/** * Licensed to Apereo under one or more contributor license agreements. See the NOTICE file * distributed with this work for additional information regarding copyright ownership. Apereo * licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use * this file except in compliance with the License. You may obtain a copy of the License at the * following location: * * <p>http://www.apache.org/licenses/LICENSE-2.0 * * <p>Unless required by applicable law or agreed to in writing, software distributed under the * License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing permissions and * limitations under the License. */ package org.apereo.portal.security.provider; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apereo.portal.persondir.ILocalAccountDao; import org.apereo.portal.persondir.ILocalAccountPerson; import org.apereo.portal.security.ISecurityContext; import org.apereo.portal.security.PortalSecurityException; import org.apereo.portal.spring.locator.LocalAccountDaoLocator; /** * This is an implementation of a SecurityContext that merely checks to see if the user exists in * the UP_USERS database table but otherwise presumes to be pre-authenticated by the context from * which it is called. The typical system where this might be used is a portal whose main page is * protected by HTTP authentication (BASIC or otherwise). * */ class TrustSecurityContext extends ChainingSecurityContext implements ISecurityContext { private static final Log log = LogFactory.getLog(TrustSecurityContext.class); private final int TRUSTSECURITYAUTHTYPE = 0xFF01; TrustSecurityContext() { super(); } public int getAuthType() { return this.TRUSTSECURITYAUTHTYPE; } public synchronized void authenticate() throws PortalSecurityException { this.isauth = true; if (this.myPrincipal.UID != null) { try { String first_name, last_name; ILocalAccountDao accountStore = LocalAccountDaoLocator.getLocalAccountDao(); ILocalAccountPerson account = accountStore.getPerson(this.myPrincipal.UID); if (account != null) { first_name = (String) account.getAttributeValue("given"); last_name = (String) account.getAttributeValue("sn"); this.myPrincipal.FullName = first_name + " " + last_name; if (log.isInfoEnabled()) log.info("User " + this.myPrincipal.UID + " is authenticated"); this.isauth = true; } else { if (log.isInfoEnabled()) log.info("No such user: " + this.myPrincipal.UID); } } catch (Exception e) { PortalSecurityException ep = new PortalSecurityException("SQL Database Error"); log.error(e, e); throw (ep); } } else { log.error("Principal not initialized prior to authenticate"); } // Ok...we are now ready to authenticate all of our subcontexts. super.authenticate(); return; } }