern =
|
|
||||||
reqdef(config, "accountPattern", type.accountPattern());
|
|
||||||
|
|
||||||
for (String accountBase : requiredList(config, "accountBase")) {
|
|
||||||
final LdapQuery accountQuery =
|
|
||||||
new LdapQuery(accountBase, accountScope, new ParamertizedString(
|
|
||||||
accountPattern), accountAtts);
|
|
||||||
if (accountQuery.getParameters().isEmpty()) {
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
"No variables in ldap.accountPattern");
|
|
||||||
}
|
|
||||||
accountQueryList.add(accountQuery);
|
|
||||||
}
|
|
||||||
|
|
||||||
usernameCache = new SelfPopulatingCache<String, Account.Id>(rawUsername) {
|
usernameCache = new SelfPopulatingCache<String, Account.Id>(rawUsername) {
|
||||||
@Override
|
@Override
|
||||||
public Account.Id createEntry(final String username) throws Exception {
|
public Account.Id createEntry(final String username) throws Exception {
|
||||||
@@ -278,10 +197,18 @@ class LdapRealm implements Realm {
|
|||||||
public boolean allowsEdit(final Account.FieldName field) {
|
public boolean allowsEdit(final Account.FieldName field) {
|
||||||
switch (field) {
|
switch (field) {
|
||||||
case FULL_NAME:
|
case FULL_NAME:
|
||||||
return accountFullName == null; // only if not obtained from LDAP
|
if (ldapSchema == null) {
|
||||||
|
return false; // Assume not until we've resolved the server type.
|
||||||
|
}
|
||||||
|
// only if not obtained from LDAP
|
||||||
|
return ldapSchema.accountFullName == null;
|
||||||
|
|
||||||
case USER_NAME:
|
case USER_NAME:
|
||||||
return accountSshUserName == null; // only if not obtained from LDAP
|
if (ldapSchema == null) {
|
||||||
|
return false; // Assume not until we've resolved the server type.
|
||||||
|
}
|
||||||
|
// only if not obtained from LDAP
|
||||||
|
return ldapSchema.accountSshUserName == null;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return true;
|
return true;
|
||||||
@@ -314,7 +241,8 @@ class LdapRealm implements Realm {
|
|||||||
ctx = open();
|
ctx = open();
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
final LdapQuery.Result m = findAccount(ctx, username);
|
final LdapSchema schema = getSchema(ctx);
|
||||||
|
final LdapQuery.Result m = findAccount(schema, ctx, username);
|
||||||
|
|
||||||
if (authConfig.getAuthType() == AuthType.LDAP) {
|
if (authConfig.getAuthType() == AuthType.LDAP) {
|
||||||
// We found the user account, but we need to verify
|
// We found the user account, but we need to verify
|
||||||
@@ -323,11 +251,11 @@ class LdapRealm implements Realm {
|
|||||||
authenticate(m.getDN(), who.getPassword());
|
authenticate(m.getDN(), who.getPassword());
|
||||||
}
|
}
|
||||||
|
|
||||||
who.setDisplayName(apply(accountFullName, m));
|
who.setDisplayName(apply(schema.accountFullName, m));
|
||||||
who.setUserName(apply(accountSshUserName, m));
|
who.setUserName(apply(schema.accountSshUserName, m));
|
||||||
|
|
||||||
if (accountEmailAddress != null) {
|
if (schema.accountEmailAddress != null) {
|
||||||
who.setEmailAddress(apply(accountEmailAddress, m));
|
who.setEmailAddress(apply(schema.accountEmailAddress, m));
|
||||||
|
|
||||||
} else if (emailExpander.canExpand(username)) {
|
} else if (emailExpander.canExpand(username)) {
|
||||||
// If LDAP cannot give us a valid email address for this user
|
// If LDAP cannot give us a valid email address for this user
|
||||||
@@ -388,39 +316,41 @@ class LdapRealm implements Realm {
|
|||||||
private Set<AccountGroup.Id> queryForGroups(final DirContext ctx,
|
private Set<AccountGroup.Id> queryForGroups(final DirContext ctx,
|
||||||
final String username, LdapQuery.Result account) throws NamingException,
|
final String username, LdapQuery.Result account) throws NamingException,
|
||||||
AccountException {
|
AccountException {
|
||||||
|
final LdapSchema schema = getSchema(ctx);
|
||||||
final Set<String> groupDNs = new HashSet<String>();
|
final Set<String> groupDNs = new HashSet<String>();
|
||||||
|
|
||||||
if (!groupMemberQueryList.isEmpty()) {
|
if (!schema.groupMemberQueryList.isEmpty()) {
|
||||||
final HashMap<String, String> params = new HashMap<String, String>();
|
final HashMap<String, String> params = new HashMap<String, String>();
|
||||||
|
|
||||||
if (groupNeedsAccount) {
|
if (schema.groupNeedsAccount) {
|
||||||
if (account == null) {
|
if (account == null) {
|
||||||
account = findAccount(ctx, username);
|
account = findAccount(schema, ctx, username);
|
||||||
}
|
}
|
||||||
for (final String name : groupMemberQueryList.get(0).getParameters()) {
|
for (String name : schema.groupMemberQueryList.get(0).getParameters()) {
|
||||||
params.put(name, account.get(name));
|
params.put(name, account.get(name));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
params.put(USERNAME, username);
|
params.put(USERNAME, username);
|
||||||
|
|
||||||
for (LdapQuery groupMemberQuery : groupMemberQueryList) {
|
for (LdapQuery groupMemberQuery : schema.groupMemberQueryList) {
|
||||||
for (LdapQuery.Result r : groupMemberQuery.query(ctx, params)) {
|
for (LdapQuery.Result r : groupMemberQuery.query(ctx, params)) {
|
||||||
groupDNs.add(r.getDN());
|
groupDNs.add(r.getDN());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (accountMemberField != null) {
|
if (schema.accountMemberField != null) {
|
||||||
if (account == null) {
|
if (account == null) {
|
||||||
account = findAccount(ctx, username);
|
account = findAccount(schema, ctx, username);
|
||||||
}
|
}
|
||||||
|
|
||||||
final Attribute groupAtt = account.getAll(accountMemberField);
|
final Attribute groupAtt = account.getAll(schema.accountMemberField);
|
||||||
if (groupAtt != null) {
|
if (groupAtt != null) {
|
||||||
final NamingEnumeration<?> groups = groupAtt.getAll();
|
final NamingEnumeration<?> groups = groupAtt.getAll();
|
||||||
while (groups.hasMore()) {
|
while (groups.hasMore()) {
|
||||||
recursivelyExpandGroups(groupDNs, ctx, (String) groups.next());
|
final String nextDN = (String) groups.next();
|
||||||
|
recursivelyExpandGroups(groupDNs, schema, ctx, nextDN);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -443,16 +373,18 @@ class LdapRealm implements Realm {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void recursivelyExpandGroups(final Set<String> groupDNs,
|
private void recursivelyExpandGroups(final Set<String> groupDNs,
|
||||||
final DirContext ctx, final String groupDN) {
|
final LdapSchema schema, final DirContext ctx, final String groupDN) {
|
||||||
if (groupDNs.add(groupDN)) {
|
if (groupDNs.add(groupDN)) {
|
||||||
// Recursively identify the groups it is a member of.
|
// Recursively identify the groups it is a member of.
|
||||||
//
|
//
|
||||||
try {
|
try {
|
||||||
final Attribute in = ctx.getAttributes(groupDN).get(accountMemberField);
|
final Attribute in =
|
||||||
|
ctx.getAttributes(groupDN).get(schema.accountMemberField);
|
||||||
if (in != null) {
|
if (in != null) {
|
||||||
final NamingEnumeration<?> groups = in.getAll();
|
final NamingEnumeration<?> groups = in.getAll();
|
||||||
while (groups.hasMore()) {
|
while (groups.hasMore()) {
|
||||||
recursivelyExpandGroups(groupDNs, ctx, (String) groups.next());
|
final String nextDN = (String) groups.next();
|
||||||
|
recursivelyExpandGroups(groupDNs, schema, ctx, nextDN);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (NamingException e) {
|
} catch (NamingException e) {
|
||||||
@@ -478,18 +410,19 @@ class LdapRealm implements Realm {
|
|||||||
@Override
|
@Override
|
||||||
public Set<AccountGroup.ExternalNameKey> lookupGroups(String name) {
|
public Set<AccountGroup.ExternalNameKey> lookupGroups(String name) {
|
||||||
final Set<AccountGroup.ExternalNameKey> out;
|
final Set<AccountGroup.ExternalNameKey> out;
|
||||||
final ParamertizedString filter =
|
|
||||||
ParamertizedString.asis(groupPattern.replace(GROUPNAME, name)
|
|
||||||
.toString());
|
|
||||||
final Map<String, String> params = Collections.<String, String> emptyMap();
|
final Map<String, String> params = Collections.<String, String> emptyMap();
|
||||||
|
|
||||||
out = new HashSet<AccountGroup.ExternalNameKey>();
|
out = new HashSet<AccountGroup.ExternalNameKey>();
|
||||||
try {
|
try {
|
||||||
final DirContext ctx = open();
|
final DirContext ctx = open();
|
||||||
try {
|
try {
|
||||||
for (String groupBase : groupBases) {
|
final LdapSchema schema = getSchema(ctx);
|
||||||
|
final ParamertizedString filter =
|
||||||
|
ParamertizedString.asis(schema.groupPattern
|
||||||
|
.replace(GROUPNAME, name).toString());
|
||||||
|
for (String groupBase : schema.groupBases) {
|
||||||
final LdapQuery query =
|
final LdapQuery query =
|
||||||
new LdapQuery(groupBase, groupScope, filter, Collections
|
new LdapQuery(groupBase, schema.groupScope, filter, Collections
|
||||||
.<String> emptySet());
|
.<String> emptySet());
|
||||||
for (LdapQuery.Result res : query.query(ctx, params)) {
|
for (LdapQuery.Result res : query.query(ctx, params)) {
|
||||||
out.add(new AccountGroup.ExternalNameKey(res.getDN()));
|
out.add(new AccountGroup.ExternalNameKey(res.getDN()));
|
||||||
@@ -559,28 +492,14 @@ class LdapRealm implements Realm {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private LdapType discoverLdapType() {
|
private LdapQuery.Result findAccount(final LdapSchema schema,
|
||||||
try {
|
final DirContext ctx, final String username) throws NamingException,
|
||||||
final DirContext ctx = open();
|
AccountException {
|
||||||
try {
|
|
||||||
return LdapType.guessType(ctx);
|
|
||||||
} finally {
|
|
||||||
ctx.close();
|
|
||||||
}
|
|
||||||
} catch (NamingException e) {
|
|
||||||
log.warn("Cannot discover type of LDAP server at " + server
|
|
||||||
+ ", assuming the server is RFC 2307 compliant.", e);
|
|
||||||
return LdapType.RFC_2307;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private LdapQuery.Result findAccount(final DirContext ctx,
|
|
||||||
final String username) throws NamingException, AccountException {
|
|
||||||
final HashMap<String, String> params = new HashMap<String, String>();
|
final HashMap<String, String> params = new HashMap<String, String>();
|
||||||
params.put(USERNAME, username);
|
params.put(USERNAME, username);
|
||||||
|
|
||||||
final List<LdapQuery.Result> res = new ArrayList<LdapQuery.Result>();
|
final List<LdapQuery.Result> res = new ArrayList<LdapQuery.Result>();
|
||||||
for (LdapQuery accountQuery : accountQueryList) {
|
for (LdapQuery accountQuery : schema.accountQueryList) {
|
||||||
res.addAll(accountQuery.query(ctx, params));
|
res.addAll(accountQuery.query(ctx, params));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -595,4 +514,117 @@ class LdapRealm implements Realm {
|
|||||||
throw new AccountException("Duplicate users: " + username);
|
throw new AccountException("Duplicate users: " + username);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private LdapSchema getSchema(DirContext ctx) {
|
||||||
|
if (ldapSchema == null) {
|
||||||
|
synchronized (this) {
|
||||||
|
if (ldapSchema == null) {
|
||||||
|
ldapSchema = new LdapSchema(ctx);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ldapSchema;
|
||||||
|
}
|
||||||
|
|
||||||
|
private class LdapSchema {
|
||||||
|
final LdapType type;
|
||||||
|
|
||||||
|
final ParamertizedString accountFullName;
|
||||||
|
final ParamertizedString accountEmailAddress;
|
||||||
|
final ParamertizedString accountSshUserName;
|
||||||
|
final String accountMemberField;
|
||||||
|
final List<LdapQuery> accountQueryList;
|
||||||
|
|
||||||
|
boolean groupNeedsAccount;
|
||||||
|
final List<String> groupBases;
|
||||||
|
final SearchScope groupScope;
|
||||||
|
final ParamertizedString groupPattern;
|
||||||
|
final List<LdapQuery> groupMemberQueryList;
|
||||||
|
|
||||||
|
LdapSchema(final DirContext ctx) {
|
||||||
|
type = discoverLdapType(ctx);
|
||||||
|
groupMemberQueryList = new ArrayList<LdapQuery>();
|
||||||
|
accountQueryList = new ArrayList<LdapQuery>();
|
||||||
|
|
||||||
|
final Set<String> accountAtts = new HashSet<String>();
|
||||||
|
|
||||||
|
// Group query
|
||||||
|
//
|
||||||
|
|
||||||
|
groupBases = optionalList(config, "groupBase");
|
||||||
|
groupScope = scope(config, "groupScope");
|
||||||
|
groupPattern = paramString(config, "groupPattern", type.groupPattern());
|
||||||
|
final String groupMemberPattern =
|
||||||
|
optdef(config, "groupMemberPattern", type.groupMemberPattern());
|
||||||
|
|
||||||
|
for (String groupBase : groupBases) {
|
||||||
|
if (groupMemberPattern != null) {
|
||||||
|
final LdapQuery groupMemberQuery =
|
||||||
|
new LdapQuery(groupBase, groupScope, new ParamertizedString(
|
||||||
|
groupMemberPattern), Collections.<String> emptySet());
|
||||||
|
if (groupMemberQuery.getParameters().isEmpty()) {
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"No variables in ldap.groupMemberPattern");
|
||||||
|
}
|
||||||
|
|
||||||
|
for (final String name : groupMemberQuery.getParameters()) {
|
||||||
|
if (!USERNAME.equals(name)) {
|
||||||
|
groupNeedsAccount = true;
|
||||||
|
accountAtts.add(name);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
groupMemberQueryList.add(groupMemberQuery);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Account query
|
||||||
|
//
|
||||||
|
accountFullName =
|
||||||
|
paramString(config, "accountFullName", type.accountFullName());
|
||||||
|
if (accountFullName != null) {
|
||||||
|
accountAtts.addAll(accountFullName.getParameterNames());
|
||||||
|
}
|
||||||
|
accountEmailAddress =
|
||||||
|
paramString(config, "accountEmailAddress", type.accountEmailAddress());
|
||||||
|
if (accountEmailAddress != null) {
|
||||||
|
accountAtts.addAll(accountEmailAddress.getParameterNames());
|
||||||
|
}
|
||||||
|
accountSshUserName =
|
||||||
|
paramString(config, "accountSshUserName", type.accountSshUserName());
|
||||||
|
if (accountSshUserName != null) {
|
||||||
|
accountAtts.addAll(accountSshUserName.getParameterNames());
|
||||||
|
}
|
||||||
|
accountMemberField =
|
||||||
|
optdef(config, "accountMemberField", type.accountMemberField());
|
||||||
|
if (accountMemberField != null) {
|
||||||
|
accountAtts.add(accountMemberField);
|
||||||
|
}
|
||||||
|
|
||||||
|
final SearchScope accountScope = scope(config, "accountScope");
|
||||||
|
final String accountPattern =
|
||||||
|
reqdef(config, "accountPattern", type.accountPattern());
|
||||||
|
|
||||||
|
for (String accountBase : requiredList(config, "accountBase")) {
|
||||||
|
final LdapQuery accountQuery =
|
||||||
|
new LdapQuery(accountBase, accountScope, new ParamertizedString(
|
||||||
|
accountPattern), accountAtts);
|
||||||
|
if (accountQuery.getParameters().isEmpty()) {
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"No variables in ldap.accountPattern");
|
||||||
|
}
|
||||||
|
accountQueryList.add(accountQuery);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
LdapType discoverLdapType(DirContext ctx) {
|
||||||
|
try {
|
||||||
|
return LdapType.guessType(ctx);
|
||||||
|
} catch (NamingException e) {
|
||||||
|
log.warn("Cannot discover type of LDAP server at " + server
|
||||||
|
+ ", assuming the server is RFC 2307 compliant.", e);
|
||||||
|
return LdapType.RFC_2307;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user