All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.unboundid.ldap.sdk.unboundidds.controls.GetEffectiveRightsRequestControl Maven / Gradle / Ivy

Go to download

The UnboundID LDAP SDK for Java is a fast, comprehensive, and easy-to-use Java API for communicating with LDAP directory servers and performing related tasks like reading and writing LDIF, encoding and decoding data using base64 and ASN.1 BER, and performing secure communication. This package contains the Standard Edition of the LDAP SDK, which is a complete, general-purpose library for communicating with LDAPv3 directory servers.

There is a newer version: 7.0.2
Show newest version
/*
 * Copyright 2008-2018 Ping Identity Corporation
 * All Rights Reserved.
 */
/*
 * Copyright (C) 2015-2018 Ping Identity Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (GPLv2 only)
 * or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
 * as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see .
 */
package com.unboundid.ldap.sdk.unboundidds.controls;



import com.unboundid.asn1.ASN1Element;
import com.unboundid.asn1.ASN1OctetString;
import com.unboundid.asn1.ASN1Sequence;
import com.unboundid.ldap.sdk.Control;
import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.ResultCode;
import com.unboundid.util.Debug;
import com.unboundid.util.NotMutable;
import com.unboundid.util.StaticUtils;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import com.unboundid.util.Validator;

import static com.unboundid.ldap.sdk.unboundidds.controls.ControlMessages.*;



/**
 * This class provides an implementation of the get effective rights request
 * control, which may be included in a search request to indicate that matching
 * entries should include information about the rights a given user may have
 * when interacting with that entry.
 * 
*
* NOTE: This class, and other classes within the * {@code com.unboundid.ldap.sdk.unboundidds} package structure, are only * supported for use against Ping Identity, UnboundID, and * Nokia/Alcatel-Lucent 8661 server products. These classes provide support * for proprietary functionality or for external specifications that are not * considered stable or mature enough to be guaranteed to work in an * interoperable way with other types of LDAP servers. *
*
* When the get effective rights control is included in a search request, then * each entry returned may include information about the rights that the * specified user has for that entry in the {@code aclRights} operational * attribute. Note that because this is an operational attribute, it must be * explicitly included in the set of attributes to return. *

* If the {@code aclRights} attribute is included in the entry, then it will be * present with multiple sets of options. In one case, it will have an option * of "entryLevel", which provides information about the rights that the user * has for the entry in general (see the {@link EntryRight} enum for a list of * the entry-level rights that can be held). In all other cases, it will have * one option of "attributeLevel" and another option that is the name of the * attribute for which the set of rights is granted (see the * {@link AttributeRight} enum for a list of the attribute-level rights that can * be held). In either case, the value will be a comma-delimited list of * right strings, where each right string is the name of the right followed by * a colon and a one to indicate that the right is granted or zero to indicate * that it is not granted. The {@link EffectiveRightsEntry} class provides a * simple means of accessing the information encoded in the values of the * {@code aclRights} attribute. *

* This control was designed by Sun Microsystems, and it is not the same as the * get effective rights control referenced in the draft-ietf-ldapext-acl-model * Internet draft. The value for this control should be encoded as follows: *

*
 * GET_EFFECTIVE_RIGHTS := SEQUENCE {
 *   authzID     authzID,
 *   attributes  SEQUENCE OF AttributeType OPTIONAL }
 * 
*

Example

* The following example demonstrates the use of the get effective rights * control to determine whether user "uid=admin,dc=example,dc=com" has the * ability to change the password for the user with uid "john.doe": *
 * SearchRequest searchRequest = new SearchRequest("dc=example,dc=com",
 *      SearchScope.SUB, Filter.createEqualityFilter("uid", "john.doe"),
 *      "userPassword", "aclRights");
 * searchRequest.addControl(new GetEffectiveRightsRequestControl(
 *      "dn:uid=admin,dc=example,dc=com"));
 * SearchResult searchResult = connection.search(searchRequest);
 *
 * for (SearchResultEntry entry : searchResult.getSearchEntries())
 * {
 *   EffectiveRightsEntry effectiveRightsEntry =
 *        new EffectiveRightsEntry(entry);
 *   if (effectiveRightsEntry.rightsInformationAvailable())
 *   {
 *     if (effectiveRightsEntry.hasAttributeRight(AttributeRight.WRITE,
 *          "userPassword"))
 *     {
 *       // The admin user has permission to change the target user's password.
 *     }
 *     else
 *     {
 *       // The admin user does not have permission to change the target user's
 *       // password.
 *     }
 *   }
 *   else
 *   {
 *     // No effective rights information was returned.
 *   }
 * }
 * 
*/ @NotMutable() @ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE) public final class GetEffectiveRightsRequestControl extends Control { /** * The OID (1.3.6.1.4.1.42.2.27.9.5.2) for the get effective rights request * control. */ public static final String GET_EFFECTIVE_RIGHTS_REQUEST_OID = "1.3.6.1.4.1.42.2.27.9.5.2"; /** * The serial version UID for this serializable class. */ private static final long serialVersionUID = 354733122036206073L; // The authorization ID of the user for which to calculate the effective // rights. private final String authzID; // The names of the attribute types for which to calculate the effective // rights. private final String[] attributes; /** * Creates a new get effective rights request control with the provided * information. It will not be marked critical. * * @param authzID The authorization ID of the user for whom the effective * rights should be calculated. It must not be * {@code null}. * @param attributes The set of attributes for which to calculate the * effective rights. */ public GetEffectiveRightsRequestControl(final String authzID, final String... attributes) { this(false, authzID, attributes); } /** * Creates a new get effective rights request control with the provided * information. It will not be marked critical. * * @param isCritical Indicates whether this control should be marked * critical. * @param authzID The authorization ID of the user for whom the effective * rights should be calculated. It must not be * {@code null}. * @param attributes The set of attributes for which to calculate the * effective rights. */ public GetEffectiveRightsRequestControl(final boolean isCritical, final String authzID, final String... attributes) { super(GET_EFFECTIVE_RIGHTS_REQUEST_OID, isCritical, encodeValue(authzID, attributes)); this.authzID = authzID; this.attributes = attributes; } /** * Creates a new get effective rights request control which is decoded from * the provided generic control. * * @param control The generic control to be decoded as a get effective * rights request control. * * @throws LDAPException If the provided control cannot be decoded as a get * effective rights request control. */ public GetEffectiveRightsRequestControl(final Control control) throws LDAPException { super(control); final ASN1OctetString value = control.getValue(); if (value == null) { throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GER_REQUEST_NO_VALUE.get()); } final ASN1Element[] elements; try { final ASN1Element valueElement = ASN1Element.decode(value.getValue()); elements = ASN1Sequence.decodeAsSequence(valueElement).elements(); } catch (final Exception e) { Debug.debugException(e); throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GER_REQUEST_VALUE_NOT_SEQUENCE.get(e), e); } if ((elements.length < 1) || (elements.length > 2)) { throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GER_REQUEST_INVALID_ELEMENT_COUNT.get( elements.length)); } authzID = ASN1OctetString.decodeAsOctetString(elements[0]).stringValue(); if (elements.length == 2) { try { final ASN1Element[] attrElements = ASN1Sequence.decodeAsSequence(elements[1]).elements(); attributes = new String[attrElements.length]; for (int i=0; i < attrElements.length; i++) { attributes[i] = ASN1OctetString.decodeAsOctetString( attrElements[i]).stringValue(); } } catch (final Exception e) { Debug.debugException(e); throw new LDAPException(ResultCode.DECODING_ERROR, ERR_GER_REQUEST_CANNOT_DECODE.get(e), e); } } else { attributes = StaticUtils.NO_STRINGS; } } /** * Encodes the provided information into an ASN.1 octet string suitable for * use as the value of this control. * * @param authzID The authorization ID of the user for whom the effective * rights should be calculated. It must not be * {@code null}. * @param attributes The set of attributes for which to calculate the * effective rights. * * @return An ASN.1 octet string containing the encoded control value. */ private static ASN1OctetString encodeValue(final String authzID, final String[] attributes) { Validator.ensureNotNull(authzID); final ASN1Element[] elements; if ((attributes == null) || (attributes.length == 0)) { elements = new ASN1Element[] { new ASN1OctetString(authzID), new ASN1Sequence() }; } else { final ASN1Element[] attrElements = new ASN1Element[attributes.length]; for (int i=0; i < attributes.length; i++) { attrElements[i] = new ASN1OctetString(attributes[i]); } elements = new ASN1Element[] { new ASN1OctetString(authzID), new ASN1Sequence(attrElements) }; } return new ASN1OctetString(new ASN1Sequence(elements).encode()); } /** * Retrieves the authorization ID of the user for whom to calculate the * effective rights. * * @return The authorization ID of the user for whom to calculate the * effective rights. */ public String getAuthzID() { return authzID; } /** * Retrieves the names of the attributes for which to calculate the effective * rights information. * * @return The names of the attributes for which to calculate the effective * rights information, or an empty array if no attribute names were * specified. */ public String[] getAttributes() { return attributes; } /** * {@inheritDoc} */ @Override() public String getControlName() { return INFO_CONTROL_NAME_GET_EFFECTIVE_RIGHTS_REQUEST.get(); } /** * {@inheritDoc} */ @Override() public void toString(final StringBuilder buffer) { buffer.append("GetEffectiveRightsRequestControl(authzId='"); buffer.append(authzID); buffer.append('\''); if (attributes.length > 0) { buffer.append(", attributes={"); for (int i=0; i < attributes.length; i++) { if (i > 0) { buffer.append(", "); } buffer.append(attributes[i]); } buffer.append('}'); } buffer.append(", isCritical="); buffer.append(isCritical()); buffer.append(')'); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy