You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

JettyLoginService.java 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471
  1. /*
  2. * Copyright 2011 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit;
  17. import java.io.File;
  18. import java.io.FileReader;
  19. import java.io.FileWriter;
  20. import java.io.IOException;
  21. import java.security.Principal;
  22. import java.text.MessageFormat;
  23. import java.util.ArrayList;
  24. import java.util.HashSet;
  25. import java.util.List;
  26. import java.util.Map;
  27. import java.util.Properties;
  28. import java.util.Set;
  29. import javax.security.auth.Subject;
  30. import org.eclipse.jetty.http.security.Credential;
  31. import org.eclipse.jetty.security.IdentityService;
  32. import org.eclipse.jetty.security.MappedLoginService;
  33. import org.eclipse.jetty.server.UserIdentity;
  34. import org.eclipse.jetty.util.log.Log;
  35. import org.slf4j.Logger;
  36. import org.slf4j.LoggerFactory;
  37. import com.gitblit.models.UserModel;
  38. public class JettyLoginService extends MappedLoginService implements ILoginService {
  39. private final Logger logger = LoggerFactory.getLogger(JettyLoginService.class);
  40. private final File realmFile;
  41. public JettyLoginService(File realmFile) {
  42. super();
  43. setName(Constants.NAME);
  44. this.realmFile = realmFile;
  45. }
  46. @Override
  47. public UserModel authenticate(String username, char[] password) {
  48. UserIdentity identity = login(username, new String(password));
  49. if (identity == null || identity.equals(UserIdentity.UNAUTHENTICATED_IDENTITY)) {
  50. return null;
  51. }
  52. UserModel user = new UserModel(username);
  53. user.canAdmin = identity.isUserInRole(Constants.ADMIN_ROLE, null);
  54. // Add repositories
  55. for (Principal principal : identity.getSubject().getPrincipals()) {
  56. if (principal instanceof RolePrincipal) {
  57. RolePrincipal role = (RolePrincipal) principal;
  58. String roleName = role.getName();
  59. if (roleName.charAt(0) != '#') {
  60. user.addRepository(roleName);
  61. }
  62. }
  63. }
  64. return user;
  65. }
  66. @Override
  67. public UserModel getUserModel(String username) {
  68. UserIdentity identity = _users.get(username);
  69. if (identity == null) {
  70. return null;
  71. }
  72. UserModel model = new UserModel(username);
  73. Subject subject = identity.getSubject();
  74. for (Principal principal : subject.getPrincipals()) {
  75. if (principal instanceof RolePrincipal) {
  76. RolePrincipal role = (RolePrincipal) principal;
  77. String name = role.getName();
  78. switch (name.charAt(0)) {
  79. case '#':
  80. // Permissions
  81. if (name.equalsIgnoreCase(Constants.ADMIN_ROLE)) {
  82. model.canAdmin = true;
  83. }
  84. break;
  85. default:
  86. model.addRepository(name);
  87. }
  88. }
  89. }
  90. // Retrieve the password from the realm file.
  91. // Stupid, I know, but the password is buried within protected inner
  92. // classes in private variables. Too much work to reflectively retrieve.
  93. try {
  94. Properties allUsers = readRealmFile();
  95. String value = allUsers.getProperty(username);
  96. String password = value.split(",")[0];
  97. model.password = password;
  98. } catch (Throwable t) {
  99. logger.error(MessageFormat.format("Failed to read password for user {0}!", username), t);
  100. }
  101. return model;
  102. }
  103. @Override
  104. public boolean updateUserModel(UserModel model) {
  105. return updateUserModel(model.username, model);
  106. }
  107. @Override
  108. public boolean updateUserModel(String username, UserModel model) {
  109. try {
  110. Properties allUsers = readRealmFile();
  111. ArrayList<String> roles = new ArrayList<String>(model.repositories);
  112. // Permissions
  113. if (model.canAdmin) {
  114. roles.add(Constants.ADMIN_ROLE);
  115. }
  116. StringBuilder sb = new StringBuilder();
  117. sb.append(model.password);
  118. sb.append(',');
  119. for (String role : roles) {
  120. sb.append(role);
  121. sb.append(',');
  122. }
  123. // trim trailing comma
  124. sb.setLength(sb.length() - 1);
  125. allUsers.remove(username);
  126. allUsers.put(model.username, sb.toString());
  127. writeRealmFile(allUsers);
  128. // Update login service
  129. removeUser(username);
  130. putUser(model.username, Credential.getCredential(model.password),
  131. roles.toArray(new String[0]));
  132. return true;
  133. } catch (Throwable t) {
  134. logger.error(MessageFormat.format("Failed to update user model {0}!", model.username),
  135. t);
  136. }
  137. return false;
  138. }
  139. @Override
  140. public boolean deleteUserModel(UserModel model) {
  141. return deleteUser(model.username);
  142. }
  143. @Override
  144. public boolean deleteUser(String username) {
  145. try {
  146. // Read realm file
  147. Properties allUsers = readRealmFile();
  148. allUsers.remove(username);
  149. writeRealmFile(allUsers);
  150. // Drop user from map
  151. removeUser(username);
  152. return true;
  153. } catch (Throwable t) {
  154. logger.error(MessageFormat.format("Failed to delete user {0}!", username), t);
  155. }
  156. return false;
  157. }
  158. @Override
  159. public List<String> getAllUsernames() {
  160. List<String> list = new ArrayList<String>();
  161. list.addAll(_users.keySet());
  162. return list;
  163. }
  164. @Override
  165. public List<String> getUsernamesForRole(String role) {
  166. List<String> list = new ArrayList<String>();
  167. try {
  168. Properties allUsers = readRealmFile();
  169. for (String username : allUsers.stringPropertyNames()) {
  170. String value = allUsers.getProperty(username);
  171. String[] values = value.split(",");
  172. // skip first value (password)
  173. for (int i = 1; i < values.length; i++) {
  174. String r = values[i];
  175. if (r.equalsIgnoreCase(role)) {
  176. list.add(username);
  177. break;
  178. }
  179. }
  180. }
  181. } catch (Throwable t) {
  182. logger.error(MessageFormat.format("Failed to get usernames for role {0}!", role), t);
  183. }
  184. return list;
  185. }
  186. @Override
  187. public boolean setUsernamesForRole(String role, List<String> usernames) {
  188. try {
  189. Set<String> specifiedUsers = new HashSet<String>(usernames);
  190. Set<String> needsAddRole = new HashSet<String>(specifiedUsers);
  191. Set<String> needsRemoveRole = new HashSet<String>();
  192. // identify users which require add and remove role
  193. Properties allUsers = readRealmFile();
  194. for (String username : allUsers.stringPropertyNames()) {
  195. String value = allUsers.getProperty(username);
  196. String[] values = value.split(",");
  197. // skip first value (password)
  198. for (int i = 1; i < values.length; i++) {
  199. String r = values[i];
  200. if (r.equalsIgnoreCase(role)) {
  201. // user has role, check against revised user list
  202. if (specifiedUsers.contains(username)) {
  203. needsAddRole.remove(username);
  204. } else {
  205. // remove role from user
  206. needsRemoveRole.add(username);
  207. }
  208. break;
  209. }
  210. }
  211. }
  212. // add roles to users
  213. for (String user : needsAddRole) {
  214. String userValues = allUsers.getProperty(user);
  215. userValues += "," + role;
  216. allUsers.put(user, userValues);
  217. String[] values = userValues.split(",");
  218. String password = values[0];
  219. String[] roles = new String[values.length - 1];
  220. System.arraycopy(values, 1, roles, 0, values.length - 1);
  221. putUser(user, Credential.getCredential(password), roles);
  222. }
  223. // remove role from user
  224. for (String user : needsRemoveRole) {
  225. String[] values = allUsers.getProperty(user).split(",");
  226. String password = values[0];
  227. StringBuilder sb = new StringBuilder();
  228. sb.append(password);
  229. sb.append(',');
  230. List<String> revisedRoles = new ArrayList<String>();
  231. // skip first value (password)
  232. for (int i = 1; i < values.length; i++) {
  233. String value = values[i];
  234. if (!value.equalsIgnoreCase(role)) {
  235. revisedRoles.add(value);
  236. sb.append(value);
  237. sb.append(',');
  238. }
  239. }
  240. sb.setLength(sb.length() - 1);
  241. // update properties
  242. allUsers.put(user, sb.toString());
  243. // update memory
  244. putUser(user, Credential.getCredential(password),
  245. revisedRoles.toArray(new String[0]));
  246. }
  247. // persist changes
  248. writeRealmFile(allUsers);
  249. return true;
  250. } catch (Throwable t) {
  251. logger.error(MessageFormat.format("Failed to set usernames for role {0}!", role), t);
  252. }
  253. return false;
  254. }
  255. @Override
  256. public boolean renameRole(String oldRole, String newRole) {
  257. try {
  258. Properties allUsers = readRealmFile();
  259. Set<String> needsRenameRole = new HashSet<String>();
  260. // identify users which require role rename
  261. for (String username : allUsers.stringPropertyNames()) {
  262. String value = allUsers.getProperty(username);
  263. String[] roles = value.split(",");
  264. // skip first value (password)
  265. for (int i = 1; i < roles.length; i++) {
  266. String r = roles[i];
  267. if (r.equalsIgnoreCase(oldRole)) {
  268. needsRenameRole.remove(username);
  269. break;
  270. }
  271. }
  272. }
  273. // rename role for identified users
  274. for (String user : needsRenameRole) {
  275. String userValues = allUsers.getProperty(user);
  276. String[] values = userValues.split(",");
  277. String password = values[0];
  278. StringBuilder sb = new StringBuilder();
  279. sb.append(password);
  280. sb.append(',');
  281. List<String> revisedRoles = new ArrayList<String>();
  282. revisedRoles.add(newRole);
  283. // skip first value (password)
  284. for (int i = 1; i < values.length; i++) {
  285. String value = values[i];
  286. if (!value.equalsIgnoreCase(oldRole)) {
  287. revisedRoles.add(value);
  288. sb.append(value);
  289. sb.append(',');
  290. }
  291. }
  292. sb.setLength(sb.length() - 1);
  293. // update properties
  294. allUsers.put(user, sb.toString());
  295. // update memory
  296. putUser(user, Credential.getCredential(password),
  297. revisedRoles.toArray(new String[0]));
  298. }
  299. // persist changes
  300. writeRealmFile(allUsers);
  301. return true;
  302. } catch (Throwable t) {
  303. logger.error(
  304. MessageFormat.format("Failed to rename role {0} to {1}!", oldRole, newRole), t);
  305. }
  306. return false;
  307. }
  308. @Override
  309. public boolean deleteRole(String role) {
  310. try {
  311. Properties allUsers = readRealmFile();
  312. Set<String> needsDeleteRole = new HashSet<String>();
  313. // identify users which require role rename
  314. for (String username : allUsers.stringPropertyNames()) {
  315. String value = allUsers.getProperty(username);
  316. String[] roles = value.split(",");
  317. // skip first value (password)
  318. for (int i = 1; i < roles.length; i++) {
  319. String r = roles[i];
  320. if (r.equalsIgnoreCase(role)) {
  321. needsDeleteRole.remove(username);
  322. break;
  323. }
  324. }
  325. }
  326. // delete role for identified users
  327. for (String user : needsDeleteRole) {
  328. String userValues = allUsers.getProperty(user);
  329. String[] values = userValues.split(",");
  330. String password = values[0];
  331. StringBuilder sb = new StringBuilder();
  332. sb.append(password);
  333. sb.append(',');
  334. List<String> revisedRoles = new ArrayList<String>();
  335. // skip first value (password)
  336. for (int i = 1; i < values.length; i++) {
  337. String value = values[i];
  338. if (!value.equalsIgnoreCase(role)) {
  339. revisedRoles.add(value);
  340. sb.append(value);
  341. sb.append(',');
  342. }
  343. }
  344. sb.setLength(sb.length() - 1);
  345. // update properties
  346. allUsers.put(user, sb.toString());
  347. // update memory
  348. putUser(user, Credential.getCredential(password),
  349. revisedRoles.toArray(new String[0]));
  350. }
  351. // persist changes
  352. writeRealmFile(allUsers);
  353. return true;
  354. } catch (Throwable t) {
  355. logger.error(MessageFormat.format("Failed to delete role {0}!", role), t);
  356. }
  357. return false;
  358. }
  359. private Properties readRealmFile() throws IOException {
  360. Properties allUsers = new Properties();
  361. FileReader reader = new FileReader(realmFile);
  362. allUsers.load(reader);
  363. reader.close();
  364. return allUsers;
  365. }
  366. private void writeRealmFile(Properties properties) throws IOException {
  367. // Update realm file
  368. File realmFileCopy = new File(realmFile.getAbsolutePath() + ".tmp");
  369. FileWriter writer = new FileWriter(realmFileCopy);
  370. properties
  371. .store(writer,
  372. "# Gitblit realm file format: username=password,\\#permission,repository1,repository2...");
  373. writer.close();
  374. if (realmFileCopy.exists() && realmFileCopy.length() > 0) {
  375. if (realmFile.delete()) {
  376. if (!realmFileCopy.renameTo(realmFile)) {
  377. throw new IOException(MessageFormat.format("Failed to rename {0} to {1}!",
  378. realmFileCopy.getAbsolutePath(), realmFile.getAbsolutePath()));
  379. }
  380. } else {
  381. throw new IOException(MessageFormat.format("Failed to delete (0)!",
  382. realmFile.getAbsolutePath()));
  383. }
  384. } else {
  385. throw new IOException(MessageFormat.format("Failed to save {0}!",
  386. realmFileCopy.getAbsolutePath()));
  387. }
  388. }
  389. /* ------------------------------------------------------------ */
  390. @Override
  391. public void loadUsers() throws IOException {
  392. if (realmFile == null) {
  393. return;
  394. }
  395. if (Log.isDebugEnabled()) {
  396. Log.debug("Load " + this + " from " + realmFile);
  397. }
  398. Properties allUsers = readRealmFile();
  399. // Map Users
  400. for (Map.Entry<Object, Object> entry : allUsers.entrySet()) {
  401. String username = ((String) entry.getKey()).trim();
  402. String credentials = ((String) entry.getValue()).trim();
  403. String roles = null;
  404. int c = credentials.indexOf(',');
  405. if (c > 0) {
  406. roles = credentials.substring(c + 1).trim();
  407. credentials = credentials.substring(0, c).trim();
  408. }
  409. if (username != null && username.length() > 0 && credentials != null
  410. && credentials.length() > 0) {
  411. String[] roleArray = IdentityService.NO_ROLES;
  412. if (roles != null && roles.length() > 0) {
  413. roleArray = roles.split(",");
  414. }
  415. putUser(username, Credential.getCredential(credentials), roleArray);
  416. }
  417. }
  418. }
  419. @Override
  420. protected UserIdentity loadUser(String username) {
  421. return null;
  422. }
  423. }