Hi Nicolas,

In article <[EMAIL PROTECTED]>,
Fri, 28 Sep 2007 20:39:40 +0900 (JST),
Kazuhito SUGURI <[EMAIL PROTECTED]> wrote: 
suguri> I have modified the FormAuthentication class so that
suguri> the form authentication would work with both Tomcat 5.5.20
suguri> and 5.5.23.
suguri> 
suguri> I'll post the (dirty ;-<) code later.

Please find the code (and diff) attached.

Hope this helps.
----
Kazuhito SUGURI
/* 
 * ========================================================================
 * 
 * Copyright 2001-2004 The Apache Software Foundation.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 * 
 *   http://www.apache.org/licenses/LICENSE-2.0
 * 
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * 
 * ========================================================================
 */
package org.apache.cactus.client.authentication;

import java.net.HttpURLConnection;
import java.net.MalformedURLException;
import java.net.URL;

import org.apache.cactus.Cookie;
import org.apache.cactus.WebRequest;
import org.apache.cactus.internal.HttpServiceDefinition;
import org.apache.cactus.internal.ServiceEnumeration;
import org.apache.cactus.internal.WebRequestImpl;
import 
org.apache.cactus.internal.client.connector.http.HttpClientConnectionHelper;
import org.apache.cactus.internal.configuration.Configuration;
import org.apache.cactus.internal.configuration.WebConfiguration;
import org.apache.cactus.util.ChainedRuntimeException;
import org.apache.commons.httpclient.HttpMethod;
import org.apache.commons.httpclient.HttpState;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

/**
 * Form-based authentication implementation. An instance of this class
 * can be reused across several tests as it caches the session cookie.
 * Thus the first time it is used to authenticate the user, it calls
 * the security URL (which is by default the context URL prepended by
 * "j_security_check"), caches the returned session cookie and adds the
 * cookie for the next request. The second time it is called, it simply
 * addes the session cookie for the next request.
 * 
 * @since 1.5
 *
 * @version $Id: FormAuthentication.java 238991 2004-05-22 11:34:50Z vmassol $
 */
public class FormAuthentication extends AbstractAuthentication
{
    /**
     * The logger.
     */
    private static final Log LOGGER = 
        LogFactory.getLog(FormAuthentication.class);

    /**
     * The expected HTTP response status code when the authentication
     * is succeeded.
     */
    private int expectedAuthResponse = HttpURLConnection.HTTP_MOVED_TEMP;

    /**
     * The URL to use when attempting to log in, if for whatever reason 
     * the default URL is incorrect.
     */
    private URL securityCheckURL;

    /**
     * The cookie name of the session.
     */
    private String sessionCookieName = "JSESSIONID";

    /**
     * We store the session cookie.
     */
    private Cookie jsessionCookie;

    /**
     * [EMAIL PROTECTED] WebRequest} object that will be used to connect to the
     * security URL. 
     */
    private WebRequest securityRequest = new WebRequestImpl();
      
    /**
     * @param theName user name of the Credential
     * @param thePassword user password of the Credential
     */
    public FormAuthentication(String theName, String thePassword)
    {
        super(theName, thePassword);
    }
    
    /**
     * @see Authentication#configure
     */
    public void configure(HttpState theState, HttpMethod theMethod,
        WebRequest theRequest, Configuration theConfiguration)
    {
        // Only authenticate the first time this instance is used.
        if (this.jsessionCookie == null)
        {
           authenticate(theRequest, theConfiguration);
        }

        // Sets the session id cookie for the next request.
        if (this.jsessionCookie != null)
        {
            theRequest.addCookie(this.jsessionCookie);
        }
    }

    /**
     * @return the [EMAIL PROTECTED] WebRequest} that will be used to connect 
to the
     * security URL. It can be used to add additional HTTP parameters such
     * as proprietary ones required by some containers.
     */
    public WebRequest getSecurityRequest()
    {
        return this.securityRequest;
    }
    
    /**
     * This sets the URL to use when attempting to log in. This method is used
     * if for whatever reason the default URL is incorrect.
     *
     * @param theUrl A URL to use to attempt to login.
     */
    public void setSecurityCheckURL(URL theUrl)
    {
        this.securityCheckURL = theUrl;
    }
    
    /**
     * This returns the URL to use when attempting to log in. By default, it's
     * the context URL defined in the Cactus configuration with  
     * "/j_security_check" appended. 
     *
     * @param theConfiguration the Cactus configuration
     * @return the URL that is being used to attempt to login.
     */
    public URL getSecurityCheckURL(Configuration theConfiguration)
    {
        if (this.securityCheckURL == null)
        {
            // Configure default
            String stringUrl = 
                ((WebConfiguration) theConfiguration).getContextURL()
                + "/j_security_check";

            try
            {
                this.securityCheckURL = new URL(stringUrl);
            }
            catch (MalformedURLException e)
            {
                throw new ChainedRuntimeException(
                    "Unable to create default Security Check URL [" 
                    + stringUrl + "]");
            }
        }

        LOGGER.debug("Using security check URL [" + this.securityCheckURL
            + "]");

        return securityCheckURL;
    }


    /**
     * Get the cookie name of the session.
     * @return the cookie name of the session
     */
    private String getSessionCookieName()
    {
        return this.sessionCookieName;
    }

    /**
     * Set the cookie name of the session to theName.
     * If theName is null, the change request will be ignored.
     * The default is &quot;<code>JSESSIONID</code>&quot;.
     * @param theName the cookie name of the session
     */
    public void setSessionCookieName(String theName)
    {
        if (theName != null)
        {
            this.sessionCookieName = theName;
        }
    }


    /**
     * Get the expected HTTP response status code for an authentication request
     * which should be successful.
     * @return the expected HTTP response status code
     */
    protected int getExpectedAuthResponse()
    {
        return this.expectedAuthResponse;
    }

    /**
     * Set the expected HTTP response status code for an authentication request
     * which should be successful.
     * The default is HttpURLConnection.HTTP_MOVED_TEMP.
     * @param theExpectedCode the expected HTTP response status code value
     */
    public void setExpectedAuthResponse(int theExpectedCode)
    {
        this.expectedAuthResponse = theExpectedCode;
    }


    /**
     * Get a cookie required to be set by set-cookie header field.
     * @param theConnection a [EMAIL PROTECTED] HttpURLConnection}
     * @param theTarget the target cookie name
     * @return the [EMAIL PROTECTED] Cookie}
     */
    private Cookie getCookie(HttpURLConnection theConnection, String theTarget)
    {
        // Check (possible multiple) cookies for a target.
        int i = 1;
        String key = theConnection.getHeaderFieldKey(i);
        while (key != null)
        {
            if (key.equalsIgnoreCase("set-cookie"))
            {
                // Cookie is in the form:
                // "NAME=VALUE; expires=DATE; path=PATH;
                //  domain=DOMAIN_NAME; secure"
                // The only thing we care about is finding a cookie with
                // the name "JSESSIONID" and caching the value.
                String cookiestr = theConnection.getHeaderField(i);
                String nameValue = cookiestr.substring(0, 
                    cookiestr.indexOf(";"));
                int equalsChar = nameValue.indexOf("=");
                String name = nameValue.substring(0, equalsChar);
                String value = nameValue.substring(equalsChar + 1);
                if (name.equalsIgnoreCase(theTarget))
                {
                    return new Cookie(theConnection.getURL().getHost(),
                        name, value);
                }
            }
            key = theConnection.getHeaderFieldKey(++i);
        }
        return null;
    }


    /**
     * Check if the pre-auth step can be considered as succeeded or not.
     * As default, the step considered as succeeded
     * if the response status code of <code>theConnection</code>
     * is less than 400.
     *
     * @param theConnection a <code>HttpURLConnection</code> value
     * @exception Exception if the pre-auth step should be considered as failed
     */
    protected void checkPreAuthResponse(HttpURLConnection theConnection)
        throws Exception
    {
        if (theConnection.getResponseCode() >= 400)
        {
            throw new Exception("Received a status code ["
                + theConnection.getResponseCode()
                + "] and was expecting less than 400");
        }
    }


    /**
     * @param theRequest a <code>WebRequest</code> value
     * @param theConfiguration a <code>Configuration</code> value
     * @exception Exception if the post-auth request results response
     *    other than 200 (OK).
     */
    protected void checkPostAuthRequest(WebRequest theRequest,
                                        Configuration theConfiguration)
        throws Exception
    {
        HttpURLConnection connection;
        String resource = null;

        try
        {
            // Create a helper that will connect to a restricted resource.
            WebConfiguration webConfig = (WebConfiguration) theConfiguration;
            resource = webConfig.getRedirectorURL(theRequest);

            HttpClientConnectionHelper helper =
                new HttpClientConnectionHelper(resource);

            WebRequest request = getDummyRequest(webConfig);
            request.addCookie(this.jsessionCookie);

            // Make the connection using a default web request.
            connection = helper.connect(request, theConfiguration);
        }
        catch (Throwable e)
        {
            throw new ChainedRuntimeException(
                "Failed to connect to the secured redirector: " + resource, e);
        }

        if (connection.getResponseCode() != 200)
        {
            throw new Exception("Received a status code ["
                + connection.getResponseCode()
                + "] and was expecting 200");

        }
    }

    /**
     * @param theWebConfiguration the <code>WebConfiguration</code> value
     * @return WebReuest instance
     */
    private WebRequest getDummyRequest(WebConfiguration theWebConfiguration)
    {
        WebRequest request = new WebRequestImpl(theWebConfiguration);
        request.addParameter(HttpServiceDefinition.SERVICE_NAME_PARAM,
            ServiceEnumeration.RUN_TEST_SERVICE.toString());
        return request;
    }

    /**
     * Get login session cookie.
     * This is the first step to start login session:
     * <dl>
     *   <dt> C-&gt;S: </dt>
     *   <dd> try to connect to a restricted resource </dd>
     *   <dt> S-&gt;C: </dt>
     *   <dd> redirect or forward to the login page with set-cookie header </dd>
     * </ol>
     * @param theRequest a request to connect to a restricted resource
     * @param theConfiguration a <code>Configuration</code> value
     * @return the <code>Cookie</code>
     */
    private Cookie getSecureSessionIdCookie(WebRequest theRequest,
        Configuration theConfiguration)
    {
        HttpURLConnection connection;
        String resource = null;

        try
        {
            // Create a helper that will connect to a restricted resource.
            WebConfiguration webConfig = (WebConfiguration) theConfiguration;
            resource = webConfig.getRedirectorURL(theRequest);

            HttpClientConnectionHelper helper = 
                new HttpClientConnectionHelper(resource);

            WebRequest request = getDummyRequest(webConfig);

            // Make the connection using a default web request.
            connection = helper.connect(request, theConfiguration);

            checkPreAuthResponse(connection);
        }
        catch (Throwable e)
        {
            throw new ChainedRuntimeException(
                "Failed to connect to the secured redirector: " + resource, e);
        }

        return getCookie(connection, getSessionCookieName());
    }


    /**
     * Check if the auth step can be considered as succeeded or not.
     * As default, the step considered as succeeded
     * if the response status code of <code>theConnection</code>
     * equals <code>getExpectedAuthResponse()</code>.
     *
     * @param theConnection a <code>HttpURLConnection</code> value
     * @exception Exception if the auth step should be considered as failed
     */
    protected void checkAuthResponse(HttpURLConnection theConnection)
        throws Exception
    {
        if (theConnection.getResponseCode() != getExpectedAuthResponse())
        {
            throw new Exception("Received a status code ["
                + theConnection.getResponseCode()
                + "] and was expecting a ["
                + getExpectedAuthResponse() + "]");
        }
    }


    /**
     * Authenticate the principal by calling the security URL.
     * 
     * @param theRequest the web request used to connect to the Redirector
     * @param theConfiguration the Cactus configuration
     */
    public void authenticate(WebRequest theRequest,
        Configuration theConfiguration)
    {
        this.jsessionCookie = getSecureSessionIdCookie(theRequest,
            theConfiguration);
    
        try
        {
            // Create a helper that will connect to the security check URL.
            HttpClientConnectionHelper helper = 
                new HttpClientConnectionHelper(
                    getSecurityCheckURL(theConfiguration).toString());

            // Configure a web request with the JSESSIONID cookie,
            // the username and the password.
            WebRequest request = getSecurityRequest();
            ((WebRequestImpl) request).setConfiguration(theConfiguration);
            request.addCookie(this.jsessionCookie);
            request.addParameter("j_username", getName(), 
                WebRequest.POST_METHOD);
            request.addParameter("j_password", getPassword(), 
                WebRequest.POST_METHOD);

            // Make the connection using the configured web request.
            HttpURLConnection connection = helper.connect(request,
                theConfiguration);

            checkAuthResponse(connection);        
            checkPostAuthRequest(theRequest, theConfiguration);
        }
        catch (Throwable e)
        {
            this.jsessionCookie = null;
            throw new ChainedRuntimeException(
                "Failed to authenticate the principal", e);
        }
    }
}
Index: 
framework/src/java/share-12-13-14/org/apache/cactus/client/authentication/FormAuthentication.java
===================================================================
--- 
framework/src/java/share-12-13-14/org/apache/cactus/client/authentication/FormAuthentication.java
   (revision 568555)
+++ 
framework/src/java/share-12-13-14/org/apache/cactus/client/authentication/FormAuthentication.java
   (working copy)
@@ -25,6 +25,8 @@
 
 import org.apache.cactus.Cookie;
 import org.apache.cactus.WebRequest;
+import org.apache.cactus.internal.HttpServiceDefinition;
+import org.apache.cactus.internal.ServiceEnumeration;
 import org.apache.cactus.internal.WebRequestImpl;
 import 
org.apache.cactus.internal.client.connector.http.HttpClientConnectionHelper;
 import org.apache.cactus.internal.configuration.Configuration;
@@ -275,6 +277,61 @@
 
 
     /**
+     * @param theRequest a <code>WebRequest</code> value
+     * @param theConfiguration a <code>Configuration</code> value
+     * @exception Exception if the post-auth request results response
+     *    other than 200 (OK).
+     */
+    protected void checkPostAuthRequest(WebRequest theRequest,
+                                        Configuration theConfiguration)
+        throws Exception
+    {
+        HttpURLConnection connection;
+        String resource = null;
+
+        try
+        {
+            // Create a helper that will connect to a restricted resource.
+            WebConfiguration webConfig = (WebConfiguration) theConfiguration;
+            resource = webConfig.getRedirectorURL(theRequest);
+
+            HttpClientConnectionHelper helper =
+                new HttpClientConnectionHelper(resource);
+
+            WebRequest request = getDummyRequest(webConfig);
+            request.addCookie(this.jsessionCookie);
+
+            // Make the connection using a default web request.
+            connection = helper.connect(request, theConfiguration);
+        }
+        catch (Throwable e)
+        {
+            throw new ChainedRuntimeException(
+                "Failed to connect to the secured redirector: " + resource, e);
+        }
+
+        if (connection.getResponseCode() != 200)
+        {
+            throw new Exception("Received a status code ["
+                + connection.getResponseCode()
+                + "] and was expecting 200");
+
+        }
+    }
+
+    /**
+     * @param theWebConfiguration the <code>WebConfiguration</code> value
+     * @return WebReuest instance
+     */
+    private WebRequest getDummyRequest(WebConfiguration theWebConfiguration)
+    {
+        WebRequest request = new WebRequestImpl(theWebConfiguration);
+        request.addParameter(HttpServiceDefinition.SERVICE_NAME_PARAM,
+            ServiceEnumeration.RUN_TEST_SERVICE.toString());
+        return request;
+    }
+
+    /**
      * Get login session cookie.
      * This is the first step to start login session:
      * <dl>
@@ -302,8 +359,7 @@
             HttpClientConnectionHelper helper = 
                 new HttpClientConnectionHelper(resource);
 
-            WebRequest request =
-                new WebRequestImpl((WebConfiguration) theConfiguration);
+            WebRequest request = getDummyRequest(webConfig);
 
             // Make the connection using a default web request.
             connection = helper.connect(request, theConfiguration);
@@ -376,6 +432,7 @@
                 theConfiguration);
 
             checkAuthResponse(connection);        
+            checkPostAuthRequest(theRequest, theConfiguration);
         }
         catch (Throwable e)
         {

---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to