Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
/*
************************************************************************
******************* CANADIAN ASTRONOMY DATA CENTRE *******************
************** CENTRE CANADIEN DE DONNÉES ASTRONOMIQUES **************
*
* (c) 2017. (c) 2017.
* Government of Canada Gouvernement du Canada
* National Research Council Conseil national de recherches
* Ottawa, Canada, K1A 0R6 Ottawa, Canada, K1A 0R6
* All rights reserved Tous droits réservés
*
* NRC disclaims any warranties, Le CNRC dénie toute garantie
* expressed, implied, or énoncée, implicite ou légale,
* statutory, of any kind with de quelque nature que ce
* respect to the software, soit, concernant le logiciel,
* including without limitation y compris sans restriction
* any warranty of merchantability toute garantie de valeur
* or fitness for a particular marchande ou de pertinence
* purpose. NRC shall not be pour un usage particulier.
* liable in any event for any Le CNRC ne pourra en aucun cas
* damages, whether direct or être tenu responsable de tout
* indirect, special or general, dommage, direct ou indirect,
* consequential or incidental, particulier ou général,
* arising from the use of the accessoire ou fortuit, résultant
* software. Neither the name de l'utilisation du logiciel. Ni
* of the National Research le nom du Conseil National de
* Council of Canada nor the Recherches du Canada ni les noms
* names of its contributors may de ses participants ne peuvent
* be used to endorse or promote être utilisés pour approuver ou
* products derived from this promouvoir les produits dérivés
* software without specific prior de ce logiciel sans autorisation
* written permission. préalable et particulière
* par écrit.
*
* This file is part of the Ce fichier fait partie du projet
* OpenCADC project. OpenCADC.
*
* OpenCADC is free software: OpenCADC est un logiciel libre ;
* you can redistribute it and/or vous pouvez le redistribuer ou le
* modify it under the terms of modifier suivant les termes de
* the GNU Affero General Public la “GNU Affero General Public
* License as published by the License” telle que publiée
* Free Software Foundation, par la Free Software Foundation
* either version 3 of the : soit la version 3 de cette
* License, or (at your option) licence, soit (à votre gré)
* any later version. toute version ultérieure.
*
* OpenCADC is distributed in the OpenCADC est distribué
* hope that it will be useful, dans l’espoir qu’il vous
* but WITHOUT ANY WARRANTY; sera utile, mais SANS AUCUNE
* without even the implied GARANTIE : sans même la garantie
* warranty of MERCHANTABILITY implicite de COMMERCIALISABILITÉ
* or FITNESS FOR A PARTICULAR ni d’ADÉQUATION À UN OBJECTIF
* PURPOSE. See the GNU Affero PARTICULIER. Consultez la Licence
* General Public License for Générale Publique GNU Affero
* more details. pour plus de détails.
*
* You should have received Vous devriez avoir reçu une
* a copy of the GNU Affero copie de la Licence Générale
* General Public License along Publique GNU Affero avec
* with OpenCADC. If not, see OpenCADC ; si ce n’est
* <http://www.gnu.org/licenses/>. pas le cas, consultez :
* <http://www.gnu.org/licenses/>.
*
* $Revision: 4 $
*
************************************************************************
*/
package ca.nrc.cadc.auth;
Brian Major
committed
import java.io.File;
import java.net.URI;
import java.net.URL;
import java.security.Principal;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
import java.sql.Types;
import java.util.HashSet;
import java.util.Set;
import java.util.UUID;
import javax.security.auth.Subject;
import javax.security.auth.x500.X500Principal;
import org.apache.log4j.Logger;
import ca.nrc.cadc.ac.User;
import ca.nrc.cadc.ac.client.UserClient;
import ca.nrc.cadc.profiler.Profiler;
import ca.nrc.cadc.reg.Standards;
import ca.nrc.cadc.reg.client.LocalAuthority;
Brian Major
committed
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
import ca.nrc.cadc.reg.client.RegistryClient;
import ca.nrc.cadc.vosi.avail.CheckResource;
import ca.nrc.cadc.vosi.avail.CheckWebService;
/**
* AC implementation of the IdentityManager interface. This
* implementation returns the NumericPrincipal.
*
* @author pdowler
*/
public class ACIdentityManager implements IdentityManager
{
private static final Logger log = Logger.getLogger(ACIdentityManager.class);
private static final File DEFAULT_PRIVILEGED_PEM_FILE = new File(System.getProperty("user.home") + "/.ssl/cadcproxy.pem");
private static final String ALT_PEM_KEY = ACIdentityManager.class.getName() + ".pemfile";
private File privilegedPemFile;
public ACIdentityManager()
{
privilegedPemFile = DEFAULT_PRIVILEGED_PEM_FILE;
String altPemFile = System.getProperty(ALT_PEM_KEY);
if (altPemFile != null)
{
privilegedPemFile = new File(altPemFile);
}
}
/**
* Returns a storage type constant from java.sql.Types.
*
* @return Types.INTEGER
*/
public int getOwnerType()
{
return Types.INTEGER;
}
/**
* Returns a value of type specified by getOwnerType() for storage.
*
* @param subject
* @return an Integer internal CADC ID
*/
public Object toOwner(Subject subject)
{
X500Principal x500Principal = null;
if (subject != null)
{
Set<Principal> principals = subject.getPrincipals();
for (Principal principal : principals)
{
if (principal instanceof NumericPrincipal)
{
NumericPrincipal cp = (NumericPrincipal) principal;
UUID id = cp.getUUID();
Long l = Long.valueOf(id.getLeastSignificantBits());
return l.intValue();
}
if (principal instanceof X500Principal)
{
x500Principal = (X500Principal) principal;
}
}
}
if (x500Principal == null)
{
return null;
}
// The user has connected with a valid client cert but does
// not have an account (no numeric principal).
// Create an auto-approved account with their x500Principal.
NumericPrincipal numericPrincipal = createX500User(x500Principal);
subject.getPrincipals().add(numericPrincipal);
return Long.valueOf(numericPrincipal.getUUID().getLeastSignificantBits());
}
private NumericPrincipal createX500User(final X500Principal x500Principal)
{
PrivilegedExceptionAction<NumericPrincipal> action = new PrivilegedExceptionAction<NumericPrincipal>()
{
@Override
public NumericPrincipal run() throws Exception
{
LocalAuthority localAuth = new LocalAuthority();
URI serviceURI = localAuth.getServiceURI(Standards.UMS_USERS_01.toASCIIString());
UserClient userClient = new UserClient(serviceURI);
Brian Major
committed
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
User newUser = userClient.createUser(x500Principal);
Set<NumericPrincipal> set = newUser.getIdentities(NumericPrincipal.class);
if (set.isEmpty())
{
throw new IllegalStateException("missing internal id");
}
return set.iterator().next();
}
};
Subject servopsSubject = SSLUtil.createSubject(privilegedPemFile);
try
{
return Subject.doAs(servopsSubject, action);
}
catch (Exception e)
{
throw new IllegalStateException("failed to create internal id for user " + x500Principal.getName(), e);
}
}
/**
* Get a consistent string representation of the user.
*
* @param subject
* @return an X509 distinguished name
*/
public String toOwnerString(Subject subject)
{
if (subject != null)
{
Set<Principal> principals = subject.getPrincipals();
for (Principal principal : principals)
{
if (principal instanceof X500Principal)
{
return principal.getName();
}
}
}
return null;
}
/**
* Reconstruct the subject from the stored object. This method also
* re-populates the subject with all know alternate principals.
*
* @param o the stored object
* @return the complete subject
*/
public Subject toSubject(Object o)
{
try
{
if (o == null || !(o instanceof Integer))
{
return null;
}
Integer i = (Integer) o;
if (i <= 0)
{
// identities <= 0 are internal
return new Subject();
}
UUID uuid = new UUID(0L, (long) i);
NumericPrincipal p = new NumericPrincipal(uuid);
Set<Principal> pset = new HashSet<Principal>();
pset.add(p);
Subject ret = new Subject(false, pset, new HashSet(), new HashSet());
Profiler prof = new Profiler(ACIdentityManager.class);
augmentSubject(ret);
prof.checkpoint("CadcIdentityManager.augmentSubject");
return ret;
}
finally
{
}
}
public void augmentSubject(final Subject subject)
{
try
{
PrivilegedExceptionAction<Object> action = new PrivilegedExceptionAction<Object>()
{
public Object run() throws Exception
{
LocalAuthority localAuth = new LocalAuthority();
URI serviceURI = localAuth.getServiceURI(Standards.UMS_USERS_01.toASCIIString());
Brian Major
committed
UserClient userClient = new UserClient(serviceURI);
userClient.augmentSubject(subject);
return null;
}
};
log.debug("privileged user cert: " + privilegedPemFile.getAbsolutePath());
Subject servopsSubject = SSLUtil.createSubject(privilegedPemFile);
Subject.doAs(servopsSubject, action);
}
catch (PrivilegedActionException e)
{
String msg = "Error augmenting subject " + subject;
throw new RuntimeException(msg, e);
}
}
/**
* The returned CheckResource is the same as the one from AuthenticatorImpl.
*
Brian Major
committed
*/
public static CheckResource getAvailabilityCheck()
{
RegistryClient regClient = new RegistryClient();
LocalAuthority localAuth = new LocalAuthority();
URI serviceURI = localAuth.getServiceURI(Standards.UMS_USERS_01.toASCIIString());
URL availURL = regClient.getServiceURL(serviceURI, Standards.VOSI_AVAILABILITY, AuthMethod.ANON);
return new CheckWebService(availURL.toExternalForm());