Package org.jboss.jms.server.jbosssx

Source Code of org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore

/*
* JBoss, Home of Professional Open Source.
* Copyright 2008, Red Hat Middleware LLC, and individual contributors
* as indicated by the @author tags. See the copyright.txt file in the
* distribution for a full listing of individual contributors.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package org.jboss.jms.server.jbosssx;

import java.security.AccessController;
import java.security.Principal;
import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.Map;
import java.util.Set;

import javax.jms.JMSSecurityException;
import javax.naming.NamingException;
import javax.security.auth.Subject;

import org.jboss.jms.server.SecurityStore;
import org.jboss.jms.server.security.CheckType;
import org.jboss.jms.server.security.SecurityMetadata;
import org.jboss.logging.Logger;
import org.jboss.security.AuthenticationManager;
import org.jboss.security.AuthorizationManager;
import org.jboss.security.ISecurityManagement;
import org.jboss.security.SimplePrincipal;
import org.w3c.dom.Element;

/**
* A security metadate store for JMS. Stores security information for destinations and delegates authentication and
* authorization to a JaasSecurityManager.
*
* @author Peter Antman
* @author <a href="mailto:Scott.Stark@jboss.org">Scott Stark</a>
* @author <a href="mailto:tim.fox@jboss.com">Tim Fox</a>
* @author <a href="mailto:ovidiu@feodorov.com">Ovidiu Feodorov</a>
* @author Anil.Saldhana@redhat.com
* @version $Revision: 85945 $
*
* $Id: JBossASSecurityMetadataStore.java 85945 2009-03-16 19:45:12Z dimitris@jboss.org $
*/
@SuppressWarnings("unchecked")
public class JBossASSecurityMetadataStore implements SecurityStore, JBossASSecurityMetadataStoreMBean
{
   // Constants -----------------------------------------------------

   private static final Logger log = Logger.getLogger(JBossASSecurityMetadataStore.class);

   public static final String DEFAULT_SUCKER_USER_PASSWORD = "CHANGE ME!!";

   // Attributes ----------------------------------------------------

   private final boolean trace = log.isTraceEnabled();

   private final Map queueSecurityConf;

   private final Map topicSecurityConf;

   private Element defaultSecurityConfig;

   private String securityDomain = "messaging";

   private String suckerPassword;

   private ISecurityManagement securityManagement = null;

   // Static --------------------------------------------------------

   // Constructors --------------------------------------------------

   public JBossASSecurityMetadataStore()
   {
      queueSecurityConf = new HashMap();
      topicSecurityConf = new HashMap();
   }

   // SecurityManager implementation --------------------------------

   public SecurityMetadata getSecurityMetadata(boolean isQueue, String destName)
   {
      SecurityMetadata m = (SecurityMetadata) (isQueue ? queueSecurityConf.get(destName) : topicSecurityConf
            .get(destName));

      if (m == null)
      {
         // No SecurityMetadata was configured for the destination, apply the default
         if (defaultSecurityConfig != null)
         {
            log.debug("No SecurityMetadadata was available for " + destName + ", using default security config");
            try
            {
               m = new SecurityMetadata(defaultSecurityConfig);
            }
            catch (Exception e)
            {
               log.warn("Unable to apply default security for destName, using guest " + destName, e);
               m = new SecurityMetadata();
            }
         }
         else
         {
            // default to guest
            log.warn("No SecurityMetadadata was available for " + destName + ", adding guest");
            m = new SecurityMetadata();
         }

         // don't cache it! this way the callers will be able to take advantage of default security
         // configuration updates
         // securityConf.put(destName, m);
      }
      return m;
   }

   public void setSecurityConfig(boolean isQueue, String destName, Element conf) throws Exception
   {
      if (trace)
      {
         log.trace("adding security configuration for " + (isQueue ? "queue " : "topic ") + destName);
      }

      if (conf == null)
      {
         clearSecurityConfig(isQueue, destName);
      }
      else
      {
         SecurityMetadata m = new SecurityMetadata(conf);

         if (isQueue)
         {
            queueSecurityConf.put(destName, m);
         }
         else
         {
            topicSecurityConf.put(destName, m);
         }
      }
   }

   public void clearSecurityConfig(boolean isQueue, String name) throws Exception
   {
      if (trace)
      {
         log.trace("clearing security configuration for " + (isQueue ? "queue " : "topic ") + name);
      }

      if (isQueue)
      {
         queueSecurityConf.remove(name);
      }
      else
      {
         topicSecurityConf.remove(name);
      }
   }

   public Subject authenticate(String user, String password) throws JMSSecurityException
   {
      if (trace)
      {
         log.trace("authenticating user " + user);
      }

      SimplePrincipal principal = new SimplePrincipal(user);
      char[] passwordChars = null;
      if (password != null)
      {
         passwordChars = password.toCharArray();
      }

      Subject subject = new Subject();

      boolean authenticated = false;

      if (SUCKER_USER.equals(user))
      {
         if (trace)
         {
            log.trace("Authenticating sucker user");
         }

         checkDefaultSuckerPassword(password);

         // The special user SUCKER_USER is used for creating internal connections that suck messages between nodes

         authenticated = suckerPassword.equals(password);
      }
      else
      {
         if (securityManagement == null)
            throw new SecurityException("SecurityManagement has not been set");
         AuthenticationManager authenticationManager = securityManagement.getAuthenticationManager(securityDomain);
         if (authenticationManager == null)
            throw new SecurityException("AuthenticationManager is null for domain=" + securityDomain);
         authenticated = authenticationManager.isValid(principal, passwordChars, subject);
      }

      if (authenticated)
      {
         // Warning! This "taints" thread local. Make sure you pop it off the stack as soon as
         // you're done with it.
         SecurityActions.pushSubjectContext(principal, passwordChars, subject, securityDomain);
         return subject;
      }
      else
      {
         throw new JMSSecurityException("User " + user + " is NOT authenticated");
      }
   }

   public boolean authorize(String user, final Set rolePrincipals, CheckType checkType)
   {
      if (trace)
      {
         log.trace("authorizing user " + user + " for role(s) " + rolePrincipals.toString());
      }

      if (SUCKER_USER.equals(user))
      {
         // The special user SUCKER_USER is used for creating internal connections that suck messages between nodes
         // It has automatic read/write access to all destinations
         return (checkType.equals(CheckType.READ) || checkType.equals(CheckType.WRITE));
      }

      final Principal principal = user == null ? null : new SimplePrincipal(user);
      if (securityManagement == null)
         throw new SecurityException("SecurityManagement has not been set");
      final AuthorizationManager authorizationManager = securityManagement.getAuthorizationManager(securityDomain);
      if (authorizationManager == null)
         throw new SecurityException("AuthorizationManager is null for domain=" + securityDomain);
      boolean hasRole = AccessController.doPrivileged(new PrivilegedAction<Boolean>()
      {
         public Boolean run()
         {
             return authorizationManager.doesUserHaveRole(principal, rolePrincipals);
         }});

      if (trace)
      {
         log.trace("user " + user + (hasRole ? " is " : " is NOT ") + "authorized");
      }

      return hasRole;
   }

   // Public --------------------------------------------------------

   public void setSuckerPassword(String password)
   {
      checkDefaultSuckerPassword(password);

      this.suckerPassword = password;
   }

   /**
    * @see JBossASSecurityMetadataStoreMBean#setSecurityManagement(ISecurityManagement)
    */
   public void setSecurityManagement(ISecurityManagement securityManagement)
   {
      this.securityManagement = securityManagement;
   }

   public void start() throws NamingException
   {
   }

   public void stop() throws Exception
   {
   }

   public String getSecurityDomain()
   {
      return this.securityDomain;
   }

   public void setSecurityDomain(String securityDomain)
   {
      this.securityDomain = securityDomain;
   }

   public Element getDefaultSecurityConfig()
   {
      return this.defaultSecurityConfig;
   }

   public void setDefaultSecurityConfig(Element conf) throws Exception
   {
      // Force a parse
      new SecurityMetadata(conf);
      defaultSecurityConfig = conf;
   }

   // Protected -----------------------------------------------------

   // Package Private -----------------------------------------------

   // Private -------------------------------------------------------

   private void checkDefaultSuckerPassword(String password)
   {
      // Sanity check
      if (DEFAULT_SUCKER_USER_PASSWORD.equals(password))
      {
         log
               .warn("WARNING! POTENTIAL SECURITY RISK. It has been detected that the MessageSucker component "
                     + "which sucks messages from one node to another has not had its password changed from the installation default. "
                     + "Please see the JBoss Messaging user guide for instructions on how to do this.");
      }
   }
}
TOP

Related Classes of org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.