001 //$HeadURL: svn+ssh://rbezema@svn.wald.intevation.org/deegree/base/branches/2.2_testing/src/org/deegree/portal/standard/security/control/SecurityHelper.java $ 002 /*---------------- FILE HEADER ------------------------------------------ 003 004 This file is part of deegree. 005 Copyright (C) 2001-2008 by: 006 EXSE, Department of Geography, University of Bonn 007 http://www.giub.uni-bonn.de/deegree/ 008 lat/lon GmbH 009 http://www.lat-lon.de 010 011 This library is free software; you can redistribute it and/or 012 modify it under the terms of the GNU Lesser General Public 013 License as published by the Free Software Foundation; either 014 version 2.1 of the License, or (at your option) any later version. 015 016 This library is distributed in the hope that it will be useful, 017 but WITHOUT ANY WARRANTY; without even the implied warranty of 018 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 019 Lesser General Public License for more details. 020 021 You should have received a copy of the GNU Lesser General Public 022 License along with this library; if not, write to the Free Software 023 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 024 025 Contact: 026 027 Andreas Poth 028 lat/lon GmbH 029 Aennchenstr. 19 030 53177 Bonn 031 Germany 032 E-Mail: poth@lat-lon.de 033 034 Prof. Dr. Klaus Greve 035 Department of Geography 036 University of Bonn 037 Meckenheimer Allee 166 038 53115 Bonn 039 Germany 040 E-Mail: greve@giub.uni-bonn.de 041 042 ---------------------------------------------------------------------------*/ 043 package org.deegree.portal.standard.security.control; 044 045 import java.util.HashSet; 046 import java.util.Iterator; 047 import java.util.Set; 048 049 import javax.servlet.http.HttpServletRequest; 050 import javax.servlet.http.HttpSession; 051 052 import org.deegree.enterprise.control.AbstractListener; 053 import org.deegree.i18n.Messages; 054 import org.deegree.security.GeneralSecurityException; 055 import org.deegree.security.UnauthorizedException; 056 import org.deegree.security.drm.SecurityAccess; 057 import org.deegree.security.drm.SecurityAccessManager; 058 import org.deegree.security.drm.SecurityTransaction; 059 import org.deegree.security.drm.model.RightType; 060 import org.deegree.security.drm.model.Role; 061 import org.deegree.security.drm.model.User; 062 063 /** 064 * Helper class that performs common security access tasks and checks used in the 065 * <code>Listener</code> classes. 066 * 067 * @author <a href="mschneider@lat-lon.de">Markus Schneider </a> 068 * @author last edited by: $Author: apoth $ 069 * 070 * @version $Revision: 9346 $, $Date: 2007-12-27 17:39:07 +0100 (Do, 27 Dez 2007) $ 071 */ 072 public class SecurityHelper { 073 074 /** 075 * Tries to acquire a <code>SecurityAccess</code> for the credentials (username, password) 076 * stored in the associated <code>HttpSesssion</code> of the given 077 * <code>AbstractListener</code>. 078 * 079 * @param listener 080 * @return SecurityAccess 081 * @throws GeneralSecurityException 082 */ 083 public static SecurityAccess acquireAccess( AbstractListener listener ) 084 throws GeneralSecurityException { 085 // get USERNAME and PASSWORD from HttpSession 086 HttpSession session = ( (HttpServletRequest) listener.getRequest() ).getSession( false ); 087 if ( session == null ) { 088 throw new UnauthorizedException( Messages.getMessage( "IGEO_STD_SEC_ERROR_UNAUTHORIZED_ACCESS" ) ); 089 090 } 091 String userName = (String) session.getAttribute( ClientHelper.KEY_USERNAME ); 092 String password = (String) session.getAttribute( ClientHelper.KEY_PASSWORD ); 093 094 // perform access check 095 SecurityAccessManager manager = SecurityAccessManager.getInstance(); 096 User user = manager.getUserByName( userName ); 097 user.authenticate( password ); 098 return manager.acquireAccess( user ); 099 } 100 101 /** 102 * Tries to acquire a <code>SecurityTransaction</code> for the credentials (username, 103 * password) stored in the associated <code>HttpSesssion</code>. 104 * 105 * @param listener 106 * @return SecurityTransaction 107 * @throws GeneralSecurityException 108 */ 109 public static SecurityTransaction acquireTransaction( AbstractListener listener ) 110 throws GeneralSecurityException { 111 // get USERNAME and PASSWORD from HttpSession 112 HttpSession session = ( (HttpServletRequest) listener.getRequest() ).getSession( false ); 113 String userName = (String) session.getAttribute( ClientHelper.KEY_USERNAME ); 114 String password = (String) session.getAttribute( ClientHelper.KEY_PASSWORD ); 115 116 // perform access check 117 SecurityAccessManager manager = SecurityAccessManager.getInstance(); 118 User user = manager.getUserByName( userName ); 119 user.authenticate( password ); 120 return manager.acquireTransaction( user ); 121 } 122 123 /** 124 * Returns the administrator (the 'Administrator'- or a 'SUBADMIN:'-role) for the given role. 125 * 126 * @param access 127 * @param role 128 * @throws GeneralSecurityException 129 * @return Role 130 */ 131 public static Role findAdminForRole( SecurityAccess access, Role role ) 132 throws GeneralSecurityException { 133 Role[] allRoles = access.getAllRoles(); 134 Role admin = access.getRoleById( Role.ID_SEC_ADMIN ); 135 for ( int i = 0; i < allRoles.length; i++ ) { 136 if ( allRoles[i].getName().startsWith( "SUBADMIN:" ) ) { 137 // if a subadmin-role has the update right, it is 138 // considered to be administrative for the role 139 if ( allRoles[i].hasRight( access, RightType.UPDATE, role ) ) { 140 admin = allRoles[i]; 141 } 142 } 143 } 144 return admin; 145 } 146 147 /** 148 * Returns the associated 'Administrator'- or 'SUBADMIN:'-role of the token holder. 149 * 150 * @param access 151 * @return Role 152 * @throws GeneralSecurityException 153 */ 154 public static Role checkForAdminOrSubadminRole( SecurityAccess access ) 155 throws GeneralSecurityException { 156 Role adminOrSubadminRole = null; 157 Role[] roles = access.getUser().getRoles( access ); 158 for ( int i = 0; i < roles.length; i++ ) { 159 if ( roles[i].getID() == Role.ID_SEC_ADMIN || 160 roles[i].getName().startsWith( "SUBADMIN:" ) ) { 161 if ( adminOrSubadminRole == null ) { 162 adminOrSubadminRole = roles[i]; 163 } else { 164 throw new GeneralSecurityException( Messages.getMessage( "IGEO_STD_SEC_WRONG_ROLE" ) ); 165 } 166 } 167 } 168 if ( adminOrSubadminRole == null ) { 169 throw new UnauthorizedException( Messages.getMessage( "IGEO_STD_SEC_MISSING_SUBADMIN_ROLE" ) ); 170 171 } 172 return adminOrSubadminRole; 173 } 174 175 /** 176 * Tests if the given token is associated with the 'Administrator'-role. 177 * 178 * @param access 179 * @throws GeneralSecurityException, 180 * this is an UnauthorizedException if the user does not have the 181 * 'Administrator'-role 182 */ 183 public static void checkForAdminRole( SecurityAccess access ) 184 throws GeneralSecurityException { 185 Role[] roles = access.getUser().getRoles( access ); 186 for ( int i = 0; i < roles.length; i++ ) { 187 if ( roles[i].getID() == Role.ID_SEC_ADMIN ) { 188 return; 189 } 190 } 191 throw new UnauthorizedException( Messages.getMessage( "IGEO_STD_SEC_MISSING_ADMIN_ROLE" ) ); 192 } 193 194 /** 195 * Tests if the 'SUBADMIN:' and 'Administrator'-roles are all disjoint (so that there are no 196 * users that have more than 1 role). 197 * 198 * @param access 199 * @throws GeneralSecurityException 200 * if there is a user with more than one role 201 */ 202 public static void checkSubadminRoleValidity( SecurityAccess access ) 203 throws GeneralSecurityException { 204 205 Role[] subadminRoles = access.getRolesByNS( "SUBADMIN" ); 206 Set<User>[] rolesAndUsers = new Set[subadminRoles.length + 1]; 207 String[] roleNames = new String[subadminRoles.length + 1]; 208 209 // admin role 210 User[] users = access.getRoleById( Role.ID_SEC_ADMIN ).getAllUsers( access ); 211 rolesAndUsers[0] = new HashSet<User>(); 212 roleNames[0] = "Administrator"; 213 for ( int i = 0; i < users.length; i++ ) { 214 rolesAndUsers[0].add( users[i] ); 215 } 216 217 // subadmin roles 218 for ( int i = 1; i < rolesAndUsers.length; i++ ) { 219 users = subadminRoles[i - 1].getAllUsers( access ); 220 rolesAndUsers[i] = new HashSet<User>(); 221 roleNames[i] = subadminRoles[i - 1].getTitle(); 222 for ( int j = 0; j < users.length; j++ ) { 223 rolesAndUsers[i].add( users[j] ); 224 } 225 } 226 227 // now check if all usersets are disjoint 228 for ( int i = 0; i < rolesAndUsers.length - 1; i++ ) { 229 Set userSet1 = rolesAndUsers[i]; 230 for ( int j = i + 1; j < rolesAndUsers.length; j++ ) { 231 Set userSet2 = rolesAndUsers[j]; 232 Iterator it = userSet2.iterator(); 233 while ( it.hasNext() ) { 234 User user = (User) it.next(); 235 if ( userSet1.contains( user ) ) { 236 throw new GeneralSecurityException( Messages.getMessage( "IGEO_STD_SEC_INVALID_SUBADMIN_ROLE" ) ); 237 } 238 } 239 } 240 } 241 } 242 }