blob: 789421cbcb91b6b599c7dae36ccd30ce949a0f65 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.qpid.jms.sasl;
import org.apache.qpid.jms.util.PropertyUtil;
import javax.security.auth.Subject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.LoginContext;
import javax.security.sasl.Sasl;
import javax.security.sasl.SaslClient;
import javax.security.sasl.SaslException;
import java.io.IOException;
import java.security.Principal;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
import java.util.HashMap;
import java.util.Map;
/**
* Implements the GSSAPI sasl authentication Mechanism.
*/
public class GssapiMechanism extends AbstractMechanism {
public static final String NAME = "GSSAPI";
private Subject subject;
private SaslClient saslClient;
private String protocol = "amqp";
private String serverName = null;
private String configScope = "amqp-jms-client";
// a gss/sasl service name, x@y, morphs to a krbPrincipal a/y@REALM
@Override
public int getPriority() {
return PRIORITY.LOW.getValue();
}
@Override
public String getName() {
return NAME;
}
@Override
public boolean isEnabledByDefault() {
// Only enable if given explicit configuration to do so, as we can't discern here
// whether the external configuration is appropriately set to actually allow its use.
return false;
}
@Override
public void init(Map<String, String> saslOptions) {
PropertyUtil.setProperties(this, saslOptions);
}
@Override
public byte[] getInitialResponse() throws SaslException {
try {
LoginContext loginContext = new LoginContext(configScope, new CredentialCallbackHandler());;
loginContext.login();
subject = loginContext.getSubject();
return Subject.doAs(subject, new PrivilegedExceptionAction<byte[]>() {
@Override
public byte[] run() throws Exception {
Map<String, String> props = new HashMap<>();
props.put("javax.security.sasl.server.authentication", "true");
saslClient = Sasl.createSaslClient(new String[]{NAME}, null, protocol, serverName, props, null);
if (saslClient.hasInitialResponse()) {
return saslClient.evaluateChallenge(new byte[0]);
}
return null;
}
});
} catch (Exception e) {
throw new SaslException(e.toString(), e);
}
}
@Override
public byte[] getChallengeResponse(final byte[] challenge) throws SaslException {
try {
return Subject.doAs(subject, new PrivilegedExceptionAction<byte[]>() {
@Override
public byte[] run() throws Exception {
return saslClient.evaluateChallenge(challenge);
}
});
} catch (PrivilegedActionException e) {
throw new SaslException(e.toString(), e);
}
}
@Override
public void verifyCompletion() throws SaslException {
boolean result = saslClient.isComplete();
saslClient.dispose();
if (!result) {
throw new SaslException("not complete");
}
}
@Override
public boolean isApplicable(String username, String password, Principal localPrincipal) {
return true;
}
public String getProtocol() {
return protocol;
}
public void setProtocol(String protocol) {
this.protocol = protocol;
}
public String getServerName() {
return serverName;
}
public void setServerName(String serverName) {
this.serverName = serverName;
}
public String getConfigScope() {
return configScope;
}
public void setConfigScope(String configScope) {
this.configScope = configScope;
}
private class CredentialCallbackHandler implements CallbackHandler {
@Override
public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
for (int i = 0; i < callbacks.length; i++) {
Callback cb = callbacks[i];
if (cb instanceof NameCallback) {
((NameCallback) cb).setName(getUsername());
} else if (cb instanceof PasswordCallback) {
String pass = getPassword();
if (pass != null) {
((PasswordCallback) cb).setPassword(pass.toCharArray());
}
} else {
throw new UnsupportedCallbackException(cb);
}
}
}
}
}