All Downloads are FREE. Search and download functionalities are using the official Maven repository.

fish.payara.microprofile.jwtauth.cdi.JwtAuthCdiExtension Maven / Gradle / Ivy

/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 *
 * Copyright (c) 2017-2021 Payara Foundation and/or its affiliates. All rights reserved.
 *
 * The contents of this file are subject to the terms of either the GNU
 * General Public License Version 2 only ("GPL") or the Common Development
 * and Distribution License("CDDL") (collectively, the "License").  You
 * may not use this file except in compliance with the License.  You can
 * obtain a copy of the License at
 * https://github.com/payara/Payara/blob/main/LICENSE.txt
 * See the License for the specific
 * language governing permissions and limitations under the License.
 *
 * When distributing the software, include this License Header Notice in each
 * file and include the License file at glassfish/legal/LICENSE.txt.
 *
 * GPL Classpath Exception:
 * The Payara Foundation designates this particular file as subject to the "Classpath"
 * exception as provided by the Payara Foundation in the GPL Version 2 section of the License
 * file that accompanied this code.
 *
 * Modifications:
 * If applicable, add the following below the License Header, with the fields
 * enclosed by brackets [] replaced by your own identifying information:
 * "Portions Copyright [year] [name of copyright owner]"
 *
 * Contributor(s):
 * If you wish your version of this file to be governed by only the CDDL or
 * only the GPL Version 2, indicate your decision by adding "[Contributor]
 * elects to include this software in this distribution under the [CDDL or GPL
 * Version 2] license."  If you don't indicate a single choice of license, a
 * recipient has the option to distribute your version of this file under
 * either the CDDL, the GPL Version 2 or to extend the choice of license to
 * its licensees as provided above.  However, if you add GPL Version 2 code
 * and therefore, elected the GPL Version 2 license, then the option applies
 * only if the new code is made subject to such option by the copyright
 * holder.
 */
package fish.payara.microprofile.jwtauth.cdi;

import fish.payara.microprofile.jwtauth.eesecurity.JWTAuthenticationMechanism;
import fish.payara.microprofile.jwtauth.eesecurity.SignedJWTIdentityStore;
import jakarta.annotation.security.RolesAllowed;
import jakarta.enterprise.context.SessionScoped;
import jakarta.enterprise.event.Observes;
import jakarta.enterprise.inject.spi.AfterBeanDiscovery;
import jakarta.enterprise.inject.spi.Annotated;
import jakarta.enterprise.inject.spi.Bean;
import jakarta.enterprise.inject.spi.BeanManager;
import jakarta.enterprise.inject.spi.BeforeBeanDiscovery;
import jakarta.enterprise.inject.spi.DeploymentException;
import jakarta.enterprise.inject.spi.Extension;
import jakarta.enterprise.inject.spi.InjectionPoint;
import jakarta.enterprise.inject.spi.ProcessBean;
import jakarta.enterprise.inject.spi.ProcessInjectionTarget;
import jakarta.enterprise.inject.spi.ProcessManagedBean;
import jakarta.enterprise.inject.spi.ProcessSessionBean;
import org.eclipse.microprofile.auth.LoginConfig;
import org.eclipse.microprofile.config.Config;
import org.eclipse.microprofile.config.ConfigProvider;
import org.eclipse.microprofile.jwt.Claim;

import java.lang.annotation.Annotation;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.HashSet;
import java.util.List;
import java.util.Set;

import static org.eclipse.microprofile.jwt.Claims.UNKNOWN;
import static org.eclipse.microprofile.jwt.config.Names.VERIFIER_PUBLIC_KEY;
import static org.eclipse.microprofile.jwt.config.Names.VERIFIER_PUBLIC_KEY_LOCATION;

/**
 * This CDI extension installs the {@link JWTAuthenticationMechanism} and related {@link SignedJWTIdentityStore}
 * when the LoginConfig annotation is encountered (MP-JWT 1.0 5).
 * 
 * 

* Additionally this extension checks that injection of claims are in the right scope (non-transitively, 7.1.3). * * @author Arjan Tijms */ public class JwtAuthCdiExtension implements Extension { /** * Tracks whether a LoginConfig annotation has been encountered and thus * a mechanism needs to be installed. */ private boolean addJWTAuthenticationMechanism; private final Set roles = new HashSet<>(); public void register(@Observes BeforeBeanDiscovery beforeBean, BeanManager beanManager) { beforeBean.addAnnotatedType(beanManager.createAnnotatedType(InjectionPointGenerator.class), "JWT InjectionPointGenerator "); } /** * This method tries to find the LoginConfig annotation and if does flags that fact. * */ public void findLoginConfigAnnotation(@Observes ProcessBean eventIn, BeanManager beanManager) { ProcessBean event = eventIn; // JDK8 u60 workaround LoginConfig loginConfig = event.getAnnotated().getAnnotation(LoginConfig.class); if (loginConfig != null && loginConfig.authMethod().equals("MP-JWT")) { addJWTAuthenticationMechanism = true; } } /** * Find all the roles used by the @RolesAllowed annotation, so these can be programmatically * declared later on. * */ public void findRoles(@Observes ProcessManagedBean eventIn, BeanManager beanManager) { ProcessManagedBean event = eventIn; // JDK8 u60 workaround if (event instanceof ProcessSessionBean) { // @RolesAllowed on session beans is already handled return; } List annotatedElements = new ArrayList<>(event.getAnnotatedBeanClass().getMethods()); annotatedElements.add(event.getAnnotatedBeanClass()); for (Annotated annotated : annotatedElements) { RolesAllowed rolesAllowed = annotated.getAnnotation(RolesAllowed.class); if (rolesAllowed != null) { roles.addAll(Arrays.asList(rolesAllowed.value())); } } } public void checkInjectIntoRightScope(@Observes ProcessInjectionTarget eventIn, BeanManager beanManager) { ProcessInjectionTarget event = eventIn; // JDK8 u60 workaround for (InjectionPoint injectionPoint : event.getInjectionTarget().getInjectionPoints()) { Claim claim = hasClaim(injectionPoint); if (claim != null) { // MP-JWT 1.0 7.1.3. Bean bean = injectionPoint.getBean(); Class scope = bean != null ? injectionPoint.getBean().getScope() : null; if (scope != null && scope.equals(SessionScoped.class)) { throw new DeploymentException( "Can't inject using qualifier " + Claim.class + " in a target with scope " + scope); } if (!claim.value().equals("") && claim.standard() != UNKNOWN && !claim.value().equals(claim.standard().name())) { throw new DeploymentException( "Claim value " + claim.value() + " should be equal to claim standard " + claim.standard().name() + " or one of those should be left at their default value"); } } } } public void installMechanismIfNeeded(@Observes AfterBeanDiscovery eventIn, BeanManager beanManager) { AfterBeanDiscovery afterBeanDiscovery = eventIn; // JDK8 u60 workaround if (addJWTAuthenticationMechanism) { validateConfigValue(); CdiInitEventHandler.installAuthenticationMechanism(afterBeanDiscovery); } } private void validateConfigValue() { Config config = ConfigProvider.getConfig(); if (config.getOptionalValue(VERIFIER_PUBLIC_KEY, String.class).isPresent() && config.getOptionalValue(VERIFIER_PUBLIC_KEY_LOCATION, String.class).isPresent()) { throw new DeploymentException( "Both properties mp.jwt.verify.publickey and mp.jwt.verify.publickey.location must not be defined" ); } } public Set getRoles() { return roles; } public boolean isAddJWTAuthenticationMechanism() { return addJWTAuthenticationMechanism; } private static Claim hasClaim(InjectionPoint injectionPoint) { for (Annotation qualifier : injectionPoint.getQualifiers()) { if (qualifier.annotationType().equals(Claim.class)) { return (Claim) qualifier; } } return null; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy