All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.wss4j.stax.setup.InboundWSSec Maven / Gradle / Ivy

The newest version!
/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements. See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership. The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */
package org.apache.wss4j.stax.setup;

import java.nio.charset.StandardCharsets;
import java.util.Collections;
import java.util.Iterator;
import java.util.List;

import javax.xml.parsers.ParserConfigurationException;
import javax.xml.stream.XMLInputFactory;
import javax.xml.stream.XMLStreamException;
import javax.xml.stream.XMLStreamReader;

import org.apache.wss4j.common.ext.WSSecurityException;
import org.apache.wss4j.stax.ext.DocumentCreatorImpl;
import org.apache.wss4j.stax.ext.WSSConstants;
import org.apache.wss4j.stax.ext.WSSSecurityProperties;
import org.apache.wss4j.stax.impl.InboundWSSecurityContextImpl;
import org.apache.wss4j.stax.impl.WSSecurityStreamReader;
import org.apache.wss4j.stax.impl.processor.input.OperationInputProcessor;
import org.apache.wss4j.stax.impl.processor.input.SecurityHeaderInputProcessor;
import org.apache.wss4j.stax.impl.processor.input.SignatureConfirmationInputProcessor;
import org.apache.wss4j.stax.securityEvent.WSSecurityEventConstants;
import org.apache.xml.security.exceptions.XMLSecurityException;
import org.apache.xml.security.stax.ext.InputProcessor;
import org.apache.xml.security.stax.impl.DocumentContextImpl;
import org.apache.xml.security.stax.impl.InputProcessorChainImpl;
import org.apache.xml.security.stax.impl.processor.input.LogInputProcessor;
import org.apache.xml.security.stax.impl.processor.input.XMLEventReaderInputProcessor;
import org.apache.xml.security.stax.impl.util.IDGenerator;
import org.apache.xml.security.stax.securityEvent.SecurityEvent;
import org.apache.xml.security.stax.securityEvent.SecurityEventListener;
import org.apache.xml.security.stax.securityEvent.TokenSecurityEvent;
import org.apache.xml.security.stax.securityToken.InboundSecurityToken;
import org.apache.xml.security.stax.securityToken.SecurityTokenProvider;

/**
 * Inbound Streaming-WebService-Security
 * An instance of this class can be retrieved over the WSSec class
 */
public class InboundWSSec {

    protected static final transient org.slf4j.Logger LOG =
        org.slf4j.LoggerFactory.getLogger(InboundWSSec.class);

    private static final XMLInputFactory XML_INPUT_FACTORY = XMLInputFactory.newInstance();

    static {
        XML_INPUT_FACTORY.setProperty(XMLInputFactory.SUPPORT_DTD, false);
        XML_INPUT_FACTORY.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false);
        try {
            XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.internNames", true);
            XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.internNsUris", true);
            XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.preserveLocation", false);
        } catch (IllegalArgumentException e) {
            LOG.debug(e.getMessage(), e);
            //ignore
        }
    }

    private final WSSSecurityProperties securityProperties;
    private final boolean initiator;
    private final boolean returnSecurityError;

    public InboundWSSec(WSSSecurityProperties securityProperties) {
        this(securityProperties, false, false);
    }

    public InboundWSSec(WSSSecurityProperties securityProperties, boolean initiator,
                        boolean returnSecurityError) {
        this.securityProperties = securityProperties;
        this.initiator = initiator;
        this.returnSecurityError = returnSecurityError;
    }

    /**
     * Warning:
     * configure your xmlStreamReader correctly. Otherwise you can create a security hole.
     * At minimum configure the following properties:
     * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false);
     * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false);
     * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false);
     * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192));
     * 

* This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws WSSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, null, (SecurityEventListener)null); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); *

* This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws WSSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List requestSecurityEvents ) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, requestSecurityEvents, (SecurityEventListener)null); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); *

* This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @param securityEventListener A SecurityEventListener to receive security-relevant events. * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws WSSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List requestSecurityEvents, SecurityEventListener securityEventListener) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, requestSecurityEvents, Collections.singletonList(securityEventListener)); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); *

* This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @param securityEventListeners A list of SecurityEventListeners to receive security-relevant events. * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws WSSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List requestSecurityEvents, List securityEventListeners) throws XMLStreamException, WSSecurityException { if (requestSecurityEvents == null) { requestSecurityEvents = Collections.emptyList(); } final InboundWSSecurityContextImpl securityContextImpl = new InboundWSSecurityContextImpl(); securityContextImpl.putList(SecurityEvent.class, requestSecurityEvents); if (securityEventListeners != null) { for (SecurityEventListener securityEventListener : securityEventListeners) { securityContextImpl.addSecurityEventListener(securityEventListener); } } securityContextImpl.ignoredBSPRules(this.securityProperties.getIgnoredBSPRules()); securityContextImpl.setDisableBSPEnforcement(this.securityProperties.isDisableBSPEnforcement()); securityContextImpl.setAllowRSA15KeyTransportAlgorithm(this.securityProperties.isAllowRSA15KeyTransportAlgorithm()); securityContextImpl.setSoap12(this.securityProperties.isSoap12()); if (securityProperties.getDocumentCreator() == null) { try { securityProperties.setDocumentCreator(new DocumentCreatorImpl()); } catch (ParserConfigurationException e) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILED_CHECK, e); } } if (!requestSecurityEvents.isEmpty()) { try { Iterator securityEventIterator = requestSecurityEvents.iterator(); while (securityEventIterator.hasNext()) { SecurityEvent securityEvent = securityEventIterator.next(); if (securityEvent instanceof TokenSecurityEvent) { @SuppressWarnings("unchecked") final TokenSecurityEvent tokenSecurityEvent = (TokenSecurityEvent)securityEvent; if (WSSecurityEventConstants.HTTPS_TOKEN.equals(securityEvent.getSecurityEventType())) { securityContextImpl.registerSecurityEvent(securityEvent); securityContextImpl.put(WSSConstants.TRANSPORT_SECURITY_ACTIVE, Boolean.TRUE); } SecurityTokenProvider securityTokenProvider = new SecurityTokenProvider() { private String id; @Override public InboundSecurityToken getSecurityToken() throws XMLSecurityException { return tokenSecurityEvent.getSecurityToken(); } @Override public String getId() { if (this.id == null) { this.id = tokenSecurityEvent.getSecurityToken().getId(); if (this.id == null) { this.id = IDGenerator.generateID(null); } } return this.id; } }; securityContextImpl.registerSecurityTokenProvider(securityTokenProvider.getId(), securityTokenProvider); } } } catch (XMLSecurityException e) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILED_CHECK, e); } } securityContextImpl.put(WSSConstants.XMLINPUTFACTORY, XML_INPUT_FACTORY); DocumentContextImpl documentContext = new DocumentContextImpl(); documentContext.setEncoding(xmlStreamReader.getEncoding() != null ? xmlStreamReader.getEncoding() : StandardCharsets.UTF_8.name()); InputProcessorChainImpl inputProcessorChain = new InputProcessorChainImpl(securityContextImpl, documentContext); inputProcessorChain.addProcessor(new XMLEventReaderInputProcessor(securityProperties, xmlStreamReader)); inputProcessorChain.addProcessor(new SecurityHeaderInputProcessor(securityProperties)); inputProcessorChain.addProcessor(new OperationInputProcessor(securityProperties)); if (securityProperties.isEnableSignatureConfirmationVerification()) { inputProcessorChain.addProcessor(new SignatureConfirmationInputProcessor(securityProperties)); } if (LOG.isTraceEnabled()) { LogInputProcessor logInputProcessor = new LogInputProcessor(securityProperties); logInputProcessor.addAfterProcessor(SecurityHeaderInputProcessor.class.getName()); inputProcessorChain.addProcessor(logInputProcessor); } List additionalInputProcessors = securityProperties.getInputProcessorList(); if (!additionalInputProcessors.isEmpty()) { Iterator inputProcessorIterator = additionalInputProcessors.iterator(); while (inputProcessorIterator.hasNext()) { InputProcessor inputProcessor = inputProcessorIterator.next(); inputProcessorChain.addProcessor(inputProcessor); } } return new WSSecurityStreamReader(inputProcessorChain, securityProperties, initiator, returnSecurityError); } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy