View Javadoc
1   /**
2    * This file Copyright (c) 2003-2015 Magnolia International
3    * Ltd.  (http://www.magnolia-cms.com). All rights reserved.
4    *
5    *
6    * This file is dual-licensed under both the Magnolia
7    * Network Agreement and the GNU General Public License.
8    * You may elect to use one or the other of these licenses.
9    *
10   * This file is distributed in the hope that it will be
11   * useful, but AS-IS and WITHOUT ANY WARRANTY; without even the
12   * implied warranty of MERCHANTABILITY or FITNESS FOR A
13   * PARTICULAR PURPOSE, TITLE, or NONINFRINGEMENT.
14   * Redistribution, except as permitted by whichever of the GPL
15   * or MNA you select, is prohibited.
16   *
17   * 1. For the GPL license (GPL), you can redistribute and/or
18   * modify this file under the terms of the GNU General
19   * Public License, Version 3, as published by the Free Software
20   * Foundation.  You should have received a copy of the GNU
21   * General Public License, Version 3 along with this program;
22   * if not, write to the Free Software Foundation, Inc., 51
23   * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
24   *
25   * 2. For the Magnolia Network Agreement (MNA), this file
26   * and the accompanying materials are made available under the
27   * terms of the MNA which accompanies this distribution, and
28   * is available at http://www.magnolia-cms.com/mna.html
29   *
30   * Any modifications to this file must keep this entire header
31   * intact.
32   *
33   */
34  package info.magnolia.jaas.sp.jcr;
35  
36  import info.magnolia.cms.security.MgnlUser;
37  import info.magnolia.cms.security.MgnlUserManager;
38  import info.magnolia.cms.security.SecuritySupport;
39  import info.magnolia.cms.security.User;
40  import info.magnolia.cms.security.UserManager;
41  import info.magnolia.jaas.sp.AbstractLoginModule;
42  import info.magnolia.jaas.sp.UserAwareLoginModule;
43  
44  import java.io.Serializable;
45  import java.security.Principal;
46  import java.util.Collections;
47  import java.util.HashMap;
48  import java.util.Map;
49  
50  import javax.security.auth.login.AccountLockedException;
51  import javax.security.auth.login.AccountNotFoundException;
52  import javax.security.auth.login.FailedLoginException;
53  import javax.security.auth.login.LoginException;
54  
55  import org.apache.commons.codec.binary.Base64;
56  import org.apache.commons.lang.StringUtils;
57  import org.apache.jackrabbit.core.security.UserPrincipal;
58  import org.apache.jackrabbit.core.security.principal.AdminPrincipal;
59  
60  /**
61   * Authentication module implementation using JCR to retrieve the users.
62   */
63  // JR requires login module to be serializable!
64  public class MagnoliaAuthenticationModule extends AbstractLoginModule implements UserAwareLoginModule, Serializable {
65  
66      private static final boolean logAdmin = false;
67      protected User user;
68  
69      /**
70       * As silly as it seems this class sole purpose of existence is to implement Serializable required by JR itself.
71       */
72      public class MagnoliaJRAdminPrincipal extends AdminPrincipal implements Principal, Serializable {
73          public MagnoliaJRAdminPrincipal(String name) {
74              super(name);
75          }
76      }
77  
78      /**
79       * Checks is the credentials exist in the repository.
80       * @throws LoginException or specific subclasses (which will be handled further for user feedback)
81       */
82      @Override
83      public void validateUser() throws LoginException {
84          initUser();
85  
86          if (this.user == null) {
87              throw new AccountNotFoundException("User account " + this.name + " not found.");
88          }
89  
90          matchPassword();
91  
92          if (!this.user.isEnabled()) {
93              throw new AccountLockedException("User account " + this.name + " is locked.");
94          }
95  
96          if (!UserManager.ANONYMOUS_USER.equals(user.getName()) && !isAdmin()) {
97              // update last access date for all non anonymous users
98              getUserManager().updateLastAccessTimestamp(user);
99          }
100     }
101 
102     private UserManager getUserManager() {
103         // can't get the factory upfront and can't use IoC as this class is instantiated by JCR/JAAS before anything else is ready.
104         if (logAdmin || !"admin".equals(name)) {
105             log.debug("getting user manager for realm " + realm.getName());
106         }
107         return SecuritySupport.Factory.getInstance().getUserManager(realm.getName());
108     }
109 
110 
111 
112     protected void initUser() throws LoginException {
113         if (logAdmin || !"admin".equals(name)) {
114             log.debug("initializing user {}", name);
115         }
116         // we do not verify admin user, against our user base (which is in repo we are trying to access with this user), but we still check the password.
117         // This user has assigned no privileges, just dummy near empty user object (with name and pwd only).
118         if (isAdmin()) {
119             Map<String, String> props = new HashMap<String, String>();
120             //TODO: double check if we need to reset pwd here or if getAdminSession() is enough!!!
121             props.put(MgnlUserManager.PROPERTY_PASSWORD, new String(Base64.encodeBase64("admin".getBytes())));
122             MgnlUser user = new MgnlUser(name, null, Collections.EMPTY_LIST, Collections.EMPTY_LIST,props);
123             this.user = user;
124             // admin user is used by system and have no access to regular user stuff
125             return;
126         }
127 
128         long start = System.currentTimeMillis();
129         this.user = getUserManager().getUser(name);
130         if (logAdmin || !"admin".equals(name)) {
131             log.debug("initialized user {} in {}ms", name, (System.currentTimeMillis() - start));
132         }
133     }
134 
135     protected void matchPassword() throws LoginException {
136         String serverPassword = user.getPassword();
137 
138         if (StringUtils.isEmpty(serverPassword)) {
139             throw new FailedLoginException("we do not allow users with no password");
140         }
141 
142         if (!StringUtils.equals(serverPassword, new String(this.pswd))) {
143             throw new FailedLoginException("passwords do not match");
144         }
145     }
146 
147     /**
148      * Set user details.
149      */
150     @Override
151     public void setEntity() {
152         if (isAdmin()) {
153             // JR specific principal for repo only authentication. This part will be probably different per repo.
154             this.subject.getPrincipals().add(new MagnoliaJRAdminPrincipal(name));
155             // admin user is used by system and have no access to regular user stuff
156             return;
157         } else if ("superuser".equals(name)) {
158             // add admin principal also for our superuser to make sure system doesn't deny him any access
159             this.subject.getPrincipals().add(new MagnoliaJRAdminPrincipal(name));
160         } else {
161             // TODO: make JR dependency pluggable!!!
162             // and ordinary JR User principal for everybody else
163             this.subject.getPrincipals().add(new UserPrincipal(name));
164 
165         }
166 
167         // our user has our principal!!!!
168         this.subject.getPrincipals().add(this.user);
169         this.subject.getPrincipals().add(this.realm);
170 
171 
172         collectGroupNames();
173         collectRoleNames();
174     }
175 
176     private boolean isAdmin() {
177         // TODO: make admin user name configurable (read from properties)
178         return this.name != null && this.name.equals("admin");
179     }
180 
181     /**
182      * Set access control list from the user, roles and groups.
183      */
184     @Override
185     public void setACL() {
186     }
187 
188     /**
189      * Extract all the configured roles from the given node. (which can be the user node or a group node)
190      */
191     public void collectRoleNames() {
192         for (String role : this.user.getAllRoles()) {
193             addRoleName(role);
194         }
195     }
196 
197     /**
198      * Extract all the configured groups from the given node. (which can be the user node or a group node)
199      */
200     public void collectGroupNames() {
201         for (String group : this.user.getAllGroups()) {
202             addGroupName(group);
203         }
204     }
205 
206     @Override
207     public User getUser() {
208         return user;
209     }
210 }