/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2017 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://oss.oracle.com/licenses/CDDL+GPL-1.1
* or LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package com.sun.enterprise.security.ee.auth.login;
import com.sun.appserv.security.ProgrammaticLoginPermission;
import com.sun.enterprise.security.SecurityServicesUtil;
import java.util.logging.Logger;
import java.util.logging.Level;
import java.security.AccessController;
import java.security.PrivilegedAction;
import java.security.PrivilegedExceptionAction;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import com.sun.logging.LogDomains;
import com.sun.enterprise.security.auth.login.LoginContextDriver;
import com.sun.enterprise.security.UsernamePasswordStore;
import com.sun.enterprise.security.web.integration.WebProgrammaticLogin;
import org.jvnet.hk2.annotations.Service;
import org.glassfish.hk2.api.PerLookup;
import org.glassfish.hk2.api.ServiceLocator;
import com.sun.enterprise.security.common.SecurityConstants;
import com.sun.enterprise.security.common.Util;
/**
* Implement programmatic login.
*
* <P>This class allows deployed applications to supply a name and
* password directly to the security service. This info will be used
* to attempt to login to the current realm. If authentication succeeds,
* a security context is established as this user.
*
* <P>This allows applications to programmatically handle authentication.
* The use of this mechanism is not recommended since it bypasses the
* standard J2EE mechanisms and places all burden on the application
* developer.
*
* <P>Invoking this method requires the permission
* ProgrammaticLoginPermission with the method name being invoked.
*
* <P>There are two forms of the login method, one which includes the HTTP
* request and response objects for use by servlets and one which can be used
* by EJBs.
*
*
*/
@Service
@PerLookup
public class ProgrammaticLogin
{
private WebProgrammaticLogin webProgrammaticLogin;
private static final Logger logger =
LogDomains.getLogger(ProgrammaticLogin.class, LogDomains.SECURITY_LOGGER);
private static ProgrammaticLoginPermission plLogin =
new ProgrammaticLoginPermission("login");
private static ProgrammaticLoginPermission plLogout =
new ProgrammaticLoginPermission("logout");
private static final String DEFAULT_WEBPROGRAMMATICLOGIN_IMPL="com.sun.web.security.WebProgrammaticLoginImpl";
/*V3:Commented
private static boolean isServer =
(ApplicationServer.getServerContext() != null);*/
private static javax.security.auth.callback.CallbackHandler handler = new com.sun.enterprise.security.auth.login.LoginCallbackHandler(false);
public ProgrammaticLogin() {
if (SecurityServicesUtil.getInstance() != null) {
resolveWebProgrammaticLogin();
}
}
/**
* Password should be used as a char[]
*/
@Deprecated
public Boolean login(final String user, final String password,
final String realm, boolean errors) throws Exception
{
return login(user, password.toCharArray(),realm, errors);
}
/**
* Attempt to login.
*
* <P>Upon successful return from this method the SecurityContext will
* be set in the name of the given user as its Subject.
*
* <p>On client side, realm and errors parameters will be ignored and
* the actual login will not occur until we actually access a resource
* requiring a login. And a java.rmi.AccessException with
* COBRA NO_PERMISSION will occur when actual login is failed.
*
* <P>This method is intented primarily for EJBs wishing to do
* programmatic login. If servlet code used this method the established
* identity will be propagated to EJB calls but will not be used for
* web container manager authorization. In general servlets should use
* the servlet-specific version of login instead.
*
* @param user User name.
* @param password Password for user.
* @param realm the realm name in which the user should be logged in.
* @param errors errors=true, propagate any exception encountered to the user
* errors=false, no exceptions are propagated.
* @return Boolean containing true or false to indicate success or
* failure of login.
* @throws Exception any exception encountered during Login.
*/
public Boolean login(final String user, final char[] password,
final String realm, boolean errors) throws Exception
{
Boolean authenticated = null;
// check permission to login
try {
// exception thrown on failure
checkLoginPermission(user);
// try to login. doPrivileged is used since application code does
// not have permissions to process the jaas login.
authenticated = AccessController.doPrivileged(new PrivilegedAction<Boolean>() {
public java.lang.Boolean run() {
// if realm is null, LCD will log into the default realm
if (((SecurityServicesUtil.getInstance() != null) && SecurityServicesUtil.getInstance().isServer())
|| Util.isEmbeddedServer()){
LoginContextDriver.login(user, password, realm);
} else {
int type = SecurityConstants.USERNAME_PASSWORD;
//should not set realm here
// Bugfix# 6387278. The UsernamePasswordStore
// abstracts the thread-local/global details
UsernamePasswordStore.set(user, password);
try {
LoginContextDriver.doClientLogin(type, handler);
} finally {
// For security, if thread-local no need to
// save the username/password state
UsernamePasswordStore.resetThreadLocalOnly();
}
}
return Boolean.valueOf(true);
}
});
} catch (Exception e) {
logger.log(Level.SEVERE,"prog.login.failed", e);
if(errors == true){ // propagate the exception ahead
throw e;
} else{
authenticated = Boolean.valueOf(false);
}
}
return authenticated;
}
/*
* Use of the char[] as password is encouraged
*/
@Deprecated
public Boolean login(final String user, final String password)
{
return login(user, password.toCharArray());
}
/** Attempt to login.
*
* <P>Upon successful return from this method the SecurityContext will
* be set in the name of the given user as its Subject.
*
* <p>On client side, the actual login will not occur until we actually
* access a resource requiring a login. And a java.rmi.AccessException
* with COBRA NO_PERMISSION will occur when actual login is failed.
*
* <P>This method is intented primarily for EJBs wishing to do
* programmatic login. If servlet code used this method the established
* identity will be propagated to EJB calls but will not be used for
* web container manager authorization. In general servlets should use
* the servlet-specific version of login instead.
*
* @param user User name.
* @param password Password for user.
* @return Boolean containing true or false to indicate success or
* failure of login.
*/
public Boolean login(final String user, final char[] password)
{
// call login with realm-name = null and request for errors = false
Boolean authenticated = null;
try{
authenticated = login(user, password, null, false);
} catch(Exception e){
// sanity checking, will never come here
authenticated = Boolean.valueOf(false);
}
return authenticated;
}
/*
* Use of the char[] as password is encouraged
*/
@Deprecated
public Boolean login(final String user, final String password,
final String realm,
final HttpServletRequest request,
final HttpServletResponse response, boolean errors)
throws Exception {
return login(user, password.toCharArray(), realm, request, response, errors);
}
/** Attempt to login. This method is specific to servlets (and JSPs).
*
* <P>Upon successful return from this method the SecurityContext will
* be set in the name of the given user as its Subject. In addition, the
* principal stored in the request is set to the user name. If a session
* is available, its principal is also set to the user provided.
*
* @returns Boolean containing true or false to indicate success or
* failure of login.
* @param realm
* @param errors
* @param user User name.
* @param password Password for user.
* @param request HTTP request object provided by caller application. It
* should be an instance of HttpRequestFacade.
* @param response HTTP response object provided by called application. It
* should be an instance of HttpServletResponse.
* @throws Exception any exceptions encountered during login
* @return Boolean indicating true for successful login and false otherwise
*/
public Boolean login(final String user, final char[] password,
final String realm,
final HttpServletRequest request,
final HttpServletResponse response, boolean errors)
throws Exception
{
Boolean authenticated = null;
try{
// check permission to login
checkLoginPermission(user);
// try to login. doPrivileged is used since application code does
// not have permissions to process the jaas login.
authenticated = AccessController.doPrivileged(new PrivilegedAction<Boolean>() {
public Boolean run() {
return webProgrammaticLogin.login(user, password, realm,
request, response);
}
});
} catch(Exception e){
if(errors != true){
authenticated = Boolean.valueOf(false);
} else{
throw e;
}
}
return authenticated;
}
/*
* Use of char[] as password is encouraged
*/
@Deprecated
public Boolean login(final String user, final String password,
final HttpServletRequest request,
final HttpServletResponse response) {
return login(user, password.toCharArray(), request, response);
}
/**
* Attempt to login. This method is specific to servlets (and JSPs).
*
* <P>Upon successful return from this method the SecurityContext will
* be set in the name of the given user as its Subject. In addition, the
* principal stored in the request is set to the user name. If a session
* is available, its principal is also set to the user provided.
*
* @param user User name.
* @param password Password for user.
* @param request HTTP request object provided by caller application. It
* should be an instance of HttpRequestFacade.
* @param response HTTP response object provided by called application. It
* should be an instance of HttpServletResponse.
* @return Boolean containing true or false to indicate success or
* failure of login.
*
*/
public Boolean login(final String user, final char[] password,
final HttpServletRequest request,
final HttpServletResponse response)
{
Boolean authenticated = null;
try{
// pass a null realmname and errors=false
authenticated = login(user, password, null, request, response, false);
}catch (Exception e){
// sanity check will never come here
authenticated = Boolean.valueOf(false);
}
return authenticated;
}
/**
* Attempt to logout.
* @returns Boolean containing true or false to indicate success or
* failure of logout.
*
*/
public Boolean logout()
{
Boolean loggedout = null;
try{
loggedout = logout(false);
} catch(Exception e){
// sanity check will never come here
loggedout = Boolean.valueOf(false);
}
return loggedout;
}
/**
* Attempt to logout.
* @param errors, errors = true, the method will propagate the exceptions
* encountered while logging out, errors=false will return a Boolean value
* of false indicating failure of logout
* @return Boolean containing true or false to indicate success or
* failure of logout.
* @throws Exception encountered while logging out, if errors==false
*
*/
public Boolean logout(boolean errors) throws Exception
{
Boolean loggedout = null;
// check logout permission
try{
checkLogoutPermission();
AccessController.doPrivileged(new PrivilegedAction<Object>() {
public java.lang.Object run() {
//V3:Commentedif (isServer) {
if (SecurityServicesUtil.getInstance() != null &&
SecurityServicesUtil.getInstance().isServer()) {
LoginContextDriver.logout();
} else {
// Reset the username/password state on logout
UsernamePasswordStore.reset();
LoginContextDriver.doClientLogout();
//If user try to access a protected resource after here
//then it will prompt for password in appclient or
//just fail in standalone client.
}
return null;
}
});
loggedout = Boolean.valueOf(true);
} catch (Exception e) {
logger.log(Level.WARNING, "prog.logout.failed", e);
if(errors){
throw e;
} else{
loggedout = Boolean.valueOf(false);
}
}
return loggedout;
}
/**
* Attempt to logout. Also removes principal from request (and session
* if available).
*
* @returns Boolean containing true or false to indicate success or
* failure of logout.
*
*/
public Boolean logout(final HttpServletRequest request,
final HttpServletResponse response)
{
Boolean loggedout = null;
try{
loggedout = logout(request, response, false);
}catch(Exception e){
// sanity check, will never come here
loggedout = Boolean.valueOf(false);
}
return loggedout;
}
/**
* Attempt to logout. Also removes principal from request (and session
* if available).
* @param errors, errors = true, the method will propagate the exceptions
* encountered while logging out, errors=false will return a Boolean value
* of false indicating failure of logout
*
* @return Boolean containing true or false to indicate success or
* failure of logout.
* @throws Exception, exception encountered while logging out and if errors
* == true
*/
public Boolean logout(final HttpServletRequest request,
final HttpServletResponse response,
boolean errors) throws Exception
{
// check logout permission
Boolean loggedout = null;
try{
checkLogoutPermission();
loggedout = AccessController.doPrivileged(new PrivilegedExceptionAction<Boolean>() {
public Boolean run() throws Exception{
return webProgrammaticLogin.logout(request, response);
}
});
}catch(Exception e){
if(errors){
throw e;
}else{
loggedout = Boolean.valueOf(false);
}
}
return loggedout;
}
/**
* Check whether caller has login permission.
*
*/
private void checkLoginPermission(String user) throws Exception
{
try {
if(logger.isLoggable(Level.FINE)){
logger.log(Level.FINE, "ProgrammaticLogin.login() called for user: "
+ user);
}
SecurityManager sm = System.getSecurityManager();
if (sm != null) {
sm.checkPermission(plLogin);
}
} catch (Exception e) {
logger.warning("proglogin.noperm");
throw e;
}
}
/**
* Check if caller has logout permission.
*
*/
private void checkLogoutPermission() throws Exception
{
try {
if(logger.isLoggable(Level.FINE)){
logger.log(Level.FINE, "ProgrammaticLogin.logout() called.");
}
SecurityManager sm = System.getSecurityManager();
if (sm != null) {
sm.checkPermission(plLogout);
}
} catch (Exception e) {
logger.warning("prologout.noperm");
throw e;
}
}
private void resolveWebProgrammaticLogin() {
ServiceLocator habitat = SecurityServicesUtil.getInstance().getHabitat();
this.webProgrammaticLogin = habitat.getService(WebProgrammaticLogin.class);
}
}