import java.security.cert.X509Certificate;
import java.util.Base64;
import java.util.Collection;
+import java.util.Locale;
import java.util.Map;
import java.util.StringTokenizer;
private BundleContext bc;
private Authorization authorization;
+ private Locale locale;
@SuppressWarnings("unchecked")
@Override
}
if (sr.size() == 1) {
CmsSession cmsSession = bc.getService(sr.iterator().next());
+ locale = cmsSession.getLocale();
authorization = cmsSession.getAuthorization();
if (authorization.getName() == null)
authorization = null;// anonymous is not sufficient
}
if (authorization != null) {
- CmsAuthUtils.addAuthorization(subject, authorization, request.getLocale(), request);
+ // Locale locale = request.getLocale();
+ if (locale == null)
+ locale = request.getLocale();
+ subject.getPublicCredentials().add(locale);
+ CmsAuthUtils.addAuthorization(subject, authorization, locale, request);
+ CmsAuthUtils.registerSessionAuthorization(request, subject, authorization, locale);
cleanUp();
return true;
} else {
if (null != certs && certs.length > 0) {
sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, certs[0].getSubjectX500Principal().getName());
sharedState.put(CmsAuthUtils.SHARED_STATE_CERTIFICATE_CHAIN, certs);
+ } else {
+ // When client has been verified by reverse proxy
+ String certDn = req.getHeader("SSL_CLIENT_S_DN");
+ if (certDn != null) {
+ sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, certDn);
+ String issuerDn = req.getHeader("SSL_CLIENT_I_DN");
+ sharedState.put(CmsAuthUtils.SHARED_STATE_CERTIFICATE_CHAIN, issuerDn);
+ }
}
}