| 1 |
|
/*
|
|
1 |
|
/*
|
|
1 |
|
/*
|
| 2 |
|
* License
d to the A
pache Soft
ware Found
ation (ASF
) under on
e or more
|
|
2 |
|
* License
d to the A
pache Soft
ware Found
ation (ASF
) under on
e or more
|
|
2 |
|
* License
d to the A
pache Soft
ware Found
ation (ASF
) under on
e or more
|
| 3 |
|
* contrib
utor licen
se agreeme
nts. See
the NOTICE
file dist
ributed wi
th
|
|
3 |
|
* contrib
utor licen
se agreeme
nts. See
the NOTICE
file dist
ributed wi
th
|
|
3 |
|
* contrib
utor licen
se agreeme
nts. See
the NOTICE
file dist
ributed wi
th
|
| 4 |
|
* this wo
rk for add
itional in
formation
regarding
copyright
ownership.
|
|
4 |
|
* this wo
rk for add
itional in
formation
regarding
copyright
ownership.
|
|
4 |
|
* this wo
rk for add
itional in
formation
regarding
copyright
ownership.
|
| 5 |
|
* The ASF
licenses
this file
to You und
er the Apa
che Licens
e, Version
2.0
|
|
5 |
|
* The ASF
licenses
this file
to You und
er the Apa
che Licens
e, Version
2.0
|
|
5 |
|
* The ASF
licenses
this file
to You und
er the Apa
che Licens
e, Version
2.0
|
| 6 |
|
* (the "L
icense");
you may no
t use this
file exce
pt in comp
liance wit
h
|
|
6 |
|
* (the "L
icense");
you may no
t use this
file exce
pt in comp
liance wit
h
|
|
6 |
|
* (the "L
icense");
you may no
t use this
file exce
pt in comp
liance wit
h
|
| 7 |
|
* the Lic
ense. You
may obtai
n a copy o
f the Lice
nse at
|
|
7 |
|
* the Lic
ense. You
may obtai
n a copy o
f the Lice
nse at
|
|
7 |
|
* the Lic
ense. You
may obtai
n a copy o
f the Lice
nse at
|
| 8 |
|
*
|
|
8 |
|
*
|
|
8 |
|
*
|
| 9 |
|
* ht
tp://www.a
pache.org/
licenses/L
ICENSE-2.0
|
|
9 |
|
* ht
tp://www.a
pache.org/
licenses/L
ICENSE-2.0
|
|
9 |
|
* ht
tp://www.a
pache.org/
licenses/L
ICENSE-2.0
|
| 10 |
|
*
|
|
10 |
|
*
|
|
10 |
|
*
|
| 11 |
|
* Unless
required b
y applicab
le law or
agreed to
in writing
, software
|
|
11 |
|
* Unless
required b
y applicab
le law or
agreed to
in writing
, software
|
|
11 |
|
* Unless
required b
y applicab
le law or
agreed to
in writing
, software
|
| 12 |
|
* distrib
uted under
the Licen
se is dist
ributed on
an "AS IS
" BASIS,
|
|
12 |
|
* distrib
uted under
the Licen
se is dist
ributed on
an "AS IS
" BASIS,
|
|
12 |
|
* distrib
uted under
the Licen
se is dist
ributed on
an "AS IS
" BASIS,
|
| 13 |
|
* WITHOUT
WARRANTIE
S OR CONDI
TIONS OF A
NY KIND, e
ither expr
ess or imp
lied.
|
|
13 |
|
* WITHOUT
WARRANTIE
S OR CONDI
TIONS OF A
NY KIND, e
ither expr
ess or imp
lied.
|
|
13 |
|
* WITHOUT
WARRANTIE
S OR CONDI
TIONS OF A
NY KIND, e
ither expr
ess or imp
lied.
|
| 14 |
|
* See the
License f
or the spe
cific lang
uage gover
ning permi
ssions and
|
|
14 |
|
* See the
License f
or the spe
cific lang
uage gover
ning permi
ssions and
|
|
14 |
|
* See the
License f
or the spe
cific lang
uage gover
ning permi
ssions and
|
| 15 |
|
* limitat
ions under
the Licen
se.
|
|
15 |
|
* limitat
ions under
the Licen
se.
|
|
15 |
|
* limitat
ions under
the Licen
se.
|
| 16 |
|
*/
|
|
16 |
|
*/
|
|
16 |
|
*/
|
| 17 |
|
package or
g.apache.c
atalina.au
thenticato
r;
|
|
17 |
|
package or
g.apache.c
atalina.au
thenticato
r;
|
|
17 |
|
package or
g.apache.c
atalina.au
thenticato
r;
|
| 18 |
|
|
|
18 |
|
|
|
18 |
|
|
| 19 |
|
import jav
a.io.IOExc
eption;
|
|
19 |
|
import jav
a.io.IOExc
eption;
|
|
19 |
|
import jav
a.io.IOExc
eption;
|
| 20 |
|
import jav
a.security
.Principal
;
|
|
20 |
|
import jav
a.security
.Principal
;
|
|
20 |
|
import jav
a.security
.Principal
;
|
| 21 |
|
import jav
a.util.Map
;
|
|
21 |
|
import jav
a.util.Map
;
|
|
21 |
|
import jav
a.util.Map
;
|
| 22 |
|
import jav
a.util.Set
;
|
|
22 |
|
import jav
a.util.Set
;
|
|
22 |
|
import jav
a.util.Set
;
|
| 23 |
|
import jav
a.util.con
current.Co
ncurrentHa
shMap;
|
|
23 |
|
import jav
a.util.con
current.Co
ncurrentHa
shMap;
|
|
23 |
|
import jav
a.util.con
current.Co
ncurrentHa
shMap;
|
| 24 |
|
|
|
24 |
|
|
|
24 |
|
|
| 25 |
|
import jav
ax.servlet
.ServletEx
ception;
|
|
25 |
|
import jav
ax.servlet
.ServletEx
ception;
|
|
25 |
|
import jav
ax.servlet
.ServletEx
ception;
|
| 26 |
|
import jav
ax.servlet
.http.Cook
ie;
|
|
26 |
|
import jav
ax.servlet
.http.Cook
ie;
|
|
26 |
|
import jav
ax.servlet
.http.Cook
ie;
|
| 27 |
|
|
|
27 |
|
|
|
27 |
|
|
| 28 |
|
import org
.apache.ca
talina.Con
tainer;
|
|
28 |
|
import org
.apache.ca
talina.Con
tainer;
|
|
28 |
|
import org
.apache.ca
talina.Con
tainer;
|
| 29 |
|
import org
.apache.ca
talina.Con
text;
|
|
29 |
|
import org
.apache.ca
talina.Con
text;
|
|
29 |
|
import org
.apache.ca
talina.Con
text;
|
| 30 |
|
import org
.apache.ca
talina.Eng
ine;
|
|
30 |
|
import org
.apache.ca
talina.Eng
ine;
|
|
30 |
|
import org
.apache.ca
talina.Eng
ine;
|
| 31 |
|
import org
.apache.ca
talina.Lif
ecycleExce
ption;
|
|
31 |
|
import org
.apache.ca
talina.Lif
ecycleExce
ption;
|
|
31 |
|
import org
.apache.ca
talina.Lif
ecycleExce
ption;
|
| 32 |
|
import org
.apache.ca
talina.Man
ager;
|
|
32 |
|
import org
.apache.ca
talina.Man
ager;
|
|
32 |
|
import org
.apache.ca
talina.Man
ager;
|
| 33 |
|
import org
.apache.ca
talina.Rea
lm;
|
|
33 |
|
import org
.apache.ca
talina.Rea
lm;
|
|
33 |
|
import org
.apache.ca
talina.Rea
lm;
|
| 34 |
|
import org
.apache.ca
talina.Ses
sion;
|
|
34 |
|
import org
.apache.ca
talina.Ses
sion;
|
|
34 |
|
import org
.apache.ca
talina.Ses
sion;
|
| 35 |
|
import org
.apache.ca
talina.Ses
sionListen
er;
|
|
35 |
|
import org
.apache.ca
talina.Ses
sionListen
er;
|
|
35 |
|
import org
.apache.ca
talina.Ses
sionListen
er;
|
| 36 |
|
import org
.apache.ca
talina.con
nector.Req
uest;
|
|
36 |
|
import org
.apache.ca
talina.con
nector.Req
uest;
|
|
36 |
|
import org
.apache.ca
talina.con
nector.Req
uest;
|
| 37 |
|
import org
.apache.ca
talina.con
nector.Res
ponse;
|
|
37 |
|
import org
.apache.ca
talina.con
nector.Res
ponse;
|
|
37 |
|
import org
.apache.ca
talina.con
nector.Res
ponse;
|
| 38 |
|
import org
.apache.ca
talina.val
ves.ValveB
ase;
|
|
38 |
|
import org
.apache.ca
talina.val
ves.ValveB
ase;
|
|
38 |
|
import org
.apache.ca
talina.val
ves.ValveB
ase;
|
| 39 |
|
import org
.apache.to
mcat.util.
res.String
Manager;
|
|
39 |
|
import org
.apache.to
mcat.util.
res.String
Manager;
|
|
39 |
|
import org
.apache.to
mcat.util.
res.String
Manager;
|
| 40 |
|
|
|
40 |
|
|
|
40 |
|
|
| 41 |
|
/**
|
|
41 |
|
/**
|
|
41 |
|
/**
|
| 42 |
|
* A <stro
ng>Valve</
strong> th
at support
s a "singl
e sign on"
user expe
rience,
|
|
42 |
|
* A <stro
ng>Valve</
strong> th
at support
s a "singl
e sign on"
user expe
rience,
|
|
42 |
|
* A <stro
ng>Valve</
strong> th
at support
s a "singl
e sign on"
user expe
rience,
|
| 43 |
|
* where t
he securit
y identity
of a user
who succe
ssfully au
thenticate
s to one
|
|
43 |
|
* where t
he securit
y identity
of a user
who succe
ssfully au
thenticate
s to one
|
|
43 |
|
* where t
he securit
y identity
of a user
who succe
ssfully au
thenticate
s to one
|
| 44 |
|
* web app
lication i
s propagat
ed to othe
r web appl
ications i
n the same
|
|
44 |
|
* web app
lication i
s propagat
ed to othe
r web appl
ications i
n the same
|
|
44 |
|
* web app
lication i
s propagat
ed to othe
r web appl
ications i
n the same
|
| 45 |
|
* securit
y domain.
For succe
ssful use,
the follo
wing requi
rements mu
st
|
|
45 |
|
* securit
y domain.
For succe
ssful use,
the follo
wing requi
rements mu
st
|
|
45 |
|
* securit
y domain.
For succe
ssful use,
the follo
wing requi
rements mu
st
|
| 46 |
|
* be met:
|
|
46 |
|
* be met:
|
|
46 |
|
* be met:
|
| 47 |
|
* <ul>
|
|
47 |
|
* <ul>
|
|
47 |
|
* <ul>
|
| 48 |
|
* <li>Thi
s Valve mu
st be conf
igured on
the Contai
ner that r
epresents
a
|
|
48 |
|
* <li>Thi
s Valve mu
st be conf
igured on
the Contai
ner that r
epresents
a
|
|
48 |
|
* <li>Thi
s Valve mu
st be conf
igured on
the Contai
ner that r
epresents
a
|
| 49 |
|
* vir
tual host
(typically
an implem
entation o
f <code>Ho
st</code>)
.</li>
|
|
49 |
|
* vir
tual host
(typically
an implem
entation o
f <code>Ho
st</code>)
.</li>
|
|
49 |
|
* vir
tual host
(typically
an implem
entation o
f <code>Ho
st</code>)
.</li>
|
| 50 |
|
* <li>The
<code>Rea
lm</code>
that conta
ins the sh
ared user
and role
|
|
50 |
|
* <li>The
<code>Rea
lm</code>
that conta
ins the sh
ared user
and role
|
|
50 |
|
* <li>The
<code>Rea
lm</code>
that conta
ins the sh
ared user
and role
|
| 51 |
|
* inf
ormation m
ust be con
figured on
the same
Container
(or a high
er
|
|
51 |
|
* inf
ormation m
ust be con
figured on
the same
Container
(or a high
er
|
|
51 |
|
* inf
ormation m
ust be con
figured on
the same
Container
(or a high
er
|
| 52 |
|
* one
), and not
overridde
n at the w
eb applica
tion level
.</li>
|
|
52 |
|
* one
), and not
overridde
n at the w
eb applica
tion level
.</li>
|
|
52 |
|
* one
), and not
overridde
n at the w
eb applica
tion level
.</li>
|
| 53 |
|
* <li>The
web appli
cations th
emselves m
ust use on
e of the s
tandard
|
|
53 |
|
* <li>The
web appli
cations th
emselves m
ust use on
e of the s
tandard
|
|
53 |
|
* <li>The
web appli
cations th
emselves m
ust use on
e of the s
tandard
|
| 54 |
|
* Aut
henticator
s found in
the
|
|
54 |
|
* Aut
henticator
s found in
the
|
|
54 |
|
* Aut
henticator
s found in
the
|
| 55 |
|
* <co
de>org.apa
che.catali
na.authent
icator</co
de> packag
e.</li>
|
|
55 |
|
* <co
de>org.apa
che.catali
na.authent
icator</co
de> packag
e.</li>
|
|
55 |
|
* <co
de>org.apa
che.catali
na.authent
icator</co
de> packag
e.</li>
|
| 56 |
|
* </ul>
|
|
56 |
|
* </ul>
|
|
56 |
|
* </ul>
|
| 57 |
|
*
|
|
57 |
|
*
|
|
57 |
|
*
|
| 58 |
|
* @author
Craig R.
McClanahan
|
|
58 |
|
* @author
Craig R.
McClanahan
|
|
58 |
|
* @author
Craig R.
McClanahan
|
| 59 |
|
*/
|
|
59 |
|
*/
|
|
59 |
|
*/
|
| 60 |
|
public cla
ss SingleS
ignOn exte
nds ValveB
ase {
|
|
60 |
|
public cla
ss SingleS
ignOn exte
nds ValveB
ase {
|
|
60 |
|
public cla
ss SingleS
ignOn exte
nds ValveB
ase {
|
| 61 |
|
|
|
61 |
|
|
|
61 |
|
|
| 62 |
|
private st
atic final
StringMan
ager sm =
StringMana
ger.getMan
ager(
Co
n
sta
n
ts
.
Pa
c
k
a
ge
);
|
|
62 |
|
private st
atic final
StringMan
ager sm =
StringMana
ger.getMan
ager(
Si
n
gleSignO
n
.
c
l
a
ss
);
|
|
62 |
|
privat
e static f
inal Strin
gManager s
m = String
Manager.ge
tManager(S
ingleSignO
n.class);
|
| 63 |
|
|
|
63 |
|
|
|
63 |
|
|
| 64 |
|
/* The
engine at
the top o
f the cont
ainer hier
archy in w
hich this
SSO Valve
|
|
64 |
|
/* The
engine at
the top o
f the cont
ainer hier
archy in w
hich this
SSO Valve
|
|
64 |
|
/* The
engine at
the top o
f the cont
ainer hier
archy in w
hich this
SSO Valve
|
| 65 |
|
* has
been plac
ed. It is
used to ge
t back to
a session
object fro
m a
|
|
65 |
|
* has
been plac
ed. It is
used to ge
t back to
a session
object fro
m a
|
|
65 |
|
* has
been plac
ed. It is
used to ge
t back to
a session
object fro
m a
|
| 66 |
|
* Sin
gleSignOnS
essionKey
and is upd
ated when
the Valve
starts and
stops.
|
|
66 |
|
* Sin
gleSignOnS
essionKey
and is upd
ated when
the Valve
starts and
stops.
|
|
66 |
|
* Sin
gleSignOnS
essionKey
and is upd
ated when
the Valve
starts and
stops.
|
| 67 |
|
*/
|
|
67 |
|
*/
|
|
67 |
|
*/
|
| 68 |
|
privat
e Engine e
ngine;
|
|
68 |
|
privat
e Engine e
ngine;
|
|
68 |
|
privat
e Engine e
ngine;
|
| 69 |
|
|
|
69 |
|
|
|
69 |
|
|
| 70 |
|
//----
----------
----------
----------
----------
----------
Construct
or
|
|
70 |
|
//----
----------
----------
----------
----------
----------
Construct
or
|
|
70 |
|
//----
----------
----------
----------
----------
----------
Construct
or
|
| 71 |
|
|
|
71 |
|
|
|
71 |
|
|
| 72 |
|
public
SingleSig
nOn() {
|
|
72 |
|
public
SingleSig
nOn() {
|
|
72 |
|
public
SingleSig
nOn() {
|
| 73 |
|
su
per(true);
|
|
73 |
|
su
per(true);
|
|
73 |
|
su
per(true);
|
| 74 |
|
}
|
|
74 |
|
}
|
|
74 |
|
}
|
| 75 |
|
|
|
75 |
|
|
|
75 |
|
|
| 76 |
|
|
|
76 |
|
|
|
76 |
|
|
| 77 |
|
// ---
----------
----------
----------
----------
----------
Instance
Variables
|
|
77 |
|
// ---
----------
----------
----------
----------
----------
Instance
Variables
|
|
77 |
|
// ---
----------
----------
----------
----------
----------
Instance
Variables
|
| 78 |
|
|
|
78 |
|
|
|
78 |
|
|
| 79 |
|
/**
|
|
79 |
|
/**
|
|
79 |
|
/**
|
| 80 |
|
* The
cache of
SingleSign
OnEntry in
stances fo
r authenti
cated Prin
cipals,
|
|
80 |
|
* The
cache of
SingleSign
OnEntry in
stances fo
r authenti
cated Prin
cipals,
|
|
80 |
|
* The
cache of
SingleSign
OnEntry in
stances fo
r authenti
cated Prin
cipals,
|
| 81 |
|
* key
ed by the
cookie val
ue that is
used to s
elect them
.
|
|
81 |
|
* key
ed by the
cookie val
ue that is
used to s
elect them
.
|
|
81 |
|
* key
ed by the
cookie val
ue that is
used to s
elect them
.
|
| 82 |
|
*/
|
|
82 |
|
*/
|
|
82 |
|
*/
|
| 83 |
|
protec
ted Map<St
ring,Singl
eSignOnEnt
ry> cache
= new Conc
urrentHash
Map<>();
|
|
83 |
|
protec
ted Map<St
ring,Singl
eSignOnEnt
ry> cache
= new Conc
urrentHash
Map<>();
|
|
83 |
|
protec
ted Map<St
ring,Singl
eSignOnEnt
ry> cache
= new Conc
urrentHash
Map<>();
|
| 84 |
|
|
|
84 |
|
|
|
84 |
|
|
| 85 |
|
/**
|
|
85 |
|
/**
|
|
85 |
|
/**
|
| 86 |
|
* Ind
icates whe
ther this
valve shou
ld require
a downstr
eam Authen
ticator to
|
|
86 |
|
* Ind
icates whe
ther this
valve shou
ld require
a downstr
eam Authen
ticator to
|
|
86 |
|
* Ind
icates whe
ther this
valve shou
ld require
a downstr
eam Authen
ticator to
|
| 87 |
|
* rea
uthenticat
e each req
uest, or i
f it itsel
f can bind
a UserPri
ncipal
|
|
87 |
|
* rea
uthenticat
e each req
uest, or i
f it itsel
f can bind
a UserPri
ncipal
|
|
87 |
|
* rea
uthenticat
e each req
uest, or i
f it itsel
f can bind
a UserPri
ncipal
|
| 88 |
|
* and
AuthType
object to
the reques
t.
|
|
88 |
|
* and
AuthType
object to
the reques
t.
|
|
88 |
|
* and
AuthType
object to
the reques
t.
|
| 89 |
|
*/
|
|
89 |
|
*/
|
|
89 |
|
*/
|
| 90 |
|
privat
e boolean
requireRea
uthenticat
ion = fals
e;
|
|
90 |
|
privat
e boolean
requireRea
uthenticat
ion = fals
e;
|
|
90 |
|
privat
e boolean
requireRea
uthenticat
ion = fals
e;
|
| 91 |
|
|
|
91 |
|
|
|
91 |
|
|
| 92 |
|
/**
|
|
92 |
|
/**
|
|
92 |
|
/**
|
| 93 |
|
* Opt
ional SSO
cookie dom
ain.
|
|
93 |
|
* Opt
ional SSO
cookie dom
ain.
|
|
93 |
|
* Opt
ional SSO
cookie dom
ain.
|
| 94 |
|
*/
|
|
94 |
|
*/
|
|
94 |
|
*/
|
| 95 |
|
privat
e String c
ookieDomai
n;
|
|
95 |
|
privat
e String c
ookieDomai
n;
|
|
95 |
|
privat
e String c
ookieDomai
n;
|
| 96 |
|
|
|
96 |
|
|
|
96 |
|
|
| 97 |
|
|
|
97 |
|
|
|
97 |
|
|
| 98 |
|
// ---
----------
----------
----------
----------
----------
-------- P
roperties
|
|
98 |
|
// ---
----------
----------
----------
----------
----------
-------- P
roperties
|
|
98 |
|
// ---
----------
----------
----------
----------
----------
-------- P
roperties
|
| 99 |
|
|
|
99 |
|
|
|
99 |
|
|
| 100 |
|
/**
|
|
100 |
|
/**
|
|
100 |
|
/**
|
| 101 |
|
* Ret
urns the o
ptional co
okie domai
n.
|
|
101 |
|
* Ret
urns the o
ptional co
okie domai
n.
|
|
101 |
|
* Ret
urns the o
ptional co
okie domai
n.
|
| 102 |
|
* May
return nu
ll.
|
|
102 |
|
* May
return nu
ll.
|
|
102 |
|
* May
return nu
ll.
|
| 103 |
|
*
|
|
103 |
|
*
|
|
103 |
|
*
|
| 104 |
|
* @re
turn The c
ookie doma
in
|
|
104 |
|
* @re
turn The c
ookie doma
in
|
|
104 |
|
* @re
turn The c
ookie doma
in
|
| 105 |
|
*/
|
|
105 |
|
*/
|
|
105 |
|
*/
|
| 106 |
|
public
String ge
tCookieDom
ain() {
|
|
106 |
|
public
String ge
tCookieDom
ain() {
|
|
106 |
|
public
String ge
tCookieDom
ain() {
|
| 107 |
|
re
turn cooki
eDomain;
|
|
107 |
|
re
turn cooki
eDomain;
|
|
107 |
|
re
turn cooki
eDomain;
|
| 108 |
|
}
|
|
108 |
|
}
|
|
108 |
|
}
|
| 109 |
|
|
|
109 |
|
|
|
109 |
|
|
| 110 |
|
|
|
110 |
|
|
|
110 |
|
|
| 111 |
|
/**
|
|
111 |
|
/**
|
|
111 |
|
/**
|
| 112 |
|
* Set
s the doma
in to be u
sed for ss
o cookies.
|
|
112 |
|
* Set
s the doma
in to be u
sed for ss
o cookies.
|
|
112 |
|
* Set
s the doma
in to be u
sed for ss
o cookies.
|
| 113 |
|
*
|
|
113 |
|
*
|
|
113 |
|
*
|
| 114 |
|
* @pa
ram cookie
Domain coo
kie domain
name
|
|
114 |
|
* @pa
ram cookie
Domain coo
kie domain
name
|
|
114 |
|
* @pa
ram cookie
Domain coo
kie domain
name
|
| 115 |
|
*/
|
|
115 |
|
*/
|
|
115 |
|
*/
|
| 116 |
|
public
void setC
ookieDomai
n(String c
ookieDomai
n) {
|
|
116 |
|
public
void setC
ookieDomai
n(String c
ookieDomai
n) {
|
|
116 |
|
public
void setC
ookieDomai
n(String c
ookieDomai
n) {
|
| 117 |
|
if
(cookieDo
main != nu
ll && cook
ieDomain.t
rim().leng
th() == 0)
{
|
|
117 |
|
if
(cookieDo
main != nu
ll && cook
ieDomain.t
rim().leng
th() == 0)
{
|
|
117 |
|
if
(cookieDo
main != nu
ll && cook
ieDomain.t
rim().leng
th() == 0)
{
|
| 118 |
|
this.coo
kieDomain
= null;
|
|
118 |
|
this.coo
kieDomain
= null;
|
|
118 |
|
this.coo
kieDomain
= null;
|
| 119 |
|
}
else {
|
|
119 |
|
}
else {
|
|
119 |
|
}
else {
|
| 120 |
|
this.coo
kieDomain
= cookieDo
main;
|
|
120 |
|
this.coo
kieDomain
= cookieDo
main;
|
|
120 |
|
this.coo
kieDomain
= cookieDo
main;
|
| 121 |
|
}
|
|
121 |
|
}
|
|
121 |
|
}
|
| 122 |
|
}
|
|
122 |
|
}
|
|
122 |
|
}
|
| 123 |
|
|
|
123 |
|
|
|
123 |
|
|
| 124 |
|
|
|
124 |
|
|
|
124 |
|
|
| 125 |
|
/**
|
|
125 |
|
/**
|
|
125 |
|
/**
|
| 126 |
|
* Get
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
|
126 |
|
* Get
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
|
126 |
|
* Get
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
| 127 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
|
127 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
|
127 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
| 128 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
|
128 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
|
128 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
| 129 |
|
* to
the reques
t based on
the prese
nce of a v
alid SSO e
ntry witho
ut
|
|
129 |
|
* to
the reques
t based on
the prese
nce of a v
alid SSO e
ntry witho
ut
|
|
129 |
|
* to
the reques
t based on
the prese
nce of a v
alid SSO e
ntry witho
ut
|
| 130 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
|
130 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
|
130 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
| 131 |
|
*
|
|
131 |
|
*
|
|
131 |
|
*
|
| 132 |
|
* @re
turn <cod
e>true</co
de> if it
is require
d that a d
ownstream
|
|
132 |
|
* @re
turn <cod
e>true</co
de> if it
is require
d that a d
ownstream
|
|
132 |
|
* @re
turn <cod
e>true</co
de> if it
is require
d that a d
ownstream
|
| 133 |
|
*
Auth
enticator
reauthenti
cate each
request be
fore calls
to
|
|
133 |
|
*
Auth
enticator
reauthenti
cate each
request be
fore calls
to
|
|
133 |
|
*
Auth
enticator
reauthenti
cate each
request be
fore calls
to
|
| 134 |
|
*
<cod
e>HttpServ
letRequest
.setUserPr
incipal()<
/code>
|
|
134 |
|
*
<cod
e>HttpServ
letRequest
.setUserPr
incipal()<
/code>
|
|
134 |
|
*
<cod
e>HttpServ
letRequest
.setUserPr
incipal()<
/code>
|
| 135 |
|
*
and
<code>Http
ServletReq
uest.setAu
thType()</
code> are
made;
|
|
135 |
|
*
and
<code>Http
ServletReq
uest.setAu
thType()</
code> are
made;
|
|
135 |
|
*
and
<code>Http
ServletReq
uest.setAu
thType()</
code> are
made;
|
| 136 |
|
*
<cod
e>false</c
ode> if th
e <code>Va
lve</code>
can itsel
f make
|
|
136 |
|
*
<cod
e>false</c
ode> if th
e <code>Va
lve</code>
can itsel
f make
|
|
136 |
|
*
<cod
e>false</c
ode> if th
e <code>Va
lve</code>
can itsel
f make
|
| 137 |
|
*
thos
e calls re
lying on t
he presenc
e of a val
id SingleS
ignOn
|
|
137 |
|
*
thos
e calls re
lying on t
he presenc
e of a val
id SingleS
ignOn
|
|
137 |
|
*
thos
e calls re
lying on t
he presenc
e of a val
id SingleS
ignOn
|
| 138 |
|
*
entr
y associat
ed with th
e request.
|
|
138 |
|
*
entr
y associat
ed with th
e request.
|
|
138 |
|
*
entr
y associat
ed with th
e request.
|
| 139 |
|
*
|
|
139 |
|
*
|
|
139 |
|
*
|
| 140 |
|
* @se
e #setRequ
ireReauthe
ntication
|
|
140 |
|
* @se
e #setRequ
ireReauthe
ntication
|
|
140 |
|
* @se
e #setRequ
ireReauthe
ntication
|
| 141 |
|
*/
|
|
141 |
|
*/
|
|
141 |
|
*/
|
| 142 |
|
public
boolean g
etRequireR
eauthentic
ation() {
|
|
142 |
|
public
boolean g
etRequireR
eauthentic
ation() {
|
|
142 |
|
public
boolean g
etRequireR
eauthentic
ation() {
|
| 143 |
|
re
turn requi
reReauthen
tication;
|
|
143 |
|
re
turn requi
reReauthen
tication;
|
|
143 |
|
re
turn requi
reReauthen
tication;
|
| 144 |
|
}
|
|
144 |
|
}
|
|
144 |
|
}
|
| 145 |
|
|
|
145 |
|
|
|
145 |
|
|
| 146 |
|
|
|
146 |
|
|
|
146 |
|
|
| 147 |
|
/**
|
|
147 |
|
/**
|
|
147 |
|
/**
|
| 148 |
|
* Set
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
|
148 |
|
* Set
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
|
148 |
|
* Set
s whether
each reque
st needs t
o be reaut
henticated
(by an
|
| 149 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
|
149 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
|
149 |
|
* Aut
henticator
downstrea
m in the p
ipeline) t
o the secu
rity
|
| 150 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
|
150 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
|
150 |
|
* <co
de>Realm</
code>, or
if this Va
lve can it
self bind
security i
nfo
|
| 151 |
|
* to
the reques
t, based o
n the pres
ence of a
valid SSO
entry, wit
hout
|
|
151 |
|
* to
the reques
t, based o
n the pres
ence of a
valid SSO
entry, wit
hout
|
|
151 |
|
* to
the reques
t, based o
n the pres
ence of a
valid SSO
entry, wit
hout
|
| 152 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
|
152 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
|
152 |
|
* rec
hecking wi
th the <co
de>Realm</
code>.
|
| 153 |
|
* <p>
|
|
153 |
|
* <p>
|
|
153 |
|
* <p>
|
| 154 |
|
* If
this prope
rty is <co
de>false</
code> (the
default),
this
|
|
154 |
|
* If
this prope
rty is <co
de>false</
code> (the
default),
this
|
|
154 |
|
* If
this prope
rty is <co
de>false</
code> (the
default),
this
|
| 155 |
|
* <co
de>Valve</
code> will
bind a Us
erPrincipa
l and Auth
Type to th
e request
|
|
155 |
|
* <co
de>Valve</
code> will
bind a Us
erPrincipa
l and Auth
Type to th
e request
|
|
155 |
|
* <co
de>Valve</
code> will
bind a Us
erPrincipa
l and Auth
Type to th
e request
|
| 156 |
|
* if
a valid SS
O entry is
associate
d with the
request.
It will n
ot notify
|
|
156 |
|
* if
a valid SS
O entry is
associate
d with the
request.
It will n
ot notify
|
|
156 |
|
* if
a valid SS
O entry is
associate
d with the
request.
It will n
ot notify
|
| 157 |
|
* the
security
<code>Real
m</code> o
f the inco
ming reque
st.
|
|
157 |
|
* the
security
<code>Real
m</code> o
f the inco
ming reque
st.
|
|
157 |
|
* the
security
<code>Real
m</code> o
f the inco
ming reque
st.
|
| 158 |
|
* <p>
|
|
158 |
|
* <p>
|
|
158 |
|
* <p>
|
| 159 |
|
* Thi
s property
should be
set to <c
ode>true</
code> if t
he overall
server
|
|
159 |
|
* Thi
s property
should be
set to <c
ode>true</
code> if t
he overall
server
|
|
159 |
|
* Thi
s property
should be
set to <c
ode>true</
code> if t
he overall
server
|
| 160 |
|
* con
figuration
requires
that the <
code>Realm
</code> re
authentica
te each
|
|
160 |
|
* con
figuration
requires
that the <
code>Realm
</code> re
authentica
te each
|
|
160 |
|
* con
figuration
requires
that the <
code>Realm
</code> re
authentica
te each
|
| 161 |
|
* req
uest threa
d. An exa
mple of su
ch a confi
guration w
ould be on
e where
|
|
161 |
|
* req
uest threa
d. An exa
mple of su
ch a confi
guration w
ould be on
e where
|
|
161 |
|
* req
uest threa
d. An exa
mple of su
ch a confi
guration w
ould be on
e where
|
| 162 |
|
* the
<code>Rea
lm</code>
implementa
tion provi
des securi
ty for bot
h a
|
|
162 |
|
* the
<code>Rea
lm</code>
implementa
tion provi
des securi
ty for bot
h a
|
|
162 |
|
* the
<code>Rea
lm</code>
implementa
tion provi
des securi
ty for bot
h a
|
| 163 |
|
* web
tier and
an associa
ted EJB ti
er, and ne
eds to set
security
|
|
163 |
|
* web
tier and
an associa
ted EJB ti
er, and ne
eds to set
security
|
|
163 |
|
* web
tier and
an associa
ted EJB ti
er, and ne
eds to set
security
|
| 164 |
|
* cre
dentials o
n each req
uest threa
d in order
to suppor
t EJB acce
ss.
|
|
164 |
|
* cre
dentials o
n each req
uest threa
d in order
to suppor
t EJB acce
ss.
|
|
164 |
|
* cre
dentials o
n each req
uest threa
d in order
to suppor
t EJB acce
ss.
|
| 165 |
|
* <p>
|
|
165 |
|
* <p>
|
|
165 |
|
* <p>
|
| 166 |
|
* If
this prope
rty is set
to <code>
true</code
>, this Va
lve will s
et flags
|
|
166 |
|
* If
this prope
rty is set
to <code>
true</code
>, this Va
lve will s
et flags
|
|
166 |
|
* If
this prope
rty is set
to <code>
true</code
>, this Va
lve will s
et flags
|
| 167 |
|
* on
the reques
t notifyin
g the down
stream Aut
henticator
that the
request
|
|
167 |
|
* on
the reques
t notifyin
g the down
stream Aut
henticator
that the
request
|
|
167 |
|
* on
the reques
t notifyin
g the down
stream Aut
henticator
that the
request
|
| 168 |
|
* is
associated
with an S
SO session
. The Aut
henticator
will then
call its
|
|
168 |
|
* is
associated
with an S
SO session
. The Aut
henticator
will then
call its
|
|
168 |
|
* is
associated
with an S
SO session
. The Aut
henticator
will then
call its
|
| 169 |
|
* {@l
ink Authen
ticatorBas
e#reauthen
ticateFrom
SSO reauth
enticateFr
omSSO}
|
|
169 |
|
* {@l
ink Authen
ticatorBas
e#reauthen
ticateFrom
SSO reauth
enticateFr
omSSO}
|
|
169 |
|
* {@l
ink Authen
ticatorBas
e#reauthen
ticateFrom
SSO reauth
enticateFr
omSSO}
|
| 170 |
|
* met
hod to att
empt to re
authentica
te the req
uest to th
e
|
|
170 |
|
* met
hod to att
empt to re
authentica
te the req
uest to th
e
|
|
170 |
|
* met
hod to att
empt to re
authentica
te the req
uest to th
e
|
| 171 |
|
* <co
de>Realm</
code>, usi
ng any cre
dentials t
hat were c
ached with
this
|
|
171 |
|
* <co
de>Realm</
code>, usi
ng any cre
dentials t
hat were c
ached with
this
|
|
171 |
|
* <co
de>Realm</
code>, usi
ng any cre
dentials t
hat were c
ached with
this
|
| 172 |
|
* Val
ve.
|
|
172 |
|
* Val
ve.
|
|
172 |
|
* Val
ve.
|
| 173 |
|
* <p>
|
|
173 |
|
* <p>
|
|
173 |
|
* <p>
|
| 174 |
|
* The
default v
alue of th
is propert
y is <code
>false</co
de>, in or
der
|
|
174 |
|
* The
default v
alue of th
is propert
y is <code
>false</co
de>, in or
der
|
|
174 |
|
* The
default v
alue of th
is propert
y is <code
>false</co
de>, in or
der
|
| 175 |
|
* to
maintain b
ackward co
mpatibilit
y with pre
vious vers
ions of To
mcat.
|
|
175 |
|
* to
maintain b
ackward co
mpatibilit
y with pre
vious vers
ions of To
mcat.
|
|
175 |
|
* to
maintain b
ackward co
mpatibilit
y with pre
vious vers
ions of To
mcat.
|
| 176 |
|
*
|
|
176 |
|
*
|
|
176 |
|
*
|
| 177 |
|
* @pa
ram requir
ed <code>
true</code
> if it is
required
that a dow
nstream
|
|
177 |
|
* @pa
ram requir
ed <code>
true</code
> if it is
required
that a dow
nstream
|
|
177 |
|
* @pa
ram requir
ed <code>
true</code
> if it is
required
that a dow
nstream
|
| 178 |
|
*
Authen
ticator re
authentica
te each re
quest befo
re calls
|
|
178 |
|
*
Authen
ticator re
authentica
te each re
quest befo
re calls
|
|
178 |
|
*
Authen
ticator re
authentica
te each re
quest befo
re calls
|
| 179 |
|
*
to <c
ode>HttpSe
rvletReque
st.setUser
Principal(
)</code>
|
|
179 |
|
*
to <c
ode>HttpSe
rvletReque
st.setUser
Principal(
)</code>
|
|
179 |
|
*
to <c
ode>HttpSe
rvletReque
st.setUser
Principal(
)</code>
|
| 180 |
|
*
and <c
ode>HttpSe
rvletReque
st.setAuth
Type()</co
de> are
|
|
180 |
|
*
and <c
ode>HttpSe
rvletReque
st.setAuth
Type()</co
de> are
|
|
180 |
|
*
and <c
ode>HttpSe
rvletReque
st.setAuth
Type()</co
de> are
|
| 181 |
|
*
made;
<code>fals
e</code> i
f the <cod
e>Valve</c
ode> can
|
|
181 |
|
*
made;
<code>fals
e</code> i
f the <cod
e>Valve</c
ode> can
|
|
181 |
|
*
made;
<code>fals
e</code> i
f the <cod
e>Valve</c
ode> can
|
| 182 |
|
*
itself
make thos
e calls re
lying on t
he presenc
e of a
|
|
182 |
|
*
itself
make thos
e calls re
lying on t
he presenc
e of a
|
|
182 |
|
*
itself
make thos
e calls re
lying on t
he presenc
e of a
|
| 183 |
|
*
valid
SingleSign
On entry a
ssociated
with the r
equest.
|
|
183 |
|
*
valid
SingleSign
On entry a
ssociated
with the r
equest.
|
|
183 |
|
*
valid
SingleSign
On entry a
ssociated
with the r
equest.
|
| 184 |
|
*
|
|
184 |
|
*
|
|
184 |
|
*
|
| 185 |
|
* @se
e Authenti
catorBase#
reauthenti
cateFromSS
O
|
|
185 |
|
* @se
e Authenti
catorBase#
reauthenti
cateFromSS
O
|
|
185 |
|
* @se
e Authenti
catorBase#
reauthenti
cateFromSS
O
|
| 186 |
|
*/
|
|
186 |
|
*/
|
|
186 |
|
*/
|
| 187 |
|
public
void setR
equireReau
thenticati
on(boolean
required)
{
|
|
187 |
|
public
void setR
equireReau
thenticati
on(boolean
required)
{
|
|
187 |
|
public
void setR
equireReau
thenticati
on(boolean
required)
{
|
| 188 |
|
th
is.require
Reauthenti
cation = r
equired;
|
|
188 |
|
th
is.require
Reauthenti
cation = r
equired;
|
|
188 |
|
th
is.require
Reauthenti
cation = r
equired;
|
| 189 |
|
}
|
|
189 |
|
}
|
|
189 |
|
}
|
| 190 |
|
|
|
190 |
|
|
|
190 |
|
|
| 191 |
|
|
|
191 |
|
|
|
191 |
|
|
| 192 |
|
// ---
----------
----------
----------
----------
----------
----- Valv
e Methods
|
|
192 |
|
// ---
----------
----------
----------
----------
----------
----- Valv
e Methods
|
|
192 |
|
// ---
----------
----------
----------
----------
----------
----- Valv
e Methods
|
| 193 |
|
|
|
193 |
|
|
|
193 |
|
|
| 194 |
|
/**
|
|
194 |
|
/**
|
|
194 |
|
/**
|
| 195 |
|
* Per
form singl
e-sign-on
support pr
ocessing f
or this re
quest.
|
|
195 |
|
* Per
form singl
e-sign-on
support pr
ocessing f
or this re
quest.
|
|
195 |
|
* Per
form singl
e-sign-on
support pr
ocessing f
or this re
quest.
|
| 196 |
|
*
|
|
196 |
|
*
|
|
196 |
|
*
|
| 197 |
|
* @pa
ram reques
t The serv
let reques
t we are p
rocessing
|
|
197 |
|
* @pa
ram reques
t The serv
let reques
t we are p
rocessing
|
|
197 |
|
* @pa
ram reques
t The serv
let reques
t we are p
rocessing
|
| 198 |
|
* @pa
ram respon
se The ser
vlet respo
nse we are
creating
|
|
198 |
|
* @pa
ram respon
se The ser
vlet respo
nse we are
creating
|
|
198 |
|
* @pa
ram respon
se The ser
vlet respo
nse we are
creating
|
| 199 |
|
*
|
|
199 |
|
*
|
|
199 |
|
*
|
| 200 |
|
* @ex
ception IO
Exception
if an inpu
t/output e
rror occur
s
|
|
200 |
|
* @ex
ception IO
Exception
if an inpu
t/output e
rror occur
s
|
|
200 |
|
* @ex
ception IO
Exception
if an inpu
t/output e
rror occur
s
|
| 201 |
|
* @ex
ception Se
rvletExcep
tion if a
servlet er
ror occurs
|
|
201 |
|
* @ex
ception Se
rvletExcep
tion if a
servlet er
ror occurs
|
|
201 |
|
* @ex
ception Se
rvletExcep
tion if a
servlet er
ror occurs
|
| 202 |
|
*/
|
|
202 |
|
*/
|
|
202 |
|
*/
|
| 203 |
|
@Overr
ide
|
|
203 |
|
@Overr
ide
|
|
203 |
|
@Overr
ide
|
| 204 |
|
public
void invo
ke(Request
request,
Response r
esponse)
|
|
204 |
|
public
void invo
ke(Request
request,
Response r
esponse)
|
|
204 |
|
public
void invo
ke(Request
request,
Response r
esponse)
|
| 205 |
|
th
rows IOExc
eption, Se
rvletExcep
tion {
|
|
205 |
|
th
rows IOExc
eption, Se
rvletExcep
tion {
|
|
205 |
|
th
rows IOExc
eption, Se
rvletExcep
tion {
|
| 206 |
|
|
|
206 |
|
|
|
206 |
|
|
| 207 |
|
re
quest.remo
veNote(Con
stants.REQ
_SSOID_NOT
E);
|
|
207 |
|
re
quest.remo
veNote(Con
stants.REQ
_SSOID_NOT
E);
|
|
207 |
|
re
quest.remo
veNote(Con
stants.REQ
_SSOID_NOT
E);
|
| 208 |
|
|
|
208 |
|
|
|
208 |
|
|
| 209 |
|
//
Has a val
id user al
ready been
authentic
ated?
|
|
209 |
|
//
Has a val
id user al
ready been
authentic
ated?
|
|
209 |
|
//
Has a val
id user al
ready been
authentic
ated?
|
| 210 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
210 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
210 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
| 211 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.invoke
", request
.getReques
tURI()));
|
|
211 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.invoke
", request
.getReques
tURI()));
|
|
211 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.invoke
", request
.getReques
tURI()));
|
| 212 |
|
}
|
|
212 |
|
}
|
|
212 |
|
}
|
| 213 |
|
if
(request.
getUserPri
ncipal() !
= null) {
|
|
213 |
|
if
(request.
getUserPri
ncipal() !
= null) {
|
|
213 |
|
if
(request.
getUserPri
ncipal() !
= null) {
|
| 214 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
214 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
214 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 215 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.ha
sPrincipal
",
|
|
215 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.ha
sPrincipal
",
|
|
215 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.ha
sPrincipal
",
|
| 216 |
|
reques
t.getUserP
rincipal()
.getName()
));
|
|
216 |
|
reques
t.getUserP
rincipal()
.getName()
));
|
|
216 |
|
reques
t.getUserP
rincipal()
.getName()
));
|
| 217 |
|
}
|
|
217 |
|
}
|
|
217 |
|
}
|
| 218 |
|
getNext(
).invoke(r
equest, re
sponse);
|
|
218 |
|
getNext(
).invoke(r
equest, re
sponse);
|
|
218 |
|
getNext(
).invoke(r
equest, re
sponse);
|
| 219 |
|
return;
|
|
219 |
|
return;
|
|
219 |
|
return;
|
| 220 |
|
}
|
|
220 |
|
}
|
|
220 |
|
}
|
| 221 |
|
|
|
221 |
|
|
|
221 |
|
|
| 222 |
|
//
Check for
the singl
e sign on
cookie
|
|
222 |
|
//
Check for
the singl
e sign on
cookie
|
|
222 |
|
//
Check for
the singl
e sign on
cookie
|
| 223 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
223 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
223 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
| 224 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.cookie
Check"));
|
|
224 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.cookie
Check"));
|
|
224 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.cookie
Check"));
|
| 225 |
|
}
|
|
225 |
|
}
|
|
225 |
|
}
|
| 226 |
|
Co
okie cooki
e = null;
|
|
226 |
|
Co
okie cooki
e = null;
|
|
226 |
|
Co
okie cooki
e = null;
|
| 227 |
|
Co
okie cooki
es[] = req
uest.getCo
okies();
|
|
227 |
|
Co
okie cooki
es[] = req
uest.getCo
okies();
|
|
227 |
|
Co
okie cooki
es[] = req
uest.getCo
okies();
|
| 228 |
|
if
(cookies
!= null) {
|
|
228 |
|
if
(cookies
!= null) {
|
|
228 |
|
if
(cookies
!= null) {
|
| 229 |
|
for (int
i = 0; i
< cookies.
length; i+
+) {
|
|
229 |
|
for (int
i = 0; i
< cookies.
length; i+
+) {
|
|
229 |
|
for (int
i = 0; i
< cookies.
length; i+
+) {
|
| 230 |
|
if (
Constants.
SINGLE_SIG
N_ON_COOKI
E.equals(c
ookies[i].
getName())
) {
|
|
230 |
|
if (
Constants.
SINGLE_SIG
N_ON_COOKI
E.equals(c
ookies[i].
getName())
) {
|
|
230 |
|
if (
Constants.
SINGLE_SIG
N_ON_COOKI
E.equals(c
ookies[i].
getName())
) {
|
| 231 |
|
cookie = c
ookies[i];
|
|
231 |
|
cookie = c
ookies[i];
|
|
231 |
|
cookie = c
ookies[i];
|
| 232 |
|
break;
|
|
232 |
|
break;
|
|
232 |
|
break;
|
| 233 |
|
}
|
|
233 |
|
}
|
|
233 |
|
}
|
| 234 |
|
}
|
|
234 |
|
}
|
|
234 |
|
}
|
| 235 |
|
}
|
|
235 |
|
}
|
|
235 |
|
}
|
| 236 |
|
if
(cookie =
= null) {
|
|
236 |
|
if
(cookie =
= null) {
|
|
236 |
|
if
(cookie =
= null) {
|
| 237 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
237 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
237 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 238 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.co
okieNotFou
nd"));
|
|
238 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.co
okieNotFou
nd"));
|
|
238 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.co
okieNotFou
nd"));
|
| 239 |
|
}
|
|
239 |
|
}
|
|
239 |
|
}
|
| 240 |
|
getNext(
).invoke(r
equest, re
sponse);
|
|
240 |
|
getNext(
).invoke(r
equest, re
sponse);
|
|
240 |
|
getNext(
).invoke(r
equest, re
sponse);
|
| 241 |
|
return;
|
|
241 |
|
return;
|
|
241 |
|
return;
|
| 242 |
|
}
|
|
242 |
|
}
|
|
242 |
|
}
|
| 243 |
|
|
|
243 |
|
|
|
243 |
|
|
| 244 |
|
//
Look up t
he cached
Principal
associated
with this
cookie va
lue
|
|
244 |
|
//
Look up t
he cached
Principal
associated
with this
cookie va
lue
|
|
244 |
|
//
Look up t
he cached
Principal
associated
with this
cookie va
lue
|
| 245 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
245 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
245 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
| 246 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.princi
palCheck",
|
|
246 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.princi
palCheck",
|
|
246 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.princi
palCheck",
|
| 247 |
|
cookie.get
Value()));
|
|
247 |
|
cookie.get
Value()));
|
|
247 |
|
cookie.get
Value()));
|
| 248 |
|
}
|
|
248 |
|
}
|
|
248 |
|
}
|
| 249 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(cookie
.getValue(
));
|
|
249 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(cookie
.getValue(
));
|
|
249 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(cookie
.getValue(
));
|
| 250 |
|
if
(entry !=
null) {
|
|
250 |
|
if
(entry !=
null) {
|
|
250 |
|
if
(entry !=
null) {
|
| 251 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
251 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
251 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 252 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalFou
nd",
|
|
252 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalFou
nd",
|
|
252 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalFou
nd",
|
| 253 |
|
entry.
getPrincip
al() != nu
ll ? entry
.getPrinci
pal().getN
ame() : ""
,
|
|
253 |
|
entry.
getPrincip
al() != nu
ll ? entry
.getPrinci
pal().getN
ame() : ""
,
|
|
253 |
|
entry.
getPrincip
al() != nu
ll ? entry
.getPrinci
pal().getN
ame() : ""
,
|
| 254 |
|
entry.
getAuthTyp
e()));
|
|
254 |
|
entry.
getAuthTyp
e()));
|
|
254 |
|
entry.
getAuthTyp
e()));
|
| 255 |
|
}
|
|
255 |
|
}
|
|
255 |
|
}
|
| 256 |
|
request.
setNote(Co
nstants.RE
Q_SSOID_NO
TE, cookie
.getValue(
));
|
|
256 |
|
request.
setNote(Co
nstants.RE
Q_SSOID_NO
TE, cookie
.getValue(
));
|
|
256 |
|
request.
setNote(Co
nstants.RE
Q_SSOID_NO
TE, cookie
.getValue(
));
|
| 257 |
|
// Only
set securi
ty element
s if reaut
henticatio
n is not r
equired
|
|
257 |
|
// Only
set securi
ty element
s if reaut
henticatio
n is not r
equired
|
|
257 |
|
// Only
set securi
ty element
s if reaut
henticatio
n is not r
equired
|
| 258 |
|
if (!get
RequireRea
uthenticat
ion()) {
|
|
258 |
|
if (!get
RequireRea
uthenticat
ion()) {
|
|
258 |
|
if (!get
RequireRea
uthenticat
ion()) {
|
| 259 |
|
requ
est.setAut
hType(entr
y.getAuthT
ype());
|
|
259 |
|
requ
est.setAut
hType(entr
y.getAuthT
ype());
|
|
259 |
|
requ
est.setAut
hType(entr
y.getAuthT
ype());
|
| 260 |
|
requ
est.setUse
rPrincipal
(entry.get
Principal(
));
|
|
260 |
|
requ
est.setUse
rPrincipal
(entry.get
Principal(
));
|
|
260 |
|
requ
est.setUse
rPrincipal
(entry.get
Principal(
));
|
| 261 |
|
}
|
|
261 |
|
}
|
|
261 |
|
}
|
| 262 |
|
}
else {
|
|
262 |
|
}
else {
|
|
262 |
|
}
else {
|
| 263 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
263 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
263 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 264 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalNot
Found",
|
|
264 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalNot
Found",
|
|
264 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.pr
incipalNot
Found",
|
| 265 |
|
cookie
.getValue(
)));
|
|
265 |
|
cookie
.getValue(
)));
|
|
265 |
|
cookie
.getValue(
)));
|
| 266 |
|
}
|
|
266 |
|
}
|
|
266 |
|
}
|
| 267 |
|
// No ne
ed to retu
rn a valid
SSO sessi
on ID
|
|
267 |
|
// No ne
ed to retu
rn a valid
SSO sessi
on ID
|
|
267 |
|
// No ne
ed to retu
rn a valid
SSO sessi
on ID
|
| 268 |
|
cookie.s
etValue("R
EMOVE");
|
|
268 |
|
cookie.s
etValue("R
EMOVE");
|
|
268 |
|
cookie.s
etValue("R
EMOVE");
|
| 269 |
|
// Age o
f zero wil
l trigger
removal
|
|
269 |
|
// Age o
f zero wil
l trigger
removal
|
|
269 |
|
// Age o
f zero wil
l trigger
removal
|
| 270 |
|
cookie.s
etMaxAge(0
);
|
|
270 |
|
cookie.s
etMaxAge(0
);
|
|
270 |
|
cookie.s
etMaxAge(0
);
|
| 271 |
|
// Domai
n and path
have to m
atch the o
riginal co
okie to 'r
eplace'
|
|
271 |
|
// Domai
n and path
have to m
atch the o
riginal co
okie to 'r
eplace'
|
|
271 |
|
// Domai
n and path
have to m
atch the o
riginal co
okie to 'r
eplace'
|
| 272 |
|
// the o
riginal co
okie
|
|
272 |
|
// the o
riginal co
okie
|
|
272 |
|
// the o
riginal co
okie
|
| 273 |
|
cookie.s
etPath("/"
);
|
|
273 |
|
cookie.s
etPath("/"
);
|
|
273 |
|
cookie.s
etPath("/"
);
|
| 274 |
|
String d
omain = ge
tCookieDom
ain();
|
|
274 |
|
String d
omain = ge
tCookieDom
ain();
|
|
274 |
|
String d
omain = ge
tCookieDom
ain();
|
| 275 |
|
if (doma
in != null
) {
|
|
275 |
|
if (doma
in != null
) {
|
|
275 |
|
if (doma
in != null
) {
|
| 276 |
|
cook
ie.setDoma
in(domain)
;
|
|
276 |
|
cook
ie.setDoma
in(domain)
;
|
|
276 |
|
cook
ie.setDoma
in(domain)
;
|
| 277 |
|
}
|
|
277 |
|
}
|
|
277 |
|
}
|
| 278 |
|
// This
is going t
o trigger
a Set-Cook
ie header.
While the
value is
|
|
278 |
|
// This
is going t
o trigger
a Set-Cook
ie header.
While the
value is
|
|
278 |
|
// This
is going t
o trigger
a Set-Cook
ie header.
While the
value is
|
| 279 |
|
// not s
ecurity se
nsitive, e
nsure that
expectati
ons for se
cure and
|
|
279 |
|
// not s
ecurity se
nsitive, e
nsure that
expectati
ons for se
cure and
|
|
279 |
|
// not s
ecurity se
nsitive, e
nsure that
expectati
ons for se
cure and
|
| 280 |
|
// httpO
nly are me
t
|
|
280 |
|
// httpO
nly are me
t
|
|
280 |
|
// httpO
nly are me
t
|
| 281 |
|
cookie.s
etSecure(r
equest.isS
ecure());
|
|
281 |
|
cookie.s
etSecure(r
equest.isS
ecure());
|
|
281 |
|
cookie.s
etSecure(r
equest.isS
ecure());
|
| 282 |
|
if (requ
est.getSer
vletContex
t().getSes
sionCookie
Config().i
sHttpOnly(
) ||
|
|
282 |
|
if (requ
est.getSer
vletContex
t().getSes
sionCookie
Config().i
sHttpOnly(
) ||
|
|
282 |
|
if (requ
est.getSer
vletContex
t().getSes
sionCookie
Config().i
sHttpOnly(
) ||
|
| 283 |
|
request.ge
tContext()
.getUseHtt
pOnly()) {
|
|
283 |
|
request.ge
tContext()
.getUseHtt
pOnly()) {
|
|
283 |
|
request.ge
tContext()
.getUseHtt
pOnly()) {
|
| 284 |
|
cook
ie.setHttp
Only(true)
;
|
|
284 |
|
cook
ie.setHttp
Only(true)
;
|
|
284 |
|
cook
ie.setHttp
Only(true)
;
|
| 285 |
|
}
|
|
285 |
|
}
|
|
285 |
|
}
|
| 286 |
|
|
|
286 |
|
|
|
286 |
|
|
| 287 |
|
response
.addCookie
(cookie);
|
|
287 |
|
response
.addCookie
(cookie);
|
|
287 |
|
response
.addCookie
(cookie);
|
| 288 |
|
}
|
|
288 |
|
}
|
|
288 |
|
}
|
| 289 |
|
|
|
289 |
|
|
|
289 |
|
|
| 290 |
|
//
Invoke th
e next Val
ve in our
pipeline
|
|
290 |
|
//
Invoke th
e next Val
ve in our
pipeline
|
|
290 |
|
//
Invoke th
e next Val
ve in our
pipeline
|
| 291 |
|
ge
tNext().in
voke(reque
st, respon
se);
|
|
291 |
|
ge
tNext().in
voke(reque
st, respon
se);
|
|
291 |
|
ge
tNext().in
voke(reque
st, respon
se);
|
| 292 |
|
}
|
|
292 |
|
}
|
|
292 |
|
}
|
| 293 |
|
|
|
293 |
|
|
|
293 |
|
|
| 294 |
|
|
|
294 |
|
|
|
294 |
|
|
| 295 |
|
// ---
----------
----------
----------
----------
----------
- Protecte
d Methods
|
|
295 |
|
// ---
----------
----------
----------
----------
----------
- Protecte
d Methods
|
|
295 |
|
// ---
----------
----------
----------
----------
----------
- Protecte
d Methods
|
| 296 |
|
|
|
296 |
|
|
|
296 |
|
|
| 297 |
|
/**
|
|
297 |
|
/**
|
|
297 |
|
/**
|
| 298 |
|
* Pro
cess a ses
sion destr
oyed event
by removi
ng referen
ces to tha
t session
|
|
298 |
|
* Pro
cess a ses
sion destr
oyed event
by removi
ng referen
ces to tha
t session
|
|
298 |
|
* Pro
cess a ses
sion destr
oyed event
by removi
ng referen
ces to tha
t session
|
| 299 |
|
* fro
m the cach
es and - i
f the sess
ion destru
ction is t
he result
of a
|
|
299 |
|
* fro
m the cach
es and - i
f the sess
ion destru
ction is t
he result
of a
|
|
299 |
|
* fro
m the cach
es and - i
f the sess
ion destru
ction is t
he result
of a
|
| 300 |
|
* log
out - dest
roy the as
sociated S
SO session
.
|
|
300 |
|
* log
out - dest
roy the as
sociated S
SO session
.
|
|
300 |
|
* log
out - dest
roy the as
sociated S
SO session
.
|
| 301 |
|
*
|
|
301 |
|
*
|
|
301 |
|
*
|
| 302 |
|
* @pa
ram ssoId
The ID o
f the SSO
session wh
ich which
the destro
yed
|
|
302 |
|
* @pa
ram ssoId
The ID o
f the SSO
session wh
ich which
the destro
yed
|
|
302 |
|
* @pa
ram ssoId
The ID o
f the SSO
session wh
ich which
the destro
yed
|
| 303 |
|
*
session
was associ
ated
|
|
303 |
|
*
session
was associ
ated
|
|
303 |
|
*
session
was associ
ated
|
| 304 |
|
* @pa
ram sessio
n The sess
ion that h
as been de
stroyed
|
|
304 |
|
* @pa
ram sessio
n The sess
ion that h
as been de
stroyed
|
|
304 |
|
* @pa
ram sessio
n The sess
ion that h
as been de
stroyed
|
| 305 |
|
*/
|
|
305 |
|
*/
|
|
305 |
|
*/
|
| 306 |
|
public
void sess
ionDestroy
ed(String
ssoId, Ses
sion sessi
on) {
|
|
306 |
|
public
void sess
ionDestroy
ed(String
ssoId, Ses
sion sessi
on) {
|
|
306 |
|
public
void sess
ionDestroy
ed(String
ssoId, Ses
sion sessi
on) {
|
| 307 |
|
|
|
307 |
|
|
|
307 |
|
|
| 308 |
|
if
(!getStat
e().isAvai
lable()) {
|
|
308 |
|
if
(!getStat
e().isAvai
lable()) {
|
|
308 |
|
if
(!getStat
e().isAvai
lable()) {
|
| 309 |
|
return;
|
|
309 |
|
return;
|
|
309 |
|
return;
|
| 310 |
|
}
|
|
310 |
|
}
|
|
310 |
|
}
|
| 311 |
|
|
|
311 |
|
|
|
311 |
|
|
| 312 |
|
//
Was the s
ession des
troyed as
the result
of a time
out or con
text stop?
|
|
312 |
|
//
Was the s
ession des
troyed as
the result
of a time
out or con
text stop?
|
|
312 |
|
//
Was the s
ession des
troyed as
the result
of a time
out or con
text stop?
|
| 313 |
|
//
If so, we
'll just r
emove the
expired se
ssion from
the SSO.
If the
|
|
313 |
|
//
If so, we
'll just r
emove the
expired se
ssion from
the SSO.
If the
|
|
313 |
|
//
If so, we
'll just r
emove the
expired se
ssion from
the SSO.
If the
|
| 314 |
|
//
session w
as logged
out, we'll
log out o
f all sess
ion associ
ated with
|
|
314 |
|
//
session w
as logged
out, we'll
log out o
f all sess
ion associ
ated with
|
|
314 |
|
//
session w
as logged
out, we'll
log out o
f all sess
ion associ
ated with
|
| 315 |
|
//
the SSO.
|
|
315 |
|
//
the SSO.
|
|
315 |
|
//
the SSO.
|
| 316 |
|
if
(((sessio
n.getMaxIn
activeInte
rval() > 0
)
|
|
316 |
|
if
(((sessio
n.getMaxIn
activeInte
rval() > 0
)
|
|
316 |
|
if
(((sessio
n.getMaxIn
activeInte
rval() > 0
)
|
| 317 |
|
&& (sess
ion.getIdl
eTimeInter
nal() >= s
ession.get
MaxInactiv
eInterval(
) * 1000))
|
|
317 |
|
&& (sess
ion.getIdl
eTimeInter
nal() >= s
ession.get
MaxInactiv
eInterval(
) * 1000))
|
|
317 |
|
&& (sess
ion.getIdl
eTimeInter
nal() >= s
ession.get
MaxInactiv
eInterval(
) * 1000))
|
| 318 |
|
|| (!ses
sion.getMa
nager().ge
tContext()
.getState(
).isAvaila
ble())) {
|
|
318 |
|
|| (!ses
sion.getMa
nager().ge
tContext()
.getState(
).isAvaila
ble())) {
|
|
318 |
|
|| (!ses
sion.getMa
nager().ge
tContext()
.getState(
).isAvaila
ble())) {
|
| 319 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
319 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
319 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 320 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionTimeo
ut",
|
|
320 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionTimeo
ut",
|
|
320 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionTimeo
ut",
|
| 321 |
|
ssoId,
session))
;
|
|
321 |
|
ssoId,
session))
;
|
|
321 |
|
ssoId,
session))
;
|
| 322 |
|
}
|
|
322 |
|
}
|
|
322 |
|
}
|
| 323 |
|
removeSe
ssion(ssoI
d, session
);
|
|
323 |
|
removeSe
ssion(ssoI
d, session
);
|
|
323 |
|
removeSe
ssion(ssoI
d, session
);
|
| 324 |
|
}
else {
|
|
324 |
|
}
else {
|
|
324 |
|
}
else {
|
| 325 |
|
// The s
ession was
logged ou
t.
|
|
325 |
|
// The s
ession was
logged ou
t.
|
|
325 |
|
// The s
ession was
logged ou
t.
|
| 326 |
|
// Dereg
ister this
single se
ssion id,
invalidati
ng
|
|
326 |
|
// Dereg
ister this
single se
ssion id,
invalidati
ng
|
|
326 |
|
// Dereg
ister this
single se
ssion id,
invalidati
ng
|
| 327 |
|
// assoc
iated sess
ions
|
|
327 |
|
// assoc
iated sess
ions
|
|
327 |
|
// assoc
iated sess
ions
|
| 328 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
328 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
328 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 329 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionLogou
t",
|
|
329 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionLogou
t",
|
|
329 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.se
ssionLogou
t",
|
| 330 |
|
ssoId,
session))
;
|
|
330 |
|
ssoId,
session))
;
|
|
330 |
|
ssoId,
session))
;
|
| 331 |
|
}
|
|
331 |
|
}
|
|
331 |
|
}
|
| 332 |
|
// First
remove th
e session
that we kn
ow has exp
ired / bee
n logged
|
|
332 |
|
// First
remove th
e session
that we kn
ow has exp
ired / bee
n logged
|
|
332 |
|
// First
remove th
e session
that we kn
ow has exp
ired / bee
n logged
|
| 333 |
|
// out s
ince it ha
s already
been remov
ed from it
s Manager
and, if
|
|
333 |
|
// out s
ince it ha
s already
been remov
ed from it
s Manager
and, if
|
|
333 |
|
// out s
ince it ha
s already
been remov
ed from it
s Manager
and, if
|
| 334 |
|
// we do
n't remove
it first,
deregiste
r() will l
og a warni
ng that it
|
|
334 |
|
// we do
n't remove
it first,
deregiste
r() will l
og a warni
ng that it
|
|
334 |
|
// we do
n't remove
it first,
deregiste
r() will l
og a warni
ng that it
|
| 335 |
|
// can't
be found
|
|
335 |
|
// can't
be found
|
|
335 |
|
// can't
be found
|
| 336 |
|
removeSe
ssion(ssoI
d, session
);
|
|
336 |
|
removeSe
ssion(ssoI
d, session
);
|
|
336 |
|
removeSe
ssion(ssoI
d, session
);
|
| 337 |
|
// If th
e SSO sess
ion was on
ly associa
ted with o
ne web app
the call
|
|
337 |
|
// If th
e SSO sess
ion was on
ly associa
ted with o
ne web app
the call
|
|
337 |
|
// If th
e SSO sess
ion was on
ly associa
ted with o
ne web app
the call
|
| 338 |
|
// above
will have
removed t
he SSO ses
sion from
the cache
|
|
338 |
|
// above
will have
removed t
he SSO ses
sion from
the cache
|
|
338 |
|
// above
will have
removed t
he SSO ses
sion from
the cache
|
| 339 |
|
if (cach
e.contains
Key(ssoId)
) {
|
|
339 |
|
if (cach
e.contains
Key(ssoId)
) {
|
|
339 |
|
if (cach
e.contains
Key(ssoId)
) {
|
| 340 |
|
dere
gister(sso
Id);
|
|
340 |
|
dere
gister(sso
Id);
|
|
340 |
|
dere
gister(sso
Id);
|
| 341 |
|
}
|
|
341 |
|
}
|
|
341 |
|
}
|
| 342 |
|
}
|
|
342 |
|
}
|
|
342 |
|
}
|
| 343 |
|
}
|
|
343 |
|
}
|
|
343 |
|
}
|
| 344 |
|
|
|
344 |
|
|
|
344 |
|
|
| 345 |
|
|
|
345 |
|
|
|
345 |
|
|
| 346 |
|
/**
|
|
346 |
|
/**
|
|
346 |
|
/**
|
| 347 |
|
* Ass
ociate the
specified
single si
gn on iden
tifier wit
h the
|
|
347 |
|
* Ass
ociate the
specified
single si
gn on iden
tifier wit
h the
|
|
347 |
|
* Ass
ociate the
specified
single si
gn on iden
tifier wit
h the
|
| 348 |
|
* spe
cified Ses
sion.
|
|
348 |
|
* spe
cified Ses
sion.
|
|
348 |
|
* spe
cified Ses
sion.
|
| 349 |
|
*
|
|
349 |
|
*
|
|
349 |
|
*
|
| 350 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier
|
|
350 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier
|
|
350 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier
|
| 351 |
|
* @pa
ram sessio
n Session
to be asso
ciated
|
|
351 |
|
* @pa
ram sessio
n Session
to be asso
ciated
|
|
351 |
|
* @pa
ram sessio
n Session
to be asso
ciated
|
| 352 |
|
*
|
|
352 |
|
*
|
|
352 |
|
*
|
| 353 |
|
* @re
turn <code
>true</cod
e> if the
session wa
s associat
ed to the
given SSO
|
|
353 |
|
* @re
turn <code
>true</cod
e> if the
session wa
s associat
ed to the
given SSO
|
|
353 |
|
* @re
turn <code
>true</cod
e> if the
session wa
s associat
ed to the
given SSO
|
| 354 |
|
*
sessi
on, otherw
ise <code>
false</cod
e>
|
|
354 |
|
*
sessi
on, otherw
ise <code>
false</cod
e>
|
|
354 |
|
*
sessi
on, otherw
ise <code>
false</cod
e>
|
| 355 |
|
*/
|
|
355 |
|
*/
|
|
355 |
|
*/
|
| 356 |
|
protec
ted boolea
n associat
e(String s
soId, Sess
ion sessio
n) {
|
|
356 |
|
protec
ted boolea
n associat
e(String s
soId, Sess
ion sessio
n) {
|
|
356 |
|
protec
ted boolea
n associat
e(String s
soId, Sess
ion sessio
n) {
|
| 357 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
|
357 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
|
357 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
| 358 |
|
if
(sso == n
ull) {
|
|
358 |
|
if
(sso == n
ull) {
|
|
358 |
|
if
(sso == n
ull) {
|
| 359 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
359 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
359 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 360 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociateFai
l",
|
|
360 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociateFai
l",
|
|
360 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociateFai
l",
|
| 361 |
|
ssoId,
session))
;
|
|
361 |
|
ssoId,
session))
;
|
|
361 |
|
ssoId,
session))
;
|
| 362 |
|
}
|
|
362 |
|
}
|
|
362 |
|
}
|
| 363 |
|
return f
alse;
|
|
363 |
|
return f
alse;
|
|
363 |
|
return f
alse;
|
| 364 |
|
}
else {
|
|
364 |
|
}
else {
|
|
364 |
|
}
else {
|
| 365 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
365 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
365 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 366 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociate",
|
|
366 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociate",
|
|
366 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.as
sociate",
|
| 367 |
|
ssoId,
session))
;
|
|
367 |
|
ssoId,
session))
;
|
|
367 |
|
ssoId,
session))
;
|
| 368 |
|
}
|
|
368 |
|
}
|
|
368 |
|
}
|
| 369 |
|
sso.addS
ession(thi
s, ssoId,
session);
|
|
369 |
|
sso.addS
ession(thi
s, ssoId,
session);
|
|
369 |
|
sso.addS
ession(thi
s, ssoId,
session);
|
| 370 |
|
return t
rue;
|
|
370 |
|
return t
rue;
|
|
370 |
|
return t
rue;
|
| 371 |
|
}
|
|
371 |
|
}
|
|
371 |
|
}
|
| 372 |
|
}
|
|
372 |
|
}
|
|
372 |
|
}
|
| 373 |
|
|
|
373 |
|
|
|
373 |
|
|
| 374 |
|
|
|
374 |
|
|
|
374 |
|
|
| 375 |
|
/**
|
|
375 |
|
/**
|
|
375 |
|
/**
|
| 376 |
|
* Der
egister th
e specifie
d single s
ign on ide
ntifier, a
nd invalid
ate
|
|
376 |
|
* Der
egister th
e specifie
d single s
ign on ide
ntifier, a
nd invalid
ate
|
|
376 |
|
* Der
egister th
e specifie
d single s
ign on ide
ntifier, a
nd invalid
ate
|
| 377 |
|
* any
associate
d sessions
.
|
|
377 |
|
* any
associate
d sessions
.
|
|
377 |
|
* any
associate
d sessions
.
|
| 378 |
|
*
|
|
378 |
|
*
|
|
378 |
|
*
|
| 379 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to d
eregister
|
|
379 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to d
eregister
|
|
379 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to d
eregister
|
| 380 |
|
*/
|
|
380 |
|
*/
|
|
380 |
|
*/
|
| 381 |
|
protec
ted void d
eregister(
String sso
Id) {
|
|
381 |
|
protec
ted void d
eregister(
String sso
Id) {
|
|
381 |
|
protec
ted void d
eregister(
String sso
Id) {
|
| 382 |
|
|
|
382 |
|
|
|
382 |
|
|
| 383 |
|
//
Look up a
nd remove
the corres
ponding Si
ngleSignOn
Entry
|
|
383 |
|
//
Look up a
nd remove
the corres
ponding Si
ngleSignOn
Entry
|
|
383 |
|
//
Look up a
nd remove
the corres
ponding Si
ngleSignOn
Entry
|
| 384 |
|
Si
ngleSignOn
Entry sso
= cache.re
move(ssoId
);
|
|
384 |
|
Si
ngleSignOn
Entry sso
= cache.re
move(ssoId
);
|
|
384 |
|
Si
ngleSignOn
Entry sso
= cache.re
move(ssoId
);
|
| 385 |
|
|
|
385 |
|
|
|
385 |
|
|
| 386 |
|
if
(sso == n
ull) {
|
|
386 |
|
if
(sso == n
ull) {
|
|
386 |
|
if
(sso == n
ull) {
|
| 387 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
387 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
387 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 388 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerFa
il", ssoId
));
|
|
388 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerFa
il", ssoId
));
|
|
388 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerFa
il", ssoId
));
|
| 389 |
|
}
|
|
389 |
|
}
|
|
389 |
|
}
|
| 390 |
|
return;
|
|
390 |
|
return;
|
|
390 |
|
return;
|
| 391 |
|
}
|
|
391 |
|
}
|
|
391 |
|
}
|
| 392 |
|
|
|
392 |
|
|
|
392 |
|
|
| 393 |
|
//
Expire an
y associat
ed session
s
|
|
393 |
|
//
Expire an
y associat
ed session
s
|
|
393 |
|
//
Expire an
y associat
ed session
s
|
| 394 |
|
Se
t<SingleSi
gnOnSessio
nKey> ssoK
eys = sso.
findSessio
ns();
|
|
394 |
|
Se
t<SingleSi
gnOnSessio
nKey> ssoK
eys = sso.
findSessio
ns();
|
|
394 |
|
Se
t<SingleSi
gnOnSessio
nKey> ssoK
eys = sso.
findSessio
ns();
|
| 395 |
|
if
(ssoKeys.
size() ==
0) {
|
|
395 |
|
if
(ssoKeys.
size() ==
0) {
|
|
395 |
|
if
(ssoKeys.
size() ==
0) {
|
| 396 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
396 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
396 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 397 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerNo
ne", ssoId
));
|
|
397 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerNo
ne", ssoId
));
|
|
397 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
registerNo
ne", ssoId
));
|
| 398 |
|
}
|
|
398 |
|
}
|
|
398 |
|
}
|
| 399 |
|
}
|
|
399 |
|
}
|
|
399 |
|
}
|
| 400 |
|
fo
r (SingleS
ignOnSessi
onKey ssoK
ey : ssoKe
ys) {
|
|
400 |
|
fo
r (SingleS
ignOnSessi
onKey ssoK
ey : ssoKe
ys) {
|
|
400 |
|
fo
r (SingleS
ignOnSessi
onKey ssoK
ey : ssoKe
ys) {
|
| 401 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
401 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
401 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 402 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
register",
ssoKey, s
soId));
|
|
402 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
register",
ssoKey, s
soId));
|
|
402 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.de
register",
ssoKey, s
soId));
|
| 403 |
|
}
|
|
403 |
|
}
|
|
403 |
|
}
|
| 404 |
|
// Inval
idate this
session
|
|
404 |
|
// Inval
idate this
session
|
|
404 |
|
// Inval
idate this
session
|
| 405 |
|
expire(s
soKey);
|
|
405 |
|
expire(s
soKey);
|
|
405 |
|
expire(s
soKey);
|
| 406 |
|
}
|
|
406 |
|
}
|
|
406 |
|
}
|
| 407 |
|
|
|
407 |
|
|
|
407 |
|
|
| 408 |
|
//
NOTE: Cl
ients may
still poss
ess the ol
d single s
ign on coo
kie,
|
|
408 |
|
//
NOTE: Cl
ients may
still poss
ess the ol
d single s
ign on coo
kie,
|
|
408 |
|
//
NOTE: Cl
ients may
still poss
ess the ol
d single s
ign on coo
kie,
|
| 409 |
|
//
but it wi
ll be remo
ved on the
next requ
est since
it is no l
onger
|
|
409 |
|
//
but it wi
ll be remo
ved on the
next requ
est since
it is no l
onger
|
|
409 |
|
//
but it wi
ll be remo
ved on the
next requ
est since
it is no l
onger
|
| 410 |
|
//
in the ca
che
|
|
410 |
|
//
in the ca
che
|
|
410 |
|
//
in the ca
che
|
| 411 |
|
}
|
|
411 |
|
}
|
|
411 |
|
}
|
| 412 |
|
|
|
412 |
|
|
|
412 |
|
|
| 413 |
|
|
|
413 |
|
|
|
413 |
|
|
| 414 |
|
privat
e void exp
ire(Single
SignOnSess
ionKey key
) {
|
|
414 |
|
privat
e void exp
ire(Single
SignOnSess
ionKey key
) {
|
|
414 |
|
privat
e void exp
ire(Single
SignOnSess
ionKey key
) {
|
| 415 |
|
if
(engine =
= null) {
|
|
415 |
|
if
(engine =
= null) {
|
|
415 |
|
if
(engine =
= null) {
|
| 416 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.engineNul
l", key));
|
|
416 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.engineNul
l", key));
|
|
416 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.engineNul
l", key));
|
| 417 |
|
return;
|
|
417 |
|
return;
|
|
417 |
|
return;
|
| 418 |
|
}
|
|
418 |
|
}
|
|
418 |
|
}
|
| 419 |
|
Co
ntainer ho
st = engin
e.findChil
d(key.getH
ostName())
;
|
|
419 |
|
Co
ntainer ho
st = engin
e.findChil
d(key.getH
ostName())
;
|
|
419 |
|
Co
ntainer ho
st = engin
e.findChil
d(key.getH
ostName())
;
|
| 420 |
|
if
(host ==
null) {
|
|
420 |
|
if
(host ==
null) {
|
|
420 |
|
if
(host ==
null) {
|
| 421 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.hostNotFo
und", key)
);
|
|
421 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.hostNotFo
und", key)
);
|
|
421 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.hostNotFo
und", key)
);
|
| 422 |
|
return;
|
|
422 |
|
return;
|
|
422 |
|
return;
|
| 423 |
|
}
|
|
423 |
|
}
|
|
423 |
|
}
|
| 424 |
|
Co
ntext cont
ext = (Con
text) host
.findChild
(key.getCo
ntextName(
));
|
|
424 |
|
Co
ntext cont
ext = (Con
text) host
.findChild
(key.getCo
ntextName(
));
|
|
424 |
|
Co
ntext cont
ext = (Con
text) host
.findChild
(key.getCo
ntextName(
));
|
| 425 |
|
if
(context
== null) {
|
|
425 |
|
if
(context
== null) {
|
|
425 |
|
if
(context
== null) {
|
| 426 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.contextNo
tFound", k
ey));
|
|
426 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.contextNo
tFound", k
ey));
|
|
426 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.contextNo
tFound", k
ey));
|
| 427 |
|
return;
|
|
427 |
|
return;
|
|
427 |
|
return;
|
| 428 |
|
}
|
|
428 |
|
}
|
|
428 |
|
}
|
| 429 |
|
Ma
nager mana
ger = cont
ext.getMan
ager();
|
|
429 |
|
Ma
nager mana
ger = cont
ext.getMan
ager();
|
|
429 |
|
Ma
nager mana
ger = cont
ext.getMan
ager();
|
| 430 |
|
if
(manager
== null) {
|
|
430 |
|
if
(manager
== null) {
|
|
430 |
|
if
(manager
== null) {
|
| 431 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerNo
tFound", k
ey));
|
|
431 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerNo
tFound", k
ey));
|
|
431 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerNo
tFound", k
ey));
|
| 432 |
|
return;
|
|
432 |
|
return;
|
|
432 |
|
return;
|
| 433 |
|
}
|
|
433 |
|
}
|
|
433 |
|
}
|
| 434 |
|
Se
ssion sess
ion = null
;
|
|
434 |
|
Se
ssion sess
ion = null
;
|
|
434 |
|
Se
ssion sess
ion = null
;
|
| 435 |
|
tr
y {
|
|
435 |
|
tr
y {
|
|
435 |
|
tr
y {
|
| 436 |
|
session
= manager.
findSessio
n(key.getS
essionId()
);
|
|
436 |
|
session
= manager.
findSessio
n(key.getS
essionId()
);
|
|
436 |
|
session
= manager.
findSessio
n(key.getS
essionId()
);
|
| 437 |
|
}
catch (IOE
xception e
) {
|
|
437 |
|
}
catch (IOE
xception e
) {
|
|
437 |
|
}
catch (IOE
xception e
) {
|
| 438 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerEr
ror", key)
, e);
|
|
438 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerEr
ror", key)
, e);
|
|
438 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.managerEr
ror", key)
, e);
|
| 439 |
|
return;
|
|
439 |
|
return;
|
|
439 |
|
return;
|
| 440 |
|
}
|
|
440 |
|
}
|
|
440 |
|
}
|
| 441 |
|
if
(session
== null) {
|
|
441 |
|
if
(session
== null) {
|
|
441 |
|
if
(session
== null) {
|
| 442 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.sessionNo
tFound", k
ey));
|
|
442 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.sessionNo
tFound", k
ey));
|
|
442 |
|
containe
rLog.warn(
sm.getStri
ng("single
SignOn.ses
sionExpire
.sessionNo
tFound", k
ey));
|
| 443 |
|
return;
|
|
443 |
|
return;
|
|
443 |
|
return;
|
| 444 |
|
}
|
|
444 |
|
}
|
|
444 |
|
}
|
| 445 |
|
se
ssion.expi
re();
|
|
445 |
|
se
ssion.expi
re();
|
|
445 |
|
se
ssion.expi
re();
|
| 446 |
|
}
|
|
446 |
|
}
|
|
446 |
|
}
|
| 447 |
|
|
|
447 |
|
|
|
447 |
|
|
| 448 |
|
|
|
448 |
|
|
|
448 |
|
|
| 449 |
|
/**
|
|
449 |
|
/**
|
|
449 |
|
/**
|
| 450 |
|
* Att
empts reau
thenticati
on to the
given <cod
e>Realm</c
ode> using
|
|
450 |
|
* Att
empts reau
thenticati
on to the
given <cod
e>Realm</c
ode> using
|
|
450 |
|
* Att
empts reau
thenticati
on to the
given <cod
e>Realm</c
ode> using
|
| 451 |
|
* the
credentia
ls associa
ted with t
he single
sign-on se
ssion
|
|
451 |
|
* the
credentia
ls associa
ted with t
he single
sign-on se
ssion
|
|
451 |
|
* the
credentia
ls associa
ted with t
he single
sign-on se
ssion
|
| 452 |
|
* ide
ntified by
argument
<code>ssoI
d</code>.
|
|
452 |
|
* ide
ntified by
argument
<code>ssoI
d</code>.
|
|
452 |
|
* ide
ntified by
argument
<code>ssoI
d</code>.
|
| 453 |
|
* <p>
|
|
453 |
|
* <p>
|
|
453 |
|
* <p>
|
| 454 |
|
* If
reauthenti
cation is
successful
, the <cod
e>Principa
l</code> a
nd
|
|
454 |
|
* If
reauthenti
cation is
successful
, the <cod
e>Principa
l</code> a
nd
|
|
454 |
|
* If
reauthenti
cation is
successful
, the <cod
e>Principa
l</code> a
nd
|
| 455 |
|
* aut
horization
type asso
ciated wit
h the SSO
session wi
ll be boun
d
|
|
455 |
|
* aut
horization
type asso
ciated wit
h the SSO
session wi
ll be boun
d
|
|
455 |
|
* aut
horization
type asso
ciated wit
h the SSO
session wi
ll be boun
d
|
| 456 |
|
* to
the given
<code>Requ
est</code>
object vi
a calls to
|
|
456 |
|
* to
the given
<code>Requ
est</code>
object vi
a calls to
|
|
456 |
|
* to
the given
<code>Requ
est</code>
object vi
a calls to
|
| 457 |
|
* {@l
ink Reques
t#setAuthT
ype Reques
t.setAuthT
ype()} and
|
|
457 |
|
* {@l
ink Reques
t#setAuthT
ype Reques
t.setAuthT
ype()} and
|
|
457 |
|
* {@l
ink Reques
t#setAuthT
ype Reques
t.setAuthT
ype()} and
|
| 458 |
|
* {@l
ink Reques
t#setUserP
rincipal R
equest.set
UserPrinci
pal()}
|
|
458 |
|
* {@l
ink Reques
t#setUserP
rincipal R
equest.set
UserPrinci
pal()}
|
|
458 |
|
* {@l
ink Reques
t#setUserP
rincipal R
equest.set
UserPrinci
pal()}
|
| 459 |
|
* </p
>
|
|
459 |
|
* </p
>
|
|
459 |
|
* </p
>
|
| 460 |
|
*
|
|
460 |
|
*
|
|
460 |
|
*
|
| 461 |
|
* @pa
ram ssoId
identi
fier of Si
ngleSignOn
session w
ith which
the
|
|
461 |
|
* @pa
ram ssoId
identi
fier of Si
ngleSignOn
session w
ith which
the
|
|
461 |
|
* @pa
ram ssoId
identi
fier of Si
ngleSignOn
session w
ith which
the
|
| 462 |
|
*
caller
is associ
ated
|
|
462 |
|
*
caller
is associ
ated
|
|
462 |
|
*
caller
is associ
ated
|
| 463 |
|
* @pa
ram realm
Realm
implementa
tion again
st which t
he caller
is to
|
|
463 |
|
* @pa
ram realm
Realm
implementa
tion again
st which t
he caller
is to
|
|
463 |
|
* @pa
ram realm
Realm
implementa
tion again
st which t
he caller
is to
|
| 464 |
|
*
be aut
henticated
|
|
464 |
|
*
be aut
henticated
|
|
464 |
|
*
be aut
henticated
|
| 465 |
|
* @pa
ram reques
t the re
quest that
needs to
be authent
icated
|
|
465 |
|
* @pa
ram reques
t the re
quest that
needs to
be authent
icated
|
|
465 |
|
* @pa
ram reques
t the re
quest that
needs to
be authent
icated
|
| 466 |
|
*
|
|
466 |
|
*
|
|
466 |
|
*
|
| 467 |
|
* @re
turn <cod
e>true</co
de> if rea
uthenticat
ion was su
ccessful,
|
|
467 |
|
* @re
turn <cod
e>true</co
de> if rea
uthenticat
ion was su
ccessful,
|
|
467 |
|
* @re
turn <cod
e>true</co
de> if rea
uthenticat
ion was su
ccessful,
|
| 468 |
|
*
<cod
e>false</c
ode> other
wise.
|
|
468 |
|
*
<cod
e>false</c
ode> other
wise.
|
|
468 |
|
*
<cod
e>false</c
ode> other
wise.
|
| 469 |
|
*/
|
|
469 |
|
*/
|
|
469 |
|
*/
|
| 470 |
|
protec
ted boolea
n reauthen
ticate(Str
ing ssoId,
Realm rea
lm,
|
|
470 |
|
protec
ted boolea
n reauthen
ticate(Str
ing ssoId,
Realm rea
lm,
|
|
470 |
|
protec
ted boolea
n reauthen
ticate(Str
ing ssoId,
Realm rea
lm,
|
| 471 |
|
Req
uest reque
st) {
|
|
471 |
|
Req
uest reque
st) {
|
|
471 |
|
Req
uest reque
st) {
|
| 472 |
|
|
|
472 |
|
|
|
472 |
|
|
| 473 |
|
if
(ssoId ==
null || r
ealm == nu
ll) {
|
|
473 |
|
if
(ssoId ==
null || r
ealm == nu
ll) {
|
|
473 |
|
if
(ssoId ==
null || r
ealm == nu
ll) {
|
| 474 |
|
return f
alse;
|
|
474 |
|
return f
alse;
|
|
474 |
|
return f
alse;
|
| 475 |
|
}
|
|
475 |
|
}
|
|
475 |
|
}
|
| 476 |
|
|
|
476 |
|
|
|
476 |
|
|
| 477 |
|
bo
olean reau
thenticate
d = false;
|
|
477 |
|
bo
olean reau
thenticate
d = false;
|
|
477 |
|
bo
olean reau
thenticate
d = false;
|
| 478 |
|
|
|
478 |
|
|
|
478 |
|
|
| 479 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
|
479 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
|
479 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
| 480 |
|
if
(entry !=
null && e
ntry.getCa
nReauthent
icate()) {
|
|
480 |
|
if
(entry !=
null && e
ntry.getCa
nReauthent
icate()) {
|
|
480 |
|
if
(entry !=
null && e
ntry.getCa
nReauthent
icate()) {
|
| 481 |
|
|
|
481 |
|
|
|
481 |
|
|
| 482 |
|
String u
sername =
entry.getU
sername();
|
|
482 |
|
String u
sername =
entry.getU
sername();
|
|
482 |
|
String u
sername =
entry.getU
sername();
|
| 483 |
|
if (user
name != nu
ll) {
|
|
483 |
|
if (user
name != nu
ll) {
|
|
483 |
|
if (user
name != nu
ll) {
|
| 484 |
|
Prin
cipal reau
thPrincipa
l =
|
|
484 |
|
Prin
cipal reau
thPrincipa
l =
|
|
484 |
|
Prin
cipal reau
thPrincipa
l =
|
| 485 |
|
realm.
authentica
te(usernam
e, entry.g
etPassword
());
|
|
485 |
|
realm.
authentica
te(usernam
e, entry.g
etPassword
());
|
|
485 |
|
realm.
authentica
te(usernam
e, entry.g
etPassword
());
|
| 486 |
|
if (
reauthPrin
cipal != n
ull) {
|
|
486 |
|
if (
reauthPrin
cipal != n
ull) {
|
|
486 |
|
if (
reauthPrin
cipal != n
ull) {
|
| 487 |
|
reauthenti
cated = tr
ue;
|
|
487 |
|
reauthenti
cated = tr
ue;
|
|
487 |
|
reauthenti
cated = tr
ue;
|
| 488 |
|
// Bind th
e authoriz
ation cred
entials to
the reque
st
|
|
488 |
|
// Bind th
e authoriz
ation cred
entials to
the reque
st
|
|
488 |
|
// Bind th
e authoriz
ation cred
entials to
the reque
st
|
| 489 |
|
request.se
tAuthType(
entry.getA
uthType())
;
|
|
489 |
|
request.se
tAuthType(
entry.getA
uthType())
;
|
|
489 |
|
request.se
tAuthType(
entry.getA
uthType())
;
|
| 490 |
|
request.se
tUserPrinc
ipal(reaut
hPrincipal
);
|
|
490 |
|
request.se
tUserPrinc
ipal(reaut
hPrincipal
);
|
|
490 |
|
request.se
tUserPrinc
ipal(reaut
hPrincipal
);
|
| 491 |
|
}
|
|
491 |
|
}
|
|
491 |
|
}
|
| 492 |
|
}
|
|
492 |
|
}
|
|
492 |
|
}
|
| 493 |
|
}
|
|
493 |
|
}
|
|
493 |
|
}
|
| 494 |
|
|
|
494 |
|
|
|
494 |
|
|
| 495 |
|
re
turn reaut
henticated
;
|
|
495 |
|
re
turn reaut
henticated
;
|
|
495 |
|
re
turn reaut
henticated
;
|
| 496 |
|
}
|
|
496 |
|
}
|
|
496 |
|
}
|
| 497 |
|
|
|
497 |
|
|
|
497 |
|
|
| 498 |
|
|
|
498 |
|
|
|
498 |
|
|
| 499 |
|
/**
|
|
499 |
|
/**
|
|
499 |
|
/**
|
| 500 |
|
* Reg
ister the
specified
Principal
as being a
ssociated
with the s
pecified
|
|
500 |
|
* Reg
ister the
specified
Principal
as being a
ssociated
with the s
pecified
|
|
500 |
|
* Reg
ister the
specified
Principal
as being a
ssociated
with the s
pecified
|
| 501 |
|
* val
ue for the
single si
gn on iden
tifier.
|
|
501 |
|
* val
ue for the
single si
gn on iden
tifier.
|
|
501 |
|
* val
ue for the
single si
gn on iden
tifier.
|
| 502 |
|
*
|
|
502 |
|
*
|
|
502 |
|
*
|
| 503 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to r
egister
|
|
503 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to r
egister
|
|
503 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier to r
egister
|
| 504 |
|
* @pa
ram princi
pal Associ
ated user
principal
that is id
entified
|
|
504 |
|
* @pa
ram princi
pal Associ
ated user
principal
that is id
entified
|
|
504 |
|
* @pa
ram princi
pal Associ
ated user
principal
that is id
entified
|
| 505 |
|
* @pa
ram authTy
pe Authent
ication ty
pe used to
authentic
ate this
|
|
505 |
|
* @pa
ram authTy
pe Authent
ication ty
pe used to
authentic
ate this
|
|
505 |
|
* @pa
ram authTy
pe Authent
ication ty
pe used to
authentic
ate this
|
| 506 |
|
* us
er princip
al
|
|
506 |
|
* us
er princip
al
|
|
506 |
|
* us
er princip
al
|
| 507 |
|
* @pa
ram userna
me Usernam
e used to
authentica
te this us
er
|
|
507 |
|
* @pa
ram userna
me Usernam
e used to
authentica
te this us
er
|
|
507 |
|
* @pa
ram userna
me Usernam
e used to
authentica
te this us
er
|
| 508 |
|
* @pa
ram passwo
rd Passwor
d used to
authentica
te this us
er
|
|
508 |
|
* @pa
ram passwo
rd Passwor
d used to
authentica
te this us
er
|
|
508 |
|
* @pa
ram passwo
rd Passwor
d used to
authentica
te this us
er
|
| 509 |
|
*/
|
|
509 |
|
*/
|
|
509 |
|
*/
|
| 510 |
|
protec
ted void r
egister(St
ring ssoId
, Principa
l principa
l, String
authType,
|
|
510 |
|
protec
ted void r
egister(St
ring ssoId
, Principa
l principa
l, String
authType,
|
|
510 |
|
protec
ted void r
egister(St
ring ssoId
, Principa
l principa
l, String
authType,
|
| 511 |
|
St
ring usern
ame, Strin
g password
) {
|
|
511 |
|
St
ring usern
ame, Strin
g password
) {
|
|
511 |
|
St
ring usern
ame, Strin
g password
) {
|
| 512 |
|
|
|
512 |
|
|
|
512 |
|
|
| 513 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
513 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
513 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
| 514 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.regist
er", ssoId
,
|
|
514 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.regist
er", ssoId
,
|
|
514 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.regist
er", ssoId
,
|
| 515 |
|
principal
!= null ?
principal.
getName()
: "", auth
Type));
|
|
515 |
|
principal
!= null ?
principal.
getName()
: "", auth
Type));
|
|
515 |
|
principal
!= null ?
principal.
getName()
: "", auth
Type));
|
| 516 |
|
}
|
|
516 |
|
}
|
|
516 |
|
}
|
| 517 |
|
|
|
517 |
|
|
|
517 |
|
|
| 518 |
|
ca
che.put(ss
oId, new S
ingleSignO
nEntry(pri
ncipal, au
thType, us
ername, pa
ssword));
|
|
518 |
|
ca
che.put(ss
oId, new S
ingleSignO
nEntry(pri
ncipal, au
thType, us
ername, pa
ssword));
|
|
518 |
|
ca
che.put(ss
oId, new S
ingleSignO
nEntry(pri
ncipal, au
thType, us
ername, pa
ssword));
|
| 519 |
|
}
|
|
519 |
|
}
|
|
519 |
|
}
|
| 520 |
|
|
|
520 |
|
|
|
520 |
|
|
| 521 |
|
|
|
521 |
|
|
|
521 |
|
|
| 522 |
|
/**
|
|
522 |
|
/**
|
|
522 |
|
/**
|
| 523 |
|
* Upd
ates any <
code>Singl
eSignOnEnt
ry</code>
found unde
r key
|
|
523 |
|
* Upd
ates any <
code>Singl
eSignOnEnt
ry</code>
found unde
r key
|
|
523 |
|
* Upd
ates any <
code>Singl
eSignOnEnt
ry</code>
found unde
r key
|
| 524 |
|
* <co
de>ssoId</
code> with
the given
authentic
ation data
.
|
|
524 |
|
* <co
de>ssoId</
code> with
the given
authentic
ation data
.
|
|
524 |
|
* <co
de>ssoId</
code> with
the given
authentic
ation data
.
|
| 525 |
|
* <p>
|
|
525 |
|
* <p>
|
|
525 |
|
* <p>
|
| 526 |
|
* The
purpose o
f this met
hod is to
allow an S
SO entry t
hat was
|
|
526 |
|
* The
purpose o
f this met
hod is to
allow an S
SO entry t
hat was
|
|
526 |
|
* The
purpose o
f this met
hod is to
allow an S
SO entry t
hat was
|
| 527 |
|
* est
ablished w
ithout a u
sername/pa
ssword com
bination (
i.e. estab
lished
|
|
527 |
|
* est
ablished w
ithout a u
sername/pa
ssword com
bination (
i.e. estab
lished
|
|
527 |
|
* est
ablished w
ithout a u
sername/pa
ssword com
bination (
i.e. estab
lished
|
| 528 |
|
* fol
lowing DIG
EST or CLI
ENT_CERT a
uthenticat
ion) to be
updated w
ith
|
|
528 |
|
* fol
lowing DIG
EST or CLI
ENT_CERT a
uthenticat
ion) to be
updated w
ith
|
|
528 |
|
* fol
lowing DIG
EST or CLI
ENT_CERT a
uthenticat
ion) to be
updated w
ith
|
| 529 |
|
* a u
sername an
d password
if one be
comes avai
lable thro
ugh a subs
equent
|
|
529 |
|
* a u
sername an
d password
if one be
comes avai
lable thro
ugh a subs
equent
|
|
529 |
|
* a u
sername an
d password
if one be
comes avai
lable thro
ugh a subs
equent
|
| 530 |
|
* BAS
IC or FORM
authentic
ation. Th
e SSO entr
y will the
n be usabl
e for
|
|
530 |
|
* BAS
IC or FORM
authentic
ation. Th
e SSO entr
y will the
n be usabl
e for
|
|
530 |
|
* BAS
IC or FORM
authentic
ation. Th
e SSO entr
y will the
n be usabl
e for
|
| 531 |
|
* rea
uthenticat
ion.
|
|
531 |
|
* rea
uthenticat
ion.
|
|
531 |
|
* rea
uthenticat
ion.
|
| 532 |
|
* <p>
|
|
532 |
|
* <p>
|
|
532 |
|
* <p>
|
| 533 |
|
* <b>
NOTE:</b>
Only updat
es the SSO
entry if
a call to
|
|
533 |
|
* <b>
NOTE:</b>
Only updat
es the SSO
entry if
a call to
|
|
533 |
|
* <b>
NOTE:</b>
Only updat
es the SSO
entry if
a call to
|
| 534 |
|
* <co
de>SingleS
ignOnEntry
.getCanRea
uthenticat
e()</code>
returns
|
|
534 |
|
* <co
de>SingleS
ignOnEntry
.getCanRea
uthenticat
e()</code>
returns
|
|
534 |
|
* <co
de>SingleS
ignOnEntry
.getCanRea
uthenticat
e()</code>
returns
|
| 535 |
|
* <co
de>false</
code>; oth
erwise, it
is assume
d that the
SSO entry
already
|
|
535 |
|
* <co
de>false</
code>; oth
erwise, it
is assume
d that the
SSO entry
already
|
|
535 |
|
* <co
de>false</
code>; oth
erwise, it
is assume
d that the
SSO entry
already
|
| 536 |
|
* has
sufficien
t informat
ion to all
ow reauthe
ntication
and that n
o update
|
|
536 |
|
* has
sufficien
t informat
ion to all
ow reauthe
ntication
and that n
o update
|
|
536 |
|
* has
sufficien
t informat
ion to all
ow reauthe
ntication
and that n
o update
|
| 537 |
|
* is
needed.
|
|
537 |
|
* is
needed.
|
|
537 |
|
* is
needed.
|
| 538 |
|
*
|
|
538 |
|
*
|
|
538 |
|
*
|
| 539 |
|
* @pa
ram ssoId
identi
fier of Si
ngle sign
to be upda
ted
|
|
539 |
|
* @pa
ram ssoId
identi
fier of Si
ngle sign
to be upda
ted
|
|
539 |
|
* @pa
ram ssoId
identi
fier of Si
ngle sign
to be upda
ted
|
| 540 |
|
* @pa
ram princi
pal the <c
ode>Princi
pal</code>
returned
by the lat
est
|
|
540 |
|
* @pa
ram princi
pal the <c
ode>Princi
pal</code>
returned
by the lat
est
|
|
540 |
|
* @pa
ram princi
pal the <c
ode>Princi
pal</code>
returned
by the lat
est
|
| 541 |
|
*
call t
o <code>Re
alm.authen
ticate</co
de>.
|
|
541 |
|
*
call t
o <code>Re
alm.authen
ticate</co
de>.
|
|
541 |
|
*
call t
o <code>Re
alm.authen
ticate</co
de>.
|
| 542 |
|
* @pa
ram authTy
pe the ty
pe of auth
enticator
used (BASI
C, CLIENT_
CERT,
|
|
542 |
|
* @pa
ram authTy
pe the ty
pe of auth
enticator
used (BASI
C, CLIENT_
CERT,
|
|
542 |
|
* @pa
ram authTy
pe the ty
pe of auth
enticator
used (BASI
C, CLIENT_
CERT,
|
| 543 |
|
*
DIGEST
or FORM)
|
|
543 |
|
*
DIGEST
or FORM)
|
|
543 |
|
*
DIGEST
or FORM)
|
| 544 |
|
* @pa
ram userna
me the us
ername (if
any) used
for the a
uthenticat
ion
|
|
544 |
|
* @pa
ram userna
me the us
ername (if
any) used
for the a
uthenticat
ion
|
|
544 |
|
* @pa
ram userna
me the us
ername (if
any) used
for the a
uthenticat
ion
|
| 545 |
|
* @pa
ram passwo
rd the pa
ssword (if
any) used
for the a
uthenticat
ion
|
|
545 |
|
* @pa
ram passwo
rd the pa
ssword (if
any) used
for the a
uthenticat
ion
|
|
545 |
|
* @pa
ram passwo
rd the pa
ssword (if
any) used
for the a
uthenticat
ion
|
| 546 |
|
*
|
|
546 |
|
*
|
|
546 |
|
*
|
| 547 |
|
* @re
turn <code
>true</cod
e> if the
credential
s were upd
ated, othe
rwise
|
|
547 |
|
* @re
turn <code
>true</cod
e> if the
credential
s were upd
ated, othe
rwise
|
|
547 |
|
* @re
turn <code
>true</cod
e> if the
credential
s were upd
ated, othe
rwise
|
| 548 |
|
*
<code
>false</co
de>
|
|
548 |
|
*
<code
>false</co
de>
|
|
548 |
|
*
<code
>false</co
de>
|
| 549 |
|
*/
|
|
549 |
|
*/
|
|
549 |
|
*/
|
| 550 |
|
protec
ted boolea
n update(S
tring ssoI
d, Princip
al princip
al, String
authType,
|
|
550 |
|
protec
ted boolea
n update(S
tring ssoI
d, Princip
al princip
al, String
authType,
|
|
550 |
|
protec
ted boolea
n update(S
tring ssoI
d, Princip
al princip
al, String
authType,
|
| 551 |
|
Stri
ng usernam
e, String
password)
{
|
|
551 |
|
Stri
ng usernam
e, String
password)
{
|
|
551 |
|
Stri
ng usernam
e, String
password)
{
|
| 552 |
|
|
|
552 |
|
|
|
552 |
|
|
| 553 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
|
553 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
|
553 |
|
Si
ngleSignOn
Entry sso
= cache.ge
t(ssoId);
|
| 554 |
|
if
(sso != n
ull && !ss
o.getCanRe
authentica
te()) {
|
|
554 |
|
if
(sso != n
ull && !ss
o.getCanRe
authentica
te()) {
|
|
554 |
|
if
(sso != n
ull && !ss
o.getCanRe
authentica
te()) {
|
| 555 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
555 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
|
555 |
|
if (cont
ainerLog.i
sDebugEnab
led()) {
|
| 556 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.up
date", sso
Id, authTy
pe));
|
|
556 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.up
date", sso
Id, authTy
pe));
|
|
556 |
|
cont
ainerLog.d
ebug(sm.ge
tString("s
ingleSignO
n.debug.up
date", sso
Id, authTy
pe));
|
| 557 |
|
}
|
|
557 |
|
}
|
|
557 |
|
}
|
| 558 |
|
|
|
558 |
|
|
|
558 |
|
|
| 559 |
|
sso.upda
teCredenti
als(princi
pal, authT
ype, usern
ame, passw
ord);
|
|
559 |
|
sso.upda
teCredenti
als(princi
pal, authT
ype, usern
ame, passw
ord);
|
|
559 |
|
sso.upda
teCredenti
als(princi
pal, authT
ype, usern
ame, passw
ord);
|
| 560 |
|
return t
rue;
|
|
560 |
|
return t
rue;
|
|
560 |
|
return t
rue;
|
| 561 |
|
}
|
|
561 |
|
}
|
|
561 |
|
}
|
| 562 |
|
re
turn false
;
|
|
562 |
|
re
turn false
;
|
|
562 |
|
re
turn false
;
|
| 563 |
|
}
|
|
563 |
|
}
|
|
563 |
|
}
|
| 564 |
|
|
|
564 |
|
|
|
564 |
|
|
| 565 |
|
|
|
565 |
|
|
|
565 |
|
|
| 566 |
|
/**
|
|
566 |
|
/**
|
|
566 |
|
/**
|
| 567 |
|
* Rem
ove a sing
le Session
from a Si
ngleSignOn
. Called
when
|
|
567 |
|
* Rem
ove a sing
le Session
from a Si
ngleSignOn
. Called
when
|
|
567 |
|
* Rem
ove a sing
le Session
from a Si
ngleSignOn
. Called
when
|
| 568 |
|
* a s
ession is
timed out
and no lon
ger active
.
|
|
568 |
|
* a s
ession is
timed out
and no lon
ger active
.
|
|
568 |
|
* a s
ession is
timed out
and no lon
ger active
.
|
| 569 |
|
*
|
|
569 |
|
*
|
|
569 |
|
*
|
| 570 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier from
which to
remove the
session.
|
|
570 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier from
which to
remove the
session.
|
|
570 |
|
* @pa
ram ssoId
Single sig
n on ident
ifier from
which to
remove the
session.
|
| 571 |
|
* @pa
ram sessio
n the sess
ion to be
removed.
|
|
571 |
|
* @pa
ram sessio
n the sess
ion to be
removed.
|
|
571 |
|
* @pa
ram sessio
n the sess
ion to be
removed.
|
| 572 |
|
*/
|
|
572 |
|
*/
|
|
572 |
|
*/
|
| 573 |
|
protec
ted void r
emoveSessi
on(String
ssoId, Ses
sion sessi
on) {
|
|
573 |
|
protec
ted void r
emoveSessi
on(String
ssoId, Ses
sion sessi
on) {
|
|
573 |
|
protec
ted void r
emoveSessi
on(String
ssoId, Ses
sion sessi
on) {
|
| 574 |
|
|
|
574 |
|
|
|
574 |
|
|
| 575 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
575 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
|
575 |
|
if
(containe
rLog.isDeb
ugEnabled(
)) {
|
| 576 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.remove
Session",
session, s
soId));
|
|
576 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.remove
Session",
session, s
soId));
|
|
576 |
|
containe
rLog.debug
(sm.getStr
ing("singl
eSignOn.de
bug.remove
Session",
session, s
soId));
|
| 577 |
|
}
|
|
577 |
|
}
|
|
577 |
|
}
|
| 578 |
|
|
|
578 |
|
|
|
578 |
|
|
| 579 |
|
//
Get a ref
erence to
the Single
SignOn
|
|
579 |
|
//
Get a ref
erence to
the Single
SignOn
|
|
579 |
|
//
Get a ref
erence to
the Single
SignOn
|
| 580 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
|
580 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
|
580 |
|
Si
ngleSignOn
Entry entr
y = cache.
get(ssoId)
;
|
| 581 |
|
if
(entry ==
null) {
|
|
581 |
|
if
(entry ==
null) {
|
|
581 |
|
if
(entry ==
null) {
|
| 582 |
|
return;
|
|
582 |
|
return;
|
|
582 |
|
return;
|
| 583 |
|
}
|
|
583 |
|
}
|
|
583 |
|
}
|
| 584 |
|
|
|
584 |
|
|
|
584 |
|
|
| 585 |
|
//
Remove th
e inactive
session f
rom Single
SignOnEntr
y
|
|
585 |
|
//
Remove th
e inactive
session f
rom Single
SignOnEntr
y
|
|
585 |
|
//
Remove th
e inactive
session f
rom Single
SignOnEntr
y
|
| 586 |
|
en
try.remove
Session(se
ssion);
|
|
586 |
|
en
try.remove
Session(se
ssion);
|
|
586 |
|
en
try.remove
Session(se
ssion);
|
| 587 |
|
|
|
587 |
|
|
|
587 |
|
|
| 588 |
|
//
If there
are not se
ssions lef
t in the S
ingleSignO
nEntry,
|
|
588 |
|
//
If there
are not se
ssions lef
t in the S
ingleSignO
nEntry,
|
|
588 |
|
//
If there
are not se
ssions lef
t in the S
ingleSignO
nEntry,
|
| 589 |
|
//
deregiste
r the entr
y.
|
|
589 |
|
//
deregiste
r the entr
y.
|
|
589 |
|
//
deregiste
r the entr
y.
|
| 590 |
|
if
(entry.fi
ndSessions
().size()
== 0) {
|
|
590 |
|
if
(entry.fi
ndSessions
().size()
== 0) {
|
|
590 |
|
if
(entry.fi
ndSessions
().size()
== 0) {
|
| 591 |
|
deregist
er(ssoId);
|
|
591 |
|
deregist
er(ssoId);
|
|
591 |
|
deregist
er(ssoId);
|
| 592 |
|
}
|
|
592 |
|
}
|
|
592 |
|
}
|
| 593 |
|
}
|
|
593 |
|
}
|
|
593 |
|
}
|
| 594 |
|
|
|
594 |
|
|
|
594 |
|
|
| 595 |
|
|
|
595 |
|
|
|
595 |
|
|
| 596 |
|
protec
ted Sessio
nListener
getSession
Listener(S
tring ssoI
d) {
|
|
596 |
|
protec
ted Sessio
nListener
getSession
Listener(S
tring ssoI
d) {
|
|
596 |
|
protec
ted Sessio
nListener
getSession
Listener(S
tring ssoI
d) {
|
| 597 |
|
re
turn new S
ingleSignO
nListener(
ssoId);
|
|
597 |
|
re
turn new S
ingleSignO
nListener(
ssoId);
|
|
597 |
|
re
turn new S
ingleSignO
nListener(
ssoId);
|
| 598 |
|
}
|
|
598 |
|
}
|
|
598 |
|
}
|
| 599 |
|
|
|
599 |
|
|
|
599 |
|
|
| 600 |
|
|
|
600 |
|
|
|
600 |
|
|
| 601 |
|
@Overr
ide
|
|
601 |
|
@Overr
ide
|
|
601 |
|
@Overr
ide
|
| 602 |
|
protec
ted synchr
onized voi
d startInt
ernal() th
rows Lifec
ycleExcept
ion {
|
|
602 |
|
protec
ted synchr
onized voi
d startInt
ernal() th
rows Lifec
ycleExcept
ion {
|
|
602 |
|
protec
ted synchr
onized voi
d startInt
ernal() th
rows Lifec
ycleExcept
ion {
|
| 603 |
|
Co
ntainer c
= getConta
iner();
|
|
603 |
|
Co
ntainer c
= getConta
iner();
|
|
603 |
|
Co
ntainer c
= getConta
iner();
|
| 604 |
|
wh
ile (c !=
null && !(
c instance
of Engine)
) {
|
|
604 |
|
wh
ile (c !=
null && !(
c instance
of Engine)
) {
|
|
604 |
|
wh
ile (c !=
null && !(
c instance
of Engine)
) {
|
| 605 |
|
c = c.ge
tParent();
|
|
605 |
|
c = c.ge
tParent();
|
|
605 |
|
c = c.ge
tParent();
|
| 606 |
|
}
|
|
606 |
|
}
|
|
606 |
|
}
|
| 607 |
|
if
(c instan
ceof Engin
e) {
|
|
607 |
|
if
(c instan
ceof Engin
e) {
|
|
607 |
|
if
(c instan
ceof Engin
e) {
|
| 608 |
|
engine =
(Engine)
c;
|
|
608 |
|
engine =
(Engine)
c;
|
|
608 |
|
engine =
(Engine)
c;
|
| 609 |
|
}
|
|
609 |
|
}
|
|
609 |
|
}
|
| 610 |
|
su
per.startI
nternal();
|
|
610 |
|
su
per.startI
nternal();
|
|
610 |
|
su
per.startI
nternal();
|
| 611 |
|
}
|
|
611 |
|
}
|
|
611 |
|
}
|
| 612 |
|
|
|
612 |
|
|
|
612 |
|
|
| 613 |
|
|
|
613 |
|
|
|
613 |
|
|
| 614 |
|
@Overr
ide
|
|
614 |
|
@Overr
ide
|
|
614 |
|
@Overr
ide
|
| 615 |
|
protec
ted synchr
onized voi
d stopInte
rnal() thr
ows Lifecy
cleExcepti
on {
|
|
615 |
|
protec
ted synchr
onized voi
d stopInte
rnal() thr
ows Lifecy
cleExcepti
on {
|
|
615 |
|
protec
ted synchr
onized voi
d stopInte
rnal() thr
ows Lifecy
cleExcepti
on {
|
| 616 |
|
su
per.stopIn
ternal();
|
|
616 |
|
su
per.stopIn
ternal();
|
|
616 |
|
su
per.stopIn
ternal();
|
| 617 |
|
en
gine = nul
l;
|
|
617 |
|
en
gine = nul
l;
|
|
617 |
|
en
gine = nul
l;
|
| 618 |
|
}
|
|
618 |
|
}
|
|
618 |
|
}
|
| 619 |
|
}
|
|
619 |
|
}
|
|
619 |
|
}
|