You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@activemq.apache.org by jb...@apache.org on 2017/04/24 15:07:47 UTC

[2/2] activemq-artemis git commit: ARTEMIS-1122 ActiveMQJAASSecurityManager class loading issue

ARTEMIS-1122 ActiveMQJAASSecurityManager class loading issue

The ActiveMQJAASSecurityManager class uses LoginContext to validate
users and roles. LoginContext loads LoginModule classes defined in
the configuration (login.config) using current thread's context
classloader.
Normally this wouldn't be a problem but when a caller thread comes
from JMX (for example a client calls QueueControl.sendMessage() via
JMX) the caller thread has a different context class loader.
This will cause the LoginContext to fail to load the LoginModule
class (e.g. PropertiesLoginModule) and the validation will fail
even if correct credentials are supplied.


Project: http://git-wip-us.apache.org/repos/asf/activemq-artemis/repo
Commit: http://git-wip-us.apache.org/repos/asf/activemq-artemis/commit/b441bf0e
Tree: http://git-wip-us.apache.org/repos/asf/activemq-artemis/tree/b441bf0e
Diff: http://git-wip-us.apache.org/repos/asf/activemq-artemis/diff/b441bf0e

Branch: refs/heads/master
Commit: b441bf0e62af21d5e76048a920c340740e39cb85
Parents: 7facd28
Author: Howard Gao <ho...@gmail.com>
Authored: Tue Apr 18 22:06:44 2017 +0800
Committer: Justin Bertram <jb...@apache.org>
Committed: Mon Apr 24 10:07:20 2017 -0500

----------------------------------------------------------------------
 .../security/ActiveMQJAASSecurityManager.java   | 23 +++--
 .../security/jaas/JAASSecurityManagerTest.java  | 99 ++++++++++++++++++++
 2 files changed, 116 insertions(+), 6 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/activemq-artemis/blob/b441bf0e/artemis-server/src/main/java/org/apache/activemq/artemis/spi/core/security/ActiveMQJAASSecurityManager.java
----------------------------------------------------------------------
diff --git a/artemis-server/src/main/java/org/apache/activemq/artemis/spi/core/security/ActiveMQJAASSecurityManager.java b/artemis-server/src/main/java/org/apache/activemq/artemis/spi/core/security/ActiveMQJAASSecurityManager.java
index 26c88b2..973ea96 100644
--- a/artemis-server/src/main/java/org/apache/activemq/artemis/spi/core/security/ActiveMQJAASSecurityManager.java
+++ b/artemis-server/src/main/java/org/apache/activemq/artemis/spi/core/security/ActiveMQJAASSecurityManager.java
@@ -177,13 +177,24 @@ public class ActiveMQJAASSecurityManager implements ActiveMQSecurityManager3 {
                                            final String password,
                                            final X509Certificate[] certificates) throws LoginException {
       LoginContext lc;
-      if (certificateConfigurationName != null && certificateConfigurationName.length() > 0 && certificates != null) {
-         lc = new LoginContext(certificateConfigurationName, null, new JaasCallbackHandler(user, password, certificates), certificateConfiguration);
-      } else {
-         lc = new LoginContext(configurationName, null, new JaasCallbackHandler(user, password, certificates), configuration);
+      ClassLoader currentLoader = Thread.currentThread().getContextClassLoader();
+      ClassLoader thisLoader = this.getClass().getClassLoader();
+      try {
+         if (thisLoader != currentLoader) {
+            Thread.currentThread().setContextClassLoader(thisLoader);
+         }
+         if (certificateConfigurationName != null && certificateConfigurationName.length() > 0 && certificates != null) {
+            lc = new LoginContext(certificateConfigurationName, null, new JaasCallbackHandler(user, password, certificates), certificateConfiguration);
+         } else {
+            lc = new LoginContext(configurationName, null, new JaasCallbackHandler(user, password, certificates), configuration);
+         }
+         lc.login();
+         return lc.getSubject();
+      } finally {
+         if (thisLoader != currentLoader) {
+            Thread.currentThread().setContextClassLoader(currentLoader);
+         }
       }
-      lc.login();
-      return lc.getSubject();
    }
 
    private Set<RolePrincipal> getPrincipalsInRole(final CheckType checkType, final Set<Role> roles) {

http://git-wip-us.apache.org/repos/asf/activemq-artemis/blob/b441bf0e/artemis-server/src/test/java/org/apache/activemq/artemis/core/security/jaas/JAASSecurityManagerTest.java
----------------------------------------------------------------------
diff --git a/artemis-server/src/test/java/org/apache/activemq/artemis/core/security/jaas/JAASSecurityManagerTest.java b/artemis-server/src/test/java/org/apache/activemq/artemis/core/security/jaas/JAASSecurityManagerTest.java
new file mode 100644
index 0000000..6707ad2
--- /dev/null
+++ b/artemis-server/src/test/java/org/apache/activemq/artemis/core/security/jaas/JAASSecurityManagerTest.java
@@ -0,0 +1,99 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.activemq.artemis.core.security.jaas;
+
+import org.apache.activemq.artemis.core.security.CheckType;
+import org.apache.activemq.artemis.core.security.Role;
+import org.apache.activemq.artemis.spi.core.security.ActiveMQJAASSecurityManager;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.rules.TemporaryFolder;
+import org.junit.runner.RunWith;
+import org.junit.runners.Parameterized;
+
+import java.io.UnsupportedEncodingException;
+import java.net.URL;
+import java.net.URLClassLoader;
+import java.net.URLDecoder;
+import java.nio.charset.StandardCharsets;
+import java.util.Arrays;
+import java.util.Collection;
+import java.util.HashSet;
+import java.util.Set;
+
+import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertNotNull;
+
+@RunWith(Parameterized.class)
+public class JAASSecurityManagerTest {
+
+   @Parameterized.Parameters(name = "newLoader=({0})")
+   public static Collection<Object[]> data() {
+      return Arrays.asList(new Object[][] {{true}, {false}});
+   }
+
+   static {
+      String path = System.getProperty("java.security.auth.login.config");
+      if (path == null) {
+         URL resource = PropertiesLoginModuleTest.class.getClassLoader().getResource("login.config");
+         if (resource != null) {
+            try {
+               path = URLDecoder.decode(resource.getFile(), StandardCharsets.UTF_8.name());
+               System.setProperty("java.security.auth.login.config", path);
+            } catch (UnsupportedEncodingException e) {
+               throw new RuntimeException(e);
+            }
+         }
+      }
+   }
+
+   @Parameterized.Parameter
+   public boolean usingNewLoader;
+
+   @Rule
+   public TemporaryFolder tmpDir = new TemporaryFolder();
+
+   @Test
+   public void testLoginClassloading() throws Exception {
+      ClassLoader existingLoader = Thread.currentThread().getContextClassLoader();
+      System.out.println("loader: " + existingLoader);
+      try {
+         if (usingNewLoader) {
+            URLClassLoader simulatedLoader = new URLClassLoader(new URL[]{tmpDir.getRoot().toURI().toURL()}, null);
+            Thread.currentThread().setContextClassLoader(simulatedLoader);
+         }
+         ActiveMQJAASSecurityManager securityManager = new ActiveMQJAASSecurityManager("PropertiesLogin");
+
+         String result = securityManager.validateUser("first", "secret", null);
+
+         assertNotNull(result);
+         assertEquals("first", result);
+
+         Role role = new Role("programmers", true, true, true, true, true, true, true, true, true, true);
+         Set<Role> roles = new HashSet<>();
+         roles.add(role);
+         result = securityManager.validateUserAndRole("first", "secret", roles, CheckType.SEND, "someaddress", null);
+
+         assertNotNull(result);
+         assertEquals("first", result);
+
+      } finally {
+         Thread.currentThread().setContextClassLoader(existingLoader);
+      }
+   }
+
+}