ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/java/org/apache/catalina/authenticator/NonLoginAuthenticator.java

Path
ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/java/org/apache/catalina/authenticator/NonLoginAuthenticator.java
Status
scanned
Type
file
Name
NonLoginAuthenticator.java
Extension
.java
Programming language
Java
Mime type
text/plain
File type
ASCII text, with CRLF line terminators
Tag

      
    
Rootfs path

      
    
Size
4560 (4.5 KB)
MD5
fc10c0058b1d8c8bb46bbad1fe221259
SHA1
2065e67676b7ffeb95c8e3f02884b1716c20d85a
SHA256
bd3ad5fb836391bfd4b5428e233ae458f312fb90ed0591dbca7bac059c1c7b06
SHA512

      
    
SHA1_git
92ef766b6d4b232a8fda7c3aa475601b2260428e
Is binary

      
    
Is text
True
Is archive

      
    
Is media

      
    
Is legal

      
    
Is manifest

      
    
Is readme

      
    
Is top level

      
    
Is key file

      
    
NonLoginAuthenticator.java | 4.5 KB |

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.catalina.authenticator; import java.io.IOException; import jakarta.servlet.http.HttpServletResponse; import org.apache.catalina.connector.Request; /** * An <b>Authenticator</b> and <b>Valve</b> implementation that checks only security constraints not involving user * authentication. */ public final class NonLoginAuthenticator extends AuthenticatorBase { // --------------------------------------------------------- Public Methods /** * <p> * Authenticate the user making this request, based on the fact that no <code>login-config</code> has been defined * for the container. * </p> * <p> * This implementation means "login the user even though there is no self-contained way to establish a security * Principal for that user". * </p> * <p> * This method is called by the AuthenticatorBase super class to establish a Principal for the user BEFORE the * container security constraints are examined, i.e. it is not yet known whether the user will eventually be * permitted to access the requested resource. Therefore, it is necessary to always return <code>true</code> to * indicate the user has not failed authentication. * </p> * <p> * There are two cases: * </p> * <ul> * <li>without SingleSignon: a Session instance does not yet exist and there is no <code>auth-method</code> to * authenticate the user, so leave Request's Principal as null. Note: AuthenticatorBase will later examine the * security constraints to determine whether the resource is accessible by a user without a security Principal and * Role (i.e. unauthenticated).</li> * <li>with SingleSignon: if the user has already authenticated via another container (using its own login * configuration), then associate this Session with the SSOEntry so it inherits the already-established security * Principal and associated Roles. Note: This particular session will become a full member of the SingleSignOnEntry * Session collection and so will potentially keep the SSOE "alive", even if all the other properly authenticated * Sessions expire first... until it expires too.</li> * </ul> * * @param request Request we are processing * @param response Response we are creating * * @return boolean to indicate whether the user is authenticated * * @exception IOException if an input/output error occurs */ @Override protected boolean doAuthenticate(Request request, HttpServletResponse response) throws IOException { // Don't try and use SSO to authenticate since there is no auth // configured for this web application if (checkForCachedAuthentication(request, response, true)) { // Save the inherited Principal in this session so it can remain // authenticated until it expires. if (cache) { request.getSessionInternal(true).setPrincipal(request.getPrincipal()); } return true; } // No Principal means the user is not already authenticated // and so will not be assigned any roles. It is safe // to say the user is now authenticated because access to // protected resources will only be allowed with a matching role. // i.e. SC_FORBIDDEN (403 status) will be generated later. if (containerLog.isTraceEnabled()) { containerLog.trace("User authenticated without any roles"); } return true; } @Override protected String getAuthMethod() { return "NONE"; } }
Detected license expression
apache-2.0
Detected license expression (SPDX)
Apache-2.0
Percentage of license text
21.88
Copyrights

      
    
Holders

      
    
Authors

      
    
License detections License expression License expression SPDX
apache_2_0-4bde3f57-78aa-4201-96bf-531cba09e7de apache-2.0 Apache-2.0
URL Start line End line
http://www.apache.org/licenses/LICENSE-2.0 9 9