/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
|
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
|
* add the following below this CDDL HEADER, with the fields enclosed
|
* by brackets "[]" replaced with your own identifying information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Copyright 2008 Sun Microsystems, Inc.
|
* Portions Copyright 2011-2012 ForgeRock AS
|
*/
|
package org.opends.server.extensions;
|
import org.opends.messages.Message;
|
|
|
|
import java.util.ArrayList;
|
import java.util.HashMap;
|
import java.util.HashSet;
|
import java.util.List;
|
import java.util.Set;
|
|
import org.opends.server.admin.server.ConfigurationChangeListener;
|
import org.opends.server.admin.std.server.CharacterSetPasswordValidatorCfg;
|
import org.opends.server.admin.std.server.PasswordValidatorCfg;
|
import org.opends.server.api.PasswordValidator;
|
import org.opends.server.config.ConfigException;
|
import org.opends.server.types.*;
|
import static org.opends.messages.ExtensionMessages.*;
|
import org.opends.messages.MessageBuilder;
|
import static org.opends.server.util.StaticUtils.*;
|
|
|
|
/**
|
* This class provides an OpenDJ password validator that may be used to ensure
|
* that proposed passwords contain at least a specified number of characters
|
* from one or more user-defined character sets.
|
*/
|
public class CharacterSetPasswordValidator
|
extends PasswordValidator<CharacterSetPasswordValidatorCfg>
|
implements ConfigurationChangeListener<CharacterSetPasswordValidatorCfg>
|
{
|
// The current configuration for this password validator.
|
private CharacterSetPasswordValidatorCfg currentConfig;
|
|
// A mapping between the character sets and the minimum number of characters
|
// required for each.
|
private HashMap<String,Integer> characterSets;
|
|
// A mapping between the character ranges and the minimum number of characters
|
// required for each.
|
private HashMap<String,Integer> characterRanges;
|
|
|
|
/**
|
* Creates a new instance of this character set password validator.
|
*/
|
public CharacterSetPasswordValidator()
|
{
|
super();
|
|
// No implementation is required here. All initialization should be
|
// performed in the initializePasswordValidator() method.
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
@Override()
|
public void initializePasswordValidator(
|
CharacterSetPasswordValidatorCfg configuration)
|
throws ConfigException
|
{
|
configuration.addCharacterSetChangeListener(this);
|
currentConfig = configuration;
|
|
// Make sure that each of the character set and range definitions are
|
// acceptable.
|
processCharacterSetsAndRanges(configuration, true);
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
@Override()
|
public void finalizePasswordValidator()
|
{
|
currentConfig.removeCharacterSetChangeListener(this);
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
@Override()
|
public boolean passwordIsAcceptable(ByteString newPassword,
|
Set<ByteString> currentPasswords,
|
Operation operation, Entry userEntry,
|
MessageBuilder invalidReason)
|
{
|
// Get a handle to the current configuration.
|
CharacterSetPasswordValidatorCfg config = currentConfig;
|
HashMap<String,Integer> characterSets = this.characterSets;
|
|
|
// Process the provided password.
|
String password = newPassword.toString();
|
HashMap<String,Integer> setCounts = new HashMap<String,Integer>();
|
HashMap<String,Integer> rangeCounts = new HashMap<String,Integer>();
|
for (int i=0; i < password.length(); i++)
|
{
|
char c = password.charAt(i);
|
boolean found = false;
|
for (String characterSet : characterSets.keySet())
|
{
|
if (characterSet.indexOf(c) >= 0)
|
{
|
Integer count = setCounts.get(characterSet);
|
if (count == null)
|
{
|
setCounts.put(characterSet, 1);
|
}
|
else
|
{
|
setCounts.put(characterSet, count+1);
|
}
|
|
found = true;
|
break;
|
}
|
}
|
if (!found)
|
{
|
for (String characterRange : characterRanges.keySet())
|
{
|
int rangeStart = 0;
|
while (rangeStart < characterRange.length())
|
{
|
if (characterRange.charAt(rangeStart) <= c
|
&& c <= characterRange.charAt(rangeStart+2))
|
{
|
Integer count = rangeCounts.get(characterRange);
|
if (count == null)
|
{
|
rangeCounts.put(characterRange, 1);
|
}
|
else
|
{
|
rangeCounts.put(characterRange, count+1);
|
}
|
|
found = true;
|
break;
|
}
|
rangeStart += 3;
|
}
|
}
|
}
|
if ((! found) && (! config.isAllowUnclassifiedCharacters()))
|
{
|
invalidReason.append(ERR_CHARSET_VALIDATOR_ILLEGAL_CHARACTER.get(
|
String.valueOf(c)));
|
return false;
|
}
|
}
|
|
int usedOptionalCharacterSets = 0;
|
int optionalCharacterSets = 0;
|
int mandatoryCharacterSets = 0;
|
for (String characterSet : characterSets.keySet())
|
{
|
int minimumCount = characterSets.get(characterSet);
|
Integer passwordCount = setCounts.get(characterSet);
|
if (minimumCount > 0)
|
{
|
// Mandatory character set.
|
mandatoryCharacterSets++;
|
if ((passwordCount == null) || (passwordCount < minimumCount))
|
{
|
invalidReason
|
.append(ERR_CHARSET_VALIDATOR_TOO_FEW_CHARS_FROM_SET
|
.get(characterSet, minimumCount));
|
return false;
|
}
|
}
|
else
|
{
|
// Optional character set.
|
optionalCharacterSets++;
|
if (passwordCount != null)
|
{
|
usedOptionalCharacterSets++;
|
}
|
}
|
}
|
for (String characterRange : characterRanges.keySet())
|
{
|
int minimumCount = characterRanges.get(characterRange);
|
Integer passwordCount = rangeCounts.get(characterRange);
|
if (minimumCount > 0)
|
{
|
// Mandatory character set.
|
mandatoryCharacterSets++;
|
if ((passwordCount == null) || (passwordCount < minimumCount))
|
{
|
invalidReason
|
.append(ERR_CHARSET_VALIDATOR_TOO_FEW_CHARS_FROM_RANGE
|
.get(characterRange, minimumCount));
|
return false;
|
}
|
}
|
else
|
{
|
// Optional character set.
|
optionalCharacterSets++;
|
if (passwordCount != null)
|
{
|
usedOptionalCharacterSets++;
|
}
|
}
|
|
}
|
|
// Check minimum optional character sets are present.
|
if (optionalCharacterSets > 0)
|
{
|
int requiredOptionalCharacterSets;
|
if (currentConfig.getMinCharacterSets() == null)
|
{
|
requiredOptionalCharacterSets = 1;
|
}
|
else
|
{
|
requiredOptionalCharacterSets = currentConfig
|
.getMinCharacterSets() - mandatoryCharacterSets;
|
}
|
|
if (usedOptionalCharacterSets < requiredOptionalCharacterSets)
|
{
|
StringBuilder builder = new StringBuilder();
|
for (String characterSet : characterSets.keySet())
|
{
|
if (characterSets.get(characterSet) == 0)
|
{
|
if (builder.length() > 0)
|
{
|
builder.append(", ");
|
}
|
builder.append('\'');
|
builder.append(characterSet);
|
builder.append('\'');
|
}
|
}
|
for (String characterRange : characterRanges.keySet())
|
{
|
if (characterRanges.get(characterRange) == 0)
|
{
|
if (builder.length() > 0)
|
{
|
builder.append(", ");
|
}
|
builder.append('\'');
|
builder.append(characterRange);
|
builder.append('\'');
|
}
|
}
|
|
invalidReason
|
.append(ERR_CHARSET_VALIDATOR_TOO_FEW_OPTIONAL_CHAR_SETS
|
.get(requiredOptionalCharacterSets,
|
builder.toString()));
|
return false;
|
}
|
}
|
|
// If we've gotten here, then the password is acceptable.
|
return true;
|
}
|
|
|
|
/**
|
* Parses the provided configuration and extracts the character set
|
* definitions and associated minimum counts from them.
|
*
|
* @param configuration the configuration for this password validator.
|
* @param apply <CODE>true</CODE> if the configuration is being applied,
|
* <CODE>false</CODE> if it is just being validated.
|
* @throws ConfigException If any of the character set definitions cannot be
|
* parsed, or if there are any characters present in
|
* multiple sets.
|
*/
|
private void processCharacterSetsAndRanges(
|
CharacterSetPasswordValidatorCfg configuration,
|
boolean apply)
|
throws ConfigException
|
{
|
HashMap<String,Integer> characterSets = new HashMap<String,Integer>();
|
HashMap<String,Integer> characterRanges = new HashMap<String,Integer>();
|
HashSet<Character> usedCharacters = new HashSet<Character>();
|
int mandatoryCharacterSets = 0;
|
|
for (String definition : configuration.getCharacterSet())
|
{
|
int colonPos = definition.indexOf(':');
|
if (colonPos <= 0)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_NO_SET_COLON.get(definition);
|
throw new ConfigException(message);
|
}
|
else if (colonPos == (definition.length() - 1))
|
{
|
Message message = ERR_CHARSET_VALIDATOR_NO_SET_CHARS.get(definition);
|
throw new ConfigException(message);
|
}
|
|
int minCount;
|
try
|
{
|
minCount = Integer.parseInt(definition.substring(0, colonPos));
|
}
|
catch (Exception e)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_INVALID_SET_COUNT
|
.get(definition);
|
throw new ConfigException(message);
|
}
|
|
if (minCount < 0)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_INVALID_SET_COUNT
|
.get(definition);
|
throw new ConfigException(message);
|
}
|
|
String characterSet = definition.substring(colonPos+1);
|
for (int i=0; i < characterSet.length(); i++)
|
{
|
char c = characterSet.charAt(i);
|
if (usedCharacters.contains(c))
|
{
|
Message message = ERR_CHARSET_VALIDATOR_DUPLICATE_CHAR.get(
|
definition, String.valueOf(c));
|
throw new ConfigException(message);
|
}
|
|
usedCharacters.add(c);
|
}
|
|
characterSets.put(characterSet, minCount);
|
|
if (minCount > 0)
|
{
|
mandatoryCharacterSets++;
|
}
|
}
|
|
// Check the ranges
|
for (String definition : configuration.getCharacterSetRanges())
|
{
|
int colonPos = definition.indexOf(':');
|
if (colonPos <= 0)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_NO_RANGE_COLON.get(definition);
|
throw new ConfigException(message);
|
}
|
else if (colonPos == (definition.length() - 1))
|
{
|
Message message = ERR_CHARSET_VALIDATOR_NO_RANGE_CHARS.get(definition);
|
throw new ConfigException(message);
|
}
|
|
int minCount;
|
try
|
{
|
minCount = Integer.parseInt(definition.substring(0, colonPos));
|
}
|
catch (Exception e)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_INVALID_RANGE_COUNT
|
.get(definition);
|
throw new ConfigException(message);
|
}
|
|
if (minCount < 0)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_INVALID_RANGE_COUNT
|
.get(definition);
|
throw new ConfigException(message);
|
}
|
|
String characterRange = definition.substring(colonPos+1);
|
/*
|
* Ensure we have a number of valid range specifications which are
|
* each 3 chars long.
|
* e.g. "a-zA-Z0-9"
|
*/
|
int rangeOffset = 0;
|
while (rangeOffset < characterRange.length())
|
{
|
if (rangeOffset > characterRange.length() - 3)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_SHORT_RANGE
|
.get(definition, characterRange.substring(rangeOffset));
|
throw new ConfigException(message);
|
}
|
|
if (characterRange.charAt(rangeOffset+1) != '-')
|
{
|
Message message = ERR_CHARSET_VALIDATOR_MALFORMED_RANGE
|
.get(definition, characterRange
|
.substring(rangeOffset,rangeOffset+3));
|
throw new ConfigException(message);
|
}
|
|
if (characterRange.charAt(rangeOffset) >=
|
characterRange.charAt(rangeOffset+2))
|
{
|
Message message = ERR_CHARSET_VALIDATOR_UNSORTED_RANGE
|
.get(definition, characterRange
|
.substring(rangeOffset, rangeOffset+3));
|
throw new ConfigException(message);
|
}
|
|
rangeOffset += 3;
|
}
|
|
characterRanges.put(characterRange, minCount);
|
|
if (minCount > 0)
|
{
|
mandatoryCharacterSets++;
|
}
|
}
|
|
// Validate min-character-sets if necessary.
|
int optionalCharacterSets = characterSets.size() + characterRanges.size()
|
- mandatoryCharacterSets;
|
if (optionalCharacterSets > 0
|
&& configuration.getMinCharacterSets() != null)
|
{
|
int minCharacterSets = configuration.getMinCharacterSets();
|
|
if (minCharacterSets <= mandatoryCharacterSets)
|
{
|
Message message = ERR_CHARSET_VALIDATOR_MIN_CHAR_SETS_TOO_SMALL
|
.get(minCharacterSets);
|
throw new ConfigException(message);
|
}
|
|
if (minCharacterSets > (characterSets.size() + characterRanges.size()))
|
{
|
Message message = ERR_CHARSET_VALIDATOR_MIN_CHAR_SETS_TOO_BIG
|
.get(minCharacterSets);
|
throw new ConfigException(message);
|
}
|
}
|
|
if (apply)
|
{
|
this.characterSets = characterSets;
|
this.characterRanges = characterRanges;
|
}
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
@Override()
|
public boolean isConfigurationAcceptable(PasswordValidatorCfg configuration,
|
List<Message> unacceptableReasons)
|
{
|
CharacterSetPasswordValidatorCfg config =
|
(CharacterSetPasswordValidatorCfg) configuration;
|
return isConfigurationChangeAcceptable(config, unacceptableReasons);
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public boolean isConfigurationChangeAcceptable(
|
CharacterSetPasswordValidatorCfg configuration,
|
List<Message> unacceptableReasons)
|
{
|
// Make sure that we can process the defined character sets. If so, then
|
// we'll accept the new configuration.
|
try
|
{
|
processCharacterSetsAndRanges(configuration, false);
|
}
|
catch (ConfigException ce)
|
{
|
unacceptableReasons.add(ce.getMessageObject());
|
return false;
|
}
|
|
return true;
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public ConfigChangeResult applyConfigurationChange(
|
CharacterSetPasswordValidatorCfg configuration)
|
{
|
ResultCode resultCode = ResultCode.SUCCESS;
|
boolean adminActionRequired = false;
|
ArrayList<Message> messages = new ArrayList<Message>();
|
|
|
// Make sure that we can process the defined character sets. If so, then
|
// activate the new configuration.
|
try
|
{
|
processCharacterSetsAndRanges(configuration, true);
|
currentConfig = configuration;
|
}
|
catch (Exception e)
|
{
|
resultCode = DirectoryConfig.getServerErrorResultCode();
|
messages.add(getExceptionMessage(e));
|
}
|
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
}
|