org.wildfly.security.auth.realm.KeyStoreBackedSecurityRealm Maven / Gradle / Ivy
The newest version!
/*
* JBoss, Home of Professional Open Source.
* Copyright 2014 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.wildfly.security.auth.realm;
import static org.wildfly.security.auth.realm.ElytronMessages.log;
import static org.wildfly.security.provider.util.ProviderUtil.INSTALLED_PROVIDERS;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.Principal;
import java.security.Provider;
import java.security.UnrecoverableEntryException;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import java.security.spec.AlgorithmParameterSpec;
import java.util.Enumeration;
import java.util.function.Supplier;
import javax.security.auth.x500.X500Principal;
import org.wildfly.common.Assert;
import org.wildfly.security.auth.principal.NamePrincipal;
import org.wildfly.security.authz.AuthorizationIdentity;
import org.wildfly.security.auth.server.RealmIdentity;
import org.wildfly.security.auth.server.RealmUnavailableException;
import org.wildfly.security.auth.server.SecurityRealm;
import org.wildfly.security.auth.SupportLevel;
import org.wildfly.security.credential.Credential;
import org.wildfly.security.evidence.Evidence;
import org.wildfly.security.x500.util.X500PrincipalUtil;
/**
* A {@link KeyStore} backed {@link SecurityRealm} implementation.
*
* @author David M. Lloyd
* @author Darran Lofthouse
*/
public class KeyStoreBackedSecurityRealm implements SecurityRealm {
private final Supplier providers;
private final KeyStore keyStore;
/**
* Construct a new instance.
*
* @param keyStore the keystore to use to back this realm
*/
public KeyStoreBackedSecurityRealm(final KeyStore keyStore) {
this(keyStore, INSTALLED_PROVIDERS);
}
/**
* Construct a new instance.
*
* @param keyStore the keystore to use to back this realm
* @param providers A supplier of providers for use by this realm
*/
public KeyStoreBackedSecurityRealm(final KeyStore keyStore, final Supplier providers) {
Assert.checkNotNullParam("keyStore", keyStore);
this.keyStore = keyStore;
this.providers = providers;
}
@Override
public RealmIdentity getRealmIdentity(final Principal principal) throws RealmUnavailableException {
final X500Principal x500Principal = X500PrincipalUtil.asX500Principal(principal);
if (x500Principal != null) {
log.tracef("KeyStoreRealm: obtaining certificate by X500Principal [%s]", x500Principal);
final KeyStore keyStore = this.keyStore;
try {
final Enumeration aliases = keyStore.aliases();
while (aliases.hasMoreElements()) {
final String alias = aliases.nextElement();
if (keyStore.isCertificateEntry(alias)) {
final Certificate certificate = keyStore.getCertificate(alias);
if (certificate instanceof X509Certificate && x500Principal.equals(X500PrincipalUtil.asX500Principal(((X509Certificate) certificate).getSubjectX500Principal()))) {
log.tracef("KeyStoreRealm: certificate found by X500Principal in alias [%s]", alias);
return new KeyStoreRealmIdentity(alias);
}
}
}
} catch (KeyStoreException e) {
throw log.failedToReadKeyStore(e);
}
log.tracef("KeyStoreRealm: certificate not found by X500Principal");
return RealmIdentity.NON_EXISTENT;
} else if (NamePrincipal.isConvertibleTo(principal)) {
String name = principal.getName();
log.tracef("KeyStoreRealm: obtaining certificate by alias [%s]", name);
return new KeyStoreRealmIdentity(name);
} else {
log.tracef("KeyStoreRealm: conversion of principal [%s] to X500Principal failed", principal);
return RealmIdentity.NON_EXISTENT;
}
}
@Override
public SupportLevel getCredentialAcquireSupport(final Class extends Credential> credentialType, final String algorithmName, final AlgorithmParameterSpec parameterSpec) throws RealmUnavailableException {
Assert.checkNotNullParam("credentialType", credentialType);
return SupportLevel.POSSIBLY_SUPPORTED;
}
@Override
public SupportLevel getEvidenceVerifySupport(final Class extends Evidence> evidenceType, final String algorithmName) throws RealmUnavailableException {
Assert.checkNotNullParam("evidenceType", evidenceType);
return SupportLevel.POSSIBLY_SUPPORTED;
}
private class KeyStoreRealmIdentity implements RealmIdentity {
private final String name;
private KeyStoreRealmIdentity(final String name) {
this.name = name;
}
public Principal getRealmIdentityPrincipal() {
return new NamePrincipal(name);
}
@Override
public SupportLevel getCredentialAcquireSupport(final Class extends Credential> credentialType, final String algorithmName, final AlgorithmParameterSpec parameterSpec) throws RealmUnavailableException {
final KeyStore.Entry entry = getEntry(name);
if (entry == null) return SupportLevel.UNSUPPORTED;
final Credential credential = Credential.fromKeyStoreEntry(entry);
return credential != null && credential.matches(credentialType, algorithmName, parameterSpec) ? SupportLevel.SUPPORTED : SupportLevel.UNSUPPORTED;
}
@Override
public C getCredential(final Class credentialType, final String algorithmName, final AlgorithmParameterSpec parameterSpec) throws RealmUnavailableException {
Assert.checkNotNullParam("credentialType", credentialType);
final KeyStore.Entry entry = getEntry(name);
if (entry == null) return null;
final Credential credential = Credential.fromKeyStoreEntry(entry);
return credential != null ? credential.castAs(credentialType, algorithmName, parameterSpec) : null;
}
@Override
public C getCredential(final Class credentialType, final String algorithmName) throws RealmUnavailableException {
return getCredential(credentialType, algorithmName, null);
}
@Override
public C getCredential(final Class credentialType) throws RealmUnavailableException {
return getCredential(credentialType, null);
}
@Override
public AuthorizationIdentity getAuthorizationIdentity() {
return AuthorizationIdentity.EMPTY;
}
@Override
public SupportLevel getEvidenceVerifySupport(final Class extends Evidence> evidenceType, final String algorithmName) throws RealmUnavailableException {
final KeyStore.Entry entry = getEntry(name);
if (entry == null) return SupportLevel.UNSUPPORTED;
final Credential credential = Credential.fromKeyStoreEntry(entry);
if (credential != null && credential.canVerify(evidenceType, algorithmName)) {
log.tracef("KeyStoreRealm: verification supported using alias [%s]", name);
return SupportLevel.SUPPORTED;
}
log.tracef("KeyStoreRealm: verification unsupported - unsupported entry type of alias [%s]", name);
return SupportLevel.UNSUPPORTED;
}
@Override
public boolean verifyEvidence(final Evidence evidence) throws RealmUnavailableException {
final KeyStore.Entry entry = getEntry(name);
if (entry == null) return false;
final Credential credential = Credential.fromKeyStoreEntry(entry);
if (credential != null && credential.canVerify(evidence) && credential.verify(providers, evidence)) {
log.tracef("KeyStoreRealm: verification succeed for alias [%s]", name);
return true;
}
log.tracef("KeyStoreRealm: verification failed - rejected by credential from alias [%s]", name);
return false;
}
public boolean exists() throws RealmUnavailableException {
return getEntry(name) != null;
}
private KeyStore.Entry getEntry(String name) {
try {
KeyStore.Entry entry = keyStore.getEntry(name, null);
if (entry == null) {
log.tracef("KeyStoreRealm: alias [%s] does not exist in KeyStore", name);
}
return entry;
} catch (NoSuchAlgorithmException | UnrecoverableEntryException | KeyStoreException e) {
log.tracef(e, "KeyStoreRealm: Obtaining entry [%s] from KeyStore failed", name);
return null;
}
}
}
}