All Downloads are FREE. Search and download functionalities are using the official Maven repository.

fish.payara.security.realm.cdi.RealmExtension Maven / Gradle / Ivy

The newest version!
/*
 *  DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 * 
 *  Copyright (c) [2019-2021] Payara Foundation and/or its affiliates. All rights reserved.
 * 
 *  The contents of this file are subject to the terms of either the GNU
 *  General Public License Version 2 only ("GPL") or the Common Development
 *  and Distribution License("CDDL") (collectively, the "License").  You
 *  may not use this file except in compliance with the License.  You can
 *  obtain a copy of the License at
 *  https://github.com/payara/Payara/blob/main/LICENSE.txt
 *  See the License for the specific
 *  language governing permissions and limitations under the License.
 * 
 *  When distributing the software, include this License Header Notice in each
 *  file and include the License file at glassfish/legal/LICENSE.txt.
 * 
 *  GPL Classpath Exception:
 *  The Payara Foundation designates this particular file as subject to the "Classpath"
 *  exception as provided by the Payara Foundation in the GPL Version 2 section of the License
 *  file that accompanied this code.
 * 
 *  Modifications:
 *  If applicable, add the following below the License Header, with the fields
 *  enclosed by brackets [] replaced by your own identifying information:
 *  "Portions Copyright [year] [name of copyright owner]"
 * 
 *  Contributor(s):
 *  If you wish your version of this file to be governed by only the CDDL or
 *  only the GPL Version 2, indicate your decision by adding "[Contributor]
 *  elects to include this software in this distribution under the [CDDL or GPL
 *  Version 2] license."  If you don't indicate a single choice of license, a
 *  recipient has the option to distribute your version of this file under
 *  either the CDDL, the GPL Version 2 or to extend the choice of license to
 *  its licensees as provided above.  However, if you add GPL Version 2 code
 *  and therefore, elected the GPL Version 2 license, then the option applies
 *  only if the new code is made subject to such option by the copyright
 *  holder.
 */
package fish.payara.security.realm.cdi;

import com.sun.enterprise.config.serverbeans.AuthRealm;
import com.sun.enterprise.config.serverbeans.SecurityService;
import com.sun.enterprise.security.auth.realm.NoSuchRealmException;
import com.sun.enterprise.security.auth.realm.Realm;
import com.sun.enterprise.util.StringUtils;
import fish.payara.security.annotations.CertificateAuthenticationMechanismDefinition;
import fish.payara.security.annotations.CertificateIdentityStoreDefinition;
import fish.payara.security.annotations.FileIdentityStoreDefinition;
import fish.payara.security.annotations.PamIdentityStoreDefinition;
import fish.payara.security.annotations.RealmIdentityStoreDefinition;
import fish.payara.security.annotations.RealmIdentityStoreDefinitions;
import fish.payara.security.annotations.SolarisIdentityStoreDefinition;
import fish.payara.security.realm.config.FileRealmIdentityStoreConfiguration;
import fish.payara.security.realm.config.PamRealmIdentityStoreConfiguration;
import fish.payara.security.realm.RealmUtil;
import static fish.payara.security.realm.RealmUtil.ASSIGN_GROUPS;
import static fish.payara.security.realm.RealmUtil.JAAS_CONTEXT;
import fish.payara.security.realm.config.CertificateRealmIdentityStoreConfiguration;
import fish.payara.security.realm.config.RealmConfiguration;
import fish.payara.security.realm.config.SolarisRealmIdentityStoreConfiguration;
import fish.payara.security.realm.identitystores.CertificateRealmIdentityStore;
import fish.payara.security.realm.identitystores.FileRealmIdentityStore;
import fish.payara.security.realm.identitystores.PamRealmIdentityStore;
import fish.payara.security.realm.identitystores.RealmIdentityStore;
import fish.payara.security.realm.identitystores.SolarisRealmIdentityStore;
import fish.payara.security.realm.mechanisms.CertificateAuthenticationMechanism;
import java.util.ArrayList;
import java.util.HashSet;
import java.util.List;
import java.util.Optional;
import java.util.Properties;
import java.util.Set;
import static java.util.logging.Level.INFO;
import java.util.logging.Logger;
import java.util.regex.Pattern;
import jakarta.enterprise.context.ApplicationScoped;
import jakarta.enterprise.event.Observes;
import jakarta.enterprise.inject.spi.AfterBeanDiscovery;
import jakarta.enterprise.inject.spi.Bean;
import jakarta.enterprise.inject.spi.BeanManager;
import jakarta.enterprise.inject.spi.BeforeBeanDiscovery;
import jakarta.enterprise.inject.spi.CDI;
import jakarta.enterprise.inject.spi.Extension;
import jakarta.enterprise.inject.spi.ProcessBean;
import jakarta.security.enterprise.authentication.mechanism.http.HttpAuthenticationMechanism;
import jakarta.security.enterprise.identitystore.IdentityStore;
import org.glassfish.common.util.PayaraCdiProducer;
import org.glassfish.hk2.api.ServiceLocator;
import org.glassfish.internal.api.Globals;
import static org.glassfish.soteria.cdi.CdiUtils.getAnnotation;

/**
 * Activate Realm identity stores and authentication mechanism.
 *
 * @author Gaurav Gupta
 */
public class RealmExtension implements Extension {

    private Bean authenticationMechanismBean;

    private final Set realms = new HashSet<>();

    private final List> identityStoreBeans = new ArrayList<>();

    private SecurityService securityService;

    private static final Logger LOGGER = Logger.getLogger(RealmExtension.class.getName());

    protected void beforeBeanDiscovery(@Observes BeforeBeanDiscovery beforeBeanDiscovery, BeanManager manager) {
        addAnnotatedType(RealmIdentityStore.class, manager, beforeBeanDiscovery);
        addAnnotatedType(FileRealmIdentityStore.class, manager, beforeBeanDiscovery);
        addAnnotatedType(CertificateRealmIdentityStore.class, manager, beforeBeanDiscovery);
        addAnnotatedType(CertificateAuthenticationMechanism.class, manager, beforeBeanDiscovery);
        addAnnotatedType(PamRealmIdentityStore.class, manager, beforeBeanDiscovery);
        addAnnotatedType(SolarisRealmIdentityStore.class, manager, beforeBeanDiscovery);
    }

    protected  void addAnnotatedType(Class type, BeanManager manager, BeforeBeanDiscovery beforeBeanDiscovery) {
        beforeBeanDiscovery.addAnnotatedType(manager.createAnnotatedType(type), type.getName());
    }

    /**
     * Find the Realm annotations.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    protected  void findRealmDefinitionAnnotation(@Observes ProcessBean eventIn, BeanManager beanManager) {

        ProcessBean event = eventIn;

        //create the bean being proccessed.
        Class beanClass = event.getBean().getBeanClass();
        findRealmIdentityStoreDefinitions(beanManager, event, beanClass);
        findFileIdentityStoreDefinitions(beanManager, event, beanClass);
        findCertificateIdentityStoreDefinitions(beanManager, event, beanClass);
        findCertificateAuthenticationMechanismDefinition(beanManager, event, beanClass);
        findPamIdentityStoreDefinitions(beanManager, event, beanClass);
        findSolarisIdentityStoreDefinitions(beanManager, event, beanClass);
    }

    /**
     * Find the
     * {@link RealmIdentityStoreDefinition} & {@link RealmIdentityStoreDefinitions}
     * annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findRealmIdentityStoreDefinitions(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the identity store from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), RealmIdentityStoreDefinition.class);

        optionalStore.ifPresent(definition -> {
            validateDefinition(definition);
            logActivatedIdentityStore(RealmIdentityStore.class, beanClass);

            identityStoreBeans.add(new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(IdentityStore.class)
                    .types(Object.class, IdentityStore.class)
                    .addToId(RealmIdentityStore.class + "-" + definition.value())
                    .create(e -> {
                        RealmIdentityStore mechanism = CDI.current().select(RealmIdentityStore.class).get();
                        mechanism.setConfiguration(definition);
                        return mechanism;
                    })
            );
        });

        //get the identity store from the annotation (if it exists)
        Optional optionalStores
                = getAnnotation(beanManager, event.getAnnotated(), RealmIdentityStoreDefinitions.class);

        optionalStores.ifPresent(definitions -> {
            for (RealmIdentityStoreDefinition definition : definitions.value()) {
                validateDefinition(definition);
                logActivatedIdentityStore(RealmIdentityStore.class, beanClass);

                identityStoreBeans.add(new PayaraCdiProducer()
                        .scope(ApplicationScoped.class)
                        .beanClass(IdentityStore.class)
                        .types(Object.class, IdentityStore.class)
                        .addToId(RealmIdentityStore.class + "-" + definition.value())
                        .create(e -> {
                            RealmIdentityStore mechanism = CDI.current().select(RealmIdentityStore.class).get();
                            mechanism.setConfiguration(definition);
                            return mechanism;
                        })
                );
            }

        });
    }

    /**
     * Find the
     * {@link FileIdentityStoreDefinition} & {@link FileIdentityStoreDefinitions}
     * annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findFileIdentityStoreDefinitions(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the identity store from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), FileIdentityStoreDefinition.class);

        optionalStore.ifPresent(definition -> {
            validateDefinition(
                    definition.value(),
                    FileRealmIdentityStore.REALM_CLASS,
                    definition.jaasContext()
            );
            logActivatedIdentityStore(FileRealmIdentityStore.class, beanClass);

            FileRealmIdentityStoreConfiguration configuration = FileRealmIdentityStoreConfiguration.from(definition);
            Properties props = new Properties();
            props.put("file", configuration.getFile());
            props.put(JAAS_CONTEXT, configuration.getJaasContext());
            createRealm(
                    configuration,
                    FileRealmIdentityStore.REALM_CLASS,
                    FileRealmIdentityStore.REALM_LOGIN_MODULE_CLASS,
                    props
            );

            identityStoreBeans.add(new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(IdentityStore.class)
                    .types(Object.class, IdentityStore.class)
                    .addToId(FileRealmIdentityStore.class)
                    .create(e -> {
                        FileRealmIdentityStore mechanism = CDI.current().select(FileRealmIdentityStore.class).get();
                        mechanism.init(configuration);
                        return mechanism;
                    })
            );
        });

    }

    /**
     * Find the
     * {@link CertificateIdentityStoreDefinition} & {@link CertificateIdentityStoreDefinitions}
     * annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findCertificateIdentityStoreDefinitions(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the identity store from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), CertificateIdentityStoreDefinition.class);

        optionalStore.ifPresent(definition -> {
            validateDefinition(
                    definition.value(),
                    CertificateRealmIdentityStore.REALM_CLASS,
                    null
            );
            logActivatedIdentityStore(CertificateRealmIdentityStore.class, beanClass);

            CertificateRealmIdentityStoreConfiguration configuration = CertificateRealmIdentityStoreConfiguration.from(definition);
            createRealm(
                    configuration,
                    CertificateRealmIdentityStore.REALM_CLASS,
                    CertificateRealmIdentityStore.REALM_LOGIN_MODULE_CLASS,
                    new Properties()
            );

            identityStoreBeans.add(new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(IdentityStore.class)
                    .types(Object.class, IdentityStore.class)
                    .addToId(CertificateRealmIdentityStore.class)
                    .create(e -> {
                        CertificateRealmIdentityStore mechanism = CDI.current().select(CertificateRealmIdentityStore.class).get();
                        mechanism.init(configuration);
                        return mechanism;
                    })
            );
        });

    }

    /**
     * Find the {@link CertificateAuthenticationMechanismDefinition} annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findCertificateAuthenticationMechanismDefinition(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the authentication mechanism from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), CertificateAuthenticationMechanismDefinition.class);

        optionalStore.ifPresent(definition -> {
            logActivatedAuthenticationMechanism(CertificateAuthenticationMechanism.class, beanClass);
            authenticationMechanismBean = new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(HttpAuthenticationMechanism.class)
                    .types(Object.class, HttpAuthenticationMechanism.class)
                    .addToId(CertificateAuthenticationMechanism.class)
                    .create(e -> CDI.current().select(CertificateAuthenticationMechanism.class).get());
        });
    }

    /**
     * Find the
     * {@link PamIdentityStoreDefinition} & {@link PamIdentityStoreDefinitions}
     * annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findPamIdentityStoreDefinitions(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the identity store from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), PamIdentityStoreDefinition.class);

        optionalStore.ifPresent(definition -> {
            validateDefinition(
                    definition.value(),
                    PamRealmIdentityStore.REALM_CLASS,
                    definition.jaasContext()
            );
            logActivatedIdentityStore(PamRealmIdentityStore.class, beanClass);

            PamRealmIdentityStoreConfiguration configuration = PamRealmIdentityStoreConfiguration.from(definition);
            Properties props = new Properties();
            props.put(JAAS_CONTEXT, configuration.getJaasContext());
            createRealm(
                    configuration,
                    PamRealmIdentityStore.REALM_CLASS,
                    PamRealmIdentityStore.REALM_LOGIN_MODULE_CLASS,
                    props
            );

            identityStoreBeans.add(new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(IdentityStore.class)
                    .types(Object.class, IdentityStore.class)
                    .addToId(PamRealmIdentityStore.class)
                    .create(e -> {
                        PamRealmIdentityStore mechanism = CDI.current().select(PamRealmIdentityStore.class).get();
                        mechanism.init(configuration);
                        return mechanism;
                    })
            );
        });

    }

    /**
     * Find the
     * {@link SolarisIdentityStoreDefinition} & {@link SolarisIdentityStoreDefinitions}
     * annotation.
     *
     * @param 
     * @param eventIn
     * @param beanManager
     */
    private  void findSolarisIdentityStoreDefinitions(BeanManager beanManager, ProcessBean event, Class beanClass) {

        //get the identity store from the annotation (if it exists)
        Optional optionalStore
                = getAnnotation(beanManager, event.getAnnotated(), SolarisIdentityStoreDefinition.class);

        optionalStore.ifPresent(definition -> {
            validateDefinition(
                    definition.value(),
                    SolarisRealmIdentityStore.REALM_CLASS,
                    definition.jaasContext()
            );
            logActivatedIdentityStore(SolarisRealmIdentityStore.class, beanClass);

            SolarisRealmIdentityStoreConfiguration configuration = SolarisRealmIdentityStoreConfiguration.from(definition);
            Properties props = new Properties();
            props.put(JAAS_CONTEXT, configuration.getJaasContext());
            createRealm(
                    configuration,
                    SolarisRealmIdentityStore.REALM_CLASS,
                    SolarisRealmIdentityStore.REALM_LOGIN_MODULE_CLASS,
                    props
            );

            identityStoreBeans.add(new PayaraCdiProducer()
                    .scope(ApplicationScoped.class)
                    .beanClass(IdentityStore.class)
                    .types(Object.class, IdentityStore.class)
                    .addToId(SolarisRealmIdentityStore.class)
                    .create(e -> {
                        SolarisRealmIdentityStore mechanism = CDI.current().select(SolarisRealmIdentityStore.class).get();
                        mechanism.init(configuration);
                        return mechanism;
                    })
            );
        });

    }

    private  T createRealm(
            RealmConfiguration configuration,
            Class realmClass,
            Class loginModuleClass,
            Properties props) {

        try {
            if (!Realm.isValidRealm(configuration.getName())) {
                if (!configuration.getAssignGroups().isEmpty()) {
                    props.put(ASSIGN_GROUPS, String.join(",", configuration.getAssignGroups()));
                }
                RealmUtil.createAuthRealm(
                        configuration.getName(),
                        realmClass.getName(),
                        loginModuleClass.getName(),
                        props
                );
            }

            return realmClass.cast(Realm.getInstance(configuration.getName()));
        } catch (NoSuchRealmException ex) {
            throw new IllegalStateException(configuration.getName(), ex);
        }
    }

    private void validateDefinition(RealmIdentityStoreDefinition definition) {
        String realmName = definition.value();
        if(realmName.isEmpty()) {
            realmName = getSecurityService().getDefaultRealm();
        }
        boolean authRealmFound = getSecurityService().getAuthRealm().stream()
                .map(authRealm -> authRealm.getName())
                .anyMatch(realmName::equals);
        if (!authRealmFound) {
            throw new IllegalStateException(String.format(
                    "[%s] No such realm found.",
                    realmName
            ));
        }
        if (!realms.add(realmName)) {
            throw new IllegalStateException(String.format(
                    "Duplicate realm name [%s] defined in RealmIdentityStoreDefinition.",
                    definition.value()
            ));
        }
    }

    private static final Pattern SIMPLE_TEXT_PATTERN = Pattern.compile("[^a-z0-9 ]", Pattern.CASE_INSENSITIVE);

    private void validateDefinition(String realmName, Class realmClass, String jaasContext) {
        for (AuthRealm authRealm : getSecurityService().getAuthRealm()) {
            if (authRealm.getName().equals(realmName)
                    && !authRealm.getClassname().equals(realmClass.getName())) {
                throw new IllegalStateException(String.format(
                        "%s realm can't be created for realm class %s, as already registed with realm class %s.",
                        realmName,
                        realmClass.getName(),
                        authRealm.getClassname()
                ));
            }
        }
        if (jaasContext != null && SIMPLE_TEXT_PATTERN.matcher(jaasContext).find()) {
            throw new IllegalStateException(String.format(
                    "Special character not allowed in jaasContext %s.",
                    jaasContext
            ));
        }
    }

    private SecurityService getSecurityService() {
        if (securityService == null) {
            ServiceLocator serviceLocator = Globals.getDefaultHabitat();
            this.securityService = serviceLocator.getService(SecurityService.class);
        }
        return securityService;
    }

    protected void afterBeanDiscovery(@Observes AfterBeanDiscovery afterBeanDiscovery, BeanManager beanManager) {
        if (!identityStoreBeans.isEmpty()) {
            identityStoreBeans.forEach(afterBeanDiscovery::addBean);
        }
        if (authenticationMechanismBean != null) {
            afterBeanDiscovery.addBean(authenticationMechanismBean);
        }
    }

    private void logActivatedIdentityStore(Class identityStoreClass, Class beanClass) {
        LOGGER.log(INFO, "Activating {0} identity store from {1} class", new Object[]{identityStoreClass.getName(), beanClass.getName()});
    }

    private void logActivatedAuthenticationMechanism(Class authenticationMechanismClass, Class beanClass) {
        LOGGER.log(INFO, "Activating {0} authentication mechanism from {1} class", new Object[]{authenticationMechanismClass.getName(), beanClass.getName()});
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy