All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.wildfly.security.sasl.external.ExternalSaslServer Maven / Gradle / Ivy

Go to download

This artifact provides a single jar that contains all classes required to use remote EJB and JMS, including all dependencies. It is intended for use by those not using maven, maven users should just import the EJB and JMS BOM's instead (shaded JAR's cause lots of problems with maven, as it is very easy to inadvertently end up with different versions on classes on the class path).

There is a newer version: 34.0.0.Final
Show newest version
/*
 * JBoss, Home of Professional Open Source.
 * Copyright 2014 Red Hat, Inc., and individual contributors
 * as indicated by the @author tags.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.wildfly.security.sasl.external;

import static org.wildfly.security.mechanism._private.ElytronMessages.saslExternal;

import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.text.Normalizer;

import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.sasl.AuthorizeCallback;
import javax.security.sasl.SaslException;
import javax.security.sasl.SaslServer;

import org.wildfly.security.auth.callback.AuthenticationConfigurationCallback;
import org.wildfly.security.sasl.util.SaslMechanismInformation;

/**
 * @author David M. Lloyd
 */
final class ExternalSaslServer implements SaslServer {

    private final CallbackHandler cbh;
    private boolean complete;
    private String authorizationID;
    private final boolean skipCertificateVerification;

    ExternalSaslServer(final CallbackHandler cbh) {
        this.cbh = cbh;
        this.skipCertificateVerification = false;
    }

    ExternalSaslServer(final CallbackHandler cbh, boolean skipCertVerification) {
        this.cbh = cbh;
        this.skipCertificateVerification = skipCertVerification;
    }

    public String getMechanismName() {
        return SaslMechanismInformation.Names.EXTERNAL;
    }

    public byte[] evaluateResponse(final byte[] response) throws SaslException {
        if (complete) {
            throw saslExternal.mechMessageAfterComplete().toSaslException();
        }
        complete = true;
        String authorizationId;
        if (response.length == 0) {
            authorizationId = null;
        } else {
            authorizationId = Normalizer.normalize(new String(response, StandardCharsets.UTF_8), Normalizer.Form.NFKC);
            if (authorizationId.indexOf(0) != -1) {
                throw saslExternal.mechUserNameContainsInvalidCharacter().toSaslException();
            }
        }
        final AuthorizeCallback authorizeCallback = new AuthorizeCallback(null, authorizationId);
        final AuthenticationConfigurationCallback authenticationConfigurationCallback = new AuthenticationConfigurationCallback();
        authenticationConfigurationCallback.setSaslSkipCertificateVerification(skipCertificateVerification);
        Callback[] callbacks = new Callback[]{authenticationConfigurationCallback, authorizeCallback};
        try {
            cbh.handle(callbacks);
        } catch (SaslException e) {
            throw e;
        } catch (IOException e) {
            throw saslExternal.mechAuthorizationFailed(e).toSaslException();
        } catch (UnsupportedCallbackException e) {
            throw saslExternal.mechAuthorizationFailed(e).toSaslException();
        }
        if (!authorizeCallback.isAuthorized()) {
            throw saslExternal.mechAuthorizationFailed(null, authorizationId).toSaslException();
        }
        this.authorizationID = authorizeCallback.getAuthorizedID();
        return null;
    }

    public boolean isComplete() {
        return complete;
    }

    public String getAuthorizationID() {
        if (! complete) {
            throw saslExternal.mechAuthenticationNotComplete();
        }
        return authorizationID;
    }

    public byte[] unwrap(final byte[] incoming, final int offset, final int len) throws SaslException {
        if (complete) {
            throw saslExternal.mechNoSecurityLayer();
        } else {
            throw saslExternal.mechAuthenticationNotComplete();
        }
    }

    public byte[] wrap(final byte[] outgoing, final int offset, final int len) throws SaslException {
        if (complete) {
            throw saslExternal.mechNoSecurityLayer();
        } else {
            throw saslExternal.mechAuthenticationNotComplete();
        }
    }

    public Object getNegotiatedProperty(final String propName) {
        if (complete) {
            return null;
        } else {
            throw saslExternal.mechAuthenticationNotComplete();
        }
    }

    public void dispose() throws SaslException {
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy