summaryrefslogtreecommitdiff
path: root/qpid/java/broker/src
diff options
context:
space:
mode:
authorRobert Godfrey <rgodfrey@apache.org>2013-07-30 23:20:30 +0000
committerRobert Godfrey <rgodfrey@apache.org>2013-07-30 23:20:30 +0000
commitc00b603941decee250bcf5bd4abcafd9f1b18ffe (patch)
tree162ae22611038fd8191c7cdcc19fe01ee2db6282 /qpid/java/broker/src
parent4fe28488726a1c336392aa70696026d71a5064fc (diff)
downloadqpid-python-c00b603941decee250bcf5bd4abcafd9f1b18ffe.tar.gz
QPID-4875 : The parsing logic for certificate subjects does not work properly in all cases
git-svn-id: https://svn.apache.org/repos/asf/qpid/trunk@1508680 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'qpid/java/broker/src')
-rw-r--r--qpid/java/broker/src/main/java/org/apache/qpid/server/security/auth/sasl/external/ExternalSaslServer.java62
-rw-r--r--qpid/java/broker/src/test/java/org/apache/qpid/server/security/auth/manager/ExternalAuthenticationManagerTest.java2
2 files changed, 11 insertions, 53 deletions
diff --git a/qpid/java/broker/src/main/java/org/apache/qpid/server/security/auth/sasl/external/ExternalSaslServer.java b/qpid/java/broker/src/main/java/org/apache/qpid/server/security/auth/sasl/external/ExternalSaslServer.java
index 475f74180e..e1007d91e0 100644
--- a/qpid/java/broker/src/main/java/org/apache/qpid/server/security/auth/sasl/external/ExternalSaslServer.java
+++ b/qpid/java/broker/src/main/java/org/apache/qpid/server/security/auth/sasl/external/ExternalSaslServer.java
@@ -26,6 +26,7 @@ import javax.security.sasl.SaslServer;
import org.apache.log4j.Logger;
import org.apache.qpid.server.security.auth.UsernamePrincipal;
+import org.apache.qpid.transport.network.security.ssl.SSLUtil;
public class ExternalSaslServer implements SaslServer
{
@@ -88,7 +89,6 @@ public class ExternalSaslServer implements SaslServer
if (_externalPrincipal instanceof X500Principal && !_useFullDN)
{
// Construct username as <CN>@<DC1>.<DC2>.<DC3>....<DCN>
-
String username;
String dn = ((X500Principal) _externalPrincipal).getName(X500Principal.RFC2253);
@@ -97,62 +97,21 @@ public class ExternalSaslServer implements SaslServer
LOGGER.debug("Parsing username from Principal DN: " + dn);
}
- if (dn.contains("CN="))
+ username = SSLUtil.getIdFromSubjectDN(dn);
+ if (username.isEmpty())
{
- username = dn.substring(dn.indexOf("CN=") + 3, (dn.indexOf(",", dn.indexOf("CN=")) != -1) ? dn.indexOf(",", dn.indexOf("CN=")) : dn.length());
-
- if (username.isEmpty())
- {
- // CN is empty => Cannot construct username => Authentication failed => return null
- if(LOGGER.isDebugEnabled())
- {
- LOGGER.debug("CN value was empty in Principal name, unable to construct username");
- }
- return null;
- }
- else
- {
- if (dn.contains("DC="))
- {
- int start = 0;
- String dc = "";
-
- while (dn.indexOf("DC=", start) != -1)
- {
- int dcStart = dn.indexOf("DC=", start) + 3;
- int dcEnd = (dn.indexOf(",", dn.indexOf("DC=", start)) != -1) ? dn.indexOf(",", dn.indexOf("DC=", start)) : dn.length();
-
- if (dc.isEmpty())
- {
- dc = dn.substring(dcStart, dcEnd);
- }
- else
- {
- dc = dc.concat(".").concat(dn.substring(dcStart, dcEnd));
- }
-
- start = dn.indexOf("DC=", start) + 1;
- }
-
- username = username.concat("@").concat(dc);
- }
- }
-
+ // CN is empty => Cannot construct username => Authentication failed => return null
if(LOGGER.isDebugEnabled())
{
- LOGGER.debug("Constructing Principal with username: " + username);
+ LOGGER.debug("CN value was empty in Principal name, unable to construct username");
}
- return new UsernamePrincipal(username);
+ return null;
}
- else
+ if(LOGGER.isDebugEnabled())
{
- // No CN => Cannot construct username => Authentication failed => return null
- if(LOGGER.isDebugEnabled())
- {
- LOGGER.debug("No CN= present in DN, unable to construct username");
- }
- return null;
+ LOGGER.debug("Constructing Principal with username: " + username);
}
+ return new UsernamePrincipal(username);
}
else
{
@@ -160,8 +119,7 @@ public class ExternalSaslServer implements SaslServer
{
LOGGER.debug("Using external Principal: " + _externalPrincipal);
}
-
return _externalPrincipal;
}
}
-} \ No newline at end of file
+}
diff --git a/qpid/java/broker/src/test/java/org/apache/qpid/server/security/auth/manager/ExternalAuthenticationManagerTest.java b/qpid/java/broker/src/test/java/org/apache/qpid/server/security/auth/manager/ExternalAuthenticationManagerTest.java
index a5d087593a..61506777c5 100644
--- a/qpid/java/broker/src/test/java/org/apache/qpid/server/security/auth/manager/ExternalAuthenticationManagerTest.java
+++ b/qpid/java/broker/src/test/java/org/apache/qpid/server/security/auth/manager/ExternalAuthenticationManagerTest.java
@@ -114,7 +114,7 @@ public class ExternalAuthenticationManagerTest extends QpidTestCase
result.getStatus());
assertOnlyContainsWrapped(expectedPrincipal, result.getPrincipals());
- // Null princial
+ // Null principal
saslServer = _manager.createSaslServer("EXTERNAL", "example.example.com", null);
result = _manager.authenticate(saslServer, new byte[0]);