com.sun.xml.wss.provider.wsit.WSITAuthConfigProvider Maven / Gradle / Ivy
/*
* Copyright (c) 1997, 2021 Oracle and/or its affiliates. All rights reserved.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Distribution License v. 1.0, which is available at
* http://www.eclipse.org/org/documents/edl-v10.php.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
/*
* WSITAuthConfigProvider.java
*
* Created on November 1, 2006, 10:53 AM
*
* To change this template, choose Tools | Template Manager
* and open the template in the editor.
*/
package com.sun.xml.wss.provider.wsit;
import com.sun.xml.ws.api.model.wsdl.WSDLBoundOperation;
import com.sun.xml.ws.api.model.wsdl.WSDLPort;
import com.sun.xml.ws.policy.Policy;
import com.sun.xml.ws.policy.PolicyException;
import com.sun.xml.ws.policy.PolicyMap;
import com.sun.xml.ws.policy.PolicyMapKey;
import com.sun.xml.ws.security.policy.SecurityPolicyVersion;
import java.util.Map;
import java.util.WeakHashMap;
import java.util.concurrent.locks.ReentrantReadWriteLock;
import javax.security.auth.callback.CallbackHandler;
import jakarta.security.auth.message.AuthException;
import jakarta.security.auth.message.config.AuthConfigFactory;
import jakarta.security.auth.message.config.AuthConfigProvider;
import jakarta.security.auth.message.config.ClientAuthConfig;
import jakarta.security.auth.message.config.ServerAuthConfig;
import jakarta.xml.ws.WebServiceException;
/**
*
* @author kumar.jayanti
*/
public class WSITAuthConfigProvider implements AuthConfigProvider {
//Map properties = null;
String description = "WSIT AuthConfigProvider";
//ClientAuthConfig clientConfig = null;
//ServerAuthConfig serverConfig = null;
WeakHashMap clientConfigMap = new WeakHashMap();
WeakHashMap serverConfigMap = new WeakHashMap();
private ReentrantReadWriteLock rwLock;
private ReentrantReadWriteLock.ReadLock rLock;
private ReentrantReadWriteLock.WriteLock wLock;
/** Creates a new instance of WSITAuthConfigProvider */
public WSITAuthConfigProvider(Map props, AuthConfigFactory factory) {
//properties = props;
//this.factory = factory;
if (factory != null) {
factory.registerConfigProvider(this, "SOAP", null,description);
}
this.rwLock = new ReentrantReadWriteLock(true);
this.rLock = rwLock.readLock();
this.wLock = rwLock.writeLock();
}
@SuppressWarnings("unchecked")
public ClientAuthConfig getClientAuthConfig(String layer, String appContext, CallbackHandler callbackHandler) throws AuthException {
ClientAuthConfig clientConfig = null;
this.rLock.lock();
try {
clientConfig = (ClientAuthConfig)this.clientConfigMap.get(appContext);
if (clientConfig != null) {
return clientConfig;
}
} finally {
this.rLock.unlock();
}
// make sure you don't hold the rlock when you request the wlock
// or you will encounter dealock
this.wLock.lock();
try {
// recheck the precondition, since the rlock was released.
if (clientConfig == null) {
clientConfig = new WSITClientAuthConfig(layer, appContext, callbackHandler);
this.clientConfigMap.put(appContext, clientConfig);
}
return clientConfig;
} finally {
this.wLock.unlock();
}
}
@SuppressWarnings("unchecked")
public ServerAuthConfig getServerAuthConfig(String layer, String appContext, CallbackHandler callbackHandler) throws AuthException {
ServerAuthConfig serverConfig = null;
this.rLock.lock();
try {
serverConfig = (ServerAuthConfig)this.serverConfigMap.get(appContext);
if (serverConfig != null) {
return serverConfig;
}
} finally {
this.rLock.unlock();
}
// make sure you don't hold the rlock when you request the wlock
// or you will encounter dealock
this.wLock.lock();
try {
// recheck the precondition, since the rlock was released.
if (serverConfig == null) {
serverConfig = new WSITServerAuthConfig(layer, appContext, callbackHandler);
this.serverConfigMap.put(appContext,serverConfig);
}
return serverConfig;
} finally {
this.wLock.unlock();
}
}
public void refresh() {
}
/**
* Checks to see whether WS-Security is enabled or not.
*
* @param policyMap policy map for {@code this} assembler
* @param wsdlPort wsdl:port
* @return true if Security is enabled, false otherwise
*/
public static boolean isSecurityEnabled(PolicyMap policyMap, WSDLPort wsdlPort) {
if (policyMap == null || wsdlPort == null)
return false;
try {
PolicyMapKey endpointKey = policyMap.createWsdlEndpointScopeKey(wsdlPort.getOwner().getName(),
wsdlPort.getName());
Policy policy = policyMap.getEndpointEffectivePolicy(endpointKey);
if ((policy != null) &&
(policy.contains(SecurityPolicyVersion.SECURITYPOLICY200507.namespaceUri) ||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri)||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY200512.namespaceUri))) {
return true;
}
for (WSDLBoundOperation wbo : wsdlPort.getBinding().getBindingOperations()) {
PolicyMapKey operationKey = policyMap.createWsdlOperationScopeKey(wsdlPort.getOwner().getName(),
wsdlPort.getName(),
wbo.getName());
policy = policyMap.getOperationEffectivePolicy(operationKey);
if ((policy != null) &&
(policy.contains(SecurityPolicyVersion.SECURITYPOLICY200507.namespaceUri) ||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri)))
return true;
policy = policyMap.getInputMessageEffectivePolicy(operationKey);
if ((policy != null) &&
(policy.contains(SecurityPolicyVersion.SECURITYPOLICY200507.namespaceUri) ||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri)))
return true;
policy = policyMap.getOutputMessageEffectivePolicy(operationKey);
if ((policy != null) &&
(policy.contains(SecurityPolicyVersion.SECURITYPOLICY200507.namespaceUri) ||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri)))
return true;
policy = policyMap.getFaultMessageEffectivePolicy(operationKey);
if ((policy != null) &&
(policy.contains(SecurityPolicyVersion.SECURITYPOLICY200507.namespaceUri) ||
policy.contains(SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri)))
return true;
}
} catch (PolicyException e) {
throw new WebServiceException(e);
}
return false;
}
}