| | |
| | | import java.util.List; |
| | | import java.util.concurrent.locks.Lock; |
| | | |
| | | import org.opends.messages.Message; |
| | | import org.forgerock.i18n.LocalizableMessage; |
| | | import org.opends.server.admin.server.ConfigurationChangeListener; |
| | | import org.opends.server.admin.std.server.PlainSASLMechanismHandlerCfg; |
| | | import org.opends.server.admin.std.server.SASLMechanismHandlerCfg; |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_NO_SASL_CREDENTIALS.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_NO_SASL_CREDENTIALS.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_NO_NULLS_IN_CREDENTIALS.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_NO_NULLS_IN_CREDENTIALS.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_NO_SECOND_NULL.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_NO_SECOND_NULL.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_ZERO_LENGTH_AUTHCID.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_ZERO_LENGTH_AUTHCID.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_ZERO_LENGTH_PASSWORD.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_ZERO_LENGTH_PASSWORD.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_CANNOT_DECODE_AUTHCID_AS_DN.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_CANNOT_DECODE_AUTHCID_AS_DN.get( |
| | | authcID, de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHCID_IS_NULL_DN.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHCID_IS_NULL_DN.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_CANNOT_GET_ENTRY_BY_DN.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_CANNOT_GET_ENTRY_BY_DN.get( |
| | | String.valueOf(userDN), |
| | | de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_CANNOT_MAP_USERNAME.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_CANNOT_MAP_USERNAME.get( |
| | | String.valueOf(authcID), |
| | | de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_NO_MATCHING_ENTRIES.get(authcID); |
| | | LocalizableMessage message = ERR_SASLPLAIN_NO_MATCHING_ENTRIES.get(authcID); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_INVALID_DN.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_INVALID_DN.get( |
| | | authzID, de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_INSUFFICIENT_PRIVILEGES.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_INSUFFICIENT_PRIVILEGES.get( |
| | | String.valueOf(userEntry.getName())); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_NO_SUCH_ENTRY.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_NO_SUCH_ENTRY.get( |
| | | String.valueOf(authzDN)); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_CANNOT_GET_ENTRY.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_CANNOT_GET_ENTRY.get( |
| | | String.valueOf(authzDN), |
| | | de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_NO_MAPPED_ENTRY.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_NO_MAPPED_ENTRY.get( |
| | | authzID); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_CANNOT_MAP_AUTHZID.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_CANNOT_MAP_AUTHZID.get( |
| | | authzID, de.getMessageObject()); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_AUTHZID_INSUFFICIENT_PRIVILEGES.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_AUTHZID_INSUFFICIENT_PRIVILEGES.get( |
| | | String.valueOf(userEntry.getName())); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | |
| | | { |
| | | // Check to see if the user is administratively disabled or locked. |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | Message message = ERR_BIND_OPERATION_ACCOUNT_DISABLED.get(); |
| | | LocalizableMessage message = ERR_BIND_OPERATION_ACCOUNT_DISABLED.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | if (!authState.passwordMatches(ByteString.valueOf(password))) |
| | | { |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | Message message = ERR_SASLPLAIN_INVALID_PASSWORD.get(); |
| | | LocalizableMessage message = ERR_SASLPLAIN_INVALID_PASSWORD.get(); |
| | | bindOperation.setAuthFailureReason(message); |
| | | return; |
| | | } |
| | |
| | | |
| | | bindOperation.setResultCode(ResultCode.INVALID_CREDENTIALS); |
| | | |
| | | Message message = ERR_SASLPLAIN_CANNOT_CHECK_PASSWORD_VALIDITY.get( |
| | | LocalizableMessage message = ERR_SASLPLAIN_CANNOT_CHECK_PASSWORD_VALIDITY.get( |
| | | String.valueOf(userEntry.getName()), |
| | | String.valueOf(e)); |
| | | bindOperation.setAuthFailureReason(message); |
| | |
| | | @Override() |
| | | public boolean isConfigurationAcceptable( |
| | | SASLMechanismHandlerCfg configuration, |
| | | List<Message> unacceptableReasons) |
| | | List<LocalizableMessage> unacceptableReasons) |
| | | { |
| | | PlainSASLMechanismHandlerCfg config = |
| | | (PlainSASLMechanismHandlerCfg) configuration; |
| | |
| | | @Override |
| | | public boolean isConfigurationChangeAcceptable( |
| | | PlainSASLMechanismHandlerCfg configuration, |
| | | List<Message> unacceptableReasons) |
| | | List<LocalizableMessage> unacceptableReasons) |
| | | { |
| | | return true; |
| | | } |
| | |
| | | { |
| | | ResultCode resultCode = ResultCode.SUCCESS; |
| | | boolean adminActionRequired = false; |
| | | ArrayList<Message> messages = new ArrayList<Message>(); |
| | | ArrayList<LocalizableMessage> messages = new ArrayList<LocalizableMessage>(); |
| | | |
| | | |
| | | // Get the identity mapper that should be used to find users. |