com.sun.enterprise.security.ee.SecurityUtil Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of payara-micro Show documentation
Show all versions of payara-micro Show documentation
Micro Distribution of the Payara Project
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2013 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.enterprise.security.ee;
import java.security.*;
import javax.security.jacc.*;
//import com.sun.ejb.Invocation;
import com.sun.enterprise.security.SecurityRoleMapperFactoryGen;
import com.sun.enterprise.security.util.IASSecurityException;
import com.sun.enterprise.util.LocalStringManagerImpl;
import com.sun.logging.*;
import java.util.logging.*;
import com.sun.enterprise.deployment.Application;
import com.sun.enterprise.deployment.EjbBundleDescriptor;
import com.sun.enterprise.deployment.WebBundleDescriptor;
import org.glassfish.deployment.common.SecurityRoleMapperFactory;
import java.util.Collection;
import org.glassfish.api.deployment.DeploymentContext;
import org.glassfish.api.deployment.OpsParams;
import org.glassfish.deployment.versioning.VersioningUtils;
/**
* This utility class encloses all the calls to a ejb method
* in a specified subject
* @author Harpreet Singh
* @author Shing Wai Chan
*/
public class SecurityUtil{
private static final LocalStringManagerImpl localStrings =
new LocalStringManagerImpl(SecurityUtil.class);
private static final Logger _logger =
LogDomains.getLogger(SecurityUtil.class, LogDomains.SECURITY_LOGGER);
public static final String VENDOR_PRESENT =
"com.sun.enterprise.security.provider.jaccvendorpresent";
private static final boolean vendorPresent = Boolean.getBoolean(VENDOR_PRESENT);
// set in PolicyLoader from domain.xml
private static final String REPOSITORY_HOME_PROP =
"com.sun.enterprise.jaccprovider.property.repository";
//TODO remove use of system property
// The repository is defined in PolicyFileMgr.
// It is repeated here since JACC provider is not reference directly.
public static final String repository = System.getProperty(REPOSITORY_HOME_PROP);
/** This method is called from the generated code to execute the
* method. This is a translation of method.invoke that the
* generated code needs to do, to invoke a particular ejb
* method. The method is invoked under a security Subject. This
* method is called from the generated code.
* @param Method beanClassMethod, the bean class method to be invoked
* @param Invocation inv, the current invocation object
* @param Object o, the object on which this method needs to be invoked,
* @param Object[] oa, the parameters to the methods,
* @param Container c, the container from which the appropriate subject is
* queried from.
*/
/* This method is now in EJBSecurityUtil in ejb/ejb-container module of V3
public static Object runMethod(Method beanClassMethod, Invocation inv, Object o, Object[] oa, Container c)
throws Throwable {
final Method meth = beanClassMethod;
final Object obj = o;
final Object[] objArr = oa;
Object ret;
EJBSecurityManager mgr = (EJBSecurityManager) c.getSecurityManager();
if (mgr == null) {
throw new SecurityException("SecurityManager not set");
}
// Optimization. Skip doAsPrivileged call if this is a local
// invocation and the target ejb uses caller identity or the
// System Security Manager is disabled.
// Still need to execute it within the target bean's policy context.
// see CR 6331550
if((inv.isLocal && mgr.getUsesCallerIdentity()) ||
System.getSecurityManager() == null) {
ret = mgr.runMethod(meth, obj, objArr);
} else {
try {
PrivilegedExceptionAction pea =
new PrivilegedExceptionAction(){
public java.lang.Object run() throws Exception {
return meth.invoke(obj, objArr);
}
};
ret = mgr.doAsPrivileged(pea);
} catch(PrivilegedActionException pae) {
Throwable cause = pae.getCause();
if( cause instanceof InvocationTargetException ) {
cause = ((InvocationTargetException) cause).getCause();
}
throw cause;
}
}
return ret;
} */
/**
* This method is similiar to the runMethod, except it keeps the
* semantics same as the one in reflection. On failure, if the
* exception is caused due to reflection, it returns the
* InvocationTargetException. This method is called from the
* containers for ejbTimeout, WebService and MDBs.
* @param Method beanClassMethod, the bean class method to be invoked
* @param Invocation inv, the current invocation
* @param Object o, the object on which this method is to be
* invoked in this case the ejb,
* @param Object[] oa, the parameters for the method,
* @param Container c, the container instance,
* @param SecurityManager sm, security manager for this container,
* can be a null value, where in the container will be queried to
* find its security manager.
* @return Object, the result of the execution of the method.
*/
/* This method is now in EJBSecurityUtil in ejb/ejb-container module of V3
public static Object invoke(Method beanClassMethod, Invocation inv, Object o, Object[] oa, Container c,
SecurityManager mgr) throws Throwable {
final Method meth = beanClassMethod;
final Object obj = o;
final Object[] objArr = oa;
Object ret = null;
EJBSecurityManager ejbSecMgr = null;
if(mgr == null) {
if (c != null) {
ejbSecMgr = (EJBSecurityManager) c.getSecurityManager();
}
if (ejbSecMgr == null) {
throw new SecurityException("SecurityManager not set");
}
} else {
ejbSecMgr = (EJBSecurityManager) mgr;
}
// Optimization. Skip doAsPrivileged call if this is a local
// invocation and the target ejb uses caller identity or the
// System Security Manager is disabled.
// Still need to execute it within the target bean's policy context.
// see CR 6331550
if((inv.isLocal && ejbSecMgr.getUsesCallerIdentity()) ||
System.getSecurityManager() == null) {
ret = ejbSecMgr.runMethod(meth, obj, objArr);
} else {
PrivilegedExceptionAction pea =
new PrivilegedExceptionAction(){
public java.lang.Object run() throws Exception {
return meth.invoke(obj, objArr);
}
};
try {
ret = ejbSecMgr.doAsPrivileged(pea);
} catch(PrivilegedActionException pae) {
Throwable cause = pae.getCause();
throw cause;
}
}
return ret;
}*/
/** This method obtains the policy configuration object
* corresponding to the name, and causes the corresponding policy
* statements to be put in service. This method also informs the
* policy module to refresh its in service policy contexts.
* Note that policy statements have already been
* added to the pc, this method works to put them in Service.
* @param String name - the module id which serves to identify
* the corresponding policy context. The name shall not be null.
* If the underlying PolicyModule is the RI PolicyModule,
* A SecurityRoleMapper must have been bound to the policy context
* before this method is called or the embedded call to pc.commit will
* throw an exception.
*/
public static void generatePolicyFile(String name) throws IASSecurityException {
assert name != null;
if (name == null) {
throw new IASSecurityException("Invalid Module Name");
}
try {
boolean inService =
PolicyConfigurationFactory.getPolicyConfigurationFactory().
inService(name);
if (!inService) {
// find the PolicyConfig using remove=false to ensure policy stmts
// are retained.
// Note that it is presumed that the pc exists, and that
// it is populated with the desired policy statements.
// If this is not true, the call to commit will not
// result in the correct policy statements being made
// available to the policy module.
PolicyConfigurationFactory pcf =
PolicyConfigurationFactory.getPolicyConfigurationFactory();
PolicyConfiguration pc =
pcf.getPolicyConfiguration(name, false);
pc.commit();
if (_logger.isLoggable(Level.FINE)){
_logger.fine("JACC: committed policy for context: "+name);
}
}
Policy.getPolicy().refresh();
} catch(java.lang.ClassNotFoundException cnfe){
//String msg = localStrings.getLocalString("enterprise.security.securityutil.classnotfound","Could not find PolicyConfigurationFactory class. Check javax.security.jacc.PolicyConfigurationFactory.provider property");
throw new IASSecurityException(cnfe);
} catch(javax.security.jacc.PolicyContextException pce){
throw new IASSecurityException(pce);
}
}
/**
* Inform the policy module to take the named policy context out of service.
* The policy context is transitioned to the deleted state. In our provider
* implementation, the corresponding policy file is deleted, as the presence
* of a policy file in the repository is how we persistently remember which
* policy contexts are in service.
* @param String name - the module id which serves to identify
* the corresponding policy context. The name shall not be null.
*/
public static void removePolicy(String name) throws IASSecurityException {
assert name != null;
if (name == null) {
throw new IASSecurityException("Invalid Module Name");
}
try {
boolean wasInService =
PolicyConfigurationFactory.getPolicyConfigurationFactory().
inService(name);
// find the PolicyConfig and delete it.
PolicyConfiguration pc =
PolicyConfigurationFactory.getPolicyConfigurationFactory().
getPolicyConfiguration(name, false);
pc.delete();
// Only do refresh policy if the deleted context was in service
if (wasInService) {
Policy.getPolicy().refresh();
}
} catch(java.lang.ClassNotFoundException cnfe){
String msg = localStrings.getLocalString("enterprise.security.securityutil.classnotfound","Could not find PolicyConfigurationFactory class. Check javax.security.jacc.PolicyConfigurationFactory.provider property");
throw new IASSecurityException(msg);
} catch(javax.security.jacc.PolicyContextException pce){
throw new IASSecurityException(pce.toString());
}
}
/** This method obtains the policy configuration object
* corresponding to the name, and links it, for roleMapping purposes
* to another. If the pc is already InService when this method is called,
* this method does nothing.
* @param String name - the module id which serves to identify
* the corresponding policy context. The name shall not be null.
* @param String linkName - the module id of the module being linked
* to this context. This value may be null, in which case, no link is done,
* but the inService state of the named PC is returned.
* @param boolean lastInService - the inService state returned by the previous
* call to this method. The value of this argument is only significant when linkName
* is not null.
* @return boolean if linkName is null, returns the inService state of the
* PC identified in the name argument. Otherwise returns the value
* passed to lastInService.
*/
public static boolean linkPolicyFile(String name, String linkName, boolean lastInService)
throws IASSecurityException {
boolean rvalue = lastInService;
assert name != null;
if (name == null) {
throw new IASSecurityException("Invalid Module Name");
}
try {
PolicyConfigurationFactory pcf = PolicyConfigurationFactory.getPolicyConfigurationFactory();
boolean inService = pcf.inService(name);
if (linkName == null) {
rvalue = inService;
} else if (inService == lastInService) {
// only do the link if the named PC is not inService.
if (!inService) {
// find the PolicyConfigs using remove=false to ensure policy stmts
// are retained.
PolicyConfiguration pc =
pcf.getPolicyConfiguration(name, false);
PolicyConfiguration linkPc =
pcf.getPolicyConfiguration(linkName, false);
pc.linkConfiguration(linkPc);
}
} else {
throw new IASSecurityException("Inconsistent Module State");
}
} catch(java.lang.ClassNotFoundException cnfe){
String msg = localStrings.getLocalString("enterprise.security.securityutil.classnotfound","Could not find PolicyConfigurationFactory class. Check javax.security.jacc.PolicyConfigurationFactory.provider property");
throw new IASSecurityException(msg);
} catch(javax.security.jacc.PolicyContextException pce){
throw new IASSecurityException(pce.toString());
}
return rvalue;
}
/**
* create pseudo module context id, and make sure it is unique, by
* chacking it against the names of all the other modules in the app.
* @param ejbDesc
* @return
*/
private static String createUniquePseudoModuleID(EjbBundleDescriptor ejbDesc) {
Application app = ejbDesc.getApplication();
Collection webModules = app.getBundleDescriptors(WebBundleDescriptor.class);
Collection ejbModules = app.getBundleDescriptors(EjbBundleDescriptor.class);
String moduleName = ejbDesc.getUniqueFriendlyId();
String pseudonym;
int uniquifier = 0;
boolean unique;
do {
unique = true;
pseudonym = moduleName +
(uniquifier == 0 ? "_internal" : "_internal_" + uniquifier);
if (webModules != null) {
for (WebBundleDescriptor w : webModules) {
if (pseudonym.equals(w.getUniqueFriendlyId())) {
unique = false;
break;
}
}
}
if (unique && ejbModules != null) {
for (EjbBundleDescriptor e : ejbModules) {
if (pseudonym.equals(e.getUniqueFriendlyId())) {
unique = false;
break;
}
}
}
uniquifier += 1;
} while (!unique);
return VersioningUtils.getRepositoryName(app.getRegistrationName()) + "/" + pseudonym;
}
public static String getContextID(EjbBundleDescriptor ejbBundleDesc) {
String cid = null;
if (ejbBundleDesc != null) {
/* detect special case of EJBs embedded in a war,
* and make sure psuedo policy context id is unique within app
*/
Object root = ejbBundleDesc.getModuleDescriptor().getDescriptor();
if( (root != ejbBundleDesc) && (root instanceof WebBundleDescriptor ) ) {
cid = createUniquePseudoModuleID(ejbBundleDesc);
} else {
cid = VersioningUtils.getRepositoryName(ejbBundleDesc.getApplication().getRegistrationName()) +
'/' + ejbBundleDesc.getUniqueFriendlyId();
}
}
return cid;
}
public static String getContextID(WebBundleDescriptor wbd) {
String cid = null;
if (wbd != null ) {
//String moduleId = wbd.getUniqueFriendlyId();
cid = VersioningUtils.getRepositoryName(wbd.getApplication().getRegistrationName()) +
'/' + wbd.getUniqueFriendlyId();
}
return cid;
}
public static void removeRoleMapper(DeploymentContext dc) {
OpsParams params = dc.getCommandParameters(OpsParams.class);
if (params.origin != OpsParams.Origin.undeploy) {
return;
}
String appName = params.name();
SecurityRoleMapperFactory factory = getRoleMapperFactory();
factory.removeRoleMapper(appName);
}
public static SecurityRoleMapperFactory getRoleMapperFactory() {
SecurityRoleMapperFactory factory = SecurityRoleMapperFactoryGen.getSecurityRoleMapperFactory();
if (factory == null) {
throw new IllegalArgumentException("This application has no role mapper factory defined");
}
return factory;
}
}