1 package org
.argeo
.cms
.auth
;
3 import java
.security
.Principal
;
4 import java
.util
.Locale
;
8 import javax
.naming
.InvalidNameException
;
9 import javax
.naming
.ldap
.LdapName
;
10 import javax
.security
.auth
.Subject
;
11 import javax
.security
.auth
.x500
.X500Principal
;
12 import javax
.servlet
.http
.HttpServletRequest
;
13 import javax
.servlet
.http
.HttpSession
;
15 //import org.apache.jackrabbit.core.security.AnonymousPrincipal;
16 //import org.apache.jackrabbit.core.security.SecurityConstants;
17 //import org.apache.jackrabbit.core.security.principal.AdminPrincipal;
18 import org
.argeo
.cms
.CmsException
;
19 import org
.argeo
.cms
.internal
.auth
.CmsSessionImpl
;
20 import org
.argeo
.cms
.internal
.auth
.ImpliedByPrincipal
;
21 import org
.argeo
.cms
.internal
.http
.WebCmsSessionImpl
;
22 import org
.argeo
.node
.NodeConstants
;
23 import org
.argeo
.node
.security
.AnonymousPrincipal
;
24 import org
.argeo
.node
.security
.DataAdminPrincipal
;
25 import org
.argeo
.node
.security
.NodeSecurityUtils
;
26 import org
.argeo
.osgi
.useradmin
.AuthenticatingUser
;
27 import org
.osgi
.service
.http
.HttpContext
;
28 import org
.osgi
.service
.useradmin
.Authorization
;
32 final static String SHARED_STATE_NAME
= AuthenticatingUser
.SHARED_STATE_NAME
;
33 final static String SHARED_STATE_PWD
= AuthenticatingUser
.SHARED_STATE_PWD
;
34 final static String HEADER_AUTHORIZATION
= "Authorization";
35 final static String HEADER_WWW_AUTHENTICATE
= "WWW-Authenticate";
38 final static String SHARED_STATE_HTTP_REQUEST
= "org.argeo.cms.auth.http.request";
39 final static String SHARED_STATE_SPNEGO_TOKEN
= "org.argeo.cms.auth.spnegoToken";
40 final static String SHARED_STATE_SPNEGO_OUT_TOKEN
= "org.argeo.cms.auth.spnegoOutToken";
42 static void addAuthorization(Subject subject
, Authorization authorization
, Locale locale
,
43 HttpServletRequest request
) {
44 assert subject
!= null;
45 checkSubjectEmpty(subject
);
46 assert authorization
!= null;
48 // required for display name:
49 subject
.getPrivateCredentials().add(authorization
);
51 Set
<Principal
> principals
= subject
.getPrincipals();
53 String authName
= authorization
.getName();
55 // determine user's principal
57 final Principal userPrincipal
;
58 if (authName
== null) {
59 name
= NodeSecurityUtils
.ROLE_ANONYMOUS_NAME
;
60 userPrincipal
= new AnonymousPrincipal();
61 principals
.add(userPrincipal
);
62 // principals.add(new AnonymousPrincipal());
64 name
= new LdapName(authName
);
65 NodeSecurityUtils
.checkUserName(name
);
66 userPrincipal
= new X500Principal(name
.toString());
67 principals
.add(userPrincipal
);
68 principals
.add(new ImpliedByPrincipal(NodeSecurityUtils
.ROLE_USER_NAME
, userPrincipal
));
71 // Add roles provided by authorization
72 for (String role
: authorization
.getRoles()) {
73 LdapName roleName
= new LdapName(role
);
74 if (roleName
.equals(name
)) {
77 NodeSecurityUtils
.checkImpliedPrincipalName(roleName
);
78 principals
.add(new ImpliedByPrincipal(roleName
.toString(), userPrincipal
));
79 if (roleName
.equals(NodeSecurityUtils
.ROLE_ADMIN_NAME
))
80 principals
.add(new DataAdminPrincipal());
84 } catch (InvalidNameException e
) {
85 throw new CmsException("Cannot commit", e
);
88 registerSessionAuthorization(request
, subject
, authorization
, locale
);
91 private static void checkSubjectEmpty(Subject subject
) {
92 if (!subject
.getPrincipals(AnonymousPrincipal
.class).isEmpty())
93 throw new IllegalStateException("Already logged in as anonymous: " + subject
);
94 if (!subject
.getPrincipals(X500Principal
.class).isEmpty())
95 throw new IllegalStateException("Already logged in as user: " + subject
);
96 if (!subject
.getPrincipals(DataAdminPrincipal
.class).isEmpty())
97 throw new IllegalStateException("Already logged in as data admin: " + subject
);
98 if (!subject
.getPrincipals(ImpliedByPrincipal
.class).isEmpty())
99 throw new IllegalStateException("Already authorized: " + subject
);
102 static void cleanUp(Subject subject
) {
104 subject
.getPrincipals().removeAll(subject
.getPrincipals(X500Principal
.class));
105 subject
.getPrincipals().removeAll(subject
.getPrincipals(ImpliedByPrincipal
.class));
106 subject
.getPrincipals().removeAll(subject
.getPrincipals(AnonymousPrincipal
.class));
107 subject
.getPrincipals().removeAll(subject
.getPrincipals(DataAdminPrincipal
.class));
109 subject
.getPrivateCredentials().removeAll(subject
.getPrivateCredentials(CmsSessionId
.class));
110 subject
.getPrivateCredentials().removeAll(subject
.getPrivateCredentials(Authorization
.class));
112 // subject.getPrincipals().removeAll(subject.getPrincipals(AdminPrincipal.class));
113 // subject.getPrincipals().removeAll(subject.getPrincipals(AnonymousPrincipal.class));
116 private synchronized static void registerSessionAuthorization(HttpServletRequest request
, Subject subject
,
117 Authorization authorization
, Locale locale
) {
118 // synchronized in order to avoid multiple registrations
119 // TODO move it to a service in order to avoid static synchronization
120 if (request
!= null) {
121 HttpSession httpSession
= request
.getSession(false);
122 assert httpSession
!= null;
123 String httpSessId
= httpSession
.getId();
124 String remoteUser
= authorization
.getName() != null ? authorization
.getName()
125 : NodeConstants
.ROLE_ANONYMOUS
;
126 request
.setAttribute(HttpContext
.REMOTE_USER
, remoteUser
);
127 request
.setAttribute(HttpContext
.AUTHORIZATION
, authorization
);
129 CmsSessionImpl cmsSession
= CmsSessionImpl
.getByLocalId(httpSessId
);
130 if (cmsSession
!= null) {
131 if (authorization
.getName() != null) {
132 if (cmsSession
.getAuthorization().getName() == null) {
135 } else if (!authorization
.getName().equals(cmsSession
.getAuthorization().getName())) {
136 throw new CmsException("Inconsistent user " + authorization
.getName()
137 + " for existing CMS session " + cmsSession
);
140 if (cmsSession
.getAuthorization().getName() != null) {
142 // TODO rather throw an exception ? log a warning ?
148 if (cmsSession
== null)
149 cmsSession
= new WebCmsSessionImpl(subject
, authorization
, locale
, request
);
150 // request.setAttribute(CmsSession.class.getName(), cmsSession);
151 CmsSessionId nodeSessionId
= new CmsSessionId(cmsSession
.getUuid());
152 if (subject
.getPrivateCredentials(CmsSessionId
.class).size() == 0)
153 subject
.getPrivateCredentials().add(nodeSessionId
);
155 UUID storedSessionId
= subject
.getPrivateCredentials(CmsSessionId
.class).iterator().next().getUuid();
156 // if (storedSessionId.equals(httpSessionId.getValue()))
157 throw new CmsException(
158 "Subject already logged with session " + storedSessionId
+ " (not " + nodeSessionId
+ ")");
165 public static <T
extends Principal
> T
getSinglePrincipal(Subject subject
, Class
<T
> clss
) {
166 Set
<T
> principals
= subject
.getPrincipals(clss
);
167 if (principals
.isEmpty())
169 if (principals
.size() > 1)
170 throw new IllegalStateException("Only one " + clss
+ " principal expected in " + subject
);
171 return principals
.iterator().next();
174 private CmsAuthUtils() {