FileDocCategorySizeDatePackage
ConfigXMLParser.javaAPI DocGlassfish v2 API18165Fri May 04 22:35:36 BST 2007com.sun.enterprise.security.jauth

ConfigXMLParser.java

/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 * 
 * Copyright 1997-2007 Sun Microsystems, Inc. All rights reserved.
 * 
 * The contents of this file are subject to the terms of either the GNU
 * General Public License Version 2 only ("GPL") or the Common Development
 * and Distribution License("CDDL") (collectively, the "License").  You
 * may not use this file except in compliance with the License. You can obtain
 * a copy of the License at https://glassfish.dev.java.net/public/CDDL+GPL.html
 * or glassfish/bootstrap/legal/LICENSE.txt.  See the License for the specific
 * language governing permissions and limitations under the License.
 * 
 * When distributing the software, include this License Header Notice in each
 * file and include the License file at glassfish/bootstrap/legal/LICENSE.txt.
 * Sun designates this particular file as subject to the "Classpath" exception
 * as provided by Sun in the GPL Version 2 section of the License file that
 * accompanied this code.  If applicable, add the following below the License
 * Header, with the fields enclosed by brackets [] replaced by your own
 * identifying information: "Portions Copyrighted [year]
 * [name of copyright owner]"
 * 
 * Contributor(s):
 * 
 * If you wish your version of this file to be governed by only the CDDL or
 * only the GPL Version 2, indicate your decision by adding "[Contributor]
 * elects to include this software in this distribution under the [CDDL or GPL
 * Version 2] license."  If you don't indicate a single choice of license, a
 * recipient has the option to distribute your version of this file under
 * either the CDDL, the GPL Version 2 or to extend the choice of license to
 * its licensees as provided above.  However, if you add GPL Version 2 code
 * and therefore, elected the GPL Version 2 license, then the option applies
 * only if the new code is made subject to such option by the copyright
 * holder.
 */

package com.sun.enterprise.security.jauth;

import java.util.ArrayList;
import java.util.HashMap;
import java.io.IOException;
import javax.security.auth.login.AppConfigurationEntry;

import sun.security.util.Debug;
import sun.security.util.PropertyExpander;

import com.sun.enterprise.config.ConfigContext;
import com.sun.enterprise.config.ConfigException;
import com.sun.enterprise.config.ConfigFactory;
import com.sun.enterprise.config.clientbeans.ClientBeansResolver;
import com.sun.enterprise.config.clientbeans.ClientContainer;
import com.sun.enterprise.config.serverbeans.Server;
import com.sun.enterprise.config.serverbeans.SecurityService;
import com.sun.enterprise.config.serverbeans.ServerBeansFactory;
import com.sun.enterprise.server.ApplicationServer;
import com.sun.enterprise.Switch;

import com.sun.logging.*;
import java.util.logging.*;

/**
 * Parser for message-security-config in domain.xml or sun-acc.xml
 */
class ConfigXMLParser implements ConfigParser {

    private static Logger _logger=null;
    static {
        _logger = LogDomains.getLogger(LogDomains.SECURITY_LOGGER);
    }

    // configuration info
    private HashMap configMap;

    // system property guaranteed to be set in appclient/Main.java,
    // and is guaranteed to be non-null
    private static final String SUNACC_XML_URL = "sun-acc.xml.url";

    private static final Debug debug =
		Debug.getInstance("configxmlparser", "[ConfigXMLParser]");

    ConfigXMLParser() throws IOException {

	// first read the module config from message-security-config

	HashMap newConfig = new HashMap();

	if (Switch.getSwitch().getContainerType() == Switch.EJBWEB_CONTAINER) {
	    readDomainXML(newConfig);
	} else {
	    // container == Switch.APPCLIENT_CONTAINER
	    readSunAccXML(newConfig);
	}
	configMap = newConfig;
    }

    private static void readDomainXML(HashMap newConfig) throws IOException {

	// auth-layer
	String intercept = null;

	try {
	    ConfigContext configCtx = 
                ApplicationServer.getServerContext().getConfigContext();

	    if (configCtx == null) {
		return;
	    }

            Server configBean = ServerBeansFactory.getServerBean(configCtx);
            SecurityService secService =
                ServerBeansFactory.getSecurityServiceBean(configCtx);

            com.sun.enterprise.config.serverbeans.MessageSecurityConfig[]
                msgConfigs = secService.getMessageSecurityConfig();

            for (int j = 0; msgConfigs != null &&
                    j < msgConfigs.length; j++) {

                // single message-security-config for each auth-layer
                //
                // auth-layer is synonymous with intercept

                intercept = parseInterceptEntry(msgConfigs[j], newConfig);
		com.sun.enterprise.config.serverbeans.ProviderConfig[]
                    pConfigs = msgConfigs[j].getProviderConfig();

                for (int k = 0; pConfigs != null &&
                        k < pConfigs.length; k++) {
                    parseIDEntry(pConfigs[k], newConfig, intercept);
                }
            }
	} catch (ConfigException ce) {
	    IOException ioe = new IOException();
	    ioe.initCause(ce);
	    throw ioe;
	}
    }

    private static void readSunAccXML(HashMap newConfig) throws IOException {

	// auth-layer
	String intercept = null;

	try {
	    // ConfigContext configCtx = ConfigFactory.createConfigContext(url);

	    ConfigContext configCtx = ConfigFactory.createConfigContext
		                       (System.getProperty(SUNACC_XML_URL),
					true,
					false,
					false,
					ClientContainer.class,
					new ClientBeansResolver());
	    ClientContainer cc = (ClientContainer)configCtx.getRootConfigBean();
	    com.sun.enterprise.config.clientbeans.MessageSecurityConfig[]
		msgConfigs = cc.getMessageSecurityConfig();

	    for (int j = 0; msgConfigs != null && j < msgConfigs.length; j++) {

		// single message-security-config for each auth-layer
		//
		// auth-layer is synonymous with intercept

		intercept = parseInterceptEntry(msgConfigs[j], newConfig);
		com.sun.enterprise.config.clientbeans.ProviderConfig[]
			pConfigs = msgConfigs[j].getProviderConfig();

		for (int k = 0; pConfigs != null && k < pConfigs.length; k++) {
		    parseIDEntry(pConfigs[k], newConfig, intercept);
		}
	    }
	} catch (ConfigException ce) {
	    IOException ioe = new IOException();
	    ioe.initCause(ce);
	    throw ioe;
	}
    }

    public HashMap getConfigMap() {
	return configMap;
    }

    /**
     * XXX must duplicate for client and server side code
     *     because MessageSecurityConfig and subelements
     *     are in different packages
     */

    /**
     * XXX server-side XML duplicate methods
     */

    private static String parseInterceptEntry
	(com.sun.enterprise.config.serverbeans.MessageSecurityConfig msgConfig,
	HashMap newConfig)
		throws IOException {

	String intercept = msgConfig.getAuthLayer();
	String defaultServerID = msgConfig.getDefaultProvider();
	String defaultClientID = msgConfig.getDefaultClientProvider();

	if (debug != null) {
	    debug.println("Intercept Entry: " +
			"\n    intercept: " + intercept +
			"\n    defaultServerID: " + defaultServerID +
			"\n    defaultClientID:  " + defaultClientID);
	}

	ConfigFile.InterceptEntry intEntry = (ConfigFile.InterceptEntry)
						newConfig.get(intercept);
	if (intEntry != null) {
	    throw new IOException("found multiple MessageSecurityConfig " +
				"entries with the same auth-layer");
	}

	// create new intercept entry
	intEntry = new ConfigFile.InterceptEntry(defaultClientID,
					defaultServerID,
					null);
	newConfig.put(intercept, intEntry);
	return intercept;
    }

    private static void parseIDEntry
	(com.sun.enterprise.config.serverbeans.ProviderConfig pConfig,
	HashMap newConfig,
	String intercept)
		throws IOException {

	String id = pConfig.getProviderId();
	String type = pConfig.getProviderType();
	String moduleClass = pConfig.getClassName();
	ArrayList modules = new ArrayList();

	AuthPolicy requestPolicy =
		parseRequestPolicy(pConfig.getRequestPolicy());
	AuthPolicy responsePolicy =
		parseResponsePolicy(pConfig.getResponsePolicy());

	// get the module options

	HashMap options = new HashMap();
	String key;
	String value;

	for (int i = 0; i < pConfig.sizeElementProperty(); i++) {
	    try {
		options.put(pConfig.getElementProperty(i).getName(),
			    PropertyExpander.expand
			    (pConfig.getElementProperty(i).getValue(),
			     false));
	    } catch (sun.security.util.PropertyExpander.ExpandException ee) {
		// log warning and give the provider a chance to 
		// interpret value itself.
		_logger.warning("Container-auth: unable to expand provider property value - unexpanded value passed to provider");
		options.put(pConfig.getElementProperty(i).getName(),
			    pConfig.getElementProperty(i).getValue());
	    }
	}

	if (debug != null) {
	    debug.println("ID Entry: " +
			"\n    id: " + id +
			"\n    type: " + type +
			"\n    request policy: " + requestPolicy +
			"\n    response policy: " + responsePolicy +
			"\n    module class: " + moduleClass +
			"\n        options: " + options);
	}

	// create module entry

	AppConfigurationEntry entry = new AppConfigurationEntry
			(pConfig.getClassName(),
			AppConfigurationEntry.LoginModuleControlFlag.REQUIRED,
			options);
	modules.add(entry);

	// create ID entry

	ConfigFile.IDEntry idEntry = new ConfigFile.IDEntry(type,
				requestPolicy,
				responsePolicy,
				modules);

	ConfigFile.InterceptEntry intEntry = (ConfigFile.InterceptEntry)
					newConfig.get(intercept);
	if (intEntry == null) {
	    throw new IOException
		("intercept entry for " + intercept +
		" must be specified before ID entries");
	}

	if (intEntry.idMap == null) {
	    intEntry.idMap = new HashMap();
	}

	// map id to Intercept
	intEntry.idMap.put(id, idEntry);
    }

    private static AuthPolicy parseRequestPolicy
	(com.sun.enterprise.config.serverbeans.RequestPolicy policy) {

	// XXX identical source as parseResponsePolicy

	if (policy == null) {
	    return null;
	}

	int sourceAuthType = AuthPolicy.SOURCE_AUTH_NONE;
	boolean foundSource = true;
	String authType = policy.getAuthSource();

	if (AuthPolicy.SENDER.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_SENDER;
	} else if (AuthPolicy.CONTENT.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_CONTENT;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth source: " + authType);
	    }
	    foundSource = false;
	}
	
	boolean recipientAuth = false;
	boolean beforeContent = false;
	boolean foundRecipient = true;
	String recipient = policy.getAuthRecipient();

	if (AuthPolicy.BEFORE_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = true;
	} else if (AuthPolicy.AFTER_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = false;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth recipient: " + recipient);
	    }
	    foundRecipient = false;
	}

	if (!foundSource && !foundRecipient) {
	    return null;
	}

	return new AuthPolicy(sourceAuthType,
				recipientAuth,
				beforeContent);
    }

    private static AuthPolicy parseResponsePolicy
	(com.sun.enterprise.config.serverbeans.ResponsePolicy policy) {

	// XXX identical source as parseRequestPolicy

	if (policy == null) {
	    return null;
	}

	int sourceAuthType = AuthPolicy.SOURCE_AUTH_NONE;
	boolean foundSource = true;
	String authType = policy.getAuthSource();

	if (AuthPolicy.SENDER.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_SENDER;
	} else if (AuthPolicy.CONTENT.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_CONTENT;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth source: " + authType);
	    }
	    foundSource = false;
	}

	boolean recipientAuth = false;
	boolean beforeContent = false;
	boolean foundRecipient = true;
	String recipient = policy.getAuthRecipient();

	if (AuthPolicy.BEFORE_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = true;
	} else if (AuthPolicy.AFTER_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = false;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth recipient: " + recipient);
	    }
	    foundRecipient = false;
	}

	if (!foundSource && !foundRecipient) {
	    return null;
	}

	return new AuthPolicy(sourceAuthType,
				recipientAuth,
				beforeContent);
    }

    // XXX client-side XML duplicate methods

    private static String parseInterceptEntry
	(com.sun.enterprise.config.clientbeans.MessageSecurityConfig msgConfig,
	HashMap newConfig)
		throws IOException {

	String intercept = msgConfig.getAuthLayer();
	String defaultServerID = msgConfig.getDefaultProvider();
	String defaultClientID = msgConfig.getDefaultClientProvider();

	if (debug != null) {
	    debug.println("Intercept Entry: " +
			"\n    intercept: " + intercept +
			"\n    defaultServerID: " + defaultServerID +
			"\n    defaultClientID:  " + defaultClientID);
	}

	ConfigFile.InterceptEntry intEntry = (ConfigFile.InterceptEntry)
						newConfig.get(intercept);
	if (intEntry != null) {
	    throw new IOException("found multiple MessageSecurityConfig " +
				"entries with the same auth-layer");
	}

	// create new intercept entry
	intEntry = new ConfigFile.InterceptEntry(defaultClientID,
					defaultServerID,
					null);
	newConfig.put(intercept, intEntry);
	return intercept;
    }

    private static void parseIDEntry
	(com.sun.enterprise.config.clientbeans.ProviderConfig pConfig,
	HashMap newConfig,
	String intercept)
		throws IOException {

	String id = pConfig.getProviderId();
	String type = pConfig.getProviderType();
	String moduleClass = pConfig.getClassName();
	ArrayList modules = new ArrayList();

	AuthPolicy requestPolicy =
		parseRequestPolicy(pConfig.getRequestPolicy());
	AuthPolicy responsePolicy =
		parseResponsePolicy(pConfig.getResponsePolicy());

	// get the module options

	HashMap options = new HashMap();
	String key;
	String value;

	for (int i = 0; i < pConfig.sizeElementProperty(); i++) {
	    try {
		options.put(pConfig.getElementProperty(i).getName(),
			    PropertyExpander.expand
			    (pConfig.getElementProperty(i).getValue(),
			     false));
	    } catch (sun.security.util.PropertyExpander.ExpandException ee) {
		// log warning and give the provider a chance to 
		// interpret value itself.
		_logger.warning("Container-auth: unable to expand provider property value - unexpanded value passed to provider");
		options.put(pConfig.getElementProperty(i).getName(),
			    pConfig.getElementProperty(i).getValue());
	    }
	}

	if (debug != null) {
	    debug.println("ID Entry: " +
			"\n    id: " + id +
			"\n    type: " + type +
			"\n    request policy: " + requestPolicy +
			"\n    response policy: " + responsePolicy +
			"\n    module class: " + moduleClass +
			"\n        options: " + options);
	}

	// create module entry

	AppConfigurationEntry entry = new AppConfigurationEntry
			(pConfig.getClassName(),
			AppConfigurationEntry.LoginModuleControlFlag.REQUIRED,
			options);
	modules.add(entry);

	// create ID entry

	ConfigFile.IDEntry idEntry = new ConfigFile.IDEntry(type,
				requestPolicy,
				responsePolicy,
				modules);

	ConfigFile.InterceptEntry intEntry = (ConfigFile.InterceptEntry)
					newConfig.get(intercept);
	if (intEntry == null) {
	    throw new IOException
		("intercept entry for " + intercept +
		" must be specified before ID entries");
	}

	if (intEntry.idMap == null) {
	    intEntry.idMap = new HashMap();
	}

	// map id to Intercept
	intEntry.idMap.put(id, idEntry);
    }

    private static AuthPolicy parseRequestPolicy
	(com.sun.enterprise.config.clientbeans.RequestPolicy policy) {

	if (policy == null) {
	    return null;
	}

	int sourceAuthType = AuthPolicy.SOURCE_AUTH_NONE;
	boolean foundSource = true;
	String authType = policy.getAuthSource();

	if (AuthPolicy.SENDER.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_SENDER;
	} else if (AuthPolicy.CONTENT.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_CONTENT;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth source: " + authType);
	    }
	    foundSource = false;
	}

	boolean recipientAuth = false;
	boolean beforeContent = false;
	boolean foundRecipient = true;
	String recipient = policy.getAuthRecipient();

	if (AuthPolicy.BEFORE_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = true;
	} else if (AuthPolicy.AFTER_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = false;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth recipient: " + recipient);
	    }
	    foundRecipient = false;
	}

	if (!foundSource && !foundRecipient) {
	    return null;
	}

	return new AuthPolicy(sourceAuthType,
				recipientAuth,
				beforeContent);
    }

    private static AuthPolicy parseResponsePolicy
	(com.sun.enterprise.config.clientbeans.ResponsePolicy policy) {

	if (policy == null) {
	    return null;
	}

	int sourceAuthType = AuthPolicy.SOURCE_AUTH_NONE;
	boolean foundSource = true;
	String authType = policy.getAuthSource();

	if (AuthPolicy.SENDER.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_SENDER;
	} else if (AuthPolicy.CONTENT.equals(authType)) {
	    sourceAuthType = AuthPolicy.SOURCE_AUTH_CONTENT;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth source: " + authType);
	    }
	    foundSource = false;
	}

	boolean recipientAuth = false;
	boolean beforeContent = false;
	boolean foundRecipient = true;
	String recipient = policy.getAuthRecipient();

	if (AuthPolicy.BEFORE_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = true;
	} else if (AuthPolicy.AFTER_CONTENT.equals(recipient)) {
	    recipientAuth = true;
	    beforeContent = false;
	} else {
	    if (debug != null) {
		debug.println("invalid or null auth recipient: " + recipient);
	    }
	    foundRecipient = false;
	}

	if (!foundSource && !foundRecipient) {
	    return null;
	}

	return new AuthPolicy(sourceAuthType,
				recipientAuth,
				beforeContent);
    }
}