All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.sun.enterprise.security.auth.realm.file.FileRealm Maven / Gradle / Ivy

There is a newer version: 4.1.2.181
Show newest version
/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 *
 * Copyright (c) 1997-2014 Oracle and/or its affiliates. All rights reserved.
 *
 * The contents of this file are subject to the terms of either the GNU
 * General Public License Version 2 only ("GPL") or the Common Development
 * and Distribution License("CDDL") (collectively, the "License").  You
 * may not use this file except in compliance with the License.  You can
 * obtain a copy of the License at
 * https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
 * or packager/legal/LICENSE.txt.  See the License for the specific
 * language governing permissions and limitations under the License.
 *
 * When distributing the software, include this License Header Notice in each
 * file and include the License file at packager/legal/LICENSE.txt.
 *
 * GPL Classpath Exception:
 * Oracle designates this particular file as subject to the "Classpath"
 * exception as provided by Oracle in the GPL Version 2 section of the License
 * file that accompanied this code.
 *
 * Modifications:
 * If applicable, add the following below the License Header, with the fields
 * enclosed by brackets [] replaced by your own identifying information:
 * "Portions Copyright [year] [name of copyright owner]"
 *
 * Contributor(s):
 * If you wish your version of this file to be governed by only the CDDL or
 * only the GPL Version 2, indicate your decision by adding "[Contributor]
 * elects to include this software in this distribution under the [CDDL or GPL
 * Version 2] license."  If you don't indicate a single choice of license, a
 * recipient has the option to distribute your version of this file under
 * either the CDDL, the GPL Version 2 or to extend the choice of license to
 * its licensees as provided above.  However, if you add GPL Version 2 code
 * and therefore, elected the GPL Version 2 license, then the option applies
 * only if the new code is made subject to such option by the copyright
 * holder.
 */

package com.sun.enterprise.security.auth.realm.file;

import java.util.*;
import java.util.logging.Level;
import java.io.*;
import com.sun.enterprise.security.auth.realm.User;
import com.sun.enterprise.security.auth.realm.Realm;
import com.sun.enterprise.security.auth.realm.BadRealmException;
import com.sun.enterprise.security.auth.realm.NoSuchUserException;
import com.sun.enterprise.security.auth.realm.NoSuchRealmException;
import com.sun.enterprise.security.auth.realm.IASRealm;
import com.sun.enterprise.config.serverbeans.Config;
import com.sun.enterprise.config.serverbeans.AuthRealm;
import com.sun.enterprise.config.serverbeans.SecurityService;
import com.sun.enterprise.security.common.Util;
import com.sun.enterprise.security.util.IASSecurityException;
import org.glassfish.internal.api.RelativePathResolver;
import org.glassfish.security.common.FileRealmHelper;
import org.jvnet.hk2.annotations.Service;


/**
 * Realm wrapper for supporting file password authentication.
 *
 * 

In addition to the basic realm functionality, this class provides * administration methods for the file realm. * *

Format of the keyfile used by this class is one line per user * containing username;password;groups where: *

    *
  • username - Name string. *
  • password - A salted SHA hash (SSHA) of the user password. *
  • groups - A comma separated list of group memberships. *
* *

The file realm needs the following properties in its configuration: *

    *
  • file - Full path to the keyfile to load *
  • jaas-ctx - JAAS context name used to access LoginModule for * authentication. *
* * @author Harry Singh * @author Jyri Virkki * @author Shing Wai Chan */ @Service public final class FileRealm extends IASRealm { // Descriptive string of the authentication type of this realm. public static final String AUTH_TYPE = "filepassword"; // These are property names which should be in auth-realm in server.xml public static final String PARAM_KEYFILE="file"; FileRealmHelper helper; /** * Constructor. * *

The created FileRealm instance is not registered in the * Realm registry. This constructor can be used by admin tools * to create a FileRealm instance which can be edited by adding or * removing users and then saved to disk, without affecting the * installed realm instance. * *

The file provided should always exist. A default (empty) keyfile * is installed with the server so this should always be the case * unless the user has manually deleted this file. If this file * path provided does not point to an existing file this constructor * will first attempt to create it. If this succeeds the constructor * returns normally and an empty keyfile will have been created; otherwise * an exception is thrown. * * @param keyfile Full path to the keyfile to read for user data. * @exception BadRealmException If the configuration parameters * identify a corrupt realm. * @exception NoSuchRealmException If the configuration parameters * specify a realm which doesn't exist. * */ public FileRealm(String keyfile) throws BadRealmException, NoSuchRealmException { Properties p = new Properties(); // The original keyfile is stored here for use in the init and refresh methods p.setProperty(PARAM_KEYFILE, keyfile); p.setProperty(IASRealm.JAAS_CONTEXT_PARAM, "ignore"); this.init(p); } /* * No arg constructor used by the Realm class when creating realms. * This is followed by a call to the init() method. */ public FileRealm() { } /** * Return a list of the file names used by all file realms * defined for the specified config. * * @param config the config object * @return a list of the file names for all files realms in the * config */ public static List getRealmFileNames(Config config) { List files = new ArrayList(); SecurityService securityService = config.getSecurityService(); for (AuthRealm authRealm : securityService.getAuthRealm()) { String fileRealmClassName = authRealm.getClassname(); // skip it if it's not a file realm if (fileRealmClassName == null || !fileRealmClassName.equals(FileRealm.class.getName())) continue; String file = authRealm.getPropertyValue("file"); if (file == null) // skip if no "file" property continue; if (file.contains("$")) { file = RelativePathResolver.resolvePath(file); } files.add(file); } return files; } /** * Initialize a realm with some properties. This can be used * when instantiating realms from their descriptions. This * method is invoked from Realm during initialization. * * @param props Initialization parameters used by this realm. * @exception BadRealmException If the configuration parameters * identify a corrupt realm. * @exception NoSuchRealmException If the configuration parameters * specify a realm which doesn't exist. * */ @Override protected void init(Properties props) throws BadRealmException, NoSuchRealmException { super.init(props); String file = props.getProperty(PARAM_KEYFILE); if (file == null) { String msg = sm.getString("filerealm.nofile"); throw new BadRealmException(msg); } if (file.contains("$")) { file = RelativePathResolver.resolvePath(file); } this.setProperty(PARAM_KEYFILE, file); String jaasCtx = props.getProperty(IASRealm.JAAS_CONTEXT_PARAM); if (jaasCtx == null) { String msg = sm.getString("filerealm.nomodule"); throw new BadRealmException(msg); } this.setProperty(IASRealm.JAAS_CONTEXT_PARAM, jaasCtx); _logger.log(Level.FINE, "FileRealm : "+ PARAM_KEYFILE + "={0}", file); _logger.log(Level.FINE, "FileRealm : "+ IASRealm.JAAS_CONTEXT_PARAM + "={0}", jaasCtx); try { if (Util.isEmbeddedServer()) { String embeddedFilePath = Util.writeConfigFileToTempDir(file).getAbsolutePath(); file = embeddedFilePath; } helper = new FileRealmHelper(file); } catch (IOException ioe) { String msg = sm.getString("filerealm.noaccess", ioe.toString()); throw new BadRealmException(msg); } } /** * Returns a short (preferably less than fifteen characters) description * of the kind of authentication which is supported by this realm. * * @return Description of the kind of authentication that is directly * supported by this realm. */ @Override public String getAuthType() { return AUTH_TYPE; } /** * Returns names of all the users in this particular realm. * * @return enumeration of user names (strings) * @exception BadRealmException if realm data structures are bad */ @Override public Enumeration getUserNames() throws BadRealmException { return Collections.enumeration(helper.getUserNames()); } /** * Returns the information recorded about a particular named user. * * @param name Name of the user whose information is desired. * @return The user object. * @exception NoSuchUserException if the user doesn't exist. * @exception BadRealmException if realm data structures are bad. */ @Override public User getUser(String name) throws NoSuchUserException { FileRealmHelper.User u = helper.getUser(name); if (u == null) { String msg = sm.getString("filerealm.nouser", name); throw new NoSuchUserException(msg); } return new FileRealmUser(u, null); } /** * Returns names of all the groups in this particular realm. * Note that this will not return assign-groups. * * @return enumeration of group names (strings) * @exception BadRealmException if realm data structures are bad */ @Override public Enumeration getGroupNames() throws BadRealmException { return Collections.enumeration(helper.getGroupNames()); } /** * Returns the name of all the groups that this user belongs to. * @param username Name of the user in this realm whose group listing * is needed. * @return Enumeration of group names (strings). * @exception InvalidOperationException thrown if the realm does not * support this operation - e.g. Certificate realm does not support * this operation. */ @Override public Enumeration getGroupNames(String username) throws NoSuchUserException { String groups[] = helper.getGroupNames(username); if ( groups == null ) { groups = new String[]{}; } groups = addAssignGroups(groups); return Collections.enumeration(Arrays.asList(groups)); } /** * Refreshes the realm data so that new users/groups are visible. * *

A new FileRealm instance is created and initialized from the * keyfile on disk. The new instance is installed in the Realm registry * so future Realm.getInstance() calls will obtain the new data. Any * existing references to this instance (e.g. in active LoginModule * sessions) are unaffected. * * @exception BadRealmException if realm data structures are bad * */ @Override public void refresh() throws BadRealmException { if (_logger.isLoggable(Level.FINE)) { _logger.fine("Reloading file realm data."); } try { FileRealm newRealm = new FileRealm(getProperty(PARAM_KEYFILE)); newRealm.init(getProperties()); Realm.updateInstance(newRealm, this.getName()); } catch (Exception e) { throw new BadRealmException(e.toString()); } } /** * Refreshes the realm data so that new users/groups are visible. * *

A new FileRealm instance is created and initialized from the * keyfile on disk. The new instance is installed in the Realm registry * so future Realm.getInstance() calls will obtain the new data. Any * existing references to this instance (e.g. in active LoginModule * sessions) are unaffected. * @param config * @exception BadRealmException if realm data structures are bad * */ @Override public void refresh(String configName) throws BadRealmException { if (_logger.isLoggable(Level.FINE)) { _logger.fine("Reloading file realm data."); } try { FileRealm newRealm = new FileRealm(getProperty(PARAM_KEYFILE)); newRealm.init(getProperties()); Realm.updateInstance(configName, newRealm, this.getName()); } catch (Exception e) { throw new BadRealmException(e.toString()); } } /** * Adds new user to file realm. User cannot exist already. * * @param name User name. * @param password Cleartext password for the user. * @param groupList List of groups to which user belongs. * @throws BadRealmException If there are problems adding user. * */ @Override public void addUser(String name, char[] password, String[] groupList) throws BadRealmException, IASSecurityException { helper.addUser(name, password, groupList); } /** * Remove user from file realm. User must exist. * * @param name User name. * @throws NoSuchUserException If user does not exist. * */ @Override public void removeUser(String name) throws NoSuchUserException, BadRealmException { helper.removeUser(name); } /** * Update data for an existing user. User must exist. * * @param name Current name of the user to update. * @param newName New name to give this user. It can be the same as * the original name. Otherwise it must be a new user name which * does not already exist as a user. * @param password Cleartext password for the user. If non-null the user * password is changed to this value. If null, the original password * is retained. * @param groupList List of groups to which user belongs. * @throws BadRealmException If there are problems adding user. * @throws NoSuchUserException If user does not exist. * */ @Override public void updateUser(String name, String newName, char[] password, String[] groups) throws NoSuchUserException, BadRealmException, IASSecurityException { helper.updateUser(name, newName, password, groups); } /** * Authenticates a user. * *

This method is invoked by the FileLoginModule in order to * authenticate a user in the file realm. The authentication decision * is kept within the realm class implementation in order to keep * the password cache in a single location with no public accessors, * to simplify future improvements. * * @param user Name of user to authenticate. * @param password Password provided by client. * @returns Array of group names the user belongs to, or null if * authentication fails. * @throws LoginException If there are errors during authentication. * */ public String[] authenticate(String user, char[] password) { String groups[] = helper.authenticate(user, password); if (groups != null) { groups = addAssignGroups(groups); } return groups; } /* * Test whether their is a user in the FileRealm that has a password that * has been set, i.e., something other than the resetKey. */ public boolean hasAuthenticatableUser() { return helper.hasAuthenticatableUser(); } /** * @return true if the realm implementation support User Management (add,remove,update user) */ @Override public boolean supportsUserManagement() { //File Realm supports UserManagement return true; } /** * Persist the realm data to permanent storage * @throws com.sun.enterprise.security.auth.realm.BadRealmException */ @Override public void persist() throws BadRealmException { try { helper.persist(); } catch (IOException ex) { throw new BadRealmException(ex); } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy