Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
org.apache.activemq.security.LDAPAuthorizationMap Maven / Gradle / Ivy
/**
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.activemq.security;
import java.text.MessageFormat;
import java.util.HashSet;
import java.util.Hashtable;
import java.util.Iterator;
import java.util.Map;
import java.util.Set;
import javax.naming.Context;
import javax.naming.NamingEnumeration;
import javax.naming.NamingException;
import javax.naming.directory.Attribute;
import javax.naming.directory.Attributes;
import javax.naming.directory.DirContext;
import javax.naming.directory.InitialDirContext;
import javax.naming.directory.SearchControls;
import javax.naming.directory.SearchResult;
import javax.naming.ldap.LdapName;
import javax.naming.ldap.Rdn;
import org.apache.activemq.advisory.AdvisorySupport;
import org.apache.activemq.command.ActiveMQDestination;
import org.apache.activemq.filter.DestinationMap;
import org.apache.activemq.jaas.GroupPrincipal;
import org.apache.activemq.jaas.LDAPLoginModule;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* An {@link AuthorizationMap} which uses LDAP
*
* @org.apache.xbean.XBean
* @author ngcutura
*/
public class LDAPAuthorizationMap implements AuthorizationMap {
public static final String INITIAL_CONTEXT_FACTORY = "initialContextFactory";
public static final String CONNECTION_URL = "connectionURL";
public static final String CONNECTION_USERNAME = "connectionUsername";
public static final String CONNECTION_PASSWORD = "connectionPassword";
public static final String CONNECTION_PROTOCOL = "connectionProtocol";
public static final String AUTHENTICATION = "authentication";
public static final String TOPIC_SEARCH_MATCHING = "topicSearchMatching";
public static final String TOPIC_SEARCH_SUBTREE = "topicSearchSubtree";
public static final String QUEUE_SEARCH_MATCHING = "queueSearchMatching";
public static final String QUEUE_SEARCH_SUBTREE = "queueSearchSubtree";
public static final String ADMIN_BASE = "adminBase";
public static final String ADMIN_ATTRIBUTE = "adminAttribute";
public static final String READ_BASE = "readBase";
public static final String READ_ATTRIBUTE = "readAttribute";
public static final String WRITE_BASE = "writeBAse";
public static final String WRITE_ATTRIBUTE = "writeAttribute";
private static final Logger LOG = LoggerFactory.getLogger(LDAPLoginModule.class);
private String initialContextFactory;
private String connectionURL;
private String connectionUsername;
private String connectionPassword;
private String connectionProtocol;
private String authentication;
private DirContext context;
private MessageFormat topicSearchMatchingFormat;
private MessageFormat queueSearchMatchingFormat;
private String advisorySearchBase = "uid=ActiveMQ.Advisory,ou=topics,ou=destinations,o=ActiveMQ,dc=example,dc=com";
private String tempSearchBase = "uid=ActiveMQ.Temp,ou=topics,ou=destinations,o=ActiveMQ,dc=example,dc=com";
private boolean topicSearchSubtreeBool = true;
private boolean queueSearchSubtreeBool = true;
private boolean useAdvisorySearchBase = true;
private String adminBase;
private String adminAttribute;
private String readBase;
private String readAttribute;
private String writeBase;
private String writeAttribute;
public LDAPAuthorizationMap() {
// lets setup some sensible defaults
initialContextFactory = "com.sun.jndi.ldap.LdapCtxFactory";
connectionURL = "ldap://localhost:10389";
connectionUsername = "uid=admin,ou=system";
connectionPassword = "secret";
connectionProtocol = "s";
authentication = "simple";
topicSearchMatchingFormat = new MessageFormat("uid={0},ou=topics,ou=destinations,o=ActiveMQ,dc=example,dc=com");
queueSearchMatchingFormat = new MessageFormat("uid={0},ou=queues,ou=destinations,o=ActiveMQ,dc=example,dc=com");
adminBase = "(cn=admin)";
adminAttribute = "uniqueMember";
readBase = "(cn=read)";
readAttribute = "uniqueMember";
writeBase = "(cn=write)";
writeAttribute = "uniqueMember";
}
public LDAPAuthorizationMap(Map options) {
initialContextFactory = options.get(INITIAL_CONTEXT_FACTORY);
connectionURL = options.get(CONNECTION_URL);
connectionUsername = options.get(CONNECTION_USERNAME);
connectionPassword = options.get(CONNECTION_PASSWORD);
connectionProtocol = options.get(CONNECTION_PROTOCOL);
authentication = options.get(AUTHENTICATION);
adminBase = options.get(ADMIN_BASE);
adminAttribute = options.get(ADMIN_ATTRIBUTE);
readBase = options.get(READ_BASE);
readAttribute = options.get(READ_ATTRIBUTE);
writeBase = options.get(WRITE_BASE);
writeAttribute = options.get(WRITE_ATTRIBUTE);
String topicSearchMatching = options.get(TOPIC_SEARCH_MATCHING);
String topicSearchSubtree = options.get(TOPIC_SEARCH_SUBTREE);
String queueSearchMatching = options.get(QUEUE_SEARCH_MATCHING);
String queueSearchSubtree = options.get(QUEUE_SEARCH_SUBTREE);
topicSearchMatchingFormat = new MessageFormat(topicSearchMatching);
queueSearchMatchingFormat = new MessageFormat(queueSearchMatching);
topicSearchSubtreeBool = Boolean.valueOf(topicSearchSubtree).booleanValue();
queueSearchSubtreeBool = Boolean.valueOf(queueSearchSubtree).booleanValue();
}
public Set getTempDestinationAdminACLs() {
try {
context = open();
} catch (NamingException e) {
LOG.error(e.toString());
return new HashSet();
}
SearchControls constraints = new SearchControls();
constraints.setReturningAttributes(new String[] {adminAttribute});
return getACLs(tempSearchBase, constraints, adminBase, adminAttribute);
}
public Set getTempDestinationReadACLs() {
try {
context = open();
} catch (NamingException e) {
LOG.error(e.toString());
return new HashSet();
}
SearchControls constraints = new SearchControls();
constraints.setReturningAttributes(new String[] {readAttribute});
return getACLs(tempSearchBase, constraints, readBase, readAttribute);
}
public Set getTempDestinationWriteACLs() {
try {
context = open();
} catch (NamingException e) {
LOG.error(e.toString());
return new HashSet();
}
SearchControls constraints = new SearchControls();
constraints.setReturningAttributes(new String[] {writeAttribute});
return getACLs(tempSearchBase, constraints, writeBase, writeAttribute);
}
public Set getAdminACLs(ActiveMQDestination destination) {
if (destination.isComposite()) {
return getCompositeACLs(destination, adminBase, adminAttribute);
}
return getACLs(destination, adminBase, adminAttribute);
}
public Set getReadACLs(ActiveMQDestination destination) {
if (destination.isComposite()) {
return getCompositeACLs(destination, readBase, readAttribute);
}
return getACLs(destination, readBase, readAttribute);
}
public Set getWriteACLs(ActiveMQDestination destination) {
if (destination.isComposite()) {
return getCompositeACLs(destination, writeBase, writeAttribute);
}
return getACLs(destination, writeBase, writeAttribute);
}
// Properties
// -------------------------------------------------------------------------
public String getAdminAttribute() {
return adminAttribute;
}
public void setAdminAttribute(String adminAttribute) {
this.adminAttribute = adminAttribute;
}
public String getAdminBase() {
return adminBase;
}
public void setAdminBase(String adminBase) {
this.adminBase = adminBase;
}
public String getAuthentication() {
return authentication;
}
public void setAuthentication(String authentication) {
this.authentication = authentication;
}
public String getConnectionPassword() {
return connectionPassword;
}
public void setConnectionPassword(String connectionPassword) {
this.connectionPassword = connectionPassword;
}
public String getConnectionProtocol() {
return connectionProtocol;
}
public void setConnectionProtocol(String connectionProtocol) {
this.connectionProtocol = connectionProtocol;
}
public String getConnectionURL() {
return connectionURL;
}
public void setConnectionURL(String connectionURL) {
this.connectionURL = connectionURL;
}
public String getConnectionUsername() {
return connectionUsername;
}
public void setConnectionUsername(String connectionUsername) {
this.connectionUsername = connectionUsername;
}
public DirContext getContext() {
return context;
}
public void setContext(DirContext context) {
this.context = context;
}
public String getInitialContextFactory() {
return initialContextFactory;
}
public void setInitialContextFactory(String initialContextFactory) {
this.initialContextFactory = initialContextFactory;
}
public MessageFormat getQueueSearchMatchingFormat() {
return queueSearchMatchingFormat;
}
public void setQueueSearchMatchingFormat(MessageFormat queueSearchMatchingFormat) {
this.queueSearchMatchingFormat = queueSearchMatchingFormat;
}
public boolean isQueueSearchSubtreeBool() {
return queueSearchSubtreeBool;
}
public void setQueueSearchSubtreeBool(boolean queueSearchSubtreeBool) {
this.queueSearchSubtreeBool = queueSearchSubtreeBool;
}
public String getReadAttribute() {
return readAttribute;
}
public void setReadAttribute(String readAttribute) {
this.readAttribute = readAttribute;
}
public String getReadBase() {
return readBase;
}
public void setReadBase(String readBase) {
this.readBase = readBase;
}
public MessageFormat getTopicSearchMatchingFormat() {
return topicSearchMatchingFormat;
}
public void setTopicSearchMatchingFormat(MessageFormat topicSearchMatchingFormat) {
this.topicSearchMatchingFormat = topicSearchMatchingFormat;
}
public boolean isTopicSearchSubtreeBool() {
return topicSearchSubtreeBool;
}
public void setTopicSearchSubtreeBool(boolean topicSearchSubtreeBool) {
this.topicSearchSubtreeBool = topicSearchSubtreeBool;
}
public String getWriteAttribute() {
return writeAttribute;
}
public void setWriteAttribute(String writeAttribute) {
this.writeAttribute = writeAttribute;
}
public String getWriteBase() {
return writeBase;
}
public void setWriteBase(String writeBase) {
this.writeBase = writeBase;
}
public boolean isUseAdvisorySearchBase() {
return useAdvisorySearchBase;
}
public void setUseAdvisorySearchBase(boolean useAdvisorySearchBase) {
this.useAdvisorySearchBase = useAdvisorySearchBase;
}
public String getAdvisorySearchBase() {
return advisorySearchBase;
}
public void setAdvisorySearchBase(String advisorySearchBase) {
this.advisorySearchBase = advisorySearchBase;
}
public String getTempSearchBase() {
return tempSearchBase;
}
public void setTempSearchBase(String tempSearchBase) {
this.tempSearchBase = tempSearchBase;
}
protected Set getCompositeACLs(ActiveMQDestination destination, String roleBase, String roleAttribute) {
ActiveMQDestination[] dests = destination.getCompositeDestinations();
Set acls = null;
for (ActiveMQDestination dest : dests) {
acls = DestinationMap.union(acls, getACLs(dest, roleBase, roleAttribute));
if (acls == null || acls.isEmpty()) {
break;
}
}
return acls;
}
// Implementation methods
// -------------------------------------------------------------------------
protected Set getACLs(ActiveMQDestination destination, String roleBase, String roleAttribute) {
try {
context = open();
} catch (NamingException e) {
LOG.error(e.toString());
return new HashSet();
}
String destinationBase = "";
SearchControls constraints = new SearchControls();
if (AdvisorySupport.isAdvisoryTopic(destination) && useAdvisorySearchBase) {
destinationBase = advisorySearchBase;
} else {
if ((destination.getDestinationType() & ActiveMQDestination.QUEUE_TYPE) == ActiveMQDestination.QUEUE_TYPE) {
destinationBase = queueSearchMatchingFormat.format(new String[]{destination.getPhysicalName()});
if (queueSearchSubtreeBool) {
constraints.setSearchScope(SearchControls.SUBTREE_SCOPE);
} else {
constraints.setSearchScope(SearchControls.ONELEVEL_SCOPE);
}
}
if ((destination.getDestinationType() & ActiveMQDestination.TOPIC_TYPE) == ActiveMQDestination.TOPIC_TYPE) {
destinationBase = topicSearchMatchingFormat.format(new String[]{destination.getPhysicalName()});
if (topicSearchSubtreeBool) {
constraints.setSearchScope(SearchControls.SUBTREE_SCOPE);
} else {
constraints.setSearchScope(SearchControls.ONELEVEL_SCOPE);
}
}
}
constraints.setReturningAttributes(new String[] {roleAttribute});
return getACLs(destinationBase, constraints, roleBase, roleAttribute);
}
protected Set getACLs(String destinationBase, SearchControls constraints, String roleBase, String roleAttribute) {
try {
Set roles = new HashSet();
Set acls = new HashSet();
NamingEnumeration> results = context.search(destinationBase, roleBase, constraints);
while (results.hasMore()) {
SearchResult result = (SearchResult)results.next();
Attributes attrs = result.getAttributes();
if (attrs == null) {
continue;
}
acls = addAttributeValues(roleAttribute, attrs, acls);
}
for (Iterator iter = acls.iterator(); iter.hasNext();) {
String roleName = iter.next();
LdapName ldapname = new LdapName(roleName);
Rdn rdn = ldapname.getRdn(ldapname.size() - 1);
LOG.debug("Found role: [" + rdn.getValue().toString() + "]");
roles.add(new GroupPrincipal(rdn.getValue().toString()));
}
return roles;
} catch (NamingException e) {
LOG.error(e.toString());
return new HashSet();
}
}
protected Set addAttributeValues(String attrId, Attributes attrs, Set values) throws NamingException {
if (attrId == null || attrs == null) {
return values;
}
if (values == null) {
values = new HashSet();
}
Attribute attr = attrs.get(attrId);
if (attr == null) {
return values;
}
NamingEnumeration> e = attr.getAll();
while (e.hasMore()) {
String value = (String)e.next();
values.add(value);
}
return values;
}
protected DirContext open() throws NamingException {
if (context != null) {
return context;
}
try {
Hashtable env = new Hashtable();
env.put(Context.INITIAL_CONTEXT_FACTORY, initialContextFactory);
if (connectionUsername != null && !"".equals(connectionUsername)) {
env.put(Context.SECURITY_PRINCIPAL, connectionUsername);
} else {
throw new NamingException("Empty username is not allowed");
}
if (connectionPassword != null && !"".equals(connectionPassword)) {
env.put(Context.SECURITY_CREDENTIALS, connectionPassword);
} else {
throw new NamingException("Empty password is not allowed");
}
env.put(Context.SECURITY_PROTOCOL, connectionProtocol);
env.put(Context.PROVIDER_URL, connectionURL);
env.put(Context.SECURITY_AUTHENTICATION, authentication);
context = new InitialDirContext(env);
} catch (NamingException e) {
LOG.error(e.toString());
throw e;
}
return context;
}
}