merge with branch issue-384

This commit is contained in:
Sebastian Sdorra
2013-04-26 14:46:37 +02:00
17 changed files with 65 additions and 25 deletions

View File

@@ -183,7 +183,7 @@ public final class PermissionUtil
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
String username = subject.getPrincipal().toString(); String username = subject.getPrincipal().toString();

View File

@@ -69,12 +69,33 @@ public final class Tokens
* @param username username of the user to authenticate * @param username username of the user to authenticate
* @param password password of the user to authenticate * @param password password of the user to authenticate
* *
* @return * @return authentication token
*/ */
public static AuthenticationToken createAuthenticationToken( public static AuthenticationToken createAuthenticationToken(
HttpServletRequest request, String username, String password) HttpServletRequest request, String username, String password)
{ {
return new UsernamePasswordToken(username, password, return createAuthenticationToken(request, username, password, false);
}
/**
* Build an {@link AuthenticationToken} for use with
* {@link Subject#login(org.apache.shiro.authc.AuthenticationToken)}.
*
*
* @param request servlet request
* @param username username of the user to authenticate
* @param password password of the user to authenticate
* @param rememberMe true to remember the user across sessions
*
* @return authentication token
*
* @since 1.31
*/
public static AuthenticationToken createAuthenticationToken(
HttpServletRequest request, String username, String password,
boolean rememberMe)
{
return new UsernamePasswordToken(username, password, rememberMe,
request.getRemoteAddr()); request.getRemoteAddr());
} }
} }

View File

@@ -87,7 +87,7 @@ public final class SecurityUtil
{ {
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (!subject.isAuthenticated()) if (!subject.hasRole(Role.USER))
{ {
throw new ScmSecurityException("user is not authenticated"); throw new ScmSecurityException("user is not authenticated");
} }

View File

@@ -156,7 +156,7 @@ public class BasicAuthenticationFilter extends HttpFilter
} }
} }
} }
else if (subject.isAuthenticated()) else if (subject.isAuthenticated() || subject.isRemembered())
{ {
if (logger.isTraceEnabled()) if (logger.isTraceEnabled())
{ {

View File

@@ -65,6 +65,7 @@ import javax.servlet.FilterChain;
import javax.servlet.ServletException; import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpServletResponse;
import sonia.scm.security.Role;
/** /**
* Abstract http filter to check repository permissions. * Abstract http filter to check repository permissions.
@@ -255,7 +256,7 @@ public abstract class PermissionFilter extends HttpFilter
private void sendAccessDenied(HttpServletResponse response, Subject subject) private void sendAccessDenied(HttpServletResponse response, Subject subject)
throws IOException throws IOException
{ {
if (subject.isAuthenticated()) if (subject.hasRole(Role.USER))
{ {
response.sendError(HttpServletResponse.SC_FORBIDDEN); response.sendError(HttpServletResponse.SC_FORBIDDEN);
} }

View File

@@ -73,7 +73,7 @@ public class SubjectWrapper
{ {
String name; String name;
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
name = (String) subject.getPrincipal(); name = (String) subject.getPrincipal();
} }
@@ -104,7 +104,7 @@ public class SubjectWrapper
*/ */
public boolean isAuthenticated() public boolean isAuthenticated()
{ {
return subject.isAuthenticated(); return subject.isAuthenticated() || subject.isRemembered();
} }
//~--- fields --------------------------------------------------------------- //~--- fields ---------------------------------------------------------------

View File

@@ -66,7 +66,7 @@ public class HelloResource
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
String displayName = "Unknown"; String displayName = "Unknown";
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
displayName = displayName =
subject.getPrincipals().oneByType(User.class).getDisplayName(); subject.getPrincipals().oneByType(User.class).getDisplayName();

View File

@@ -62,6 +62,7 @@ import java.util.List;
import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpServletResponse;
import sonia.scm.security.Role;
/** /**
* *
@@ -116,7 +117,8 @@ public final class MockUtil
when(subject.isPermittedAll(anyCollectionOf(Permission.class))).thenReturn( when(subject.isPermittedAll(anyCollectionOf(Permission.class))).thenReturn(
Boolean.TRUE); Boolean.TRUE);
when(subject.isPermittedAll()).thenReturn(Boolean.TRUE); when(subject.isPermittedAll()).thenReturn(Boolean.TRUE);
when(subject.hasRole("admin")).thenReturn(Boolean.TRUE); when(subject.hasRole(Role.ADMIN)).thenReturn(Boolean.TRUE);
when(subject.hasRole(Role.USER)).thenReturn(Boolean.TRUE);
PrincipalCollection collection = mock(PrincipalCollection.class); PrincipalCollection collection = mock(PrincipalCollection.class);

View File

@@ -68,6 +68,7 @@ import java.util.Collections;
import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse; import javax.servlet.http.HttpServletResponse;
import javax.ws.rs.DefaultValue;
import javax.ws.rs.FormParam; import javax.ws.rs.FormParam;
import javax.ws.rs.GET; import javax.ws.rs.GET;
import javax.ws.rs.POST; import javax.ws.rs.POST;
@@ -131,6 +132,7 @@ public class AuthenticationResource
* @param response the current http response * @param response the current http response
* @param username the username for the authentication * @param username the username for the authentication
* @param password the password for the authentication * @param password the password for the authentication
* @param rememberMe true to remember the user across sessions
* *
* @return * @return
*/ */
@@ -139,7 +141,8 @@ public class AuthenticationResource
@TypeHint(ScmState.class) @TypeHint(ScmState.class)
public ScmState authenticate(@Context HttpServletRequest request, public ScmState authenticate(@Context HttpServletRequest request,
@FormParam("username") String username, @FormParam("username") String username,
@FormParam("password") String password) @FormParam("password") String password, @FormParam("rememberMe")
@DefaultValue("false") boolean rememberMe)
{ {
ScmState state = null; ScmState state = null;
@@ -148,7 +151,7 @@ public class AuthenticationResource
try try
{ {
subject.login(Tokens.createAuthenticationToken(request, username, subject.login(Tokens.createAuthenticationToken(request, username,
password)); password, rememberMe));
state = createState(subject); state = createState(subject);
} }
catch (AuthenticationException ex) catch (AuthenticationException ex)
@@ -253,11 +256,16 @@ public class AuthenticationResource
Response response = null; Response response = null;
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
if (logger.isDebugEnabled()) if (logger.isDebugEnabled())
{ {
logger.debug("return state for user {}", subject.getPrincipal()); String auth = subject.isRemembered()
? "remembered"
: "authenticated";
logger.debug("return state for {} user {}", auth,
subject.getPrincipal());
} }
ScmState state = createState(subject); ScmState state = createState(subject);

View File

@@ -65,6 +65,7 @@ import javax.ws.rs.Produces;
import javax.ws.rs.WebApplicationException; import javax.ws.rs.WebApplicationException;
import javax.ws.rs.core.MediaType; import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.Response; import javax.ws.rs.core.Response;
import sonia.scm.security.Role;
/** /**
* *
@@ -137,7 +138,7 @@ public class ChangePasswordResource
Response response = null; Response response = null;
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (!subject.isAuthenticated()) if (!subject.hasRole(Role.USER))
{ {
throw new ScmSecurityException("user is not authenticated"); throw new ScmSecurityException("user is not authenticated");
} }

View File

@@ -111,7 +111,7 @@ public class SecurityFilter extends HttpFilter
chain.doFilter(new SecurityHttpServletRequestWrapper(request, chain.doFilter(new SecurityHttpServletRequestWrapper(request,
getUser(subject)), response); getUser(subject)), response);
} }
else if (subject.isAuthenticated()) else if (subject.isAuthenticated() || subject.isRemembered())
{ {
response.sendError(HttpServletResponse.SC_FORBIDDEN); response.sendError(HttpServletResponse.SC_FORBIDDEN);
} }
@@ -142,8 +142,7 @@ public class SecurityFilter extends HttpFilter
*/ */
protected boolean hasPermission(Subject subject) protected boolean hasPermission(Subject subject)
{ {
return ((configuration != null) return ((configuration != null) && configuration.isAnonymousAccessEnabled()) || subject.isAuthenticated() || subject.isRemembered();
&& configuration.isAnonymousAccessEnabled()) || subject.isAuthenticated();
} }
/** /**
@@ -158,7 +157,7 @@ public class SecurityFilter extends HttpFilter
{ {
User user = null; User user = null;
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
user = subject.getPrincipals().oneByType(User.class); user = subject.getPrincipals().oneByType(User.class);
} }

View File

@@ -55,6 +55,7 @@ import java.util.Collection;
import javax.ws.rs.WebApplicationException; import javax.ws.rs.WebApplicationException;
import javax.ws.rs.core.Response.Status; import javax.ws.rs.core.Response.Status;
import sonia.scm.security.Role;
/** /**
* *
@@ -112,7 +113,7 @@ public class SearchHandler<T>
{ {
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (!subject.isAuthenticated()) if (!subject.hasRole(Role.USER))
{ {
throw new ScmSecurityException("Authentication is required"); throw new ScmSecurityException("Authentication is required");
} }

View File

@@ -169,7 +169,7 @@ public class DefaultUserManager extends AbstractUserManager
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (!subject.isAuthenticated()) if (!subject.hasRole(Role.USER))
{ {
throw new ScmSecurityException("user is not authenticated"); throw new ScmSecurityException("user is not authenticated");
} }

View File

@@ -227,7 +227,7 @@ public class BasicSecurityContext implements WebSecurityContext
T result = null; T result = null;
Subject subject = SecurityUtils.getSubject(); Subject subject = SecurityUtils.getSubject();
if (subject.isAuthenticated()) if (subject.isAuthenticated() || subject.isRemembered())
{ {
PrincipalCollection pc = subject.getPrincipals(); PrincipalCollection pc = subject.getPrincipals();

View File

@@ -242,7 +242,7 @@ public class DefaultAdministrationContext implements AdministrationContext
{ {
String username = null; String username = null;
if (subject.isAuthenticated()) if (subject.hasRole(Role.USER))
{ {
username = principal; username = principal;
} }

View File

@@ -88,7 +88,8 @@ if (Sonia.login.Form){
WaitMsgText: 'Übertrage Daten...', WaitMsgText: 'Übertrage Daten...',
failedMsgText: 'Anmeldung fehlgeschlagen!', failedMsgText: 'Anmeldung fehlgeschlagen!',
failedDescriptionText: 'Falscher Benutzername, Passwort oder sie haben nicht\n\ failedDescriptionText: 'Falscher Benutzername, Passwort oder sie haben nicht\n\
genug Berechtigungen. Bitte versuchen sie es erneut.' genug Berechtigungen. Bitte versuchen sie es erneut.',
rememberMeText: 'Angemeldet bleiben'
}); });
} }

View File

@@ -39,11 +39,12 @@ Sonia.login.Form = Ext.extend(Ext.FormPanel,{
WaitMsgText: 'Sending data...', WaitMsgText: 'Sending data...',
failedMsgText: 'Login failed!', failedMsgText: 'Login failed!',
failedDescriptionText: 'Incorrect username, password or not enough permission. Please Try again.', failedDescriptionText: 'Incorrect username, password or not enough permission. Please Try again.',
rememberMeText: 'Remember me',
initComponent: function(){ initComponent: function(){
var config = { var config = {
labelWidth: 80, labelWidth: 120,
url: restUrl + "authentication/login.json", url: restUrl + "authentication/login.json",
frame: true, frame: true,
title: this.titleText, title: this.titleText,
@@ -76,6 +77,11 @@ Sonia.login.Form = Ext.extend(Ext.FormPanel,{
scope: this scope: this
} }
} }
},{
xtype: 'checkbox',
fieldLabel: this.rememberMeText,
name: 'rememberMe',
inputValue: 'true'
}], }],
buttons:[{ buttons:[{
text: this.cancelText, text: this.cancelText,