/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.wss4j.stax.setup; import java.nio.charset.StandardCharsets; import java.util.Collections; import java.util.Iterator; import java.util.List; import javax.xml.stream.XMLInputFactory; import javax.xml.stream.XMLStreamException; import javax.xml.stream.XMLStreamReader; import org.apache.wss4j.common.ext.WSSecurityException; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.impl.InboundWSSecurityContextImpl; import org.apache.wss4j.stax.impl.WSSecurityStreamReader; import org.apache.wss4j.stax.impl.processor.input.OperationInputProcessor; import org.apache.wss4j.stax.impl.processor.input.SecurityHeaderInputProcessor; import org.apache.wss4j.stax.impl.processor.input.SignatureConfirmationInputProcessor; import org.apache.wss4j.stax.securityEvent.WSSecurityEventConstants; import org.apache.xml.security.exceptions.XMLSecurityException; import org.apache.xml.security.stax.ext.InputProcessor; import org.apache.xml.security.stax.impl.DocumentContextImpl; import org.apache.xml.security.stax.impl.InputProcessorChainImpl; import org.apache.xml.security.stax.impl.processor.input.LogInputProcessor; import org.apache.xml.security.stax.impl.processor.input.XMLEventReaderInputProcessor; import org.apache.xml.security.stax.impl.util.IDGenerator; import org.apache.xml.security.stax.securityEvent.SecurityEvent; import org.apache.xml.security.stax.securityEvent.SecurityEventListener; import org.apache.xml.security.stax.securityEvent.TokenSecurityEvent; import org.apache.xml.security.stax.securityToken.InboundSecurityToken; import org.apache.xml.security.stax.securityToken.SecurityTokenProvider; /** * Inbound Streaming-WebService-Security * An instance of this class can be retrieved over the WSSec class */ public class InboundWSSec { protected static final transient org.slf4j.Logger LOG = org.slf4j.LoggerFactory.getLogger(InboundWSSec.class); private static final XMLInputFactory XML_INPUT_FACTORY = XMLInputFactory.newInstance(); static { XML_INPUT_FACTORY.setProperty(XMLInputFactory.SUPPORT_DTD, false); XML_INPUT_FACTORY.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); try { XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.internNames", true); XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.internNsUris", true); XML_INPUT_FACTORY.setProperty("org.codehaus.stax2.preserveLocation", false); } catch (IllegalArgumentException e) { LOG.debug(e.getMessage(), e); //ignore } } private final WSSSecurityProperties securityProperties; private final boolean initiator; private final boolean returnSecurityError; public InboundWSSec(WSSSecurityProperties securityProperties) { this(securityProperties, false, false); } public InboundWSSec(WSSSecurityProperties securityProperties, boolean initiator, boolean returnSecurityError) { this.securityProperties = securityProperties; this.initiator = initiator; this.returnSecurityError = returnSecurityError; } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); * <p/> * This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws XMLSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, null, (SecurityEventListener)null); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); * <p/> * This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws XMLSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List<SecurityEvent> requestSecurityEvents ) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, requestSecurityEvents, (SecurityEventListener)null); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); * <p/> * This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @param securityEventListener A SecurityEventListener to receive security-relevant events. * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws XMLSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List<SecurityEvent> requestSecurityEvents, SecurityEventListener securityEventListener) throws XMLStreamException, WSSecurityException { return this.processInMessage(xmlStreamReader, requestSecurityEvents, Collections.singletonList(securityEventListener)); } /** * Warning: * configure your xmlStreamReader correctly. Otherwise you can create a security hole. * At minimum configure the following properties: * xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); * xmlInputFactory.setProperty(XMLInputFactory.IS_COALESCING, false); * xmlInputFactory.setProperty(WstxInputProperties.P_MIN_TEXT_SEGMENT, new Integer(8192)); * <p/> * This method is the entry point for the incoming security-engine. * Hand over the original XMLStreamReader and use the returned one for further processing * * @param xmlStreamReader The original XMLStreamReader * @param securityEventListeners A list of SecurityEventListeners to receive security-relevant events. * @return A new XMLStreamReader which does transparently the security processing. * @throws XMLStreamException thrown when a streaming error occurs * @throws XMLSecurityException */ public XMLStreamReader processInMessage( XMLStreamReader xmlStreamReader, List<SecurityEvent> requestSecurityEvents, List<SecurityEventListener> securityEventListeners) throws XMLStreamException, WSSecurityException { if (requestSecurityEvents == null) { requestSecurityEvents = Collections.emptyList(); } final InboundWSSecurityContextImpl securityContextImpl = new InboundWSSecurityContextImpl(); securityContextImpl.putList(SecurityEvent.class, requestSecurityEvents); if (securityEventListeners != null) { for (SecurityEventListener securityEventListener : securityEventListeners) { securityContextImpl.addSecurityEventListener(securityEventListener); } } securityContextImpl.ignoredBSPRules(this.securityProperties.getIgnoredBSPRules()); securityContextImpl.setDisableBSPEnforcement(this.securityProperties.isDisableBSPEnforcement()); securityContextImpl.setAllowRSA15KeyTransportAlgorithm(this.securityProperties.isAllowRSA15KeyTransportAlgorithm()); if (!requestSecurityEvents.isEmpty()) { try { Iterator<SecurityEvent> securityEventIterator = requestSecurityEvents.iterator(); while (securityEventIterator.hasNext()) { SecurityEvent securityEvent = securityEventIterator.next(); if (securityEvent instanceof TokenSecurityEvent) { @SuppressWarnings("unchecked") final TokenSecurityEvent<? extends InboundSecurityToken> tokenSecurityEvent = (TokenSecurityEvent<? extends InboundSecurityToken>)securityEvent; if (WSSecurityEventConstants.HTTPS_TOKEN.equals(securityEvent.getSecurityEventType())) { securityContextImpl.registerSecurityEvent(securityEvent); securityContextImpl.put(WSSConstants.TRANSPORT_SECURITY_ACTIVE, Boolean.TRUE); } SecurityTokenProvider<InboundSecurityToken> securityTokenProvider = new SecurityTokenProvider<InboundSecurityToken>() { private String id; @Override public InboundSecurityToken getSecurityToken() throws XMLSecurityException { return tokenSecurityEvent.getSecurityToken(); } @Override public String getId() { if (this.id == null) { this.id = tokenSecurityEvent.getSecurityToken().getId(); if (this.id == null) { this.id = IDGenerator.generateID(null); } } return this.id; } }; securityContextImpl.registerSecurityTokenProvider(securityTokenProvider.getId(), securityTokenProvider); } } } catch (XMLSecurityException e) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILED_CHECK, e); } } securityContextImpl.put(WSSConstants.XMLINPUTFACTORY, XML_INPUT_FACTORY); DocumentContextImpl documentContext = new DocumentContextImpl(); documentContext.setEncoding(xmlStreamReader.getEncoding() != null ? xmlStreamReader.getEncoding() : StandardCharsets.UTF_8.name()); InputProcessorChainImpl inputProcessorChain = new InputProcessorChainImpl(securityContextImpl, documentContext); inputProcessorChain.addProcessor(new XMLEventReaderInputProcessor(securityProperties, xmlStreamReader)); inputProcessorChain.addProcessor(new SecurityHeaderInputProcessor(securityProperties)); inputProcessorChain.addProcessor(new OperationInputProcessor(securityProperties)); if (securityProperties.isEnableSignatureConfirmationVerification()) { inputProcessorChain.addProcessor(new SignatureConfirmationInputProcessor(securityProperties)); } if (LOG.isTraceEnabled()) { LogInputProcessor logInputProcessor = new LogInputProcessor(securityProperties); logInputProcessor.addAfterProcessor(SecurityHeaderInputProcessor.class.getName()); inputProcessorChain.addProcessor(logInputProcessor); } List<InputProcessor> additionalInputProcessors = securityProperties.getInputProcessorList(); if (!additionalInputProcessors.isEmpty()) { Iterator<InputProcessor> inputProcessorIterator = additionalInputProcessors.iterator(); while (inputProcessorIterator.hasNext()) { InputProcessor inputProcessor = inputProcessorIterator.next(); inputProcessorChain.addProcessor(inputProcessor); } } return new WSSecurityStreamReader(inputProcessorChain, securityProperties, initiator, returnSecurityError); } }