package org.jboss.ejb.plugins;
import java.security.Principal;
import java.util.Map;
import java.util.Set;
import javax.ejb.EJBException;
import org.jboss.ejb.Container;
import org.jboss.invocation.Invocation;
import org.jboss.invocation.InvocationType;
import org.jboss.metadata.ApplicationMetaData;
import org.jboss.metadata.AssemblyDescriptorMetaData;
import org.jboss.metadata.BeanMetaData;
import org.jboss.security.AnybodyPrincipal;
import org.jboss.security.RealmMapping;
import org.jboss.security.RunAsIdentity;
import org.jboss.security.SecurityAssociation;
public class SecurityRolesInterceptor extends AbstractInterceptor
{
protected RealmMapping realmMapping;
protected Map securityRoles;
public void setContainer(Container container)
{
super.setContainer(container);
if (container != null)
{
BeanMetaData beanMetaData = container.getBeanMetaData();
ApplicationMetaData applicationMetaData = beanMetaData.getApplicationMetaData();
AssemblyDescriptorMetaData assemblyDescriptor = applicationMetaData.getAssemblyDescriptor();
securityRoles = assemblyDescriptor.getSecurityRoles();
realmMapping = container.getRealmMapping();
}
}
public void start() throws Exception
{
super.start();
}
public Object invokeHome(Invocation mi) throws Exception
{
checkSecurityAssociation(mi);
Object returnValue = getNext().invokeHome(mi);
return returnValue;
}
public Object invoke(Invocation mi) throws Exception
{
checkSecurityAssociation(mi);
Object returnValue = getNext().invoke(mi);
return returnValue;
}
private void checkSecurityAssociation(Invocation mi)
throws Exception
{
Principal principal = mi.getPrincipal();
boolean trace = log.isInfoEnabled();
if (realmMapping == null)
{
throw new EJBException("checkSecurityAssociation",
new SecurityException("Role mapping manager has not been set"));
}
InvocationType iface = mi.getType();
Set methodRoles = container.getMethodPermissions(mi.getMethod(), iface);
if (methodRoles == null)
{
String method = mi.getMethod().getName();
String msg = "No method permissions assigned to method=" + method
+ ", interface=" + iface;
log.error(msg);
SecurityException e = new SecurityException(msg);
throw new EJBException("checkSecurityAssociation", e);
}
else if (trace)
{
log.trace("method=" + mi.getMethod() + ", interface=" + iface
+ ", requiredRoles=" + methodRoles);
}
RunAsIdentity callerRunAsIdentity = SecurityAssociation.peekRunAsIdentity();
if (methodRoles.contains(AnybodyPrincipal.ANYBODY_PRINCIPAL) == false)
{
if (callerRunAsIdentity == null)
{
if (realmMapping.doesUserHaveRole(principal, methodRoles) == false)
{
Set userRoles = realmMapping.getUserRoles(principal);
String method = mi.getMethod().getName();
String msg = "Insufficient method permissions, principal=" + principal
+ ", method=" + method + ", interface=" + iface
+ ", requiredRoles=" + methodRoles + ", principalRoles=" + userRoles;
log.error(msg);
SecurityException e = new SecurityException(msg);
throw new EJBException("checkSecurityAssociation", e);
}
}
else
{
if (callerRunAsIdentity.doesUserHaveRole(methodRoles) == false)
{
String method = mi.getMethod().getName();
String msg = "Insufficient method permissions, runAsPrincipal=" + callerRunAsIdentity.getName()
+ ", method=" + method + ", interface=" + iface
+ ", requiredRoles=" + methodRoles + ", runAsRoles=" + callerRunAsIdentity.getRunAsRoles();
log.error(msg);
SecurityException e = new SecurityException(msg);
throw new EJBException("checkSecurityAssociation", e);
}
}
}
}
}