1 /* 2 * Licensed to the Apache Software Foundation (ASF) under one 3 * or more contributor license agreements. See the NOTICE file 4 * distributed with this work for additional information 5 * regarding copyright ownership. The ASF licenses this file 6 * to you under the Apache License, Version 2.0 (the 7 * "License"); you may not use this file except in compliance 8 * with the License. You may obtain a copy of the License at 9 * 10 * http://www.apache.org/licenses/LICENSE-2.0 11 * 12 * Unless required by applicable law or agreed to in writing, 13 * software distributed under the License is distributed on an 14 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 15 * KIND, either express or implied. See the License for the 16 * specific language governing permissions and limitations 17 * under the License. 18 */ 19 package org.apache.shiro.mgt; 20 21 import org.apache.shiro.authc.*; 22 import org.apache.shiro.authz.Authorizer; 23 import org.apache.shiro.realm.Realm; 24 import org.apache.shiro.session.InvalidSessionException; 25 import org.apache.shiro.session.Session; 26 import org.apache.shiro.session.mgt.DefaultSessionContext; 27 import org.apache.shiro.session.mgt.DefaultSessionKey; 28 import org.apache.shiro.session.mgt.SessionContext; 29 import org.apache.shiro.session.mgt.SessionKey; 30 import org.apache.shiro.subject.PrincipalCollection; 31 import org.apache.shiro.subject.Subject; 32 import org.apache.shiro.subject.SubjectContext; 33 import org.apache.shiro.subject.support.DefaultSubjectContext; 34 import org.apache.shiro.util.CollectionUtils; 35 import org.slf4j.Logger; 36 import org.slf4j.LoggerFactory; 37 38 import java.io.Serializable; 39 import java.util.Collection; 40 41 /** 42 * The Shiro framework's default concrete implementation of the {@link SecurityManager} interface, 43 * based around a collection of {@link org.apache.shiro.realm.Realm}s. This implementation delegates its 44 * authentication, authorization, and session operations to wrapped {@link Authenticator}, {@link Authorizer}, and 45 * {@link org.apache.shiro.session.mgt.SessionManager SessionManager} instances respectively via superclass 46 * implementation. 47 * <p/> 48 * To greatly reduce and simplify configuration, this implementation (and its superclasses) will 49 * create suitable defaults for all of its required dependencies, <em>except</em> the required one or more 50 * {@link Realm Realm}s. Because {@code Realm} implementations usually interact with an application's data model, 51 * they are almost always application specific; you will want to specify at least one custom 52 * {@code Realm} implementation that 'knows' about your application's data/security model 53 * (via {@link #setRealm} or one of the overloaded constructors). All other attributes in this class hierarchy 54 * will have suitable defaults for most enterprise applications. 55 * <p/> 56 * <b>RememberMe notice</b>: This class supports the ability to configure a 57 * {@link #setRememberMeManager RememberMeManager} 58 * for {@code RememberMe} identity services for login/logout, BUT, a default instance <em>will not</em> be created 59 * for this attribute at startup. 60 * <p/> 61 * Because RememberMe services are inherently client tier-specific and 62 * therefore aplication-dependent, if you want {@code RememberMe} services enabled, you will have to specify an 63 * instance yourself via the {@link #setRememberMeManager(RememberMeManager) setRememberMeManager} 64 * mutator. However if you're reading this JavaDoc with the 65 * expectation of operating in a Web environment, take a look at the 66 * {@code org.apache.shiro.web.DefaultWebSecurityManager} implementation, which 67 * <em>does</em> support {@code RememberMe} services by default at startup. 68 * 69 * @since 0.2 70 */ 71 public class DefaultSecurityManager extends SessionsSecurityManager { 72 73 private static final Logger log = LoggerFactory.getLogger(DefaultSecurityManager.class); 74 75 protected RememberMeManager rememberMeManager; 76 protected SubjectDAO subjectDAO; 77 protected SubjectFactory subjectFactory; 78 79 /** 80 * Default no-arg constructor. 81 */ 82 public DefaultSecurityManager() { 83 super(); 84 this.subjectFactory = new DefaultSubjectFactory(); 85 this.subjectDAO = new DefaultSubjectDAO(); 86 } 87 88 /** 89 * Supporting constructor for a single-realm application. 90 * 91 * @param singleRealm the single realm used by this SecurityManager. 92 */ 93 public DefaultSecurityManager(Realm singleRealm) { 94 this(); 95 setRealm(singleRealm); 96 } 97 98 /** 99 * Supporting constructor for multiple {@link #setRealms realms}. 100 * 101 * @param realms the realm instances backing this SecurityManager. 102 */ 103 public DefaultSecurityManager(Collection<Realm> realms) { 104 this(); 105 setRealms(realms); 106 } 107 108 /** 109 * Returns the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. 110 * 111 * @return the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. 112 */ 113 public SubjectFactory getSubjectFactory() { 114 return subjectFactory; 115 } 116 117 /** 118 * Sets the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. 119 * 120 * @param subjectFactory the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. 121 */ 122 public void setSubjectFactory(SubjectFactory subjectFactory) { 123 this.subjectFactory = subjectFactory; 124 } 125 126 /** 127 * Returns the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an 128 * Subject identity is discovered (eg after RememberMe services). Unless configured otherwise, the default 129 * implementation is a {@link DefaultSubjectDAO}. 130 * 131 * @return the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an 132 * Subject identity is discovered (eg after RememberMe services). 133 * @see DefaultSubjectDAO 134 * @since 1.2 135 */ 136 public SubjectDAO getSubjectDAO() { 137 return subjectDAO; 138 } 139 140 /** 141 * Sets the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an 142 * Subject identity is discovered (eg after RememberMe services). Unless configured otherwise, the default 143 * implementation is a {@link DefaultSubjectDAO}. 144 * 145 * @param subjectDAO the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an 146 * Subject identity is discovered (eg after RememberMe services). 147 * @see DefaultSubjectDAO 148 * @since 1.2 149 */ 150 public void setSubjectDAO(SubjectDAO subjectDAO) { 151 this.subjectDAO = subjectDAO; 152 } 153 154 public RememberMeManager getRememberMeManager() { 155 return rememberMeManager; 156 } 157 158 public void setRememberMeManager(RememberMeManager rememberMeManager) { 159 this.rememberMeManager = rememberMeManager; 160 } 161 162 protected SubjectContext createSubjectContext() { 163 return new DefaultSubjectContext(); 164 } 165 166 /** 167 * Creates a {@code Subject} instance for the user represented by the given method arguments. 168 * 169 * @param token the {@code AuthenticationToken} submitted for the successful authentication. 170 * @param info the {@code AuthenticationInfo} of a newly authenticated user. 171 * @param existing the existing {@code Subject} instance that initiated the authentication attempt 172 * @return the {@code Subject} instance that represents the context and session data for the newly 173 * authenticated subject. 174 */ 175 protected Subject createSubject(AuthenticationToken token, AuthenticationInfo info, Subject existing) { 176 SubjectContext context = createSubjectContext(); 177 context.setAuthenticated(true); 178 context.setAuthenticationToken(token); 179 context.setAuthenticationInfo(info); 180 if (existing != null) { 181 context.setSubject(existing); 182 } 183 return createSubject(context); 184 } 185 186 /** 187 * Binds a {@code Subject} instance created after authentication to the application for later use. 188 * <p/> 189 * As of Shiro 1.2, this method has been deprecated in favor of {@link #save(org.apache.shiro.subject.Subject)}, 190 * which this implementation now calls. 191 * 192 * @param subject the {@code Subject} instance created after authentication to be bound to the application 193 * for later use. 194 * @see #save(org.apache.shiro.subject.Subject) 195 * @deprecated in favor of {@link #save(org.apache.shiro.subject.Subject) save(subject)}. 196 */ 197 @Deprecated 198 protected void bind(Subject subject) { 199 save(subject); 200 } 201 202 protected void rememberMeSuccessfulLogin(AuthenticationToken token, AuthenticationInfo info, Subject subject) { 203 RememberMeManager rmm = getRememberMeManager(); 204 if (rmm != null) { 205 try { 206 rmm.onSuccessfulLogin(subject, token, info); 207 } catch (Exception e) { 208 if (log.isWarnEnabled()) { 209 String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + 210 "] threw an exception during onSuccessfulLogin. RememberMe services will not be " + 211 "performed for account [" + info + "]."; 212 log.warn(msg, e); 213 } 214 } 215 } else { 216 if (log.isTraceEnabled()) { 217 log.trace("This " + getClass().getName() + " instance does not have a " + 218 "[" + RememberMeManager.class.getName() + "] instance configured. RememberMe services " + 219 "will not be performed for account [" + info + "]."); 220 } 221 } 222 } 223 224 protected void rememberMeFailedLogin(AuthenticationToken token, AuthenticationException ex, Subject subject) { 225 RememberMeManager rmm = getRememberMeManager(); 226 if (rmm != null) { 227 try { 228 rmm.onFailedLogin(subject, token, ex); 229 } catch (Exception e) { 230 if (log.isWarnEnabled()) { 231 String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + 232 "] threw an exception during onFailedLogin for AuthenticationToken [" + 233 token + "]."; 234 log.warn(msg, e); 235 } 236 } 237 } 238 } 239 240 protected void rememberMeLogout(Subject subject) { 241 RememberMeManager rmm = getRememberMeManager(); 242 if (rmm != null) { 243 try { 244 rmm.onLogout(subject); 245 } catch (Exception e) { 246 if (log.isWarnEnabled()) { 247 String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + 248 "] threw an exception during onLogout for subject with principals [" + 249 (subject != null ? subject.getPrincipals() : null) + "]"; 250 log.warn(msg, e); 251 } 252 } 253 } 254 } 255 256 /** 257 * First authenticates the {@code AuthenticationToken} argument, and if successful, constructs a 258 * {@code Subject} instance representing the authenticated account's identity. 259 * <p/> 260 * Once constructed, the {@code Subject} instance is then {@link #bind bound} to the application for 261 * subsequent access before being returned to the caller. 262 * 263 * @param token the authenticationToken to process for the login attempt. 264 * @return a Subject representing the authenticated user. 265 * @throws AuthenticationException if there is a problem authenticating the specified {@code token}. 266 */ 267 public Subject login(Subject subject, AuthenticationToken token) throws AuthenticationException { 268 AuthenticationInfo info; 269 try { 270 info = authenticate(token); 271 } catch (AuthenticationException ae) { 272 try { 273 onFailedLogin(token, ae, subject); 274 } catch (Exception e) { 275 if (log.isInfoEnabled()) { 276 log.info("onFailedLogin method threw an " + 277 "exception. Logging and propagating original AuthenticationException.", e); 278 } 279 } 280 throw ae; //propagate 281 } 282 283 Subject loggedIn = createSubject(token, info, subject); 284 285 onSuccessfulLogin(token, info, loggedIn); 286 287 return loggedIn; 288 } 289 290 protected void onSuccessfulLogin(AuthenticationToken token, AuthenticationInfo info, Subject subject) { 291 rememberMeSuccessfulLogin(token, info, subject); 292 } 293 294 protected void onFailedLogin(AuthenticationToken token, AuthenticationException ae, Subject subject) { 295 rememberMeFailedLogin(token, ae, subject); 296 } 297 298 protected void beforeLogout(Subject subject) { 299 rememberMeLogout(subject); 300 } 301 302 protected SubjectContext copy(SubjectContext subjectContext) { 303 return new DefaultSubjectContext(subjectContext); 304 } 305 306 /** 307 * This implementation functions as follows: 308 * <p/> 309 * <ol> 310 * <li>Ensures the {@code SubjectContext} is as populated as it can be, using heuristics to acquire 311 * data that may not have already been available to it (such as a referenced session or remembered principals).</li> 312 * <li>Calls {@link #doCreateSubject(org.apache.shiro.subject.SubjectContext)} to actually perform the 313 * {@code Subject} instance creation.</li> 314 * <li>calls {@link #save(org.apache.shiro.subject.Subject) save(subject)} to ensure the constructed 315 * {@code Subject}'s state is accessible for future requests/invocations if necessary.</li> 316 * <li>returns the constructed {@code Subject} instance.</li> 317 * </ol> 318 * 319 * @param subjectContext any data needed to direct how the Subject should be constructed. 320 * @return the {@code Subject} instance reflecting the specified contextual data. 321 * @see #ensureSecurityManager(org.apache.shiro.subject.SubjectContext) 322 * @see #resolveSession(org.apache.shiro.subject.SubjectContext) 323 * @see #resolvePrincipals(org.apache.shiro.subject.SubjectContext) 324 * @see #doCreateSubject(org.apache.shiro.subject.SubjectContext) 325 * @see #save(org.apache.shiro.subject.Subject) 326 * @since 1.0 327 */ 328 public Subject createSubject(SubjectContext subjectContext) { 329 //create a copy so we don't modify the argument's backing map: 330 SubjectContext context = copy(subjectContext); 331 332 //ensure that the context has a SecurityManager instance, and if not, add one: 333 context = ensureSecurityManager(context); 334 335 //Resolve an associated Session (usually based on a referenced session ID), and place it in the context before 336 //sending to the SubjectFactory. The SubjectFactory should not need to know how to acquire sessions as the 337 //process is often environment specific - better to shield the SF from these details: 338 context = resolveSession(context); 339 340 //Similarly, the SubjectFactory should not require any concept of RememberMe - translate that here first 341 //if possible before handing off to the SubjectFactory: 342 context = resolvePrincipals(context); 343 344 Subject subject = doCreateSubject(context); 345 346 //save this subject for future reference if necessary: 347 //(this is needed here in case rememberMe principals were resolved and they need to be stored in the 348 //session, so we don't constantly rehydrate the rememberMe PrincipalCollection on every operation). 349 //Added in 1.2: 350 save(subject); 351 352 return subject; 353 } 354 355 /** 356 * Actually creates a {@code Subject} instance by delegating to the internal 357 * {@link #getSubjectFactory() subjectFactory}. By the time this method is invoked, all possible 358 * {@code SubjectContext} data (session, principals, et. al.) has been made accessible using all known heuristics 359 * and will be accessible to the {@code subjectFactory} via the {@code subjectContext.resolve*} methods. 360 * 361 * @param context the populated context (data map) to be used by the {@code SubjectFactory} when creating a 362 * {@code Subject} instance. 363 * @return a {@code Subject} instance reflecting the data in the specified {@code SubjectContext} data map. 364 * @see #getSubjectFactory() 365 * @see SubjectFactory#createSubject(org.apache.shiro.subject.SubjectContext) 366 * @since 1.2 367 */ 368 protected Subject doCreateSubject(SubjectContext context) { 369 return getSubjectFactory().createSubject(context); 370 } 371 372 /** 373 * Saves the subject's state to a persistent location for future reference if necessary. 374 * <p/> 375 * This implementation merely delegates to the internal {@link #setSubjectDAO(SubjectDAO) subjectDAO} and calls 376 * {@link SubjectDAO#save(org.apache.shiro.subject.Subject) subjectDAO.save(subject)}. 377 * 378 * @param subject the subject for which state will potentially be persisted 379 * @see SubjectDAO#save(org.apache.shiro.subject.Subject) 380 * @since 1.2 381 */ 382 protected void save(Subject subject) { 383 this.subjectDAO.save(subject); 384 } 385 386 /** 387 * Removes (or 'unbinds') the Subject's state from the application, typically called during {@link #logout}.. 388 * <p/> 389 * This implementation merely delegates to the internal {@link #setSubjectDAO(SubjectDAO) subjectDAO} and calls 390 * {@link SubjectDAO#delete(org.apache.shiro.subject.Subject) delete(subject)}. 391 * 392 * @param subject the subject for which state will be removed 393 * @see SubjectDAO#delete(org.apache.shiro.subject.Subject) 394 * @since 1.2 395 */ 396 protected void delete(Subject subject) { 397 this.subjectDAO.delete(subject); 398 } 399 400 /** 401 * Determines if there is a {@code SecurityManager} instance in the context, and if not, adds 'this' to the 402 * context. This ensures the SubjectFactory instance will have access to a SecurityManager during Subject 403 * construction if necessary. 404 * 405 * @param context the subject context data that may contain a SecurityManager instance. 406 * @return The SubjectContext to use to pass to a {@link SubjectFactory} for subject creation. 407 * @since 1.0 408 */ 409 @SuppressWarnings({"unchecked"}) 410 protected SubjectContext ensureSecurityManager(SubjectContext context) { 411 if (context.resolveSecurityManager() != null) { 412 log.trace("Context already contains a SecurityManager instance. Returning."); 413 return context; 414 } 415 log.trace("No SecurityManager found in context. Adding self reference."); 416 context.setSecurityManager(this); 417 return context; 418 } 419 420 /** 421 * Attempts to resolve any associated session based on the context and returns a 422 * context that represents this resolved {@code Session} to ensure it may be referenced if necessary by the 423 * invoked {@link SubjectFactory} that performs actual {@link Subject} construction. 424 * <p/> 425 * If there is a {@code Session} already in the context because that is what the caller wants to be used for 426 * {@code Subject} construction, or if no session is resolved, this method effectively does nothing 427 * returns the context method argument unaltered. 428 * 429 * @param context the subject context data that may resolve a Session instance. 430 * @return The context to use to pass to a {@link SubjectFactory} for subject creation. 431 * @since 1.0 432 */ 433 @SuppressWarnings({"unchecked"}) 434 protected SubjectContext resolveSession(SubjectContext context) { 435 if (context.resolveSession() != null) { 436 log.debug("Context already contains a session. Returning."); 437 return context; 438 } 439 try { 440 //Context couldn't resolve it directly, let's see if we can since we have direct access to 441 //the session manager: 442 Session session = resolveContextSession(context); 443 if (session != null) { 444 context.setSession(session); 445 } 446 } catch (InvalidSessionException e) { 447 log.debug("Resolved SubjectContext context session is invalid. Ignoring and creating an anonymous " + 448 "(session-less) Subject instance.", e); 449 } 450 return context; 451 } 452 453 protected Session resolveContextSession(SubjectContext context) throws InvalidSessionException { 454 SessionKey key = getSessionKey(context); 455 if (key != null) { 456 return getSession(key); 457 } 458 return null; 459 } 460 461 protected SessionKey getSessionKey(SubjectContext context) { 462 Serializable sessionId = context.getSessionId(); 463 if (sessionId != null) { 464 return new DefaultSessionKey(sessionId); 465 } 466 return null; 467 } 468 469 /** 470 * Attempts to resolve an identity (a {@link PrincipalCollection}) for the context using heuristics. This 471 * implementation functions as follows: 472 * <ol> 473 * <li>Check the context to see if it can already {@link SubjectContext#resolvePrincipals resolve an identity}. If 474 * so, this method does nothing and returns the method argument unaltered.</li> 475 * <li>Check for a RememberMe identity by calling {@link #getRememberedIdentity}. If that method returns a 476 * non-null value, place the remembered {@link PrincipalCollection} in the context.</li> 477 * </ol> 478 * 479 * @param context the subject context data that may provide (directly or indirectly through one of its values) a 480 * {@link PrincipalCollection} identity. 481 * @return The Subject context to use to pass to a {@link SubjectFactory} for subject creation. 482 * @since 1.0 483 */ 484 @SuppressWarnings({"unchecked"}) 485 protected SubjectContext resolvePrincipals(SubjectContext context) { 486 487 PrincipalCollection principals = context.resolvePrincipals(); 488 489 if (CollectionUtils.isEmpty(principals)) { 490 log.trace("No identity (PrincipalCollection) found in the context. Looking for a remembered identity."); 491 492 principals = getRememberedIdentity(context); 493 494 if (!CollectionUtils.isEmpty(principals)) { 495 log.debug("Found remembered PrincipalCollection. Adding to the context to be used " + 496 "for subject construction by the SubjectFactory."); 497 498 context.setPrincipals(principals); 499 500 // The following call was removed (commented out) in Shiro 1.2 because it uses the session as an 501 // implementation strategy. Session use for Shiro's own needs should be controlled in a single place 502 // to be more manageable for end-users: there are a number of stateless (e.g. REST) applications that 503 // use Shiro that need to ensure that sessions are only used when desirable. If Shiro's internal 504 // implementations used Subject sessions (setting attributes) whenever we wanted, it would be much 505 // harder for end-users to control when/where that occurs. 506 // 507 // Because of this, the SubjectDAO was created as the single point of control, and session state logic 508 // has been moved to the DefaultSubjectDAO implementation. 509 510 // Removed in Shiro 1.2. SHIRO-157 is still satisfied by the new DefaultSubjectDAO implementation 511 // introduced in 1.2 512 // Satisfies SHIRO-157: 513 // bindPrincipalsToSession(principals, context); 514 515 } else { 516 log.trace("No remembered identity found. Returning original context."); 517 } 518 } 519 520 return context; 521 } 522 523 protected SessionContext createSessionContext(SubjectContext subjectContext) { 524 DefaultSessionContext sessionContext = new DefaultSessionContext(); 525 if (!CollectionUtils.isEmpty(subjectContext)) { 526 sessionContext.putAll(subjectContext); 527 } 528 Serializable sessionId = subjectContext.getSessionId(); 529 if (sessionId != null) { 530 sessionContext.setSessionId(sessionId); 531 } 532 String host = subjectContext.resolveHost(); 533 if (host != null) { 534 sessionContext.setHost(host); 535 } 536 return sessionContext; 537 } 538 539 public void logout(Subject subject) { 540 541 if (subject == null) { 542 throw new IllegalArgumentException("Subject method argument cannot be null."); 543 } 544 545 beforeLogout(subject); 546 547 PrincipalCollection principals = subject.getPrincipals(); 548 if (principals != null && !principals.isEmpty()) { 549 if (log.isDebugEnabled()) { 550 log.debug("Logging out subject with primary principal {}", principals.getPrimaryPrincipal()); 551 } 552 Authenticator authc = getAuthenticator(); 553 if (authc instanceof LogoutAware) { 554 ((LogoutAware) authc).onLogout(principals); 555 } 556 } 557 558 try { 559 delete(subject); 560 } catch (Exception e) { 561 if (log.isDebugEnabled()) { 562 String msg = "Unable to cleanly unbind Subject. Ignoring (logging out)."; 563 log.debug(msg, e); 564 } 565 } finally { 566 try { 567 stopSession(subject); 568 } catch (Exception e) { 569 if (log.isDebugEnabled()) { 570 String msg = "Unable to cleanly stop Session for Subject [" + subject.getPrincipal() + "] " + 571 "Ignoring (logging out)."; 572 log.debug(msg, e); 573 } 574 } 575 } 576 } 577 578 protected void stopSession(Subject subject) { 579 Session s = subject.getSession(false); 580 if (s != null) { 581 s.stop(); 582 } 583 } 584 585 /** 586 * Unbinds or removes the Subject's state from the application, typically called during {@link #logout}. 587 * <p/> 588 * This has been deprecated in Shiro 1.2 in favor of the {@link #delete(org.apache.shiro.subject.Subject) delete} 589 * method. The implementation has been updated to invoke that method. 590 * 591 * @param subject the subject to unbind from the application as it will no longer be used. 592 * @deprecated in Shiro 1.2 in favor of {@link #delete(org.apache.shiro.subject.Subject)} 593 */ 594 @Deprecated 595 @SuppressWarnings({"UnusedDeclaration"}) 596 protected void unbind(Subject subject) { 597 delete(subject); 598 } 599 600 protected PrincipalCollection getRememberedIdentity(SubjectContext subjectContext) { 601 RememberMeManager rmm = getRememberMeManager(); 602 if (rmm != null) { 603 try { 604 return rmm.getRememberedPrincipals(subjectContext); 605 } catch (Exception e) { 606 if (log.isWarnEnabled()) { 607 String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + 608 "] threw an exception during getRememberedPrincipals()."; 609 log.warn(msg, e); 610 } 611 } 612 } 613 return null; 614 } 615 }