All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.sun.xml.wss.provider.WssProviderAuthModule Maven / Gradle / Ivy

There is a newer version: 4.0.4
Show newest version
/*
 * Copyright (c) 1997, 2020 Oracle and/or its affiliates. All rights reserved.
 *
 * This program and the accompanying materials are made available under the
 * terms of the Eclipse Distribution License v. 1.0, which is available at
 * http://www.eclipse.org/org/documents/edl-v10.php.
 *
 * SPDX-License-Identifier: BSD-3-Clause
 */

package com.sun.xml.wss.provider;

import java.io.File;
import java.util.Map;
import java.util.Iterator;
import java.util.ArrayList;
import java.util.Collection;
import java.io.FileInputStream;
import java.io.BufferedInputStream;
import java.io.InputStream;
import jakarta.xml.soap.SOAPMessage;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.PasswordCallback;
import com.sun.xml.wss.impl.WssProviderSecurityEnvironment;
import com.sun.xml.wss.impl.policy.mls.MessagePolicy;
import com.sun.xml.wss.impl.config.SecurityConfigurationXmlReader;
import com.sun.xml.wss.impl.config.DeclarativeSecurityConfiguration;
import com.sun.xml.wss.impl.MessageConstants;
import com.sun.xml.wss.impl.policy.SecurityPolicy;
import com.sun.xml.wss.impl.policy.PolicyGenerationException;
import com.sun.xml.wss.impl.policy.mls.WSSPolicy;
import com.sun.xml.wss.impl.policy.MLSPolicy;
import com.sun.xml.wss.impl.policy.mls.SignaturePolicy;
import com.sun.xml.wss.impl.policy.mls.EncryptionPolicy;
import com.sun.xml.wss.impl.policy.mls.AuthenticationTokenPolicy;
import com.sun.xml.wss.impl.policy.mls.Target;
import com.sun.xml.wss.impl.PolicyTypeUtil;

public class WssProviderAuthModule implements ModuleOptions, ConfigurationStates {
       protected SecurityPolicy _policy = null;
       protected WssProviderSecurityEnvironment _sEnvironment = null;
       private boolean runtimeUsernamePassword = false;
       private static final String SIGN_POLICY      = "com.sun.xml.wss.impl.policy.mls.SignaturePolicy";
       private static final String ENCRYPT_POLICY   = "com.sun.xml.wss.impl.policy.mls.EncryptionPolicy";
       private static final String TIMESTAMP_POLICY = "com.sun.xml.wss.impl.policy.mls.TimestampPolicy";
       private static final String AUTHENTICATION_POLICY = 
                      "com.sun.xml.wss.impl.policy.mls.AuthenticationTokenPolicy";
       private static final String USERNAMETOKEN_POLICY = 
                      "com.sun.xml.wss.impl.policy.mls.AuthenticationTokenPolicy.UsernameTokenBinding";
       private static final String USERNAMETOKEN = "UsernameToken";
       private static final String BODY = "Body";
       public static final String REQUESTER_SUBJECT = "REQUESTER_SUBJECT";
       public static final String REQUESTER_KEYID = "REQUESTER_KEYID";
       public static final String REQUESTER_ISSUERNAME = "REQUESTER_ISSUERNAME";
       public static final String REQUESTER_SERIAL = "REQUESTER_SERIAL";
       public static final String SELF_SUBJECT = "SELF_SUBJECT";
       protected int optimize = MessageConstants.NOT_OPTIMIZED;
       protected boolean configOptimizeAttribute = true;
       public WssProviderAuthModule() {
       }

       public Class[] getSupportedMessageTypes() {
           return new Class[] { SOAPMessage.class };
       }

      /**
       * Initialization method for Client and Server Auth Modules 
       * @param requestPolicy
       *        used to validate request on server side 
       *        and to secure request on client side
       * @param responsePolicy  
       *        used to validate response on client side
       *        and to secure response on server side
       * @param handler
       *        CallbackHandler 
       * @param options
       *        Map of module options
       * @param isClientAuthModule
       *        indicates if the current instance is client or server module
       * @throws RuntimeException
       */
       public void initialize (jakarta.security.auth.message.MessagePolicy requestPolicy,
                               jakarta.security.auth.message.MessagePolicy responsePolicy,
                               CallbackHandler handler,
                               Map options,
                               boolean isClientAuthModule) {
              boolean debugON = false;
              String bg = (String)options.get(DEBUG);
              if (bg !=null && bg.equals("true")) debugON = true;
              // use the requestPolicy to configure recipient in   
              // case of Server and annotator in case of Client -
              // use the responsePolicy to configure annotator in   
              // case of Server and recipient in case of Client -
              // get the security configuration file from options
              String securityConfigurationURL = (String)options.get(SECURITY_CONFIGURATION_FILE);
              String signAlias = (String)options.get(SIGNING_KEY_ALIAS);
              String encryptAlias = (String)options.get(ENCRYPTION_KEY_ALIAS);
              
              try {
                      InputStream is = null;
                      if (securityConfigurationURL != null) {
                          is = new BufferedInputStream(new FileInputStream(new File(securityConfigurationURL)));
                      } else {
                          // try to locate the config file from the classpath
                          if (this instanceof ServerSecurityAuthModule) {
                              is = this.getClass().getResourceAsStream("wss-server-config-2.0.xml");
                          } else {
                              is = this.getClass().getResourceAsStream("wss-client-config-2.0.xml");
                          }
                      }
                      _policy = SecurityConfigurationXmlReader.createDeclarativeConfiguration(is);
                  int request_policy_state =  EMPTY_POLICY_STATE;
                  int response_policy_state = EMPTY_POLICY_STATE;
                  if (requestPolicy != null) {
                      request_policy_state = resolveConfigurationState(requestPolicy, true, isClientAuthModule);
                  }
                  if (responsePolicy != null) {
                      response_policy_state = resolveConfigurationState(responsePolicy, false, isClientAuthModule);
                  }
                  String obj = (String)options.get(DYNAMIC_USERNAME_PASSWORD);
                  if (obj != null) {
                      runtimeUsernamePassword = "true".equalsIgnoreCase(obj);
                  }
                  if (isClientAuthModule) {
                     augmentConfiguration(response_policy_state, true, handler, debugON, signAlias, encryptAlias);
                     augmentConfiguration(request_policy_state, false, handler, debugON, signAlias, encryptAlias);
                  } else {
                     augmentConfiguration(response_policy_state, false, handler, debugON, signAlias, encryptAlias);
                     augmentConfiguration(request_policy_state, true, handler, debugON, signAlias, encryptAlias);
                  }
                  _sEnvironment = new WssProviderSecurityEnvironment(handler, options);
              } catch (Exception e) {
                  throw new RuntimeException(e);
              } 
       }
      /**
       * Resolves the state of a policy object
       * @param messagePolicy
       *        AuthPolicy object whose state is to be resolved
       * @return configurationState
       *        returns one of the possible states defined in ConfigurationStates
       * @throws RuntimeException
       */
       @Override
       public int resolveConfigurationState(jakarta.security.auth.message.MessagePolicy messagePolicy,
               boolean isRequestPolicy, boolean isClientAuthModule) {
           boolean orderForValidation = isClientAuthModule ? !isRequestPolicy : isRequestPolicy;
           boolean recipientBeforeContent = false;
           boolean recipientAuthRequired = false;
           boolean sourceAuthRequired = false;
           boolean senderAuthRequired = false;
           boolean contentAuthRequired = false;
           if (messagePolicy != null) {
               jakarta.security.auth.message.MessagePolicy.TargetPolicy[] targetPolicies = messagePolicy.getTargetPolicies();
               if (targetPolicies != null && targetPolicies.length > 0) {
                   int contentInd = -1;
                   int recipientInd = -1;
                   for (int i = 0; i < targetPolicies.length; i++) {
                       jakarta.security.auth.message.MessagePolicy.ProtectionPolicy pp
                               = targetPolicies[i].getProtectionPolicy();

                       if (jakarta.security.auth.message.MessagePolicy.ProtectionPolicy.AUTHENTICATE_RECIPIENT.equals(
                               pp.getID())) {
                           recipientInd = i;
                           recipientAuthRequired = true;
                       } else if (jakarta.security.auth.message.MessagePolicy.ProtectionPolicy.AUTHENTICATE_SENDER.equals(
                               pp.getID())) {
                           contentInd = i;
                           sourceAuthRequired = true;
                           senderAuthRequired = true;
                       } else if (jakarta.security.auth.message.MessagePolicy.ProtectionPolicy.AUTHENTICATE_CONTENT.equals(
                               pp.getID())) {
                           contentInd = i;
                           sourceAuthRequired = true;
                           contentAuthRequired = true;
                       }
                   }

                   if (recipientAuthRequired && contentInd >= 0) {
                       recipientBeforeContent = (recipientInd < contentInd);
                   }
               }
           }
           boolean beforeContent = orderForValidation ? !recipientBeforeContent : recipientBeforeContent;

           int configurationState = -1;
           if (sourceAuthRequired && !recipientAuthRequired) {
              if (senderAuthRequired) 
                 configurationState = AUTHENTICATE_SENDER_TOKEN_ONLY;
              else if (contentAuthRequired)
                 configurationState = AUTHENTICATE_SENDER_SIGNATURE_ONLY; 
           } else if (!sourceAuthRequired && recipientAuthRequired) {
              configurationState = AUTHENTICATE_RECIPIENT_ONLY;
           } else if (sourceAuthRequired && recipientAuthRequired) {
              if (beforeContent) {
                if (senderAuthRequired) {
                   configurationState = AUTHENTICATE_RECIPIENT_AUTHENTICATE_SENDER_TOKEN;  
                } else if (contentAuthRequired) {
                   configurationState = AUTHENTICATE_RECIPIENT_AUTHENTICATE_SENDER_SIGNATURE; 
                } 
              } else {
                if (senderAuthRequired) {
                   configurationState = AUTHENTICATE_SENDER_TOKEN_AUTHENTICATE_RECIPIENT; 
                } else if (contentAuthRequired) {
                   configurationState = AUTHENTICATE_SENDER_SIGNATURE_AUTHENTICATE_RECIPIENT; 
                } 
              }
           } else {
              configurationState = EMPTY_POLICY_STATE;
           }
           if (configurationState == -1) {
               // log
               throw new RuntimeException("AuthPolicy configuration error: Invalid policy specification");
           }
           return configurationState; 
       }
      @SuppressWarnings("unchecked")
      private Collection getEncryptPolicies(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  if (!hasEncryptUsernamePolicy((EncryptionPolicy)policy, mPolicy)) {
                      requiredElements.add(policy);
                  }              
              }
          }
          if (requiredElements.isEmpty()) {
              throw new RuntimeException("Operation/Requirement (" + 
                  translate2configurationName(ENCRYPT_POLICY, senderConfiguration) + 
                      ") not specified " + "in the Config. file is required by the policy");
          }
          return requiredElements;
      }
      @SuppressWarnings("unchecked")
      private Collection getEncryptPoliciesOptional(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  if (!hasEncryptUsernamePolicy((EncryptionPolicy)policy, mPolicy)) {
                      requiredElements.add(policy);
                  }              
              }
          }
          return requiredElements;
      }
      @SuppressWarnings("unchecked")
      private Collection getSignPolicies(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.signaturePolicy(policy)) {
                  requiredElements.add(policy);
              }
          }
          if (requiredElements.isEmpty()) {
              throw new RuntimeException("Operation/Requirement (" + 
                  translate2configurationName(SIGN_POLICY, senderConfiguration) + 
                      ") not specified " + "in the Config. file is required by the policy");
          }
          return requiredElements;
      }
      private WSSPolicy getUsernamePolicy(MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          WSSPolicy usernamePolicy = null;
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.authenticationTokenPolicy(policy)) {
                  if ((policy.getFeatureBinding() != null) && 
                      (PolicyTypeUtil.usernameTokenPolicy(policy.getFeatureBinding()))) {
                      if (senderConfiguration && !runtimeUsernamePassword) {
                          setUsernamePassword((AuthenticationTokenPolicy)policy, handler);
                      } 
                      usernamePolicy = policy;
                      break;
                  }
              } 
          }
          if (usernamePolicy == null) {
              throw new RuntimeException("Operation/Requirement (" + 
                  translate2configurationName(USERNAMETOKEN_POLICY, senderConfiguration) + 
                      ") not specified " + "in the Config. file is required by the policy");
          }
          return usernamePolicy;
      }
     @SuppressWarnings("unchecked")
      private Collection getUsernamePolicies(MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration)
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          WSSPolicy encryptUsernamePolicy = null;
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.authenticationTokenPolicy(policy)) {
                  if ((policy.getFeatureBinding() != null) && 
                      (PolicyTypeUtil.usernameTokenPolicy(policy.getFeatureBinding()))) {
                      if (senderConfiguration && !runtimeUsernamePassword) {
                          setUsernamePassword((AuthenticationTokenPolicy)policy, handler);
                      }
                      requiredElements.add(policy);
                  }
              } else if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  if (isEncryptUsernamePolicy((EncryptionPolicy)policy, mPolicy)) {
                      encryptUsernamePolicy = policy;
                  }
              }
          }
          if (requiredElements.isEmpty()) {
              throw new RuntimeException("Operation/Requirement (" + 
                  translate2configurationName(USERNAMETOKEN_POLICY, senderConfiguration) + 
                      ") not specified " + "in the Config. file is required by the policy");
          }
          if (encryptUsernamePolicy != null) {
              requiredElements.add(encryptUsernamePolicy);
          }
          return requiredElements;
      }
     @SuppressWarnings("unchecked")
     private Collection getEncryptUsernamePolicies(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          WSSPolicy eBU =  getEncryptBodyUsernamePolicy(mPolicy);
          if (eBU != null) {
              Collection ePolicies = getNonBodyUsernameEncryptPolicies(
                  mPolicy, handler, senderConfiguration);
              requiredElements.addAll(ePolicies);
              requiredElements.add(getUsernamePolicy(mPolicy, handler, senderConfiguration));
              requiredElements.add(eBU);
          } else {
              //FOR BC Reasons we allow this
              Collection ePolicies = getEncryptPoliciesOptional(mPolicy, handler, senderConfiguration);
              requiredElements.addAll(ePolicies);
              requiredElements.addAll(getUsernamePolicies(mPolicy, handler, senderConfiguration));
          }
          if (requiredElements.isEmpty()) {
              throw new RuntimeException("Operation/Requirement (" + 
                  translate2configurationName(ENCRYPT_POLICY, senderConfiguration) + 
                      ") not specified " + "in the Config. file is required by the policy");
          }
          return requiredElements;
      }
     @SuppressWarnings("unchecked")
     private Collection getUsernameEncryptPolicies(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) 
          throws PolicyGenerationException {
          Collection requiredElements = new ArrayList();              
          WSSPolicy eUB =  getEncryptUsernameBodyPolicy(mPolicy);
          if (eUB != null) {
              requiredElements.add(getUsernamePolicy(mPolicy, handler, senderConfiguration));
              requiredElements.add(eUB);
              Collection ePolicies = getNonBodyUsernameEncryptPolicies(
                  mPolicy, handler, senderConfiguration);
              requiredElements.addAll(ePolicies);
          } else {
              requiredElements.addAll(getUsernamePolicies(mPolicy, handler, senderConfiguration));
              //FOR BC Reasons we allow this
              Collection ePolicies = getEncryptPoliciesOptional(mPolicy, handler, senderConfiguration);
              requiredElements.addAll(ePolicies);
          }
          if (requiredElements.isEmpty()) {
              throw new RuntimeException("Operation/Requirement (" +
                  translate2configurationName(USERNAMETOKEN_POLICY, senderConfiguration) +
                      ") not specified " + "in the Config. file is required by the policy");
          }
          return requiredElements;
      }
      private WSSPolicy getTimestampPolicy(
          MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) {
          WSSPolicy timestampPolicy = null;
          Iterator it = mPolicy.iterator();
          while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.timestampPolicy(policy)) {
                  timestampPolicy = (policy);
                  break;
              }
          }
          return timestampPolicy;
      }
      /**
       * Modifies the sender/receiver settings according to the corresponding policy
       * @param requiredState
       *        the state of the policy object
       * @param modifyReceiverSettings
       *        indicates if sender/receiver settings need to be modified
       * @throws RuntimeException
       */
       @SuppressWarnings("unchecked")
       private void augmentConfiguration(int requiredState, boolean modifyReceiverSettings, CallbackHandler handler, boolean debugON,
           String signAlias, String encryptAlias) throws PolicyGenerationException {
              MessagePolicy mPolicy = null;
              DeclarativeSecurityConfiguration dConfiguration = (DeclarativeSecurityConfiguration) _policy;
              boolean senderConfiguration = false;
              if (requiredState == EMPTY_POLICY_STATE)  {
                  if (modifyReceiverSettings) {
                      mPolicy = dConfiguration.receiverSettings();
                      mPolicy.removeAll();
 
                  } else {
                     mPolicy = dConfiguration.senderSettings();
                     mPolicy.removeAll();
                  }
                  if (debugON) {
                      mPolicy.dumpMessages(true);
                  }
                  return;
              }
              if (modifyReceiverSettings) {
                 mPolicy = dConfiguration.receiverSettings();
              } else {
                 mPolicy = dConfiguration.senderSettings();
                 senderConfiguration = !senderConfiguration;
              }
              Collection newMPolicy = null;
              WSSPolicy ts = getTimestampPolicy(mPolicy, handler, senderConfiguration);
              boolean requireTimestampPolicy = false;
              switch (requiredState) {
                 case AUTHENTICATE_RECIPIENT_ONLY: 
                                  // Resultant List:  (encrypt+)
                                  newMPolicy = getEncryptPolicies(mPolicy, handler, senderConfiguration);
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  break;
                 case AUTHENTICATE_SENDER_TOKEN_ONLY:
                                  // Resultant List:  (authenticate, encrypt?)
                                  newMPolicy = getUsernamePolicies(mPolicy, handler, senderConfiguration);
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  if (!modifyReceiverSettings && configOptimizeAttribute) {
                                      optimize=MessageConstants.SECURITY_HEADERS;
                                  }
                                  break;
                 case AUTHENTICATE_SENDER_SIGNATURE_ONLY:
                                  // Resultant List: (sign+) 
                                  newMPolicy = getSignPolicies(mPolicy, handler, senderConfiguration);
                                  requireTimestampPolicy = !(newMPolicy.isEmpty());
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  if (!modifyReceiverSettings && configOptimizeAttribute) {
                                      optimize=MessageConstants.SIGN_BODY;
                                  }
                                  break;  
                 case AUTHENTICATE_RECIPIENT_AUTHENTICATE_SENDER_TOKEN:
                                  /* Resultant List: (encrypt+, authenticate, encrypt?) */
                                  newMPolicy = getEncryptUsernamePolicies(mPolicy, handler, senderConfiguration);
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  break;  
                 case AUTHENTICATE_SENDER_TOKEN_AUTHENTICATE_RECIPIENT:
                                  /* Resultant List: (authenticate, encrypt+) */
                                  newMPolicy =  getUsernameEncryptPolicies(mPolicy, handler, senderConfiguration);
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  break;  
                 case AUTHENTICATE_RECIPIENT_AUTHENTICATE_SENDER_SIGNATURE:
                                  /* Resultant List: (encrypt+, sign+) */
                                  newMPolicy =  getEncryptPolicies(mPolicy, handler, senderConfiguration);
                                  Collection signPolicies = getSignPolicies(mPolicy, handler, senderConfiguration);
                                  requireTimestampPolicy = !(signPolicies.isEmpty());
                                  newMPolicy.addAll(signPolicies);
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  break;  
                 case AUTHENTICATE_SENDER_SIGNATURE_AUTHENTICATE_RECIPIENT: 
                                  /* Resultant List: (sign+, encrypt+) */
				  newMPolicy = getSignPolicies(mPolicy, handler, senderConfiguration);
                                  requireTimestampPolicy = !(newMPolicy.isEmpty());
                                  newMPolicy.addAll(getEncryptPolicies(mPolicy, handler, senderConfiguration));
                                  mPolicy.removeAll();
                                  mPolicy.appendAll(newMPolicy);
                                  if (!modifyReceiverSettings && configOptimizeAttribute) {
                                      optimize=MessageConstants.SIGN_ENCRYPT_BODY;
                                  }
                                  break;  
                 default:
                                  break;
              }
              if ((ts != null) && requireTimestampPolicy) {
                  mPolicy.prepend(ts);
              }
              if (debugON) {
                  mPolicy.dumpMessages(true);
              }
              augmentSignAlias(mPolicy, signAlias);
              augmentEncryptAlias(mPolicy, encryptAlias);
       }
       private String translate2configurationName(String opName, boolean senderConfiguration) {
             String value = null;
             if (opName == SIGN_POLICY) 
                 value = senderConfiguration ? "xwss:Sign" : "xwss:RequireSignature";
             else 
             if (opName == ENCRYPT_POLICY) 
                 value = senderConfiguration ? "xwss:Encrypt" : "xwss:RequireEncryption";
             else 
             if (opName == USERNAMETOKEN_POLICY) 
                 value = senderConfiguration ? "xwss:UsernameToken" : "xwss:RequireUsernameToken";
             return value;
       }
       private boolean isEncryptUsernamePolicy(EncryptionPolicy policy, MessagePolicy mPolicy) {
           EncryptionPolicy.FeatureBinding fb = 
               (EncryptionPolicy.FeatureBinding)policy.getFeatureBinding();
           int numTargets = fb.getTargetBindings().size();
           if (numTargets != 1)
               return false;
           Iterator it1 = fb.getTargetBindings().iterator();
           Target target = (Target)it1.next();
           if (target.getType() == Target.TARGET_TYPE_VALUE_URI) {
               //get the URI fragment
               return uriIsUsernameToken(mPolicy, target.getValue());
           } else {
               int idx = target.getValue().indexOf(USERNAMETOKEN);
               if (idx > -1) {
                   return true;
               }
           }
           return false;
       }
       private boolean hasEncryptUsernamePolicy(EncryptionPolicy policy, MessagePolicy mPolicy) {
           EncryptionPolicy.FeatureBinding fb = 
               (EncryptionPolicy.FeatureBinding)policy.getFeatureBinding();
           Iterator it = fb.getTargetBindings().iterator();
           while (it.hasNext()) {
               Target target = (Target)it.next();
               if (target.getType() == Target.TARGET_TYPE_VALUE_URI) {
                   //get the URI fragment
                   return uriIsUsernameToken(mPolicy, target.getValue());
               }else {
                   int idx = target.getValue().indexOf(USERNAMETOKEN);
                   if (idx > -1) {
                       return true;
                   }
               }
           }
           return false;
       }
       private boolean uriIsUsernameToken(MessagePolicy mPolicy, String uri) {
           String fragment = uri;
           if (uri.startsWith("#")) {
               fragment = uri.substring(1);
           }
           Iterator it = mPolicy.iterator();
           while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.authenticationTokenPolicy(policy)) {
                  MLSPolicy feature = policy.getFeatureBinding();
                  if ((feature != null) && PolicyTypeUtil.usernameTokenPolicy(feature)) {
                      AuthenticationTokenPolicy.UsernameTokenBinding fb =
                          (AuthenticationTokenPolicy.UsernameTokenBinding)feature;
                      if (fragment.equals(fb.getUUID())) {
                          return true;
                      }
                  }
               }
           }
           return false;
       }
       private WSSPolicy getEncryptBodyUsernamePolicy(MessagePolicy mPolicy) {
           WSSPolicy ret = null;
           Iterator it = mPolicy.iterator();
           while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  EncryptionPolicy.FeatureBinding fb = 
                      (EncryptionPolicy.FeatureBinding)policy.getFeatureBinding();
                  int numTargets = fb.getTargetBindings().size();
                  if (numTargets <= 1) {
                     continue; 
                  }
                  if (hasBodyFollowedByUsername((ArrayList)fb.getTargetBindings())) {
                      ret = policy;
                      return ret;
                  } 
              }
           }
           return ret;
       }
       private WSSPolicy getEncryptUsernameBodyPolicy(MessagePolicy mPolicy) {
           WSSPolicy ret = null;
           Iterator it = mPolicy.iterator();
           while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  EncryptionPolicy.FeatureBinding fb = 
                      (EncryptionPolicy.FeatureBinding)policy.getFeatureBinding();
                  int numTargets = fb.getTargetBindings().size();
                  if (numTargets <= 1) {
                     continue; 
                  }
                  if (hasUsernameFollowedByBody((ArrayList)fb.getTargetBindings())) {
                      ret = policy;
                      return ret;
                  } 
              }
           }
           return ret;
       }
       //Assuming single username target
       //TODO: This logic fails if we have more than 2 targets in the ArrayList
       private boolean hasUsernameFollowedByBody(ArrayList targets) {
           Target t = (Target)targets.get(0);
           int idx = t.getValue().indexOf(USERNAMETOKEN);
           if (idx == -1) {
               return false;
           }
           return true;
       }
       //TODO: This logic fails if we have more than 2 targets in the ArrayList
       private boolean hasBodyFollowedByUsername(ArrayList targets) {
           Target t = (Target)targets.get(targets.size() - 1);
           int idx = t.getValue().indexOf(USERNAMETOKEN);
           if (idx == -1) {
               return false;
           }
           return true;
       }
       private void setUsernamePassword(AuthenticationTokenPolicy policy, CallbackHandler handler) {
            AuthenticationTokenPolicy.UsernameTokenBinding
                up = (AuthenticationTokenPolicy.UsernameTokenBinding)policy.getFeatureBinding();
                                                                                                                                                     
                NameCallback nameCallback    = new NameCallback("Username: ");
                PasswordCallback pwdCallback = new PasswordCallback("Password: ", false);
                                                                                                                                                
                try {
                    Callback[] cbs = new Callback[] { nameCallback, pwdCallback };
                    handler.handle(cbs);
                } catch (Exception e) {
                    throw new RuntimeException(e);
                }
                                                                                                                                                     
                up.setUsername(nameCallback.getName());
                up.setPassword(new String(pwdCallback.getPassword()));
       }
       @SuppressWarnings("unchecked")
       private Collection getNonBodyUsernameEncryptPolicies(
            MessagePolicy mPolicy, CallbackHandler handler, boolean senderConfiguration) {
           Collection requiredElements = new ArrayList();
                                                                                                           
           Iterator it = mPolicy.iterator();
           while (it.hasNext()) {
              WSSPolicy policy = (WSSPolicy)it.next();
              if (PolicyTypeUtil.encryptionPolicy(policy)) {
                  if (!hasEncryptBodyPolicy((EncryptionPolicy)policy) && 
                      !hasEncryptUsernamePolicy((EncryptionPolicy)policy, mPolicy)) {
                      requiredElements.add(policy);
                  }
              }
          }
                                                                                                           
          return requiredElements;
       }
       private boolean hasEncryptBodyPolicy(EncryptionPolicy policy) {
           EncryptionPolicy.FeatureBinding fb = 
               (EncryptionPolicy.FeatureBinding)policy.getFeatureBinding();
           Iterator it = fb.getTargetBindings().iterator();
           while (it.hasNext()) {
               Target target = (Target)it.next();
               int idx = target.getValue().indexOf(BODY);
               if (idx > -1) {
                   return true;
               }
           }
           return false;
       }
       protected boolean isOptimized(SOAPMessage msg){
//		     System.out.println("ClassName"+(msg.getClass().getName()));
		     if(msg.getClass().getName().equals("com.sun.xml.messaging.saaj.soap.ver1_1.ExpressMessage1_1Impl") || msg.getClass().getName().equals("com.sun.xml.messaging.saaj.soap.ver1_2.ExpressMessage1_2Impl")){
				return true;
			 }
			 return false;
       }
      private void augmentSignAlias(MessagePolicy mPolicy, String signAlias) {
          if (signAlias == null) {
              return;
          }
          for (Iterator it = mPolicy.iterator(); it.hasNext();) {
              WSSPolicy sp = (WSSPolicy)it.next();
              SecurityPolicy keyBinding = sp.getKeyBinding();
              if (sp instanceof SignaturePolicy) {
                  if ((keyBinding != null) && (keyBinding instanceof AuthenticationTokenPolicy.X509CertificateBinding)) {
                      AuthenticationTokenPolicy.X509CertificateBinding x509KB = 
                          (AuthenticationTokenPolicy.X509CertificateBinding)keyBinding;
                      String certId = x509KB.getCertificateIdentifier();
                      if (certId != null) {
                          x509KB.setCertificateIdentifier(signAlias);
                      }
                  }
              }
          }
      }
      private void augmentEncryptAlias(MessagePolicy mPolicy, String encryptAlias) {
          if (encryptAlias == null) {
              return;
          }
          for (Iterator it = mPolicy.iterator(); it.hasNext();) {
              WSSPolicy sp = (WSSPolicy)it.next();
              SecurityPolicy keyBinding = sp.getKeyBinding();
              if (sp instanceof EncryptionPolicy) {
                  if ((keyBinding != null) && (keyBinding instanceof AuthenticationTokenPolicy.X509CertificateBinding)) {
                      AuthenticationTokenPolicy.X509CertificateBinding x509KB = 
                          (AuthenticationTokenPolicy.X509CertificateBinding)keyBinding;
                      String certId = x509KB.getCertificateIdentifier();
                      if (certId != null) {
                          x509KB.setCertificateIdentifier(encryptAlias);
                      }
                  }
              }
          }
      }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy