/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.cxf.ws.security.trust.delegation; import java.io.IOException; import java.lang.ref.WeakReference; import java.util.ArrayList; import java.util.List; import java.util.Map; import javax.security.auth.callback.Callback; import javax.security.auth.callback.CallbackHandler; import javax.security.auth.callback.UnsupportedCallbackException; import org.w3c.dom.Element; import org.apache.cxf.binding.soap.SoapMessage; import org.apache.cxf.helpers.CastUtils; import org.apache.cxf.message.Message; import org.apache.cxf.phase.PhaseInterceptorChain; import org.apache.wss4j.common.saml.SamlAssertionWrapper; import org.apache.wss4j.common.token.PKIPathSecurity; import org.apache.wss4j.common.token.X509Security; import org.apache.wss4j.dom.WSConstants; import org.apache.wss4j.dom.engine.WSSecurityEngineResult; import org.apache.wss4j.dom.handler.WSHandlerConstants; import org.apache.wss4j.dom.handler.WSHandlerResult; /** * This CallbackHandler implementation obtains the previously received message from a * DelegationCallback object, and obtains a received token * (SAML/UsernameToken/BinarySecurityToken) from it to be used as the delegation token. */ public class ReceivedTokenCallbackHandler implements CallbackHandler { private static final List<Integer> DEFAULT_SECURITY_PRIORITIES = new ArrayList<>(); static { DEFAULT_SECURITY_PRIORITIES.add(WSConstants.ST_SIGNED); DEFAULT_SECURITY_PRIORITIES.add(WSConstants.ST_UNSIGNED); DEFAULT_SECURITY_PRIORITIES.add(WSConstants.UT); DEFAULT_SECURITY_PRIORITIES.add(WSConstants.BST); DEFAULT_SECURITY_PRIORITIES.add(WSConstants.UT_NOPASSWORD); } private List<Integer> securityPriorities = new ArrayList<>(DEFAULT_SECURITY_PRIORITIES); private boolean useTransformedToken = true; @SuppressWarnings("unchecked") public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { for (int i = 0; i < callbacks.length; i++) { if (callbacks[i] instanceof DelegationCallback) { DelegationCallback callback = (DelegationCallback) callbacks[i]; Message message = callback.getCurrentMessage(); if (message != null && message.get(PhaseInterceptorChain.PREVIOUS_MESSAGE) != null) { WeakReference<SoapMessage> wr = (WeakReference<SoapMessage>) message.get(PhaseInterceptorChain.PREVIOUS_MESSAGE); SoapMessage previousSoapMessage = wr.get(); Element token = getTokenFromMessage(previousSoapMessage); if (token != null) { callback.setToken(token); } } } else { throw new UnsupportedCallbackException(callbacks[i], "Unrecognized Callback"); } } } private Element getTokenFromMessage(SoapMessage soapMessage) { if (soapMessage != null) { List<WSHandlerResult> results = CastUtils.cast((List<?>)soapMessage.get(WSHandlerConstants.RECV_RESULTS)); if (results != null) { for (WSHandlerResult handlerResult : results) { Element token = getTokenFromResults(handlerResult); if (token != null) { return token; } } } } return null; } private Element getTokenFromResults(WSHandlerResult handlerResult) { // Now go through the results in a certain order. Highest priority is first. Map<Integer, List<WSSecurityEngineResult>> actionResults = handlerResult.getActionResults(); for (Integer resultPriority : securityPriorities) { List<WSSecurityEngineResult> foundResults = actionResults.get(resultPriority); if (foundResults != null && !foundResults.isEmpty()) { for (WSSecurityEngineResult result : foundResults) { if (!skipResult(resultPriority, result)) { // First check for a transformed token Object transformedToken = result.get(WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN); if (useTransformedToken && transformedToken instanceof SamlAssertionWrapper) { return ((SamlAssertionWrapper)transformedToken).getElement(); } if (result.get(WSSecurityEngineResult.TAG_TOKEN_ELEMENT) != null) { return (Element)result.get(WSSecurityEngineResult.TAG_TOKEN_ELEMENT); } } } } } return null; } protected boolean skipResult(Integer resultPriority, WSSecurityEngineResult result) { Object binarySecurity = result.get(WSSecurityEngineResult.TAG_BINARY_SECURITY_TOKEN); return resultPriority == WSConstants.BST && (binarySecurity instanceof X509Security || binarySecurity instanceof PKIPathSecurity); } public boolean isUseTransformedToken() { return useTransformedToken; } /** * Set whether to use the transformed token if it is available from a previous security result. * It false, it uses the original "received" token instead. The default is "true". * @param useTransformedToken whether to use the transformed token if it is available */ public void setUseTransformedToken(boolean useTransformedToken) { this.useTransformedToken = useTransformedToken; } public List<Integer> getSecurityPriorities() { return securityPriorities; } public void setSecurityPriorities(List<Integer> securityPriorities) { this.securityPriorities = securityPriorities; } }