[原创]JAAS 实现in Struts Web App,使用XMLPolicy文件,不改变VM安全文件(2)授权

2024-05-01 05:58

本文主要是介绍[原创]JAAS 实现in Struts Web App,使用XMLPolicy文件,不改变VM安全文件(2)授权,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

本文章继续上一篇实现WebApp的授权

5. 实现XMLPolicyFile类。

public class XMLPolicyFile extends Policy implements JAASConstants {

 

 

      private Document doc = null;

     

      //private CodeSource noCertCodeSource=null;

      /*

       * constructor

       * refresh()

       */

      public XMLPolicyFile(){

            refresh();

      }

      public PermissionCollection getPermissions(CodeSource arg0) {

            // TODO Auto-generated method stub

            return null;

      }

      /*

       * Creates a DOM tree document from the default XML file or

       * from the file specified by the system property,

       * <code>com.ibm.resource.security.auth.policy</code>.  This

       * DOM tree document is then used by the

       * <code>getPermissions()</code> in searching for permissions.

       *

       * @see javax.security.auth.Policy#refresh()

       */

      public void refresh() {

            FileInputStream fis = null;

            try {      

                  // Set up a DOM tree to query

                  fis = new FileInputStream(AUTH_SECURITY_POLICYXMLFILE);

                  InputSource in = new InputSource(fis);

                  DocumentBuilderFactory dfactory = DocumentBuilderFactory.newInstance();

                  dfactory.setNamespaceAware(true);

                  doc = dfactory.newDocumentBuilder().parse(in);

            } catch (Exception e) {

                  e.printStackTrace();

                  throw new RuntimeException(e.getMessage());

            } finally {

                  if(fis != null) {

                        try { fis.close(); } catch (IOException e) {}

                  }

      }

      }

      public PermissionCollection getPermissions(Subject subject,CodeSource codeSource) {

 

 

            ResourcePermissionCollection collection = new ResourcePermissionCollection();

           

            try {            

                  // Iterate through all of the subjects principals    

                  Iterator principalIterator = subject.getPrincipals().iterator();

                  while(principalIterator.hasNext()){

                      Principal principal = (Principal)principalIterator.next();                     

                             

                      // Set up the xpath string to retrieve all the relevant permissions

                  // Sample xpath string:  "/policy/grant[@codebase=/"sample_actions.jar/"]/principal[@classname=/"com.fonseca.security.SamplePrincipal/"][@name=/"testUser/"]/permission"

                  StringBuffer xpath = new StringBuffer();

 

 

                  xpath.append("/policy/grant/principal[@classname=/"");           

                  xpath.append(principal.getClass().getName());

                  xpath.append("/"][@name=/"");

                  xpath.append(principal.getName());

                  xpath.append("/"]/permission");

                 

                 //System.out.println(xpath.toString());

                       

                        NodeIterator nodeIter = XPathAPI.selectNodeIterator(doc, xpath.toString());

                        Node node = null;

                        while( (node = nodeIter.nextNode()) != null ) {

                              //here

                              CodeSource codebase=getCodebase(node.getParentNode().getParentNode());

                              if (codebase!=null || codebase.implies(codeSource)){

                                    Permission permission = getPermission(node);

                                    collection.add(permission);

                              }

                        }

                  }                                  

            } catch (Exception e) {

                  e.printStackTrace();

                  throw new RuntimeException(e.getMessage());

            }

                  if(collection != null)

                        return collection;

                  else {

                        // If the permission is not found here then delegate it

                        // to the standard java Policy class instance.

                        Policy policy = Policy.getPolicy();

                        return policy.getPermissions(codeSource);

                  }

      }

      /**

       * Returns a Permission instance defined by the provided

       * permission Node attributes.

       */

      private Permission getPermission(Node node) throws Exception {         

            NamedNodeMap map = node.getAttributes();

            Attr attrClassname = (Attr) map.getNamedItem("classname");

            Attr attrName = (Attr) map.getNamedItem("name");                             

            Attr attrActions = (Attr) map.getNamedItem("actions");                             

            Attr attrRelationship = (Attr) map.getNamedItem("relationship");                         

           

            if(attrClassname == null)

                  throw new RuntimeException();

           

            Class[] types = null;

            Object[] args = null;

                                   

            // Check if the name is specified

            // if no name is specified then because

            // the types and the args variables above

            // are null the default constructor is used.

            if(attrName != null) {

                  String name = attrName.getValue();

                       

                  // Check if actions are specified

                  // then setup the array sizes accordingly

                  if(attrActions != null) {

                        String actions = attrActions.getValue();

                                         

                        // Check if a relationship is specified

                        // then setup the array sizes accordingly                        

                        if(attrRelationship == null) {

                              types = new Class[2];

                              args = new Object[2];

                        } else {

                              types = new Class[3];

                              args = new Object[3];

                              String relationship = attrRelationship.getValue();

                              types[2] = relationship.getClass();

                              args[2] = relationship;

                        }

                 

                        types[1] = actions.getClass();                 

                        args[1] = actions;

                 

                  } else {

                        types = new Class[1];

                        args = new Object[1];        

                  }

                       

                  types[0] = name.getClass();

                  args[0] = name;                                                  

            }

 

 

            String classname = attrClassname.getValue();

            Class permissionClass = Class.forName(classname);

            Constructor constructor = permissionClass.getConstructor(types);

            return (Permission) constructor.newInstance(args);                                                                                       

      }

     

     

      /**

       * Returns a CodeSource object defined by the provided

       * grant Node attributes.

       */

      private java.security.CodeSource getCodebase(Node node) throws Exception {         

            Certificate[] certs = null;

            URL location;

 

 

            if(node.getNodeName().equalsIgnoreCase("grant")) {

                  NamedNodeMap map = node.getAttributes();

 

 

                  Attr attrCodebase = (Attr) map.getNamedItem("codebase");

                  if(attrCodebase != null) {

                        String codebaseValue = attrCodebase.getValue();

                        location = new URL(codebaseValue);

                        return new CodeSource(location,certs);

                  }

            }

            return null;

      }    

}

6.继承PrincipalPrincipalUser

public class PrincipalUser implements Principal {

 

 

    private String name;

 

 

    /**

     *

     * @param name the name for this principal.

     *

     * @exception InvalidParameterException if the <code>name</code>

     * is <code>null</code>.

     */

    public PrincipalUser(String name) {

            if (name == null)

               throw new InvalidParameterException("name cannot be null");

            //search role of this name.

            this.name = name;

    }

 

 

    /**

     * Returns the name for this <code>PrincipalUser</code>.

     *

     * @return the name for this <code>PrincipalUser</code>

     */

    public String getName() {

            return name;

    }

 

 

    /**

     *

     */

    public int hashCode() {

            return name.hashCode();

    }

   

}

7.继承PermissionPermissionCollection

public class ResourcePermission extends Permission {

     

      static final public String OWNER_RELATIONSHIP = "OWNER";

      static private int READ    = 0x01;

      static private int WRITE   = 0x02;

      static private int EXECUTE = 0x04;

      static private int CREATE  = 0x08;

      static private int DELETE  = 0x10;

      static private int DEPLOY  = 0x16;

      static private int CONFIRM = 0x24;

      static final public String READ_ACTION    = "read";

      static final public String WRITE_ACTION   = "write";

      static final public String EXECUTE_ACTION = "execute";

      static final public String CREATE_ACTION  = "create";

      static final public String DELETE_ACTION  = "delete";

      static final public String DEPLOY_ACTION  = "deploy";

      static final public String CONFIRM_ACTION = "confirm";

      protected int mask;

      protected Resource resource;

      protected Subject subject;

      /**

       * Constructor for ResourcePermission

       */

      public ResourcePermission(String name, String actions, Resource resource, Subject subject) {

            super(name);

            this.resource = resource;

            this.subject = subject;

            parseActions(actions);       

      }

 

 

 

 

      /**

       * @see Permission#getActions()

       */

      public String getActions() {

            StringBuffer buf = new StringBuffer();

 

 

            if( (mask & READ) == READ )

                  buf.append(READ_ACTION);                 

            if( (mask & WRITE) == WRITE ) {

                  if(buf.length() > 0)

                        buf.append(", ");

                  buf.append(WRITE_ACTION);

            }

            if( (mask & EXECUTE) == EXECUTE ) {

                  if(buf.length() > 0)

                        buf.append(", ");

                  buf.append(EXECUTE_ACTION);

            }

            if( (mask & CREATE) == CREATE ) {

                  if(buf.length() > 0)

                        buf.append(", ");

                  buf.append(CREATE_ACTION);

            }

            if( (mask & DELETE) == DELETE ) {

                  if(buf.length() > 0)

                        buf.append(", ");

                  buf.append(DELETE_ACTION);

            }

 

 

            return buf.toString();

      }

 

 

 

 

      /**

       * @see Permission#hashCode()

       */

      public int hashCode() {

            StringBuffer value = new StringBuffer(getName());

            return value.toString().hashCode() ^ mask;

      }

 

 

 

 

      /**

       * @see Permission#equals(Object)

       */

      public boolean equals(Object object) {

            if( !(object instanceof ResourcePermission) )        

                  return false;

                 

            ResourcePermission p = (ResourcePermission) object;

           

            return ( (p.getName().equals(getName())) && (p.mask == mask)  );

      }

 

 

 

      /**

       * @see Permission#implies(Permission)

       */

      public boolean implies(Permission permission) {                        

            // The permission must be an instance

            // of the DefaultResourceActionPermission.

            if( !(permission instanceof ResourcePermission) )

                  return false;

           

            // The resource name must be the same.

            if( !(permission.getName().equals(getName())) )      

                  return false;

                 

            return true;

      }

      /**

       * Parses the actions string.  Actions are separated

       * by commas or white space.

       */  

      private void parseActions(String actions) {

            mask = 0;        

           

            if(actions != null) {

                  StringTokenizer tokenizer = new StringTokenizer(actions, ",/t ");      

                  while(tokenizer.hasMoreTokens()) {

                        String token = tokenizer.nextToken();

                        if(token.equals(READ_ACTION))

                              mask |= READ;

                        else if(token.equals(WRITE_ACTION))

                              mask |= WRITE;

                        else if(token.equals(EXECUTE_ACTION))

                              mask |= EXECUTE;

                        else if(token.equals(CREATE_ACTION))

                              mask |= CREATE;

                        else if(token.equals(DELETE_ACTION))

                              mask |= DELETE;

                        else if(token.equals(DEPLOY_ACTION))

                              mask |= DEPLOY;

                        else if(token.equals(CONFIRM_ACTION))

                              mask |= CONFIRM;

                        else

                              throw new IllegalArgumentException("Unknown action: " + token);

                  }

            }

      }

      /**

       * Gets the resource

       * @return Returns a Resource

       */

      public Resource getResource() {

            return resource;

      }

 

 

 

 

      /**

       * Gets the subject

       * @return Returns a Subject

       */

      public Subject getSubject() {

            return subject;

      }    

 

 

 

 

      /**

       * @see Permission#newPermissionCollection()

       */

      public PermissionCollection newPermissionCollection() {

            return new ResourcePermissionCollection();

      }

 

 

 

 

      /**

       * @see Permission#toString()

       */

      public String toString() {

            return getName() + ":" + getActions();

      }

 

 

}

 

 

public class ResourcePermissionCollection extends PermissionCollection {

     

      private Hashtable permissions;

     

      public ResourcePermissionCollection() {

            permissions = new Hashtable();

      }

 

 

      /**

       * @see PermissionCollection#elements()

       */

      public Enumeration elements() {

            //System.out.println("DefaultResourceActionPermissionCollection.elements()");

            Hashtable list = new Hashtable();

            Enumeration enum = permissions.elements();

            while(enum.hasMoreElements()) {

                  Hashtable table = (Hashtable) enum.nextElement();

                  list.putAll(table);

            }

            return list.elements();

      }

 

 

      /**

       * @see PermissionCollection#implies(Permission)

       */

      public boolean implies(Permission permission) {

            //System.out.println("DefaultResourceActionPermissionCollection.implies()");

                       

            if( !(permission instanceof ResourcePermission) )

                  throw new IllegalArgumentException("Wrong Permission type");

                 

            ResourcePermission rcsPermission = (ResourcePermission) permission;

            Hashtable aggregate = (Hashtable) permissions.get(rcsPermission.getName());

            if(aggregate == null)

                  return false;

 

 

            Enumeration enum = aggregate.elements();

            while(enum.hasMoreElements()) {

                  ResourcePermission p = (ResourcePermission) enum.nextElement();

                  if(p.implies(permission))

                        return true;

            }

           

            return false;

      }

 

 

      /**

       * @see PermissionCollection#add(Permission)

       */

      public void add(Permission permission) {

            if(isReadOnly())

                  throw new IllegalArgumentException("Read only collection");

           

            if( !(permission instanceof ResourcePermission) )

                  throw new IllegalArgumentException("Wrong Permission type");

                 

            // Same permission names may have different relationships.

            // Therefore permissions are aggregated by relationship.

            ResourcePermission rcsPermission = (ResourcePermission) permission;

 

 

            Hashtable aggregate = (Hashtable) permissions.get(rcsPermission.getName());

 

 

                  aggregate = new Hashtable();             

           

            aggregate.put("none", rcsPermission);                      

            permissions.put(rcsPermission.getName(), aggregate);       

      }

 

 

}

8.实现授权Action

package com.nova.colimas.security.actions;

 

 

import java.security.PrivilegedAction;

import com.nova.colimas.data.sql.*;

 

 

import com.nova.colimas.data.sql.SQLTBI;

 

 

public class DBTURMAction implements PrivilegedAction {

 

 

      public Object run() {

            //验证授权

            SQLTURM sqltbi=new SQLTURM();

            sqltbi.update(null);

            return null;

      }

 

 

}

9.授权验证SQLTURM

/*

 * Created on 2005/07/01

 *

 * TODO To change the template for this generated file go to

 * Window - Preferences - Java - Code Style - Code Templates

 */

package com.nova.colimas.security.auth;

/**

 * This interface is used by implementing classes that

 * want to provide class instance authorization.

 *

 */

public interface Resource {

     

}

 

 

public class SQLTURM implements Resource{

 

 

      /* (non-Javadoc)

       * @see com.nova.colimas.data.sql.DAOAction#update(java.lang.Object)

       */

      public boolean update(Object bean) {

//验证00001角色是否有权限对SQLTURM执行write操作。

      Permission permission = new ResourcePermission("com.nova.colimas.data.sql.SQLTURM", "write", this,Subject.getSubject(java.security.AccessController.getContext()));   

            AccessController.checkPermission(permission);

      //有权限执行下面语句。无权限则抛出异常。

            return true;

      }

}

10. 实现com.nova.colimas.security.auth.AccessController类获得XMLPolicyFile实例。

package com.nova.colimas.security.auth;

 

 

import java.security.AccessControlException;

import java.security.*;

 

 

public class AccessController {

      public static void checkPermission(Permission permission)

      throws AccessControlException{

            ResourcePermission perm=(ResourcePermission)permission;

            String policy_class = null;

            XMLPolicyFile policy=null;

            policy_class = (String)java.security.AccessController.doPrivileged(

                        new PrivilegedAction() {

                              public Object run() {

                                    return Security.getProperty("policy.provider");

                              }

                        });

            try {

                  policy = ( XMLPolicyFile)

                  Class.forName(policy_class).newInstance();

                  Class permclass=Class.forName(perm.getName());

                  ResourcePermissionCollection rpc=(ResourcePermissionCollection)policy.getPermissions(perm.getSubject(),permclass.getProtectionDomain().getCodeSource());

                  if(rpc.implies(perm)) return;

            } catch (Exception e) {

                  e.printStackTrace();

            }

            throw new AccessControlException("Access Deny");

      }

}

 

 

11.实现com.nova.colimas.web.action.LoginAction

public class LoginAction extends Action {

     

      LoginContext loginContext=null;

      LoginForm loginForm=null;

      public ActionForward execute(ActionMapping mapping,

                   ActionForm form,

                   HttpServletRequest request,

                   HttpServletResponse response)

      throws Exception{

           

            /**

             * 1 get Login form Bean

             * 2 get the value

             * 3 call JAAS Login Module

             */

            try {      

                  loginForm=(LoginForm)form;

                  loginContext=new LoginContext(JAASConstants.AUTH_SECURITY_MODULENAME, new LoginCallbackHandler(loginForm.getUserID(),loginForm.getPassword()));

                 

            }catch(SecurityException e){

                  e.printStackTrace();

            } catch (LoginException e) {

                  e.printStackTrace();

                  //System.exit(-1);

            }

            // Authenticate the user

            try {

                  loginContext.login

                  //验证是否有权限运行DBTURMAction

                  Subject.doAs(loginContext.getSubject(),new DBTURMAction() );                             

                  System.out.println("Successfully!/n");   

                 

            } catch (Exception e) {

                  System.out.println("Unexpected Exception - unable to continue");

                  e.printStackTrace();

                  //System.exit(-1);

                  return mapping.findForward("failure");

            }          

      return mapping.findForward("success");

      }

}

这篇关于[原创]JAAS 实现in Struts Web App,使用XMLPolicy文件,不改变VM安全文件(2)授权的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/950865

相关文章

使用Java解析JSON数据并提取特定字段的实现步骤(以提取mailNo为例)

《使用Java解析JSON数据并提取特定字段的实现步骤(以提取mailNo为例)》在现代软件开发中,处理JSON数据是一项非常常见的任务,无论是从API接口获取数据,还是将数据存储为JSON格式,解析... 目录1. 背景介绍1.1 jsON简介1.2 实际案例2. 准备工作2.1 环境搭建2.1.1 添加

Java实现任务管理器性能网络监控数据的方法详解

《Java实现任务管理器性能网络监控数据的方法详解》在现代操作系统中,任务管理器是一个非常重要的工具,用于监控和管理计算机的运行状态,包括CPU使用率、内存占用等,对于开发者和系统管理员来说,了解这些... 目录引言一、背景知识二、准备工作1. Maven依赖2. Gradle依赖三、代码实现四、代码详解五

java如何分布式锁实现和选型

《java如何分布式锁实现和选型》文章介绍了分布式锁的重要性以及在分布式系统中常见的问题和需求,它详细阐述了如何使用分布式锁来确保数据的一致性和系统的高可用性,文章还提供了基于数据库、Redis和Zo... 目录引言:分布式锁的重要性与分布式系统中的常见问题和需求分布式锁的重要性分布式系统中常见的问题和需求

SpringBoot基于MyBatis-Plus实现Lambda Query查询的示例代码

《SpringBoot基于MyBatis-Plus实现LambdaQuery查询的示例代码》MyBatis-Plus是MyBatis的增强工具,简化了数据库操作,并提高了开发效率,它提供了多种查询方... 目录引言基础环境配置依赖配置(Maven)application.yml 配置表结构设计demo_st

如何使用celery进行异步处理和定时任务(django)

《如何使用celery进行异步处理和定时任务(django)》文章介绍了Celery的基本概念、安装方法、如何使用Celery进行异步任务处理以及如何设置定时任务,通过Celery,可以在Web应用中... 目录一、celery的作用二、安装celery三、使用celery 异步执行任务四、使用celery

使用Python绘制蛇年春节祝福艺术图

《使用Python绘制蛇年春节祝福艺术图》:本文主要介绍如何使用Python的Matplotlib库绘制一幅富有创意的“蛇年有福”艺术图,这幅图结合了数字,蛇形,花朵等装饰,需要的可以参考下... 目录1. 绘图的基本概念2. 准备工作3. 实现代码解析3.1 设置绘图画布3.2 绘制数字“2025”3.3

Jsoncpp的安装与使用方式

《Jsoncpp的安装与使用方式》JsonCpp是一个用于解析和生成JSON数据的C++库,它支持解析JSON文件或字符串到C++对象,以及将C++对象序列化回JSON格式,安装JsonCpp可以通过... 目录安装jsoncppJsoncpp的使用Value类构造函数检测保存的数据类型提取数据对json数

python使用watchdog实现文件资源监控

《python使用watchdog实现文件资源监控》watchdog支持跨平台文件资源监控,可以检测指定文件夹下文件及文件夹变动,下面我们来看看Python如何使用watchdog实现文件资源监控吧... python文件监控库watchdogs简介随着Python在各种应用领域中的广泛使用,其生态环境也

el-select下拉选择缓存的实现

《el-select下拉选择缓存的实现》本文主要介绍了在使用el-select实现下拉选择缓存时遇到的问题及解决方案,文中通过示例代码介绍的非常详细,对大家的学习或者工作具有一定的参考学习价值,需要的... 目录项目场景:问题描述解决方案:项目场景:从左侧列表中选取字段填入右侧下拉多选框,用户可以对右侧

Python中构建终端应用界面利器Blessed模块的使用

《Python中构建终端应用界面利器Blessed模块的使用》Blessed库作为一个轻量级且功能强大的解决方案,开始在开发者中赢得口碑,今天,我们就一起来探索一下它是如何让终端UI开发变得轻松而高... 目录一、安装与配置:简单、快速、无障碍二、基本功能:从彩色文本到动态交互1. 显示基本内容2. 创建链