blob: 209178b5d97557fdc4eb2e1ca866cfaa15ae81ee [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.hadoop.gateway.identityasserter.regex.filter;
import javax.security.auth.Subject;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import org.apache.hadoop.gateway.identityasserter.common.filter.CommonIdentityAssertionFilter;
import org.apache.hadoop.gateway.security.principal.PrincipalMappingException;
import java.util.Map;
import java.util.StringTokenizer;
import java.util.TreeMap;
public class RegexIdentityAssertionFilter extends CommonIdentityAssertionFilter {
private String input = null;
private String output = null;
private Map<String,String> dict;
RegexTemplate template;
@Override
public void init(FilterConfig filterConfig) throws ServletException {
super.init(filterConfig);
try {
input = filterConfig.getInitParameter( "input" );
if( input == null ) {
input = "";
}
output = filterConfig.getInitParameter( "output" );
if( output == null ) {
output = "";
}
dict = loadDictionary( filterConfig.getInitParameter( "lookup" ) );
template = new RegexTemplate( input, output, dict );
} catch ( PrincipalMappingException e ) {
throw new ServletException( e );
}
}
public String[] mapGroupPrincipals(String mappedPrincipalName, Subject subject) {
// Returning null will allow existing Subject group principals to remain the same
return null;
}
public String mapUserPrincipal(String principalName) {
return template.apply( principalName );
}
private Map<String, String> loadDictionary( String config ) throws PrincipalMappingException {
Map<String,String> dict = new TreeMap<>(String.CASE_INSENSITIVE_ORDER);
if( config != null && !config.isEmpty() ) {
try {
StringTokenizer t = new StringTokenizer( config, ";" );
while( t.hasMoreTokens() ) {
String nvp = t.nextToken();
String[] a = nvp.split( "=" );
dict.put( a[0].trim(), a[1].trim() );
}
return dict;
} catch( Exception e ) {
dict.clear();
throw new PrincipalMappingException(
"Unable to load lookup dictionary from provided configuration: " + config +
". No principal mapping will be provided.", e );
}
}
return dict;
}
}