]> git.argeo.org Git - lgpl/argeo-commons.git/blob - CmsAuthUtils.java
661cc6905fb9a33753348cfa1e81d5b47a508e47
[lgpl/argeo-commons.git] / CmsAuthUtils.java
1 package org.argeo.cms.auth;
2
3 import java.security.Principal;
4 import java.util.Locale;
5 import java.util.Set;
6 import java.util.UUID;
7
8 import javax.naming.InvalidNameException;
9 import javax.naming.ldap.LdapName;
10 import javax.security.auth.Subject;
11 import javax.security.auth.x500.X500Principal;
12 import javax.servlet.http.HttpServletRequest;
13 import javax.servlet.http.HttpSession;
14
15 //import org.apache.jackrabbit.core.security.AnonymousPrincipal;
16 //import org.apache.jackrabbit.core.security.SecurityConstants;
17 //import org.apache.jackrabbit.core.security.principal.AdminPrincipal;
18 import org.argeo.cms.CmsException;
19 import org.argeo.cms.internal.auth.CmsSessionImpl;
20 import org.argeo.cms.internal.auth.ImpliedByPrincipal;
21 import org.argeo.cms.internal.http.WebCmsSessionImpl;
22 import org.argeo.cms.internal.kernel.Activator;
23 import org.argeo.node.NodeConstants;
24 import org.argeo.node.security.AnonymousPrincipal;
25 import org.argeo.node.security.DataAdminPrincipal;
26 import org.argeo.node.security.NodeSecurityUtils;
27 import org.argeo.osgi.useradmin.AuthenticatingUser;
28 import org.osgi.service.http.HttpContext;
29 import org.osgi.service.useradmin.Authorization;
30
31 class CmsAuthUtils {
32 // Standard
33 final static String SHARED_STATE_NAME = AuthenticatingUser.SHARED_STATE_NAME;
34 final static String SHARED_STATE_PWD = AuthenticatingUser.SHARED_STATE_PWD;
35 final static String HEADER_AUTHORIZATION = "Authorization";
36 final static String HEADER_WWW_AUTHENTICATE = "WWW-Authenticate";
37
38 // Argeo specific
39 final static String SHARED_STATE_HTTP_REQUEST = "org.argeo.cms.auth.http.request";
40 final static String SHARED_STATE_SPNEGO_TOKEN = "org.argeo.cms.auth.spnegoToken";
41 final static String SHARED_STATE_SPNEGO_OUT_TOKEN = "org.argeo.cms.auth.spnegoOutToken";
42 final static String SHARED_STATE_CERTIFICATE_CHAIN = "org.argeo.cms.auth.certificateChain";
43
44 static void addAuthorization(Subject subject, Authorization authorization, Locale locale,
45 HttpServletRequest request) {
46 assert subject != null;
47 checkSubjectEmpty(subject);
48 assert authorization != null;
49
50 // required for display name:
51 subject.getPrivateCredentials().add(authorization);
52
53 if (Activator.isSingleUser()) {
54 subject.getPrincipals().add(new DataAdminPrincipal());
55 }
56
57 Set<Principal> principals = subject.getPrincipals();
58 try {
59 String authName = authorization.getName();
60
61 // determine user's principal
62 final LdapName name;
63 final Principal userPrincipal;
64 if (authName == null) {
65 name = NodeSecurityUtils.ROLE_ANONYMOUS_NAME;
66 userPrincipal = new AnonymousPrincipal();
67 principals.add(userPrincipal);
68 } else {
69 name = new LdapName(authName);
70 NodeSecurityUtils.checkUserName(name);
71 userPrincipal = new X500Principal(name.toString());
72 principals.add(userPrincipal);
73 // principals.add(new ImpliedByPrincipal(NodeSecurityUtils.ROLE_USER_NAME,
74 // userPrincipal));
75 }
76
77 // Add roles provided by authorization
78 for (String role : authorization.getRoles()) {
79 LdapName roleName = new LdapName(role);
80 if (roleName.equals(name)) {
81 // skip
82 } else if (roleName.equals(NodeSecurityUtils.ROLE_ANONYMOUS_NAME)) {
83 // skip
84 } else {
85 NodeSecurityUtils.checkImpliedPrincipalName(roleName);
86 principals.add(new ImpliedByPrincipal(roleName.toString(), userPrincipal));
87 if (roleName.equals(NodeSecurityUtils.ROLE_ADMIN_NAME))
88 principals.add(new DataAdminPrincipal());
89 }
90 }
91
92 } catch (InvalidNameException e) {
93 throw new CmsException("Cannot commit", e);
94 }
95
96 registerSessionAuthorization(request, subject, authorization, locale);
97 }
98
99 private static void checkSubjectEmpty(Subject subject) {
100 if (!subject.getPrincipals(AnonymousPrincipal.class).isEmpty())
101 throw new IllegalStateException("Already logged in as anonymous: " + subject);
102 if (!subject.getPrincipals(X500Principal.class).isEmpty())
103 throw new IllegalStateException("Already logged in as user: " + subject);
104 if (!subject.getPrincipals(DataAdminPrincipal.class).isEmpty())
105 throw new IllegalStateException("Already logged in as data admin: " + subject);
106 if (!subject.getPrincipals(ImpliedByPrincipal.class).isEmpty())
107 throw new IllegalStateException("Already authorized: " + subject);
108 }
109
110 static void cleanUp(Subject subject) {
111 // Argeo
112 subject.getPrincipals().removeAll(subject.getPrincipals(X500Principal.class));
113 subject.getPrincipals().removeAll(subject.getPrincipals(ImpliedByPrincipal.class));
114 subject.getPrincipals().removeAll(subject.getPrincipals(AnonymousPrincipal.class));
115 subject.getPrincipals().removeAll(subject.getPrincipals(DataAdminPrincipal.class));
116
117 subject.getPrivateCredentials().removeAll(subject.getPrivateCredentials(CmsSessionId.class));
118 subject.getPrivateCredentials().removeAll(subject.getPrivateCredentials(Authorization.class));
119 // Jackrabbit
120 // subject.getPrincipals().removeAll(subject.getPrincipals(AdminPrincipal.class));
121 // subject.getPrincipals().removeAll(subject.getPrincipals(AnonymousPrincipal.class));
122 }
123
124 private synchronized static void registerSessionAuthorization(HttpServletRequest request, Subject subject,
125 Authorization authorization, Locale locale) {
126 // synchronized in order to avoid multiple registrations
127 // TODO move it to a service in order to avoid static synchronization
128 if (request != null) {
129 HttpSession httpSession = request.getSession(false);
130 assert httpSession != null;
131 String httpSessId = httpSession.getId();
132 String remoteUser = authorization.getName() != null ? authorization.getName()
133 : NodeConstants.ROLE_ANONYMOUS;
134 request.setAttribute(HttpContext.REMOTE_USER, remoteUser);
135 request.setAttribute(HttpContext.AUTHORIZATION, authorization);
136
137 CmsSessionImpl cmsSession = CmsSessionImpl.getByLocalId(httpSessId);
138 if (cmsSession != null) {
139 if (authorization.getName() != null) {
140 if (cmsSession.getAuthorization().getName() == null) {
141 cmsSession.close();
142 cmsSession = null;
143 } else if (!authorization.getName().equals(cmsSession.getAuthorization().getName())) {
144 throw new CmsException("Inconsistent user " + authorization.getName()
145 + " for existing CMS session " + cmsSession);
146 }
147 } else {// anonymous
148 if (cmsSession.getAuthorization().getName() != null) {
149 cmsSession.close();
150 // TODO rather throw an exception ? log a warning ?
151 cmsSession = null;
152 }
153 }
154 }
155
156 if (cmsSession == null)
157 cmsSession = new WebCmsSessionImpl(subject, authorization, locale, request);
158 // request.setAttribute(CmsSession.class.getName(), cmsSession);
159 CmsSessionId nodeSessionId = new CmsSessionId(cmsSession.getUuid());
160 if (subject.getPrivateCredentials(CmsSessionId.class).size() == 0)
161 subject.getPrivateCredentials().add(nodeSessionId);
162 else {
163 UUID storedSessionId = subject.getPrivateCredentials(CmsSessionId.class).iterator().next().getUuid();
164 // if (storedSessionId.equals(httpSessionId.getValue()))
165 throw new CmsException(
166 "Subject already logged with session " + storedSessionId + " (not " + nodeSessionId + ")");
167 }
168 } else {
169 // TODO desktop, CLI
170 }
171 }
172
173 public static <T extends Principal> T getSinglePrincipal(Subject subject, Class<T> clss) {
174 Set<T> principals = subject.getPrincipals(clss);
175 if (principals.isEmpty())
176 return null;
177 if (principals.size() > 1)
178 throw new IllegalStateException("Only one " + clss + " principal expected in " + subject);
179 return principals.iterator().next();
180 }
181
182 private CmsAuthUtils() {
183
184 }
185
186 }