Package org.jboss.security.authorization.modules.ejb

Source Code of org.jboss.security.authorization.modules.ejb.EJBJACCPolicyModuleDelegate

/*
  * JBoss, Home of Professional Open Source
  * Copyright 2005, JBoss Inc., and individual contributors as indicated
  * by the @authors tag. See the copyright.txt in the distribution for a
  * full listing of individual contributors.
  *
  * This is free software; you can redistribute it and/or modify it
  * under the terms of the GNU Lesser General Public License as
  * published by the Free Software Foundation; either version 2.1 of
  * the License, or (at your option) any later version.
  *
  * This software is distributed in the hope that it will be useful,
  * but WITHOUT ANY WARRANTY; without even the implied warranty of
  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  * Lesser General Public License for more details.
  *
  * You should have received a copy of the GNU Lesser General Public
  * License along with this software; if not, write to the Free
  * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
  * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
  */
package org.jboss.security.authorization.modules.ejb;

import java.lang.reflect.Method;
import java.security.CodeSource;
import java.security.Permission;
import java.security.Policy;
import java.security.Principal;
import java.security.ProtectionDomain;
import java.util.Map;

import javax.security.auth.Subject;
import javax.security.jacc.EJBMethodPermission;
import javax.security.jacc.EJBRoleRefPermission;

import org.jboss.logging.Logger;
import org.jboss.security.authorization.AuthorizationContext;
import org.jboss.security.authorization.PolicyRegistration;
import org.jboss.security.authorization.Resource;
import org.jboss.security.authorization.ResourceKeys;
import org.jboss.security.authorization.modules.AbstractJACCModuleDelegate;
import org.jboss.security.authorization.modules.AuthorizationModuleDelegate;
import org.jboss.security.authorization.resources.EJBResource;
import org.jboss.security.identity.Role;
import org.jboss.security.identity.RoleGroup;

//$Id: EJBJACCPolicyModuleDelegate.java 68749 2008-01-09 20:25:39Z anil.saldhana@jboss.com $

/**
*  Authorization Module delegate that deals with the authorization decisions
*  for the EJB Layer
@author <a href="mailto:Anil.Saldhana@jboss.org">Anil Saldhana</a>
@since  Jul 6, 2006
@version $Revision: 68749 $
*/
public class EJBJACCPolicyModuleDelegate extends AbstractJACCModuleDelegate
   private String ejbName = null;
   private Method ejbMethod = null;
   private String methodInterface = null;
   private CodeSource ejbCS = null;
   private String roleName = null
   private Boolean roleRefCheck = Boolean.FALSE;
   //private Group securityContextRoles = null;
  
   public EJBJACCPolicyModuleDelegate()
   {
      log = Logger.getLogger(getClass());
      trace = log.isTraceEnabled();
   }
  
   /**
    * @see AuthorizationModuleDelegate#authorize(Resource)
    */
   public int authorize(Resource resource, Subject callerSubject, RoleGroup role)
   {
      if(resource instanceof EJBResource == false)
         throw new IllegalArgumentException("resource is not an EJBResource");
     
      EJBResource ejbResource = (EJBResource) resource;
     
      //Get the context map
      Map<String,Object> map = resource.getMap();
      if(map == null)
         throw new IllegalStateException("Map from the Resource is null");
   
      /*AuthorizationManager am = (AuthorizationManager) map.get("authorizationManager");
      if(am == null)
         throw new IllegalStateException("Authorization Manager is null");
      if(am instanceof PolicyRegistration)
         this.policyRegistration = (PolicyRegistration) am;
      */
      this.policyRegistration = (PolicyRegistration) map.get(ResourceKeys.POLICY_REGISTRATION);
     
      this.ejbCS = ejbResource.getCodeSource();
      this.ejbMethod = ejbResource.getEjbMethod();
      this.ejbName = ejbResource.getEjbName();
      this.methodInterface = ejbResource.getEjbMethodInterface();
     
      this.roleName = (String)map.get(ResourceKeys.ROLENAME);
      //Get the Security Context Roles
      /*if(am != null)
      {
         Principal ejbPrincipal = (Principal)map.get(ResourceKeys.EJB_PRINCIPAL);
         Set<Principal> roleset = am.getUserRoles(ejbPrincipal);
         this.securityContextRoles = getGroupFromRoleSet(roleset);
      } */
      this.roleRefCheck = (Boolean)map.get(ResourceKeys.ROLEREF_PERM_CHECK);
      if(this.roleRefCheck == Boolean.TRUE)
         return checkRoleRef(callerSubject, role);
      else
         return process(callerSubject, role);
   }
  
   //Private Methods
   /**
    * Process the request
    * @param request
    * @param sc
    * @return
    */
   private int process(Subject callerSubject, Role role)
   { 
      EJBMethodPermission methodPerm =
         new EJBMethodPermission(ejbName, methodInterface, ejbMethod);
      boolean policyDecision = checkWithPolicy(methodPerm, callerSubject, role);
      if( policyDecision == false )
      {
         String msg = "Denied: "+methodPerm+", caller=" + callerSubject;
         if(trace)
            log.trace("EJB Jacc Delegate:"+msg)
     
      return policyDecision ? AuthorizationContext.PERMIT : AuthorizationContext.DENY;
   }
  
   private int checkRoleRef(Subject callerSubject, RoleGroup callerRoles)
   {
      //This has to be the EJBRoleRefPermission 
      EJBRoleRefPermission ejbRoleRefPerm = new EJBRoleRefPermission(ejbName,roleName);
      boolean policyDecision = checkWithPolicy(ejbRoleRefPerm, callerSubject, callerRoles);
      if( policyDecision == false )
      {
         String msg = "Denied: "+ejbRoleRefPerm+", caller=" + callerSubject;
         if(trace)
            log.trace("EJB Jacc Delegate:"+msg)
     
      return policyDecision ? AuthorizationContext.PERMIT : AuthorizationContext.DENY;
   }
  
   /*private Principal[] getPrincipalSet(Subject callerSubject, Role role)
   {
      Principal[] principals = null;
      *//**
       * Previously, we relied on the principals in the Subject that contained
       * the roles. Now we just rely on the roles from the Security Context
       *//*
      if(trace)
         log.trace("Roles used for checking from the context:" + securityContextRoles);
      if(securityContextRoles != null )
      {
         Set<Principal> principalsSet = new HashSet<Principal>();
         Enumeration<? extends Principal> en = securityContextRoles.members();
         while(en.hasMoreElements())
            principalsSet.add(en.nextElement());
         principals = new Principal[principalsSet.size()];
         principalsSet.toArray(principals);
      }
      return principals;
   }*/
  
   private boolean checkWithPolicy(Permission ejbPerm, Subject subject, Role role)
   {
      Principal[] principals = this.getPrincipals(subject, role)
      ProtectionDomain pd = new ProtectionDomain (ejbCS, null, null, principals);
      return Policy.getPolicy().implies(pd, ejbPerm);
   }
  
   /*private Group getGroupFromRoleSet(Set<Principal> roleset)
   {
      Group gp = new SimpleGroup(SecurityConstants.ROLES_IDENTIFIER);
      for(Principal p: roleset)
      {
         gp.addMember(p);
      }
      return gp;
   }*/
}
TOP

Related Classes of org.jboss.security.authorization.modules.ejb.EJBJACCPolicyModuleDelegate

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.