@Override public String addUser(User user) throws UserExistsException, DomainNotSupportedException { if (user.getDomain() == null) { user.setDomain(UserCatalogConstants.DEFAULT_DOMAIN_NAME); } else { checkIfDomainSupported(user.getDomain()); } return userDao.save(UserCatalogModelHibernateModelTransformer.transformUserToHibernateUser(user)); }
xUser.addContent(xId); Element xDomain = new Element("domain", ns); xDomain.setText(user.getDomain()); xUser.addContent(xDomain);
@Override public void updateUser(User user) throws UserNotFoundException { if (user.getId()==null) { throw new InvalidParameterException("got null user id: " + "user identifier has to be set externally!"); } Name userDN = builUserDn(user.getId()); try { if (ldapTemplate.lookup(userDN)==null) { throw new UserNotFoundException( user.getId(), user.getDomain()); } } catch(NameNotFoundException e) { throw new UserNotFoundException( user.getId(), user.getDomain()); } // updating only selected attributes ModificationItem[] modItems = prepareModifications(user); if (modItems!=null && modItems.length>0) { ldapTemplate.modifyAttributes(userDN, modItems); } else { log.warn("No modifications will be made: " + "no modification items found!"); } }
/** * Transform user to hibernate user. * * @param user the user * @return the hibernate user */ public static HibernateUser transformUserToHibernateUser(User user) { if (user == null) { return null; } HibernateUser hibernateUser = new HibernateUser(); hibernateUser.setId(user.getId()); hibernateUser.setDomain(user.getDomain()); hibernateUser.fillUserRelatedFields(user); return hibernateUser; }
System.out.println(new Formatter().format("%1$-3s %2$-15s %3$-15s %4$-25s %5$-60s %6$s", ++idx, user.getUser().getDomain(), user.getUser().getIdentifiers().iterator().next(), user.getUser().getAttributes().get(UserAttributesConstants.EMAIL),
@Override public GenericResponse updateUser(ModifyUserRequest request) { Map<String, Serializable> auxParams = new HashMap<String, Serializable>(); if (request.getUser()!=null && request.getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(request.getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, request.getUser().getDomain());
@Override public IdentifiedResponse addUser(ModifyUserRequest request) { Map<String, Serializable> auxParams = new HashMap<String, Serializable>(); if (request.getUser()!=null && request.getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(request.getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, request.getUser().getDomain()); } else { if (disallowNullDomain) {
/** * Secures {@link User} object. * @param source * @return {@link User} object */ protected User prepareMinimalUser(User source) { if (source==null) { return null; } // creating new object to make sure only specified data will be sent to unauthorized client User result = new User(); result.setId(source.getId()); result.setDomain(source.getDomain()); result.setIdentifiers(source.getIdentifiers()); result.setAttributes(prepareMinimalAttributes(source.getAttributes())); return result; }
if (userDataResp.isOK()) { if (userDataResp.getUserData()!=null && userDataResp.getUserData().getUser()!=null && userDataResp.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userDataResp.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userDataResp.getUserData().getUser().getDomain()); } else { log.warn("Unable to inspect domain for user: " + request.getIdentifier());
while(it.hasNext()) { groups.add(new GroupName( result.getUser().getDomain(), it.next()));
auxParams.put(BackendAuthorizerRequest.UNSUFFIXED_GENERIC_PARAM_VALUE, userData.getUserData().getUser().getId()); if (userData.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userData.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userData.getUserData().getUser().getDomain());
if (userDataResp.getUserData()!=null && userDataResp.getUserData().getUser()!=null && userDataResp.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userDataResp.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userDataResp.getUserData().getUser().getDomain()); } else { log.warn("unable to find domain for user " +
if (userDataResp.getUserData()!=null && userDataResp.getUserData().getUser()!=null && userDataResp.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userDataResp.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userDataResp.getUserData().getUser().getDomain()); } else { log.warn("unable to find domain for user " +
auxParams.put(BackendAuthorizerRequest.UNSUFFIXED_GENERIC_PARAM_VALUE, userDataResp.getUserData().getUser().getId()); if (userDataResp.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userDataResp.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userDataResp.getUserData().getUser().getDomain());
if (userDataResp.getUserData()!=null && userDataResp.getUserData().getUser()!=null && userDataResp.getUserData().getUser().getDomain()!=null) { auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_ROOT_SUFFIX, extractDomainRoot(userDataResp.getUserData().getUser().getDomain())); auxParams.put(XACMLConstants.SUBJECT_AUX_PARAM_DOMAIN_SUFFIX, userDataResp.getUserData().getUser().getDomain()); } else { log.warn("unable to find domain for user " +