manifoldcf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From mlizew...@apache.org
Subject svn commit: r1525873 - in /manifoldcf/trunk/connectors/ldap/connector/src/main: java/org/apache/manifoldcf/authorities/authorities/ldap/ native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/
Date Tue, 24 Sep 2013 12:52:24 GMT
Author: mlizewski
Date: Tue Sep 24 12:52:24 2013
New Revision: 1525873

URL: http://svn.apache.org/r1525873
Log:
fixes CONNECTORS-779

Modified:
    manifoldcf/trunk/connectors/ldap/connector/src/main/java/org/apache/manifoldcf/authorities/authorities/ldap/LDAPAuthority.java
    manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_en_US.properties
    manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_ja_JP.properties
    manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_pl_PL.properties

Modified: manifoldcf/trunk/connectors/ldap/connector/src/main/java/org/apache/manifoldcf/authorities/authorities/ldap/LDAPAuthority.java
URL: http://svn.apache.org/viewvc/manifoldcf/trunk/connectors/ldap/connector/src/main/java/org/apache/manifoldcf/authorities/authorities/ldap/LDAPAuthority.java?rev=1525873&r1=1525872&r2=1525873&view=diff
==============================================================================
--- manifoldcf/trunk/connectors/ldap/connector/src/main/java/org/apache/manifoldcf/authorities/authorities/ldap/LDAPAuthority.java
(original)
+++ manifoldcf/trunk/connectors/ldap/connector/src/main/java/org/apache/manifoldcf/authorities/authorities/ldap/LDAPAuthority.java
Tue Sep 24 12:52:24 2013
@@ -39,25 +39,44 @@ import org.apache.manifoldcf.ui.util.Enc
 public class LDAPAuthority extends org.apache.manifoldcf.authorities.authorities.BaseAuthorityConnector
{
 
   public static final String _rcsid = "@(#)$Id$";
+
   /**
    * Session information for all DC's we talk with.
    */
   private LdapContext session = null;
+
   private long sessionExpirationTime = -1L;
+
   private ConfigParams parameters;
+
   private String serverName;
+
   private String serverPort;
+
   private String serverBase;
+
   private String userBase;
+
   private String userSearch;
+
   private String groupBase;
+
   private String groupSearch;
+
   private String groupNameAttr;
+
   private boolean groupMemberDN;
+
   private boolean addUserRecord;
+
+  private List<String> forcedTokens;
+
   private String userNameAttr;
+
   private long responseLifetime = 60000L; //60sec
+
   private int LRUsize = 1000;
+
   /**
    * Cache manager.
    */
@@ -102,6 +121,16 @@ public class LDAPAuthority extends org.a
     userNameAttr = configParams.getParameter("ldapUserNameAttr");
     groupMemberDN = "1".equals(getParam(configParams, "ldapGroupMemberDn", ""));
     addUserRecord = "1".equals(getParam(configParams, "ldapAddUserRecord", ""));
+
+    forcedTokens = new ArrayList<String>();
+    int i = 0;
+    while (i < parameters.getChildCount()) {
+      ConfigNode sn = parameters.getChild(i++);
+      if (sn.getType().equals("access")) {
+        String token = "" + sn.getAttributeValue("token");
+        forcedTokens.add(token);
+      }
+    }
   }
 
   // All methods below this line will ONLY be called if a connect() call succeeded
@@ -240,6 +269,7 @@ public class LDAPAuthority extends org.a
     groupSearch = null;
     groupNameAttr = null;
     userNameAttr = null;
+    forcedTokens = null;
   }
 
   protected String createCacheConnectionString() {
@@ -312,6 +342,7 @@ public class LDAPAuthority extends org.a
       }
 
       ArrayList theGroups = new ArrayList();
+      theGroups.addAll(forcedTokens);
 
       String usrName = userName.split("@")[0];
       if (userNameAttr != null && !"".equals(userNameAttr)) {
@@ -402,6 +433,7 @@ public class LDAPAuthority extends org.a
   @Override
   public void outputConfigurationHeader(IThreadContext threadContext, IHTTPOutput out, Locale
locale, ConfigParams parameters, List<String> tabsArray)
     throws ManifoldCFException, IOException {
+    tabsArray.add(Messages.getString(locale, "LDAP.ForcedTokens"));
     tabsArray.add(Messages.getString(locale, "LDAP.LDAP"));
     out.print(
       "<script type=\"text/javascript\">\n"
@@ -497,6 +529,19 @@ public class LDAPAuthority extends org.a
       + "  }\n"
       + "  return true;\n"
       + "}\n"
+      + "function SpecOp(n, opValue, anchorvalue) {\n"
+      + "  eval(\"editconnection.\"+n+\".value = \\\"\"+opValue+\"\\\"\");\n"
+      + "  postFormSetAnchor(anchorvalue);\n"
+      + "}\n"
+      + "function SpecAddToken(anchorvalue) {\n"
+      + "  if (editconnection.spectoken.value == \"\")\n"
+      + "  {\n"
+      + "    alert(\"" + Messages.getBodyJavascriptString(locale, "LDAP.TypeInToken") + "\");\n"
+      + "    editconnection.spectoken.focus();\n"
+      + "    return;\n"
+      + "  }\n"
+      + "  SpecOp(\"accessop\",\"Add\",anchorvalue);\n"
+      + "}\n"
       + "//-->\n"
       + "</script>\n");
   }
@@ -614,6 +659,77 @@ public class LDAPAuthority extends org.a
       out.print("<input type=\"hidden\" name=\"ldapAddUserRecord\" value=\"" + (fAddUserRecord
? "1" : "0") + "\"/>\n");
       out.print("<input type=\"hidden\" name=\"ldapGroupMemberDn\" value=\"" + (fGroupMemberDN
? "1" : "0") + "\"/>\n");
     }
+
+    if (tabName.equals(Messages.getString(locale, "LDAP.ForcedTokens"))) {
+      out.print(
+        "<table class=\"displaytable\">\n"
+        + "  <tr><td class=\"separator\" colspan=\"2\"><hr/></td></tr>\n"
+        + "  <tr><td class=\"value\" colspan=\"2\">" + Messages.getBodyString(locale,
"LDAP.ForcedTokensDisclaimer") + "</td></tr>\n"
+        + "  <tr><td class=\"separator\" colspan=\"2\"><hr/></td></tr>\n");
+
+      out.print("  <tr><td class=\"separator\" colspan=\"2\"><hr/></td></tr>\n");
+      // Go through forced ACL
+      int i = 0;
+      int k = 0;
+      while (i < parameters.getChildCount()) {
+        ConfigNode sn = parameters.getChild(i++);
+        if (sn.getType().equals("access")) {
+          String accessDescription = "_" + Integer.toString(k);
+          String accessOpName = "accessop" + accessDescription;
+          String token = sn.getAttributeValue("token");
+          out.print(
+            "  <tr>\n"
+            + "    <td class=\"description\">\n"
+            + "      <input type=\"hidden\" name=\"" + accessOpName + "\" value=\"\"/>\n"
+            + "      <input type=\"hidden\" name=\"" + "spectoken" + accessDescription
+ "\" value=\"" + Encoder.attributeEscape(token) + "\"/>\n"
+            + "      <a name=\"" + "token_" + Integer.toString(k) + "\">\n"
+            + "        <input type=\"button\" value=\"" + Messages.getAttributeString(locale,
"LDAP.Delete") + "\" onClick='Javascript:SpecOp(\"" + accessOpName + "\",\"Delete\",\"token_"
+ Integer.toString(k) + "\")' alt=\"" + Messages.getAttributeString(locale, "LDAP.DeleteToken")
+ Integer.toString(k) + "\"/>\n"
+            + "      </a>&nbsp;\n"
+            + "    </td>\n"
+            + "    <td class=\"value\">\n"
+            + "      " + Encoder.bodyEscape(token) + "\n"
+            + "    </td>\n"
+            + "  </tr>\n");
+          k++;
+        }
+      }
+      if (k == 0) {
+        out.print(
+          "  <tr>\n"
+          + "    <td class=\"message\" colspan=\"2\">" + Messages.getBodyString(locale,
"LDAP.NoTokensPresent") + "</td>\n"
+          + "  </tr>\n");
+      }
+      out.print(
+        "  <tr><td class=\"lightseparator\" colspan=\"2\"><hr/></td></tr>\n"
+        + "  <tr>\n"
+        + "    <td class=\"description\">\n"
+        + "      <input type=\"hidden\" name=\"tokencount\" value=\"" + Integer.toString(k)
+ "\"/>\n"
+        + "      <input type=\"hidden\" name=\"accessop\" value=\"\"/>\n"
+        + "      <a name=\"" + "token_" + Integer.toString(k) + "\">\n"
+        + "        <input type=\"button\" value=\"" + Messages.getAttributeString(locale,
"LDAP.Add") + "\" onClick='Javascript:SpecAddToken(\"token_" + Integer.toString(k + 1) + "\")'
alt=\"" + Messages.getAttributeString(locale, "LDAP.AddToken") + "\"/>\n"
+        + "      </a>&nbsp;\n"
+        + "    </td>\n"
+        + "    <td class=\"value\">\n"
+        + "      <input type=\"text\" size=\"30\" name=\"spectoken\" value=\"\"/>\n"
+        + "    </td>\n"
+        + "  </tr>\n"
+        + "</table>\n");
+    } else {
+      // Finally, go through forced ACL
+      int i = 0;
+      int k = 0;
+      while (i < parameters.getChildCount()) {
+        ConfigNode sn = parameters.getChild(i++);
+        if (sn.getType().equals("access")) {
+          String accessDescription = "_" + Integer.toString(k);
+          String token = "" + sn.getAttributeValue("token");
+          out.print(
+            "<input type=\"hidden\" name=\"" + "spectoken" + accessDescription + "\" value=\""
+ Encoder.attributeEscape(token) + "\"/>\n");
+          k++;
+        }
+      }
+      out.print("<input type=\"hidden\" name=\"tokencount\" value=\"" + Integer.toString(k)
+ "\"/>\n");
+    }
   }
 
   private String getParam(ConfigParams parameters, String name, String def) {
@@ -680,6 +796,47 @@ public class LDAPAuthority extends org.a
       parameters.setObfuscatedParameter("ldapBindPass", variableContext.mapKeyToPassword(bindPass));
     }
 
+    String xc = variableContext.getParameter("tokencount");
+    if (xc != null) {
+      // Delete all tokens first
+      int i = 0;
+      while (i < parameters.getChildCount()) {
+        ConfigNode sn = parameters.getChild(i);
+        if (sn.getType().equals("access")) {
+          parameters.removeChild(i);
+        } else {
+          i++;
+        }
+      }
+
+      int accessCount = Integer.parseInt(xc);
+      i = 0;
+      while (i < accessCount) {
+        String accessDescription = "_" + Integer.toString(i);
+        String accessOpName = "accessop" + accessDescription;
+        xc = variableContext.getParameter(accessOpName);
+        if (xc != null && xc.equals("Delete")) {
+          // Next row
+          i++;
+          continue;
+        }
+        // Get the stuff we need
+        String accessSpec = variableContext.getParameter("spectoken" + accessDescription);
+        ConfigNode node = new ConfigNode("access");
+        node.setAttribute("token", accessSpec);
+        parameters.addChild(parameters.getChildCount(), node);
+        i++;
+      }
+
+      String op = variableContext.getParameter("accessop");
+      if (op != null && op.equals("Add")) {
+        String accessspec = variableContext.getParameter("spectoken");
+        ConfigNode node = new ConfigNode("access");
+        node.setAttribute("token", accessspec);
+        parameters.addChild(parameters.getChildCount(), node);
+      }
+    }
+
     return null;
   }
 
@@ -767,8 +924,38 @@ public class LDAPAuthority extends org.a
       + " <tr>\n"
       + "  <td class=\"description\"><nobr>" + Messages.getBodyString(locale,
"LDAP.GroupMemberDnColon") + "</nobr></td>\n"
       + "  <td class=\"value\">" + (f_groupMemberDN ? "Y" : "N") + "</td>\n"
-      + " </tr>\n"
-      + "</table>\n");
+      + " </tr>\n");
+
+    out.print("  <tr><td class=\"separator\" colspan=\"4\"><hr/></td></tr>\n");
+    boolean seenAny = false;
+    int i;
+
+    // Go through looking for access tokens
+    i = 0;
+    while (i < parameters.getChildCount()) {
+      ConfigNode sn = parameters.getChild(i++);
+      if (sn.getType().equals("access")) {
+        if (seenAny == false) {
+          out.print(
+            "  <tr>\n"
+            + "    <td class=\"description\"><nobr>" + Messages.getBodyString(locale,
"LDAP.ForcedTokensColon") + "</nobr></td>\n"
+            + "    <td class=\"value\">\n");
+          seenAny = true;
+        }
+        String token = sn.getAttributeValue("token");
+        out.print(Encoder.bodyEscape(token) + "<br/>\n");
+      }
+    }
+
+    if (seenAny) {
+      out.print(
+        "    </td>\n"
+        + "  </tr>\n");
+    } else {
+      out.print(
+        "  <tr><td class=\"message\" colspan=\"4\"><nobr>" + Messages.getBodyString(locale,
"LDAP.NoTokensSpecified") + "</nobr></td></tr>\n");
+    }
+    out.print("</table>\n");
   }
 
   // Protected methods
@@ -884,6 +1071,7 @@ public class LDAPAuthority extends org.a
     }
     return sb.toString();
   }
+
   protected static StringSet emptyStringSet = new StringSet();
 
   /**
@@ -896,22 +1084,27 @@ public class LDAPAuthority extends org.a
      * The user name
      */
     protected String userName;
+
     /**
      * LDAP connection string with server name and base DN
      */
     protected String connectionString;
+
     /**
      * User search definition
      */
     protected String userSearch;
+
     /**
      * Group search definition
      */
     protected String groupSearch;
+
     /**
      * The response lifetime
      */
     protected long responseLifetime;
+
     /**
      * The expiration time
      */

Modified: manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_en_US.properties
URL: http://svn.apache.org/viewvc/manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_en_US.properties?rev=1525873&r1=1525872&r2=1525873&view=diff
==============================================================================
--- manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_en_US.properties
(original)
+++ manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_en_US.properties
Tue Sep 24 12:52:24 2013
@@ -28,6 +28,16 @@ LDAP.AddUserAuthColon=Add user as author
 LDAP.UserNameAttrColon=User name attribute:
 LDAP.GroupMemberDnColon=Member attribute is DN:
 
+LDAP.ForcedTokens=Forced tokens
+LDAP.ForcedTokensColon=Forced tokens:
+LDAP.Add=Add
+LDAP.Delete=Delete
+LDAP.AddToken=Add token
+LDAP.TypeInToken=Token cannot be empty
+LDAP.NoTokensSpecified=No tokens specified
+LDAP.NoTokensPresent=No tokens specified
+LDAP.ForcedTokensDisclaimer=Forced tokens are meant to enrich results with common tokens
explicitly handled by authorization center, like "Everyone". Use with extreme attention as
this mechanism can grant privileges to every user outside authorization directory!
+
 LDAP.ServerNameCannotBeBlank=Server name cannot be blank
 LDAP.ServerPortCannotBeBlank=Server port cannot be blank
 LDAP.UserSearchCannotBeBlank=User search expression cannot be blank

Modified: manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_ja_JP.properties
URL: http://svn.apache.org/viewvc/manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_ja_JP.properties?rev=1525873&r1=1525872&r2=1525873&view=diff
==============================================================================
--- manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_ja_JP.properties
(original)
+++ manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_ja_JP.properties
Tue Sep 24 12:52:24 2013
@@ -14,27 +14,37 @@
 # limitations under the License.
 
 LDAP.LDAP=LDAP
-LDAP.LDAPServerNameColon=LDAPサーバ名:
-LDAP.LDAPServerPortColon=LDAPサーバポート:
-LDAP.LDAPServerBaseColon=LDAPサーバベース (例 'dc=office,dc=com'):
-LDAP.LDAPBindUserColon=Bindユーザ (必要なければ空白):
-LDAP.LDAPBindPasswordColon=Bindパスワード:
-LDAP.UserSearchBaseColon=Userサーチベース:
-LDAP.UserSearchFilterColon=Userサーチフィルタ:
-LDAP.GroupSearchBaseColon=Groupサーチベース:
-LDAP.GroupSearchFilterColon=Groupサーチフィルタ:
-LDAP.GroupNameAttributeColon=Group名属性:
-LDAP.AddUserAuthColon=認証トークンとしてユーザを追加:
-LDAP.UserNameAttrColon=ユーザ名属性:
-LDAP.GroupMemberDnColon=メンバ属性がDN:
+LDAP.LDAPServerNameColon=LDAP\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e5\u0090\u008d:
+LDAP.LDAPServerPortColon=LDAP\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e3\u0083\u009d\u00e3\u0083\u00bc\u00e3\u0083\u0088:
+LDAP.LDAPServerBaseColon=LDAP\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e3\u0083\u0099\u00e3\u0083\u00bc\u00e3\u0082\u00b9
(\u00e4\u00be\u008b 'dc=office,dc=com'):
+LDAP.LDAPBindUserColon=Bind\u00e3\u0083\u00a6\u00e3\u0083\u00bc\u00e3\u0082\u00b6 (\u00e5\u00bf\u0085\u00e8\u00a6\u0081\u00e3\u0081\u00aa\u00e3\u0081\u0091\u00e3\u0082\u008c\u00e3\u0081\u00b0\u00e7\u00a9\u00ba\u00e7\u0099\u00bd):
+LDAP.LDAPBindPasswordColon=Bind\u00e3\u0083\u0091\u00e3\u0082\u00b9\u00e3\u0083\u00af\u00e3\u0083\u00bc\u00e3\u0083\u0089:
+LDAP.UserSearchBaseColon=User\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0083\u0099\u00e3\u0083\u00bc\u00e3\u0082\u00b9:
+LDAP.UserSearchFilterColon=User\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0083\u0095\u00e3\u0082\u00a3\u00e3\u0083\u00ab\u00e3\u0082\u00bf:
+LDAP.GroupSearchBaseColon=Group\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0083\u0099\u00e3\u0083\u00bc\u00e3\u0082\u00b9:
+LDAP.GroupSearchFilterColon=Group\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0083\u0095\u00e3\u0082\u00a3\u00e3\u0083\u00ab\u00e3\u0082\u00bf:
+LDAP.GroupNameAttributeColon=Group\u00e5\u0090\u008d\u00e5\u00b1\u009e\u00e6\u0080\u00a7:
+LDAP.AddUserAuthColon=\u00e8\u00aa\u008d\u00e8\u00a8\u00bc\u00e3\u0083\u0088\u00e3\u0083\u00bc\u00e3\u0082\u00af\u00e3\u0083\u00b3\u00e3\u0081\u00a8\u00e3\u0081\u0097\u00e3\u0081\u00a6\u00e3\u0083\u00a6\u00e3\u0083\u00bc\u00e3\u0082\u00b6\u00e3\u0082\u0092\u00e8\u00bf\u00bd\u00e5\u008a\u00a0:
+LDAP.UserNameAttrColon=\u00e3\u0083\u00a6\u00e3\u0083\u00bc\u00e3\u0082\u00b6\u00e5\u0090\u008d\u00e5\u00b1\u009e\u00e6\u0080\u00a7:
+LDAP.GroupMemberDnColon=\u00e3\u0083\u00a1\u00e3\u0083\u00b3\u00e3\u0083\u0090\u00e5\u00b1\u009e\u00e6\u0080\u00a7\u00e3\u0081\u008cDN:
 
-LDAP.ServerNameCannotBeBlank=サーバ名は空白にできません
-LDAP.ServerPortCannotBeBlank=サーバポートは空白にできません
-LDAP.UserSearchCannotBeBlank=Userサーチ表現は空白にできません
-LDAP.GroupSearchCannotBeBlank=Groupサーチ表現は空白にできません
-LDAP.GroupNameAttrCannotBeBlank=Group名属性は空白にできません
-LDAP.UserSearchMustIncludeSubstitution=Userサーチではユーザ代入句
({0})を含まなければなりません
-LDAP.GroupSearchMustIncludeSubstitution=Groupサーチではユーザ代入句
({0})を含まなければなりません
-LDAP.ServerPortMustBeAnInteger=サーバポートは整数でなければなりません
-LDAP.ServerNameCannotIncludeSlash=サーバ名は"/"文字を含むことができません
-LDAP.ServerBaseCannotIncludeSlash=サーバベースは"/"文字を含むことができません
+LDAP.ForcedTokens=Forced tokens
+LDAP.ForcedTokensColon=Forced tokens:
+LDAP.Add=Add
+LDAP.Delete=Delete
+LDAP.AddToken=Add token
+LDAP.TypeInToken=Token cannot be empty
+LDAP.NoTokensSpecified=No tokens specified
+LDAP.NoTokensPresent=No tokens specified
+LDAP.ForcedTokensDisclaimer=Forced tokens are meant to enrich results with common tokens
explicitly handled by authorization center, like "Everyone". Use with extreme attention as
this mechanism can grant privileges to every user outside authorization directory!
+
+LDAP.ServerNameCannotBeBlank=\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e5\u0090\u008d\u00e3\u0081\u00af\u00e7\u00a9\u00ba\u00e7\u0099\u00bd\u00e3\u0081\u00ab\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.ServerPortCannotBeBlank=\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e3\u0083\u009d\u00e3\u0083\u00bc\u00e3\u0083\u0088\u00e3\u0081\u00af\u00e7\u00a9\u00ba\u00e7\u0099\u00bd\u00e3\u0081\u00ab\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.UserSearchCannotBeBlank=User\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e8\u00a1\u00a8\u00e7\u008f\u00be\u00e3\u0081\u00af\u00e7\u00a9\u00ba\u00e7\u0099\u00bd\u00e3\u0081\u00ab\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.GroupSearchCannotBeBlank=Group\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e8\u00a1\u00a8\u00e7\u008f\u00be\u00e3\u0081\u00af\u00e7\u00a9\u00ba\u00e7\u0099\u00bd\u00e3\u0081\u00ab\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.GroupNameAttrCannotBeBlank=Group\u00e5\u0090\u008d\u00e5\u00b1\u009e\u00e6\u0080\u00a7\u00e3\u0081\u00af\u00e7\u00a9\u00ba\u00e7\u0099\u00bd\u00e3\u0081\u00ab\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.UserSearchMustIncludeSubstitution=User\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0081\u00a7\u00e3\u0081\u00af\u00e3\u0083\u00a6\u00e3\u0083\u00bc\u00e3\u0082\u00b6\u00e4\u00bb\u00a3\u00e5\u0085\u00a5\u00e5\u008f\u00a5
({0})\u00e3\u0082\u0092\u00e5\u0090\u00ab\u00e3\u0081\u00be\u00e3\u0081\u00aa\u00e3\u0081\u0091\u00e3\u0082\u008c\u00e3\u0081\u00b0\u00e3\u0081\u00aa\u00e3\u0082\u008a\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.GroupSearchMustIncludeSubstitution=Group\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0081\u00e3\u0081\u00a7\u00e3\u0081\u00af\u00e3\u0083\u00a6\u00e3\u0083\u00bc\u00e3\u0082\u00b6\u00e4\u00bb\u00a3\u00e5\u0085\u00a5\u00e5\u008f\u00a5
({0})\u00e3\u0082\u0092\u00e5\u0090\u00ab\u00e3\u0081\u00be\u00e3\u0081\u00aa\u00e3\u0081\u0091\u00e3\u0082\u008c\u00e3\u0081\u00b0\u00e3\u0081\u00aa\u00e3\u0082\u008a\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.ServerPortMustBeAnInteger=\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e3\u0083\u009d\u00e3\u0083\u00bc\u00e3\u0083\u0088\u00e3\u0081\u00af\u00e6\u0095\u00b4\u00e6\u0095\u00b0\u00e3\u0081\u00a7\u00e3\u0081\u00aa\u00e3\u0081\u0091\u00e3\u0082\u008c\u00e3\u0081\u00b0\u00e3\u0081\u00aa\u00e3\u0082\u008a\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.ServerNameCannotIncludeSlash=\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e5\u0090\u008d\u00e3\u0081\u00af"/"\u00e6\u0096\u0087\u00e5\u00ad\u0097\u00e3\u0082\u0092\u00e5\u0090\u00ab\u00e3\u0082\u0080\u00e3\u0081\u0093\u00e3\u0081\u00a8\u00e3\u0081\u008c\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093
+LDAP.ServerBaseCannotIncludeSlash=\u00e3\u0082\u00b5\u00e3\u0083\u00bc\u00e3\u0083\u0090\u00e3\u0083\u0099\u00e3\u0083\u00bc\u00e3\u0082\u00b9\u00e3\u0081\u00af"/"\u00e6\u0096\u0087\u00e5\u00ad\u0097\u00e3\u0082\u0092\u00e5\u0090\u00ab\u00e3\u0082\u0080\u00e3\u0081\u0093\u00e3\u0081\u00a8\u00e3\u0081\u008c\u00e3\u0081\u00a7\u00e3\u0081\u008d\u00e3\u0081\u00be\u00e3\u0081\u009b\u00e3\u0082\u0093

Modified: manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_pl_PL.properties
URL: http://svn.apache.org/viewvc/manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_pl_PL.properties?rev=1525873&r1=1525872&r2=1525873&view=diff
==============================================================================
--- manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_pl_PL.properties
(original)
+++ manifoldcf/trunk/connectors/ldap/connector/src/main/native2ascii/org/apache/manifoldcf/authorities/authorities/ldap/common_pl_PL.properties
Tue Sep 24 12:52:24 2013
@@ -28,6 +28,16 @@ LDAP.AddUserAuthColon=Dodaj nazw\u0119 u
 LDAP.UserNameAttrColon=Atrybut nazwy u\u017cytkownika:
 LDAP.GroupMemberDnColon=Elementy atrybutu "member" s\u0105 w postaci DN:
 
+LDAP.ForcedTokens=Wymuszone tokeny
+LDAP.ForcedTokensColon=Wymuszone tokeny:
+LDAP.Add=Dodaj
+LDAP.Delete=Usu\u0144
+LDAP.AddToken=Dodaj token
+LDAP.TypeInToken=Token nie mo\u017ce by\u0107 pusty
+LDAP.NoTokensSpecified=Brak zdefiniowanych token\u00f3w
+LDAP.NoTokensPresent=Brak zdefiniowanych token\u00f3w
+LDAP.ForcedTokensDisclaimer=Wymuszone tokeny s\u0142u\u017c\u0105 do wzbogacania zwracanych
wynik\u00f3w o grupy obs\u0142ugiwane niejawnie przez centra autoryzacji, jak np. "Wszyscy"/"Everyone".
Uzywaj z rozwag\u0105, gdy\u017c mozna w ten spos\u00f3b nadawa\u0107 wszystkim u\u017cytkownikom
dodatkowe uprawnienia poze centrum autoryzacji!
+
 LDAP.ServerNameCannotBeBlank=Nazwa serwera nie mo\u017ce by\u0107 pusta
 LDAP.ServerPortCannotBeBlank=Port nie mo\u017ce by\u0107 pusty
 LDAP.UserSearchCannotBeBlank=Filtr u\u017cytkownik\u00f3w nie mo\u017ce by\u0107 pusty



Mime
View raw message