com.sun.enterprise.admin.remote.ServerRemoteRestAdminCommand Maven / Gradle / Ivy
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2012-2017 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://oss.oracle.com/licenses/CDDL+GPL-1.1
* or LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.enterprise.admin.remote;
import com.sun.enterprise.admin.util.AuthenticationInfo;
import com.sun.enterprise.admin.util.HttpConnectorAddress;
import com.sun.enterprise.config.serverbeans.Domain;
import com.sun.enterprise.config.serverbeans.SecureAdmin;
import com.sun.enterprise.config.serverbeans.SecureAdminInternalUser;
import com.sun.enterprise.security.ssl.SSLUtils;
import com.sun.enterprise.security.store.DomainScopedPasswordAliasStore;
import java.net.URLConnection;
import java.util.logging.Logger;
import org.glassfish.api.admin.CommandException;
import org.glassfish.api.admin.ServerEnvironment;
import org.glassfish.hk2.api.ServiceLocator;
import org.glassfish.security.services.impl.JCEKSDomainPasswordAliasStore;
/**
* RemoteAdminCommand which is sent from a server (DAS or instance).
*
* This class identifies the origin as a server (as opposed to a true
* admin client) for server-to-server authentication.
*
* @author Tim Quinn
*/
//TODO: Remove it
public class ServerRemoteRestAdminCommand extends RemoteRestAdminCommand {
private final static String SSL_SOCKET_PROTOCOL = "TLS";
private ServiceLocator habitat;
private SecureAdmin secureAdmin;
private ServerEnvironment serverEnv;
private SSLUtils _sslUtils = null;
private DomainScopedPasswordAliasStore domainPasswordAliasStore = null;
public ServerRemoteRestAdminCommand(ServiceLocator habitat, String name, String host, int port,
boolean secure, String user, String password, Logger logger)
throws CommandException {
super(name, host, port, secure, "admin", "", logger,false);
completeInit(habitat);
}
private synchronized void completeInit(final ServiceLocator habitat) {
this.habitat = habitat;
final Domain domain = habitat.getService(Domain.class);
secureAdmin = domain.getSecureAdmin();
serverEnv = habitat.getService(ServerEnvironment.class);
this.secure = SecureAdmin.Util.isEnabled(secureAdmin);
domainPasswordAliasStore = habitat.getService(DomainScopedPasswordAliasStore.class);
setInteractive(false);
}
@Override
protected synchronized HttpConnectorAddress getHttpConnectorAddress(String host, int port, boolean shouldUseSecure) {
/*
* Always use secure communication to another server process.
* Return a connector address that uses a cert to authenticate this
* process as a client only if a cert, rather than an admin username
* and password, is used for process-to-process authentication.
*/
try {
final String certAlias = SecureAdmin.Util.isUsingUsernamePasswordAuth(secureAdmin) ?
null : getCertAlias();
return new HttpConnectorAddress(host, port,
certAlias == null
? null
: sslUtils().getAdminSocketFactory(certAlias, SSL_SOCKET_PROTOCOL));
} catch (Exception ex) {
throw new RuntimeException(ex);
}
}
@Override
protected synchronized AuthenticationInfo authenticationInfo() {
AuthenticationInfo result = null;
if (SecureAdmin.Util.isUsingUsernamePasswordAuth(secureAdmin)) {
final SecureAdminInternalUser secureAdminInternalUser = SecureAdmin.Util.secureAdminInternalUser(secureAdmin);
if (secureAdminInternalUser != null) {
try {
result = new AuthenticationInfo(secureAdminInternalUser.getUsername(),
new String(domainPasswordAliasStore.
get(secureAdminInternalUser.getPasswordAlias())));
} catch (Exception ex) {
throw new RuntimeException(ex);
}
}
}
return result;
}
/**
* Adds the admin indicator header to the request so. Do this whether
* secure admin is enabled or not, because the indicator is unique among
* domains to help make sure only processes in the same domain talk to
* each other.
*
* @param urlConnection
*/
@Override
protected synchronized void addAdditionalHeaders(final URLConnection urlConnection) {
final String indicatorValue = SecureAdmin.Util.configuredAdminIndicator(secureAdmin);
if (indicatorValue != null) {
urlConnection.setRequestProperty(
SecureAdmin.Util.ADMIN_INDICATOR_HEADER_NAME,
indicatorValue);
}
}
private synchronized String getCertAlias() {
return (serverEnv.isDas() ? SecureAdmin.Util.DASAlias(secureAdmin) :
SecureAdmin.Util.instanceAlias(secureAdmin));
}
private synchronized SSLUtils sslUtils() {
if (_sslUtils == null) {
_sslUtils = habitat.getService(SSLUtils.class);
}
return _sslUtils;
}
}