]> git.argeo.org Git - lgpl/argeo-commons.git/blob - org.argeo.cms/src/org/argeo/cms/auth/CmsAuthUtils.java
Use Argeo TP Core v2.1.25 and Argeo TP Extras v2.1.13.
[lgpl/argeo-commons.git] / org.argeo.cms / src / org / argeo / cms / auth / CmsAuthUtils.java
1 package org.argeo.cms.auth;
2
3 import java.security.Principal;
4 import java.util.Collection;
5 import java.util.Locale;
6 import java.util.Set;
7 import java.util.UUID;
8
9 import javax.naming.InvalidNameException;
10 import javax.naming.ldap.LdapName;
11 import javax.security.auth.Subject;
12 import javax.security.auth.x500.X500Principal;
13 import javax.servlet.http.HttpServletRequest;
14 import javax.servlet.http.HttpSession;
15
16 //import org.apache.jackrabbit.core.security.AnonymousPrincipal;
17 //import org.apache.jackrabbit.core.security.SecurityConstants;
18 //import org.apache.jackrabbit.core.security.principal.AdminPrincipal;
19 import org.argeo.cms.CmsException;
20 import org.argeo.cms.internal.auth.CmsSessionImpl;
21 import org.argeo.cms.internal.auth.ImpliedByPrincipal;
22 import org.argeo.cms.internal.http.WebCmsSessionImpl;
23 import org.argeo.cms.internal.kernel.Activator;
24 import org.argeo.node.NodeConstants;
25 import org.argeo.node.security.AnonymousPrincipal;
26 import org.argeo.node.security.DataAdminPrincipal;
27 import org.argeo.node.security.NodeSecurityUtils;
28 import org.argeo.osgi.useradmin.AuthenticatingUser;
29 import org.osgi.framework.BundleContext;
30 import org.osgi.framework.InvalidSyntaxException;
31 import org.osgi.framework.ServiceReference;
32 import org.osgi.service.http.HttpContext;
33 import org.osgi.service.useradmin.Authorization;
34
35 class CmsAuthUtils {
36 // Standard
37 final static String SHARED_STATE_NAME = AuthenticatingUser.SHARED_STATE_NAME;
38 final static String SHARED_STATE_PWD = AuthenticatingUser.SHARED_STATE_PWD;
39 final static String HEADER_AUTHORIZATION = "Authorization";
40 final static String HEADER_WWW_AUTHENTICATE = "WWW-Authenticate";
41
42 // Argeo specific
43 final static String SHARED_STATE_HTTP_REQUEST = "org.argeo.cms.auth.http.request";
44 final static String SHARED_STATE_SPNEGO_TOKEN = "org.argeo.cms.auth.spnegoToken";
45 final static String SHARED_STATE_SPNEGO_OUT_TOKEN = "org.argeo.cms.auth.spnegoOutToken";
46 final static String SHARED_STATE_CERTIFICATE_CHAIN = "org.argeo.cms.auth.certificateChain";
47 final static String SHARED_STATE_REMOTE_ADDR = "org.argeo.cms.auth.remote.addr";
48 final static String SHARED_STATE_REMOTE_PORT = "org.argeo.cms.auth.remote.port";
49
50 static void addAuthorization(Subject subject, Authorization authorization) {
51 assert subject != null;
52 checkSubjectEmpty(subject);
53 assert authorization != null;
54
55 // required for display name:
56 subject.getPrivateCredentials().add(authorization);
57
58 if (Activator.isSingleUser()) {
59 subject.getPrincipals().add(new DataAdminPrincipal());
60 }
61
62 Set<Principal> principals = subject.getPrincipals();
63 try {
64 String authName = authorization.getName();
65
66 // determine user's principal
67 final LdapName name;
68 final Principal userPrincipal;
69 if (authName == null) {
70 name = NodeSecurityUtils.ROLE_ANONYMOUS_NAME;
71 userPrincipal = new AnonymousPrincipal();
72 principals.add(userPrincipal);
73 } else {
74 name = new LdapName(authName);
75 NodeSecurityUtils.checkUserName(name);
76 userPrincipal = new X500Principal(name.toString());
77 principals.add(userPrincipal);
78 // principals.add(new ImpliedByPrincipal(NodeSecurityUtils.ROLE_USER_NAME,
79 // userPrincipal));
80 }
81
82 // Add roles provided by authorization
83 for (String role : authorization.getRoles()) {
84 LdapName roleName = new LdapName(role);
85 if (roleName.equals(name)) {
86 // skip
87 } else if (roleName.equals(NodeSecurityUtils.ROLE_ANONYMOUS_NAME)) {
88 // skip
89 } else {
90 NodeSecurityUtils.checkImpliedPrincipalName(roleName);
91 principals.add(new ImpliedByPrincipal(roleName.toString(), userPrincipal));
92 if (roleName.equals(NodeSecurityUtils.ROLE_ADMIN_NAME))
93 principals.add(new DataAdminPrincipal());
94 }
95 }
96
97 } catch (InvalidNameException e) {
98 throw new CmsException("Cannot commit", e);
99 }
100
101 // registerSessionAuthorization(request, subject, authorization, locale);
102 }
103
104 private static void checkSubjectEmpty(Subject subject) {
105 if (!subject.getPrincipals(AnonymousPrincipal.class).isEmpty())
106 throw new IllegalStateException("Already logged in as anonymous: " + subject);
107 if (!subject.getPrincipals(X500Principal.class).isEmpty())
108 throw new IllegalStateException("Already logged in as user: " + subject);
109 if (!subject.getPrincipals(DataAdminPrincipal.class).isEmpty())
110 throw new IllegalStateException("Already logged in as data admin: " + subject);
111 if (!subject.getPrincipals(ImpliedByPrincipal.class).isEmpty())
112 throw new IllegalStateException("Already authorized: " + subject);
113 }
114
115 static void cleanUp(Subject subject) {
116 // Argeo
117 subject.getPrincipals().removeAll(subject.getPrincipals(X500Principal.class));
118 subject.getPrincipals().removeAll(subject.getPrincipals(ImpliedByPrincipal.class));
119 subject.getPrincipals().removeAll(subject.getPrincipals(AnonymousPrincipal.class));
120 subject.getPrincipals().removeAll(subject.getPrincipals(DataAdminPrincipal.class));
121
122 subject.getPrivateCredentials().removeAll(subject.getPrivateCredentials(CmsSessionId.class));
123 subject.getPrivateCredentials().removeAll(subject.getPrivateCredentials(Authorization.class));
124 // Jackrabbit
125 // subject.getPrincipals().removeAll(subject.getPrincipals(AdminPrincipal.class));
126 // subject.getPrincipals().removeAll(subject.getPrincipals(AnonymousPrincipal.class));
127 }
128
129 synchronized static void registerSessionAuthorization(HttpServletRequest request, Subject subject,
130 Authorization authorization, Locale locale) {
131 // synchronized in order to avoid multiple registrations
132 // TODO move it to a service in order to avoid static synchronization
133 if (request != null) {
134 HttpSession httpSession = request.getSession(false);
135 assert httpSession != null;
136 String httpSessId = httpSession.getId();
137 String remoteUser = authorization.getName() != null ? authorization.getName()
138 : NodeConstants.ROLE_ANONYMOUS;
139 request.setAttribute(HttpContext.REMOTE_USER, remoteUser);
140 request.setAttribute(HttpContext.AUTHORIZATION, authorization);
141
142 CmsSessionImpl cmsSession = CmsSessionImpl.getByLocalId(httpSessId);
143 if (cmsSession != null) {
144 if (authorization.getName() != null) {
145 if (cmsSession.getAuthorization().getName() == null) {
146 cmsSession.close();
147 cmsSession = null;
148 } else if (!authorization.getName().equals(cmsSession.getAuthorization().getName())) {
149 throw new CmsException("Inconsistent user " + authorization.getName()
150 + " for existing CMS session " + cmsSession);
151 }
152 // keyring
153 if (cmsSession != null)
154 subject.getPrivateCredentials().addAll(cmsSession.getSecretKeys());
155 } else {// anonymous
156 if (cmsSession.getAuthorization().getName() != null) {
157 cmsSession.close();
158 // TODO rather throw an exception ? log a warning ?
159 cmsSession = null;
160 }
161 }
162 } else if (cmsSession == null) {
163 cmsSession = new WebCmsSessionImpl(subject, authorization, locale, request);
164 }
165 // request.setAttribute(CmsSession.class.getName(), cmsSession);
166 if (cmsSession != null) {
167 CmsSessionId nodeSessionId = new CmsSessionId(cmsSession.getUuid());
168 if (subject.getPrivateCredentials(CmsSessionId.class).size() == 0)
169 subject.getPrivateCredentials().add(nodeSessionId);
170 else {
171 UUID storedSessionId = subject.getPrivateCredentials(CmsSessionId.class).iterator().next()
172 .getUuid();
173 // if (storedSessionId.equals(httpSessionId.getValue()))
174 throw new CmsException(
175 "Subject already logged with session " + storedSessionId + " (not " + nodeSessionId + ")");
176 }
177 }
178 } else {
179 // TODO desktop, CLI
180 }
181 }
182
183 public static CmsSession cmsSessionFromHttpSession(BundleContext bc, String httpSessionId) {
184 Authorization authorization = null;
185 Collection<ServiceReference<CmsSession>> sr;
186 try {
187 sr = bc.getServiceReferences(CmsSession.class,
188 "(" + CmsSession.SESSION_LOCAL_ID + "=" + httpSessionId + ")");
189 } catch (InvalidSyntaxException e) {
190 throw new CmsException("Cannot get CMS session for id " + httpSessionId, e);
191 }
192 CmsSession cmsSession;
193 if (sr.size() == 1) {
194 cmsSession = bc.getService(sr.iterator().next());
195 // locale = cmsSession.getLocale();
196 authorization = cmsSession.getAuthorization();
197 if (authorization.getName() == null)
198 return null;// anonymous is not sufficient
199 } else if (sr.size() == 0)
200 return null;
201 else
202 throw new CmsException(sr.size() + ">1 web sessions detected for http session " + httpSessionId);
203 return cmsSession;
204 }
205
206 public static <T extends Principal> T getSinglePrincipal(Subject subject, Class<T> clss) {
207 Set<T> principals = subject.getPrincipals(clss);
208 if (principals.isEmpty())
209 return null;
210 if (principals.size() > 1)
211 throw new IllegalStateException("Only one " + clss + " principal expected in " + subject);
212 return principals.iterator().next();
213 }
214
215 private CmsAuthUtils() {
216
217 }
218
219 }