com.sun.jaspic.config.jaas.JAASAuthContextHelper Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of payara-micro Show documentation
Show all versions of payara-micro Show documentation
Micro Distribution of the Payara Project for IBM JDK
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2011 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.jaspic.config.jaas;
import com.sun.jaspic.config.helper.AuthContextHelper;
import java.lang.reflect.Constructor;
import java.lang.reflect.InvocationTargetException;
import java.security.AccessController;
import java.security.PrivilegedActionException;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Map;
import java.util.concurrent.locks.Lock;
import java.util.concurrent.locks.ReentrantReadWriteLock;
import java.util.logging.Level;
import javax.security.auth.login.AppConfigurationEntry;
import javax.security.auth.login.AppConfigurationEntry.LoginModuleControlFlag;
import javax.security.auth.message.AuthException;
import javax.security.auth.message.AuthStatus;
/**
*
* @author Ron Monzillo
*/
public class JAASAuthContextHelper extends AuthContextHelper {
private static final String DEFAULT_ENTRY_NAME = "other";
private static final Class[] PARAMS = {};
private static final Object[] ARGS = {};
//may be more than one delegate for a given jaas config file
private ReentrantReadWriteLock instanceReadWriteLock =
new ReentrantReadWriteLock();
private Lock instanceWriteLock = instanceReadWriteLock.writeLock();
ExtendedConfigFile jaasConfig;
private final String appContext;
private AppConfigurationEntry[] entry;
private Constructor[] ctor;
public JAASAuthContextHelper(String loggerName, boolean returnNullContexts,
ExtendedConfigFile jaasConfig, Map properties, String appContext)
throws AuthException {
super(loggerName, returnNullContexts);
this.jaasConfig = jaasConfig;
this.appContext = appContext;
initialize();
}
private void initialize() {
boolean found = false;
boolean foundDefault = false;
instanceWriteLock.lock();
try {
entry = jaasConfig.getAppConfigurationEntry(appContext);
if (entry == null) {
// NEED TO MAKE SURE THIS LOOKUP only occurs when registered for *
entry = jaasConfig.getAppConfigurationEntry(DEFAULT_ENTRY_NAME);
if (entry == null) {
entry = new AppConfigurationEntry[0];
} else {
foundDefault = true;
}
} else {
found = true;
}
// initializeContextMap();
ctor = null;
} finally {
instanceWriteLock.unlock();
}
if (!found) {
if (!foundDefault) {
logIfLevel(Level.INFO, null,
"JAASAuthConfig no entries matched appContext (",
appContext, ") or (", DEFAULT_ENTRY_NAME, ")");
} else {
logIfLevel(Level.INFO, null,
"JAASAuthConfig appContext (", appContext, ") matched (",
DEFAULT_ENTRY_NAME, ")");
}
}
}
private void loadConstructors(M[] template, String authContextID) throws AuthException {
if (ctor == null) {
try {
final Class moduleType = template.getClass().getComponentType();
ctor = (Constructor[]) AccessController.doPrivileged(
new java.security.PrivilegedExceptionAction() {
public Object run() throws
java.lang.ClassNotFoundException,
java.lang.NoSuchMethodException,
java.lang.InstantiationException,
java.lang.IllegalAccessException,
java.lang.reflect.InvocationTargetException {
Constructor[] ctor = new Constructor[entry.length];
ClassLoader loader =
Thread.currentThread().getContextClassLoader();
for (int i = 0; i < entry.length; i++) {
ctor[i] = null;
String clazz = entry[i].getLoginModuleName();
try {
Class c = Class.forName(clazz, true, loader);
if (moduleType.isAssignableFrom(c)) {
ctor[i] = c.getConstructor(PARAMS);
}
} catch (Throwable t) {
logIfLevel(Level.WARNING, null,
"skipping unloadable class: ",
clazz, " of appCOntext: ", appContext);
}
}
return ctor;
}
});
} catch (java.security.PrivilegedActionException pae) {
AuthException ae = new AuthException();
ae.initCause(pae.getCause());
throw ae;
}
}
}
protected final void refresh() {
jaasConfig.refresh();
initialize();
}
/**
* this implementation does not depend on authContextID
* @param
* @param template
* @param authContextID (ignored by this context system)
* @return
* @throws AuthException
*/
public boolean hasModules(M[] template, String authContextID) throws AuthException {
loadConstructors(template, authContextID);
for (Constructor c : ctor) {
if (c != null) {
return true;
}
}
return false;
}
/**
* this implementation does not depend on authContextID
* @param
* @param template
* @param authContextID (ignored by this context system)
* @return
* @throws AuthException
*/
public M[] getModules(M[] template, String authContextID) throws AuthException {
loadConstructors(template, authContextID);
ArrayList list = new ArrayList();
for (int i = 0; i < ctor.length; i++) {
if (ctor[i] == null) {
list.add(i, null);
} else {
final int j = i;
try {
list.add(j, AccessController.doPrivileged(
new java.security.PrivilegedExceptionAction() {
public M run()
throws InstantiationException,
IllegalAccessException,
IllegalArgumentException,
InvocationTargetException {
return (M) ctor[j].newInstance(ARGS);
}
}));
} catch (PrivilegedActionException pae) {
AuthException ae = new AuthException();
ae.initCause(pae.getCause());
throw ae;
}
}
}
return list.toArray(template);
}
public Map getInitProperties(int i, Map properties) {
Map rvalue = new HashMap();
if (entry[i] != null) {
if (properties != null && !properties.isEmpty()) {
rvalue.putAll((Map) properties);
}
Map options = (Map) entry[i].getOptions();
if (options != null && !options.isEmpty()) {
rvalue.putAll(options);
}
}
return rvalue;
}
public boolean exitContext(AuthStatus[] successValue, int i, AuthStatus moduleStatus) {
if (entry[i] != null && ctor[i] != null) {
LoginModuleControlFlag flag = entry[i].getControlFlag();
if (LoginModuleControlFlag.REQUISITE.equals(flag)) {
for (AuthStatus s : successValue) {
if (moduleStatus == s) {
return false;
}
}
return true;
} else if (LoginModuleControlFlag.SUFFICIENT.equals(flag)) {
for (AuthStatus s : successValue) {
if (moduleStatus == s) {
return true;
}
}
return false;
}
}
return false;
}
public AuthStatus getReturnStatus(AuthStatus[] successValue,
AuthStatus defaultFailStatus,
AuthStatus[] status,
int position) {
AuthStatus result = null;
for (int i = 0; i <= position; i++) {
if (entry[i] != null && ctor[i] != null) {
LoginModuleControlFlag flag = entry[i].getControlFlag();
if (isLoggable(Level.FINE)) {
logIfLevel(Level.FINE, null, "getReturnStatus - flag: ",
flag.toString());
}
if (flag == LoginModuleControlFlag.REQUIRED
|| flag == LoginModuleControlFlag.REQUISITE) {
boolean isSuccessValue = false;
for (AuthStatus s : successValue) {
if (status[i] == s) {
isSuccessValue = true;
}
}
if (isSuccessValue) {
if (result == null) {
result = status[i];
}
continue;
}
if (isLoggable(Level.FINE)) {
logIfLevel(Level.FINE, null, "ReturnStatus - REQUIRED or REQUISITE failure: ",
status[i].toString());
}
return status[i];
} else if (flag == LoginModuleControlFlag.SUFFICIENT) {
if (exitContext(successValue, i, status[i])) {
if (isLoggable(Level.FINE)) {
logIfLevel(Level.FINE, null, "ReturnStatus - Sufficient success: ",
status[i].toString());
}
return status[i];
}
} else if (flag == LoginModuleControlFlag.OPTIONAL) {
if (result == null) {
for (AuthStatus s : successValue) {
if (status[i] == s) {
result = status[i];
}
}
}
}
}
}
if (result != null) {
if (isLoggable(Level.FINE)) {
logIfLevel(Level.FINE, null, "ReturnStatus - result: ", result.toString());
}
return result;
}
if (isLoggable(Level.FINE)) {
logIfLevel(Level.FINE, null, "ReturnStatus - Default faiure status: ",
defaultFailStatus.toString());
}
return defaultFailStatus;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy