use of com.sun.enterprise.security.jmac.provider.PacketMapMessageInfo in project Payara by payara.
the class CommonServerSecurityPipe method processRequest.
private Packet processRequest(Packet request) throws Exception {
AuthStatus status = AuthStatus.SUCCESS;
PacketMessageInfo info = new PacketMapMessageInfo(request, new Packet());
// XXX at this time, we expect the server subject to be null
Subject serverSubject = (Subject) request.invocationProperties.get(PipeConstants.SERVER_SUBJECT);
// could change the request packet
ServerAuthContext sAC = helper.getServerAuthContext(info, serverSubject);
Subject clientSubject = getClientSubject(request);
final Packet validatedRequest;
try {
if (sAC != null) {
// client subject must not be null
// and when return status is SUCCESS, module
// must have called handler.handle(CallerPrincipalCallback)
status = sAC.validateRequest(info, clientSubject, serverSubject);
}
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.ERROR_REQUEST_VALIDATION, e);
WebServiceException wse = new WebServiceException(localStrings.getLocalString("enterprise.webservice.cantValidateRequest", "Cannot validate request for {0}", new Object[] { helper.getModelName() }), e);
// set status for audit
status = AuthStatus.SEND_FAILURE;
// if unable to determine if two-way will return empty response
return helper.getFaultResponse(info.getRequestPacket(), info.getResponsePacket(), wse);
} finally {
validatedRequest = info.getRequestPacket();
helper.auditInvocation(validatedRequest, status);
}
Packet response = null;
if (status == AuthStatus.SUCCESS) {
boolean authorized = false;
try {
helper.authorize(validatedRequest);
authorized = true;
} catch (Exception e) {
// not authorized, construct fault and proceded
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), e);
}
if (authorized) {
// only do doAdPriv if SecurityManager is in effect
if (System.getSecurityManager() == null) {
try {
// proceed to invoke the endpoint
response = next.process(validatedRequest);
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.NEXT_PIPE, e);
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), e);
}
} else {
try {
response = (Packet) Subject.doAsPrivileged(clientSubject, new PrivilegedExceptionAction() {
@Override
public Object run() throws Exception {
// proceed to invoke the endpoint
return next.process(validatedRequest);
}
}, null);
} catch (PrivilegedActionException pae) {
Throwable cause = pae.getCause();
_logger.log(Level.SEVERE, LogUtils.NEXT_PIPE, cause);
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), cause);
}
}
}
// pipes are not supposed to return a null response packet
if (response == null) {
WebServiceException wse = new WebServiceException(localStrings.getLocalString("enterprise.webservice.nullResponsePacket", "Invocation of Service {0} returned null response packet", new Object[] { helper.getModelName() }));
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), wse);
_logger.log(Level.SEVERE, LogUtils.EXCEPTION_THROWN, wse);
}
// secure response, including if it is a fault
if (sAC != null && response.getMessage() != null) {
info.setResponsePacket(response);
response = processResponse(info, sAC, serverSubject);
}
} else {
// validateRequest did not return success
if (_logger.isLoggable(Level.FINE)) {
_logger.log(Level.FINE, "ws.status_validate_request", status);
}
// even for one-way mep, may return response with non-empty message
response = info.getResponsePacket();
}
return response;
}
use of com.sun.enterprise.security.jmac.provider.PacketMapMessageInfo in project Payara by payara.
the class CommonServerSecurityTube method processRequest.
@Override
public NextAction processRequest(Packet request) {
try {
if (isHttpBinding) {
return doInvoke(super.next, request);
}
AuthStatus status = AuthStatus.SUCCESS;
info = new PacketMapMessageInfo(request, new Packet());
// XXX at this time, we expect the server subject to be null
serverSubject = (Subject) request.invocationProperties.get(PipeConstants.SERVER_SUBJECT);
// could change the request packet
sAC = helper.getServerAuthContext(info, serverSubject);
Subject clientSubject = getClientSubject(request);
final Packet validatedRequest;
try {
if (sAC != null) {
// client subject must not be null
// and when return status is SUCCESS, module
// must have called handler.handle(CallerPrincipalCallback)
status = sAC.validateRequest(info, clientSubject, serverSubject);
}
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.ERROR_REQUEST_VALIDATION, e);
WebServiceException wse = new WebServiceException(localStrings.getLocalString("enterprise.webservice.cantValidateRequest", "Cannot validate request for {0}", new Object[] { helper.getModelName() }), e);
// set status for audit
status = AuthStatus.SEND_FAILURE;
// if unable to determine if two-way will return empty response
Packet ret = helper.getFaultResponse(info.getRequestPacket(), info.getResponsePacket(), wse);
return doReturnWith(ret);
} finally {
validatedRequest = info.getRequestPacket();
helper.auditInvocation(validatedRequest, status);
}
Packet response = null;
if (status == AuthStatus.SUCCESS) {
boolean authorized = false;
try {
helper.authorize(validatedRequest);
authorized = true;
} catch (Exception e) {
// not authorized, construct fault and proceded
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), e);
return doReturnWith(response);
}
if (authorized) {
// only do doAdPriv if SecurityManager is in effect
if (System.getSecurityManager() == null) {
try {
// proceed to invoke the endpoint
return doInvoke(super.next, validatedRequest);
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.NEXT_PIPE, e);
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), e);
return doReturnWith(response);
}
} else {
try {
final Tube next = super.next;
NextAction action = (NextAction) Subject.doAsPrivileged(clientSubject, new PrivilegedExceptionAction() {
public Object run() throws Exception {
// proceed to invoke the endpoint
return doInvoke(next, validatedRequest);
}
}, null);
return action;
} catch (PrivilegedActionException pae) {
Throwable cause = pae.getCause();
_logger.log(Level.SEVERE, LogUtils.NEXT_PIPE, cause);
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), cause);
return doReturnWith(response);
}
}
} else {
// if not authorized
// not authorized, construct fault and proceded
response = helper.getFaultResponse(validatedRequest, info.getResponsePacket(), new Exception("Client Not Authorized"));
return doReturnWith(response);
}
} else {
// validateRequest did not return success
if (_logger.isLoggable(Level.FINE)) {
_logger.log(Level.FINE, "ws.status_validate_request", status);
}
// even for one-way mep, may return response with non-empty message
response = info.getResponsePacket();
return doReturnWith(response);
}
} catch (Throwable t) {
if (!(t instanceof WebServiceException)) {
t = new WebServiceException(t);
}
return doThrow(t);
}
}
use of com.sun.enterprise.security.jmac.provider.PacketMapMessageInfo in project Payara by payara.
the class ClientSecurityPipe method process.
@Override
public Packet process(Packet request) {
/*
* XXX should there be code like the following?
if(isHttpBinding) {
return next.process(request);
}
*/
PacketMessageInfo info = new PacketMapMessageInfo(request, new Packet());
info.getMap().put(javax.xml.ws.Endpoint.WSDL_SERVICE, helper.getProperty(PipeConstants.WSDL_SERVICE));
AuthStatus status = AuthStatus.SEND_SUCCESS;
Subject clientSubject = getClientSubject(request);
ClientAuthContext cAC = null;
try {
cAC = helper.getClientAuthContext(info, clientSubject);
if (cAC != null) {
// proceed to process message sescurity
status = cAC.secureRequest(info, clientSubject);
}
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.ERROR_REQUEST_SECURING, e);
throw new WebServiceException(localStrings.getLocalString("enterprise.webservice.cantSecureRequst", "Cannot secure request for {0}", new Object[] { helper.getModelName() }), e);
}
Packet response;
if (status == AuthStatus.FAILURE) {
if (_logger.isLoggable(Level.FINE)) {
_logger.log(Level.FINE, "ws.status_secure_request", status);
}
response = info.getResponsePacket();
} else {
response = processSecureRequest(info, cAC, clientSubject);
}
// may return a security fault even if the MEP was one-way
return response;
}
use of com.sun.enterprise.security.jmac.provider.PacketMapMessageInfo in project Payara by payara.
the class ClientSecurityTube method processRequest.
@Override
public NextAction processRequest(Packet request) {
try {
/*
* XXX should there be code like the following?
if(isHttpBinding) {
return next.process(request);
}
*/
info = new PacketMapMessageInfo(request, new Packet());
AuthStatus status = AuthStatus.SEND_SUCCESS;
info.getMap().put(javax.xml.ws.Endpoint.WSDL_SERVICE, helper.getProperty(PipeConstants.WSDL_SERVICE));
Subject locClientSubject = getClientSubject(request);
cAC = helper.getClientAuthContext(info, locClientSubject);
if (cAC != null) {
// proceed to process message sescurity
status = cAC.secureRequest(info, locClientSubject);
}
if (status == AuthStatus.FAILURE) {
if (_logger.isLoggable(Level.FINE)) {
_logger.log(Level.FINE, "ws.status_secure_request", status);
}
throw new WebServiceException(localStrings.getLocalString("enterprise.webservice.cantSecureRequst", "Cannot secure request for {0}", new Object[] { helper.getModelName() }), new Exception("An Error occured while Securing the Request"));
} else {
return doInvoke(super.next, info.getRequestPacket());
}
} catch (Exception e) {
_logger.log(Level.SEVERE, LogUtils.ERROR_REQUEST_SECURING, e);
throw new WebServiceException(localStrings.getLocalString("enterprise.webservice.cantSecureRequst", "Cannot secure request for {0}", new Object[] { helper.getModelName() }), e);
}
}
Aggregations