All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.jboss.remoting3.security.SimpleServerAuthenticationProvider Maven / Gradle / Ivy

Go to download

This artifact provides a single jar that contains all classes required to use remote EJB and JMS, including all dependencies. It is intended for use by those not using maven, maven users should just import the EJB and JMS BOM's instead (shaded JAR's cause lots of problems with maven, as it is very easy to inadvertently end up with different versions on classes on the class path).

There is a newer version: 32.0.0.Final
Show newest version
/*
 * JBoss, Home of Professional Open Source
 * Copyright 2010, JBoss Inc., and individual contributors as indicated
 * by the @authors tag. See the copyright.txt in the distribution for a
 * full listing of individual contributors.
 *
 * This is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Lesser General Public License as
 * published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * This software is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this software; if not, write to the Free
 * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
 * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
 */

package org.jboss.remoting3.security;

import java.io.IOException;
import java.security.KeyPair;
import java.security.Principal;
import java.util.Collection;
import java.util.HashMap;
import java.util.Map;

import javax.security.auth.callback.Callback;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.sasl.AuthenticationException;
import javax.security.sasl.AuthorizeCallback;
import javax.security.sasl.RealmCallback;

/**
 * A server authentication handler which maintains a simple map of user names and passwords.
 */
public final class SimpleServerAuthenticationProvider implements ServerAuthenticationProvider {

    private static final RemotingPermission ADD_USER_PERM = new RemotingPermission("addServerUser");

    private final Map> map = new HashMap>();

    /** {@inheritDoc}
     * @param mechanismName*/
    public AuthorizingCallbackHandler getCallbackHandler(final String mechanismName) {
        return new AuthorizingCallbackHandler() {
            public void handle(final Callback[] callbacks) throws IOException, UnsupportedCallbackException {
                String userName = null;
                String realmName = null;
                for (Callback callback : callbacks) {
                    if (callback instanceof NameCallback) {
                        final NameCallback nameCallback = (NameCallback) callback;
                        final String defaultName = nameCallback.getDefaultName();
                        userName = defaultName.toLowerCase().trim();
                        nameCallback.setName(userName);
                    } else if (callback instanceof RealmCallback) {
                        final RealmCallback realmCallback = (RealmCallback) callback;
                        final String defaultRealm = realmCallback.getDefaultText();
                        if (defaultRealm != null) {
                            realmName = defaultRealm.toLowerCase().trim();
                            realmCallback.setText(realmName);
                        }
                    } else if (callback instanceof PasswordCallback) {
                        final PasswordCallback passwordCallback = (PasswordCallback) callback;
                        // retrieve the record based on user and realm (if any)
                        Entry entry = null;
                        if (realmName == null) {
                            // scan all realms
                            synchronized (map) {
                                for (Map realmMap : map.values()) {
                                    if (realmMap.containsKey(userName)) {
                                        entry = realmMap.get(userName);
                                        break;
                                    }
                                }
                            }
                        } else {
                            synchronized (map) {
                                final Map realmMap = map.get(realmName);
                                if (realmMap != null) {
                                    entry = realmMap.get(userName);
                                }
                            }
                        }
                        if (entry == null) {
                            throw new AuthenticationException("No matching user found");
                        }
                        passwordCallback.setPassword(entry.getPassword());
                    } else if (callback instanceof AuthorizeCallback) {
                        final AuthorizeCallback authorizeCallback = (AuthorizeCallback) callback;
                        authorizeCallback.setAuthorized(authorizeCallback.getAuthenticationID().equals(authorizeCallback.getAuthorizationID()));
                    } else {
                        throw new UnsupportedCallbackException(callback, "Callback not supported: " + callback);
                    }
                }
            }

            public UserInfo createUserInfo(final Collection remotingPrincipals) {
                return new SimpleUserInfo(remotingPrincipals);
            }

        };
    }

    /**
     * Add a user to the authentication table.
     *
     * @param userName the user name
     * @param userRealm the user realm
     * @param password the password
     * @param keyPairs the key pairs for this identity
     */
    public void addUser(String userName, String userRealm, char[] password, KeyPair... keyPairs) {
        if (userName == null) {
            throw new IllegalArgumentException("userName is null");
        }
        if (userRealm == null) {
            throw new IllegalArgumentException("userRealm is null");
        }
        if (password == null) {
            throw new IllegalArgumentException("password is null");
        }
        if (keyPairs == null) {
            throw new IllegalArgumentException("keyPairs is null");
        }
        final SecurityManager sm = System.getSecurityManager();
        if (sm != null) {
            sm.checkPermission(ADD_USER_PERM);
        }
        final String canonUserRealm = userRealm.toLowerCase().trim();
        final String canonUserName = userName.toLowerCase().trim();
        synchronized (map) {
            Map realmMap = map.get(canonUserRealm);
            if (realmMap == null) {
                realmMap = new HashMap();
                map.put(canonUserRealm, realmMap);
            }
            realmMap.put(canonUserName, new Entry(canonUserName, canonUserRealm, password, keyPairs));
        }
    }

    private static final class Entry {
        private final String userName;
        private final String userRealm;
        private final char[] password;
        private final KeyPair[] keyPairs;

        private Entry(final String userName, final String userRealm, final char[] password, final KeyPair[] keyPairs) {
            this.userName = userName;
            this.userRealm = userRealm;
            this.password = password;
            this.keyPairs = keyPairs;
        }

        String getUserName() {
            return userName;
        }

        String getUserRealm() {
            return userRealm;
        }

        char[] getPassword() {
            return password;
        }

        KeyPair[] getKeyPairs() {
            return keyPairs;
        }
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy