]> git.argeo.org Git - lgpl/argeo-commons.git/blobdiff - org.argeo.security.core/src/org/argeo/security/core/MatchingAuthenticationProvider.java
New project conventions
[lgpl/argeo-commons.git] / org.argeo.security.core / src / org / argeo / security / core / MatchingAuthenticationProvider.java
diff --git a/org.argeo.security.core/src/org/argeo/security/core/MatchingAuthenticationProvider.java b/org.argeo.security.core/src/org/argeo/security/core/MatchingAuthenticationProvider.java
new file mode 100644 (file)
index 0000000..0471151
--- /dev/null
@@ -0,0 +1,94 @@
+/*
+ * Copyright (C) 2007-2012 Argeo GmbH
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *         http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.argeo.security.core;
+
+import java.io.InputStream;
+import java.util.ArrayList;
+import java.util.List;
+import java.util.Properties;
+
+import org.springframework.core.io.Resource;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.BadCredentialsException;
+import org.springframework.security.GrantedAuthority;
+import org.springframework.security.GrantedAuthorityImpl;
+import org.springframework.security.providers.UsernamePasswordAuthenticationToken;
+import org.springframework.security.providers.dao.AbstractUserDetailsAuthenticationProvider;
+import org.springframework.security.userdetails.User;
+import org.springframework.security.userdetails.UserDetails;
+
+/** @deprecated */
+@Deprecated
+public class MatchingAuthenticationProvider extends
+               AbstractUserDetailsAuthenticationProvider {
+
+       private Resource mapping;
+       private Properties properties;
+
+       private List<String> defaultRoles = new ArrayList<String>();
+
+       @Override
+       protected void doAfterPropertiesSet() throws Exception {
+               properties = new Properties();
+               InputStream propIn = mapping.getInputStream();
+               try {
+                       properties.load(propIn);
+               } finally {
+                       propIn.close();
+               }
+       }
+
+       @Override
+       protected void additionalAuthenticationChecks(UserDetails userDetails,
+                       UsernamePasswordAuthenticationToken authentication)
+                       throws AuthenticationException {
+               if (!userDetails.getPassword().equals(authentication.getCredentials()))
+                       throw new BadCredentialsException(
+                                       "Invalid credentails provided by "
+                                                       + authentication.getName());
+       }
+
+       @Override
+       protected UserDetails retrieveUser(String username,
+                       UsernamePasswordAuthenticationToken authentication)
+                       throws AuthenticationException {
+               String value = properties.getProperty(username);
+               if (value == null)
+                       throw new BadCredentialsException("User " + username
+                                       + " is not registered");
+               List<GrantedAuthority> grantedAuthorities = new ArrayList<GrantedAuthority>();
+               for (String role : defaultRoles)
+                       grantedAuthorities.add(new GrantedAuthorityImpl(role));
+               return new User(
+                               username,
+                               value,
+                               true,
+                               true,
+                               true,
+                               true,
+                               grantedAuthorities
+                                               .toArray(new GrantedAuthority[grantedAuthorities.size()]));
+       }
+
+       public void setMapping(Resource mapping) {
+               this.mapping = mapping;
+       }
+
+       public void setDefaultRoles(List<String> defaultRoles) {
+               this.defaultRoles = defaultRoles;
+       }
+
+}