Classes in this File | Line Coverage | Branch Coverage | Complexity | ||||
KualiDistributedSessionFilter |
|
| 3.6;3.6 |
1 | /* | |
2 | * Copyright 2007-2008 The Kuali Foundation | |
3 | * | |
4 | * Licensed under the Educational Community License, Version 2.0 (the "License"); | |
5 | * you may not use this file except in compliance with the License. | |
6 | * You may obtain a copy of the License at | |
7 | * | |
8 | * http://www.opensource.org/licenses/ecl2.php | |
9 | * | |
10 | * Unless required by applicable law or agreed to in writing, software | |
11 | * distributed under the License is distributed on an "AS IS" BASIS, | |
12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
13 | * See the License for the specific language governing permissions and | |
14 | * limitations under the License. | |
15 | */ | |
16 | package org.kuali.rice.kim.client.acegi; | |
17 | ||
18 | import javax.servlet.http.HttpServletRequest; | |
19 | import javax.servlet.http.HttpServletResponse; | |
20 | ||
21 | import org.acegisecurity.Authentication; | |
22 | import org.acegisecurity.AuthenticationException; | |
23 | import org.acegisecurity.GrantedAuthority; | |
24 | import org.acegisecurity.context.SecurityContextHolder; | |
25 | import org.acegisecurity.ui.cas.CasProcessingFilter; | |
26 | import org.kuali.rice.kim.sesn.DistributedSession; | |
27 | ||
28 | /** | |
29 | * This class is the main integration point for implementing the | |
30 | * distributed session in ACEGI. | |
31 | * | |
32 | * TODO: Need to add check for missing DST (update | |
33 | * {@link org.kuali.rice.kim.sesn.DistributedSession}) | |
34 | * | |
35 | * @author Kuali Rice Team (rice.collab@kuali.org) | |
36 | * @see org.acegisecurity.ui.cas.CasProcessingFilter#attemptAuthentication | |
37 | */ | |
38 | 0 | public class KualiDistributedSessionFilter extends CasProcessingFilter { |
39 | ||
40 | private DistributedSession distributedSession; | |
41 | ||
42 | //~ Methods ======================================================================================================== | |
43 | ||
44 | /** | |
45 | * This overridden method gets called if requiresAuthentication is true. | |
46 | * If Session is Invalid, throw a {@link KualiDistribtedSessionExpiredException}. | |
47 | * The session is determined invalid if the authentication is of type | |
48 | * {@link KualiDistribtedSessionExpiredAuthentication}. Otherwise it | |
49 | * would have to verify if the DST is valid twice. | |
50 | * | |
51 | * @return the authentication result of the super method | |
52 | * @see org.acegisecurity.ui.cas.CasProcessingFilter#attemptAuthentication(javax.servlet.http.HttpServletRequest) | |
53 | */ | |
54 | public Authentication attemptAuthentication(final HttpServletRequest request) | |
55 | throws AuthenticationException { | |
56 | 0 | Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); |
57 | ||
58 | 0 | if (authentication instanceof KualiDistributedSessionExpiredAuthentication) { |
59 | 0 | logger.debug("Authentication is dead in attemptAuthentication, setting authentication to null and throwing KualiDistributedSessionExpiredException"); |
60 | 0 | SecurityContextHolder.getContext().setAuthentication(null); |
61 | ||
62 | 0 | throw new KualiDistributedSessionExpiredException("Session Expired"); |
63 | } | |
64 | ||
65 | 0 | return super.attemptAuthentication(request); |
66 | } | |
67 | ||
68 | /** | |
69 | * This overridden method checks if the DST is valid. If it's not, the | |
70 | * authentication is set to a new, non-authenticated, | |
71 | * {@link KualiDistributedSessionExpiredAuthentication} which is the | |
72 | * indication for {@link attemptAuthentication} that the session has | |
73 | * expired | |
74 | * | |
75 | * @return true if DST is inValid or if super method returns true | |
76 | * @see org.acegisecurity.ui.AbstractProcessingFilter#requiresAuthentication(javax.servlet.http.HttpServletRequest, javax.servlet.http.HttpServletResponse) | |
77 | */ | |
78 | protected boolean requiresAuthentication(HttpServletRequest request, HttpServletResponse response) { | |
79 | 0 | boolean bSesnValid = this.isSesnValid(); |
80 | ||
81 | 0 | if (!bSesnValid) { |
82 | 0 | if (this.getDST() != null) { |
83 | 0 | logger.debug("session invalid, setting dead authentication, and pushing through to attemptAuthentication"); |
84 | 0 | SecurityContextHolder.getContext().setAuthentication(new KualiDistributedSessionExpiredAuthentication()); |
85 | 0 | return true; |
86 | } | |
87 | } | |
88 | ||
89 | 0 | return super.requiresAuthentication(request, response); |
90 | } | |
91 | ||
92 | ||
93 | /** | |
94 | * This method determines if the stored Distributed Session Ticket is | |
95 | * valid. | |
96 | * | |
97 | * @return true if valid, false if not | |
98 | */ | |
99 | private boolean isSesnValid() { | |
100 | 0 | String sDST = this.getDST(); |
101 | ||
102 | 0 | if (sDST != null) { |
103 | 0 | if (distributedSession.isSesnValid(sDST)) { |
104 | 0 | logger.debug("Session Valid"); |
105 | 0 | distributedSession.touchSesn(sDST); |
106 | 0 | return true; |
107 | } else { | |
108 | 0 | distributedSession.clearSesn(sDST); |
109 | } | |
110 | } | |
111 | 0 | logger.debug("Session Not Valid"); |
112 | ||
113 | 0 | return false; |
114 | } | |
115 | ||
116 | /** | |
117 | * This method retrieves the Distributed Session Ticket | |
118 | * | |
119 | * @return the Distributed Session Ticket if valid or null | |
120 | */ | |
121 | private String getDST() { | |
122 | 0 | Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); |
123 | 0 | String sDST = null; |
124 | ||
125 | 0 | if (authentication != null) { |
126 | 0 | GrantedAuthority[] authorities = authentication.getAuthorities(); |
127 | 0 | if (logger.isDebugEnabled()) { |
128 | 0 | logger.debug("Granted Authority Count:" + authorities.length); |
129 | } | |
130 | ||
131 | 0 | for (int i = 0; i < authorities.length; i++) { |
132 | 0 | if (logger.isDebugEnabled()) { |
133 | 0 | logger.debug("Authority:" + authorities[i]); |
134 | } | |
135 | 0 | if (authorities[i].toString().startsWith(DistributedSession.getPrefix())) { |
136 | 0 | sDST = authorities[0].toString(); |
137 | } | |
138 | } | |
139 | 0 | } |
140 | else { | |
141 | 0 | logger.debug("Authentication is NULL"); |
142 | } | |
143 | ||
144 | 0 | return sDST; |
145 | } | |
146 | ||
147 | /** | |
148 | * @param distributedSession the distributedSession to set | |
149 | */ | |
150 | public void setDistributedSession(DistributedSession distributedSession) { | |
151 | 0 | this.distributedSession = distributedSession; |
152 | 0 | } |
153 | ||
154 | } |