/*
 * Copyright (c) 1999, 2013, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Oracle designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Oracle in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

package sun.security.provider;

import java.net.URL;
import java.util.*;
import java.security.CodeSource;
import java.security.Principal;
import java.security.cert.Certificate;
import java.lang.reflect.Constructor;

import javax.security.auth.Subject;
import sun.security.provider.PolicyParser.PrincipalEntry;
import sun.security.util.ResourcesMgr;

This SubjectCodeSource class contains a URL, signer certificates, and either a Subject (that represents the Subject in the current AccessControlContext), or a linked list of Principals (that represent a "subject" in a Policy).

/** * <p> This <code>SubjectCodeSource</code> class contains * a <code>URL</code>, signer certificates, and either a <code>Subject</code> * (that represents the <code>Subject</code> in the current * <code>AccessControlContext</code>), or a linked list of Principals * (that represent a "subject" in a <code>Policy</code>). * */
class SubjectCodeSource extends CodeSource implements java.io.Serializable { private static final long serialVersionUID = 6039418085604715275L; private Subject subject; private LinkedList<PrincipalEntry> principals; private static final Class<?>[] PARAMS = { String.class }; private static final sun.security.util.Debug debug = sun.security.util.Debug.getInstance("auth", "\t[Auth Access]"); private ClassLoader sysClassLoader;
Creates a new SubjectCodeSource with the given Subject, principals, URL, and signers (Certificates). The Subject represents the Subject associated with the current AccessControlContext. The Principals are given as a LinkedList of PolicyParser.PrincipalEntry objects. Typically either a Subject will be provided, or a list of principals will be provided (not both).

Params:
  • subject – the Subject associated with this SubjectCodeSource

  • url – the URL associated with this SubjectCodeSource

  • certs – the signers associated with this SubjectCodeSource

/** * Creates a new <code>SubjectCodeSource</code> * with the given <code>Subject</code>, principals, <code>URL</code>, * and signers (Certificates). The <code>Subject</code> * represents the <code>Subject</code> associated with the current * <code>AccessControlContext</code>. * The Principals are given as a <code>LinkedList</code> * of <code>PolicyParser.PrincipalEntry</code> objects. * Typically either a <code>Subject</code> will be provided, * or a list of <code>principals</code> will be provided * (not both). * * <p> * * @param subject the <code>Subject</code> associated with this * <code>SubjectCodeSource</code> <p> * * @param url the <code>URL</code> associated with this * <code>SubjectCodeSource</code> <p> * * @param certs the signers associated with this * <code>SubjectCodeSource</code> <p> */
SubjectCodeSource(Subject subject, LinkedList<PrincipalEntry> principals, URL url, Certificate[] certs) { super(url, certs); this.subject = subject; this.principals = (principals == null ? new LinkedList<PrincipalEntry>() : new LinkedList<PrincipalEntry>(principals)); sysClassLoader = java.security.AccessController.doPrivileged (new java.security.PrivilegedAction<ClassLoader>() { public ClassLoader run() { return ClassLoader.getSystemClassLoader(); } }); }
Get the Principals associated with this SubjectCodeSource. The Principals are retrieved as a LinkedList of PolicyParser.PrincipalEntry objects.

Returns:the Principals associated with this SubjectCodeSource as a LinkedList of PolicyParser.PrincipalEntry objects.
/** * Get the Principals associated with this <code>SubjectCodeSource</code>. * The Principals are retrieved as a <code>LinkedList</code> * of <code>PolicyParser.PrincipalEntry</code> objects. * * <p> * * @return the Principals associated with this * <code>SubjectCodeSource</code> as a <code>LinkedList</code> * of <code>PolicyParser.PrincipalEntry</code> objects. */
LinkedList<PrincipalEntry> getPrincipals() { return principals; }
Get the Subject associated with this SubjectCodeSource. The Subject represents the Subject associated with the current AccessControlContext.

Returns:the Subject associated with this SubjectCodeSource.
/** * Get the <code>Subject</code> associated with this * <code>SubjectCodeSource</code>. The <code>Subject</code> * represents the <code>Subject</code> associated with the * current <code>AccessControlContext</code>. * * <p> * * @return the <code>Subject</code> associated with this * <code>SubjectCodeSource</code>. */
Subject getSubject() { return subject; }
Returns true if this SubjectCodeSource object "implies" the specified CodeSource. More specifically, this method makes the following checks. If any fail, it returns false. If they all succeed, it returns true.

  1. The provided codesource must not be null.
  2. codesource must be an instance of SubjectCodeSource.
  3. super.implies(codesource) must return true.
  4. for each principal in this codesource's principal list:
    1. if the principal is an instanceof Principal, then the principal must imply the provided codesource's Subject.
    2. if the principal is not an instanceof Principal, then the provided codesource's Subject must have an associated Principal, P, where P.getClass().getName equals principal.principalClass, and P.getName() equals principal.principalName.

Params:
  • codesource – the CodeSource to compare against.
Returns:true if this SubjectCodeSource implies the specified CodeSource.
/** * Returns true if this <code>SubjectCodeSource</code> object "implies" * the specified <code>CodeSource</code>. * More specifically, this method makes the following checks. * If any fail, it returns false. If they all succeed, it returns true. * * <p> * <ol> * <li> The provided codesource must not be <code>null</code>. * <li> codesource must be an instance of <code>SubjectCodeSource</code>. * <li> super.implies(codesource) must return true. * <li> for each principal in this codesource's principal list: * <ol> * <li> if the principal is an instanceof * <code>Principal</code>, then the principal must * imply the provided codesource's <code>Subject</code>. * <li> if the principal is not an instanceof * <code>Principal</code>, then the provided * codesource's <code>Subject</code> must have an * associated <code>Principal</code>, <i>P</i>, where * P.getClass().getName equals principal.principalClass, * and P.getName() equals principal.principalName. * </ol> * </ol> * * <p> * * @param codesource the <code>CodeSource</code> to compare against. * * @return true if this <code>SubjectCodeSource</code> implies * the specified <code>CodeSource</code>. */
public boolean implies(CodeSource codesource) { LinkedList<PrincipalEntry> subjectList = null; if (codesource == null || !(codesource instanceof SubjectCodeSource) || !(super.implies(codesource))) { if (debug != null) debug.println("\tSubjectCodeSource.implies: FAILURE 1"); return false; } SubjectCodeSource that = (SubjectCodeSource)codesource; // if the principal list in the policy "implies" // the Subject associated with the current AccessControlContext, // then return true if (this.principals == null) { if (debug != null) debug.println("\tSubjectCodeSource.implies: PASS 1"); return true; } if (that.getSubject() == null || that.getSubject().getPrincipals().size() == 0) { if (debug != null) debug.println("\tSubjectCodeSource.implies: FAILURE 2"); return false; } ListIterator<PrincipalEntry> li = this.principals.listIterator(0); while (li.hasNext()) { PrincipalEntry pppe = li.next(); try { // use new Principal.implies method Class<?> pClass = Class.forName(pppe.principalClass, true, sysClassLoader); if (!Principal.class.isAssignableFrom(pClass)) { // not the right subtype throw new ClassCastException(pppe.principalClass + " is not a Principal"); } Constructor<?> c = pClass.getConstructor(PARAMS); Principal p = (Principal)c.newInstance(new Object[] { pppe.principalName }); if (!p.implies(that.getSubject())) { if (debug != null) debug.println("\tSubjectCodeSource.implies: FAILURE 3"); return false; } else { if (debug != null) debug.println("\tSubjectCodeSource.implies: PASS 2"); return true; } } catch (Exception e) { // simply compare Principals if (subjectList == null) { if (that.getSubject() == null) { if (debug != null) debug.println("\tSubjectCodeSource.implies: " + "FAILURE 4"); return false; } Iterator<Principal> i = that.getSubject().getPrincipals().iterator(); subjectList = new LinkedList<PrincipalEntry>(); while (i.hasNext()) { Principal p = i.next(); PrincipalEntry spppe = new PrincipalEntry (p.getClass().getName(), p.getName()); subjectList.add(spppe); } } if (!subjectListImpliesPrincipalEntry(subjectList, pppe)) { if (debug != null) debug.println("\tSubjectCodeSource.implies: FAILURE 5"); return false; } } } if (debug != null) debug.println("\tSubjectCodeSource.implies: PASS 3"); return true; }
This method returns, true, if the provided subjectList "contains" the Principal specified in the provided pppe argument. Note that the provided pppe argument may have wildcards (*) for the Principal class and name, which need to be considered.

Params:
  • subjectList – a list of PolicyParser.PrincipalEntry objects that correspond to all the Principals in the Subject currently on this thread's AccessControlContext.

  • pppe – the Principals specified in a grant entry.
Returns:true if the provided subjectList "contains" the Principal specified in the provided pppe argument.
/** * This method returns, true, if the provided <i>subjectList</i> * "contains" the <code>Principal</code> specified * in the provided <i>pppe</i> argument. * * Note that the provided <i>pppe</i> argument may have * wildcards (*) for the <code>Principal</code> class and name, * which need to be considered. * * <p> * * @param subjectList a list of PolicyParser.PrincipalEntry objects * that correspond to all the Principals in the Subject currently * on this thread's AccessControlContext. <p> * * @param pppe the Principals specified in a grant entry. * * @return true if the provided <i>subjectList</i> "contains" * the <code>Principal</code> specified in the provided * <i>pppe</i> argument. */
private boolean subjectListImpliesPrincipalEntry( LinkedList<PrincipalEntry> subjectList, PrincipalEntry pppe) { ListIterator<PrincipalEntry> li = subjectList.listIterator(0); while (li.hasNext()) { PrincipalEntry listPppe = li.next(); if (pppe.getPrincipalClass().equals (PrincipalEntry.WILDCARD_CLASS) || pppe.getPrincipalClass().equals(listPppe.getPrincipalClass())) { if (pppe.getPrincipalName().equals (PrincipalEntry.WILDCARD_NAME) || pppe.getPrincipalName().equals(listPppe.getPrincipalName())) return true; } } return false; }
Tests for equality between the specified object and this object. Two SubjectCodeSource objects are considered equal if their locations are of identical value, if the two sets of Certificates are of identical values, and if the Subjects are equal, and if the PolicyParser.PrincipalEntry values are of identical values. It is not required that the Certificates or PolicyParser.PrincipalEntry values be in the same order.

Params:
  • obj – the object to test for equality with this object.
Returns:true if the objects are considered equal, false otherwise.
/** * Tests for equality between the specified object and this * object. Two <code>SubjectCodeSource</code> objects are considered equal * if their locations are of identical value, if the two sets of * Certificates are of identical values, and if the * Subjects are equal, and if the PolicyParser.PrincipalEntry values * are of identical values. It is not required that * the Certificates or PolicyParser.PrincipalEntry values * be in the same order. * * <p> * * @param obj the object to test for equality with this object. * * @return true if the objects are considered equal, false otherwise. */
public boolean equals(Object obj) { if (obj == this) return true; if (super.equals(obj) == false) return false; if (!(obj instanceof SubjectCodeSource)) return false; SubjectCodeSource that = (SubjectCodeSource)obj; // the principal lists must match try { if (this.getSubject() != that.getSubject()) return false; } catch (SecurityException se) { return false; } if ((this.principals == null && that.principals != null) || (this.principals != null && that.principals == null)) return false; if (this.principals != null && that.principals != null) { if (!this.principals.containsAll(that.principals) || !that.principals.containsAll(this.principals)) return false; } return true; }
Return a hashcode for this SubjectCodeSource.

Returns:a hashcode for this SubjectCodeSource.
/** * Return a hashcode for this <code>SubjectCodeSource</code>. * * <p> * * @return a hashcode for this <code>SubjectCodeSource</code>. */
public int hashCode() { return super.hashCode(); }
Return a String representation of this SubjectCodeSource.

Returns:a String representation of this SubjectCodeSource.
/** * Return a String representation of this <code>SubjectCodeSource</code>. * * <p> * * @return a String representation of this <code>SubjectCodeSource</code>. */
public String toString() { String returnMe = super.toString(); if (getSubject() != null) { if (debug != null) { final Subject finalSubject = getSubject(); returnMe = returnMe + "\n" + java.security.AccessController.doPrivileged (new java.security.PrivilegedAction<String>() { public String run() { return finalSubject.toString(); } }); } else { returnMe = returnMe + "\n" + getSubject().toString(); } } if (principals != null) { ListIterator<PrincipalEntry> li = principals.listIterator(); while (li.hasNext()) { PrincipalEntry pppe = li.next(); returnMe = returnMe + ResourcesMgr.getAuthResourceString("NEWLINE") + pppe.getPrincipalClass() + " " + pppe.getPrincipalName(); } } return returnMe; } }