/**
* Copyright 2013 JBoss Inc
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.overlord.dtgov.jbpm.util;
import java.security.Principal;
import java.security.acl.Group;
import java.util.ArrayList;
import java.util.Enumeration;
import java.util.List;
import java.util.Set;
import javax.enterprise.inject.Alternative;
import javax.security.auth.Subject;
import javax.security.jacc.PolicyContext;
import org.kie.internal.task.api.UserGroupCallback;
import org.overlord.commons.auth.filters.SamlBearerTokenAuthFilter;
import org.overlord.commons.auth.filters.SimplePrincipal;
import org.overlord.dtgov.server.i18n.Messages;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* Loosely based on org.jbpm.task.identity.JAASUserGroupCallbackImpl
*
* @author kstam
*
*/
@Alternative
public class DTGovUserGroupCallback implements UserGroupCallback {
private Logger logger = LoggerFactory.getLogger(this.getClass());
/**
* @see org.kie.internal.task.api.UserGroupCallback#existsUser(java.lang.String)
*/
@Override
public boolean existsUser(String userId) {
// allow everything as there is no way to ask JAAS/JACC for users in the domain
return true;
}
/**
* @see org.kie.internal.task.api.UserGroupCallback#existsGroup(java.lang.String)
*/
@Override
public boolean existsGroup(String groupId) {
// allow everything as there is no way to ask JAAS/JACC for groups in the domain
return true;
}
/**
* @see org.kie.internal.task.api.UserGroupCallback#getGroupsForUser(java.lang.String, java.util.List, java.util.List)
*/
@Override
public List<String> getGroupsForUser(String userId, List<String> groupIds,
List<String> allExistingGroupIds) {
// Try our thread local first. If we're using our own authentication mechanism,
// we would have stored it in the ThreadLocal for just this purpose.
SimplePrincipal sp = SamlBearerTokenAuthFilter.TL_principal.get();
if (sp != null) {
return new ArrayList<String>(sp.getRoles());
}
List<String> roles = null;
try {
Subject subject = (Subject) PolicyContext.getContext("javax.security.auth.Subject.container"); //$NON-NLS-1$
if (subject != null) {
Set<Principal> principals = subject.getPrincipals();
if (principals != null) {
roles = new ArrayList<String>();
for (Principal principal : principals) {
if (principal instanceof Group) { //&& rolePrincipleName.equalsIgnoreCase(principal.getName())) {
Enumeration<? extends Principal> groups = ((Group) principal).members();
while (groups.hasMoreElements()) {
Principal groupPrincipal = groups.nextElement();
roles.add(groupPrincipal.getName());
}
break;
}
}
}
}
} catch (Exception e) {
logger.error(Messages.i18n.format("DTGovUserGroupCallback.ErrorGettingRoles", userId), e); //$NON-NLS-1$
}
return roles;
}
}