com.sun.enterprise.security.embedded.EmbeddedSecurityUtil Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of payara-micro Show documentation
Show all versions of payara-micro Show documentation
Micro Distribution of the Payara Project for IBM JDK
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2010-2013 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.enterprise.security.embedded;
import com.sun.enterprise.config.serverbeans.AuthRealm;
import com.sun.enterprise.config.serverbeans.SecurityService;
import com.sun.enterprise.security.EmbeddedSecurity;
import com.sun.enterprise.security.SecurityLoggerInfo;
import com.sun.enterprise.util.StringUtils;
import com.sun.enterprise.util.io.FileUtils;
import java.io.File;
import java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.xml.stream.XMLInputFactory;
import javax.xml.stream.XMLStreamException;
import javax.xml.stream.XMLStreamReader;
import org.glassfish.api.admin.RuntimeType;
import org.glassfish.api.admin.ServerEnvironment;
import org.glassfish.hk2.api.ServiceLocator;
import org.glassfish.server.ServerEnvironmentImpl;
import org.jvnet.hk2.annotations.Service;
import javax.inject.Singleton;
import org.jvnet.hk2.config.types.Property;
/**
* Utility file to copy the security related config files
* from the passed non-embedded instanceDir to the embedded
* server instance's config.
* This is a service that is protected. This implements
* the Contract EmbeddedSecurity
*
* @author Nithya Subramanian
*/
@Service
@Singleton
public class EmbeddedSecurityUtil implements EmbeddedSecurity {
private static final Logger _logger = SecurityLoggerInfo.getLogger();
public void copyConfigFiles(ServiceLocator habitat, File fromInstanceDir, File domainXml) {
//For security reasons, permit only an embedded server instance to carry out the copy operations
ServerEnvironment se = habitat.getService(ServerEnvironment.class);
if (!isEmbedded(se)) {
return;
}
if ((fromInstanceDir == null) || (domainXml == null)) {
throw new IllegalArgumentException("Null inputs");
}
File toInstanceDir = habitat.getService(ServerEnvironmentImpl.class).getInstanceRoot();
List fileNames = new ArrayList();
//Handling the exception here, since it is causing CTS failure - CR 6981191
try {
//Add FileRealm keyfiles to the list
fileNames.addAll(new EmbeddedSecurityUtil().new DomainXmlSecurityParser(domainXml).getAbsolutePathKeyFileNames(fromInstanceDir));
//Add keystore and truststore files
// For the embedded server case, will the system properties be set in case of multiple embedded instances?
//Not sure - so obtain the other files from the usual locations instead of from the System properties
String keyStoreFileName = fromInstanceDir + File.separator + "config" + File.separator + "keystore.jks";
String trustStoreFileName = fromInstanceDir + File.separator + "config" + File.separator + "cacerts.jks";
fileNames.add(keyStoreFileName);
fileNames.add(trustStoreFileName);
//Add login.conf and security policy
String loginConf = fromInstanceDir + File.separator + "config" + File.separator + "login.conf";
String secPolicy = fromInstanceDir + File.separator + "config" + File.separator + "server.policy";
fileNames.add(loginConf);
fileNames.add(secPolicy);
File toConfigDir = new File(toInstanceDir, "config");
if (!toConfigDir.exists()) {
if(!toConfigDir.mkdir()) {
throw new IOException();
}
}
//Copy files into new directory
for (String fileName : fileNames) {
FileUtils.copyFile(new File(fileName), new File(toConfigDir, parseFileName(fileName)));
}
}catch(IOException e) {
_logger.log(Level.WARNING, SecurityLoggerInfo.ioError, e);
}catch(XMLStreamException e) {
_logger.log(Level.WARNING, SecurityLoggerInfo.xmlStreamingError, e);
}
}
public String parseFileName(String fullFilePath) {
if (fullFilePath == null) {
return null;
}
File file = new File(fullFilePath);
return file.getName();
}
public boolean isEmbedded(ServerEnvironment se) {
if (se.getRuntimeType() == RuntimeType.EMBEDDED) {
return true;
}
return false;
}
public List getKeyFileNames(SecurityService securityService) {
List keyFileNames = new ArrayList();
List authRealms = securityService.getAuthRealm();
for (AuthRealm authRealm : authRealms) {
String className = authRealm.getClassname();
if ("com.sun.enterprise.security.auth.realm.file.FileRealm".equals(className)) {
List props = authRealm.getProperty();
for (Property prop : props) {
if ("file".equals(prop.getName())) {
keyFileNames.add(prop.getValue());
}
}
}
}
return keyFileNames;
}
//Inner class to parse the domainXml to obtain the keyfile names
class DomainXmlSecurityParser {
XMLStreamReader xmlReader;
XMLInputFactory xif =
(XMLInputFactory.class.getClassLoader() == null)
? XMLInputFactory.newInstance()
: XMLInputFactory.newInstance(XMLInputFactory.class.getName(),
XMLInputFactory.class.getClassLoader());
private static final String AUTH_REALM = "auth-realm";
private static final String CONFIG = "config";
private static final String CLASSNAME = "classname";
private static final String FILE_REALM_CLASS = "com.sun.enterprise.security.auth.realm.file.FileRealm";
private static final String PROPERTY = "property";
private static final String NAME = "name";
private static final String VALUE = "value";
private static final String FILE = "file";
private static final String INSTANCE_DIR_PLACEHOLDER = "${com.sun.aas.instanceRoot}";
DomainXmlSecurityParser(File domainXml) throws XMLStreamException, FileNotFoundException {
xmlReader = xif.createXMLStreamReader(new FileReader(domainXml));
}
private String replaceInstanceDir(String fromInstanceDir, String keyFileName) {
return StringUtils.replace(keyFileName, INSTANCE_DIR_PLACEHOLDER, fromInstanceDir);
}
//Obtain the keyfile names for the server-config (the first appearing config in domain.xml
List getAbsolutePathKeyFileNames(File fromInstanceDir) throws XMLStreamException {
List keyFileNames = new ArrayList();
while (skipToStartButNotPast(AUTH_REALM, CONFIG)) {
String realmClass = xmlReader.getAttributeValue(null, CLASSNAME);
if (realmClass.equals(FILE_REALM_CLASS)) {
while (skipToStartButNotPast(PROPERTY, AUTH_REALM)) {
if (FILE.equals(xmlReader.getAttributeValue(null, NAME))) {
String keyFileName = xmlReader.getAttributeValue(null, VALUE);
//Replace the Placeholder in the keyfile names
keyFileNames.add(replaceInstanceDir(fromInstanceDir.getAbsolutePath(),keyFileName ));
}
}
}
}
return keyFileNames;
}
private boolean skipToStartButNotPast(String startName, String stopName) throws XMLStreamException {
if (!StringUtils.ok(startName) || !StringUtils.ok(stopName)) {
throw new IllegalArgumentException();
}
while (xmlReader.hasNext()) {
xmlReader.next();
// getLocalName() will throw an exception in many states. Be careful!!
if (xmlReader.isStartElement() && startName.equals(xmlReader.getLocalName())) {
return true;
}
if (xmlReader.isEndElement() && stopName.equals(xmlReader.getLocalName())) {
return false;
}
}
return false;
}
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy