aboutsummaryrefslogtreecommitdiffstats
path: root/sdnr/wt/oauth-provider/provider-jar/src/main/java/org/onap/ccsdk/features/sdnr/wt/oauthprovider/filters/BearerAndBasicHttpAuthenticationFilter.java
blob: 6fb41d79991553cd5edfc5cb73c52d62124b1f43 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
/*
 * ============LICENSE_START=======================================================
 * ONAP : ccsdk features
 * ================================================================================
 * Copyright (C) 2020 highstreet technologies GmbH Intellectual Property.
 * All rights reserved.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 *
 */
package org.onap.ccsdk.features.sdnr.wt.oauthprovider.filters;

import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.web.filter.authc.BearerHttpAuthenticationFilter;
import org.apache.shiro.web.util.WebUtils;
import org.opendaylight.aaa.shiro.filters.ODLHttpAuthenticationFilter;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

public class BearerAndBasicHttpAuthenticationFilter extends BearerHttpAuthenticationFilter{

    // defined in lower-case for more efficient string comparison
    private static final Logger LOG = LoggerFactory.getLogger(BearerAndBasicHttpAuthenticationFilter.class);
    private ODLHttpAuthenticationHelperFilter basicAuthFilter;

    public BearerAndBasicHttpAuthenticationFilter() {
        this.basicAuthFilter = new ODLHttpAuthenticationHelperFilter();
    }

    protected static final String OPTIONS_HEADER = "OPTIONS";

    @Override
    protected AuthenticationToken createToken(ServletRequest request, ServletResponse response) {
        final String authHeader = this.getAuthzHeader(request);
        if (authHeader != null && authHeader.startsWith("Basic")) {
            return this.createBasicAuthToken(request, response);
        }
        return super.createToken(request, response);
    }

    @Override
    protected String[] getPrincipalsAndCredentials(String scheme, String token) {
        LOG.debug("getPrincipalsAndCredentials with scheme {} and token {}", scheme, token);
        if (scheme.toLowerCase().equals("basic")) {
            return this.basicAuthFilter.getPrincipalsAndCredentials(scheme, token);
        }
        return super.getPrincipalsAndCredentials(scheme, token);
    }

    @Override
    protected boolean isLoginAttempt(String authzHeader) {
        LOG.debug("isLoginAttempt with header {}", authzHeader);
        if (this.basicAuthFilter.isLoginAttempt(authzHeader)) {
            return true;
        }
        return super.isLoginAttempt(authzHeader);
    }

    @Override
    protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
        final HttpServletRequest httpRequest = WebUtils.toHttp(request);
        final String httpMethod = httpRequest.getMethod();
        if (OPTIONS_HEADER.equalsIgnoreCase(httpMethod)) {
            return true;
        } else {
            if (this.basicAuthFilter.isAccessAllowed(httpRequest, response, mappedValue)) {
                LOG.debug("isAccessAllowed succeeded on basicAuth");
                return true;
            }
        }
        return super.isAccessAllowed(request, response, mappedValue);
    }

    protected AuthenticationToken createBasicAuthToken(ServletRequest request, ServletResponse response) {
        String authorizationHeader = getAuthzHeader(request);
        if (authorizationHeader == null || authorizationHeader.length() == 0) {
            // Create an empty authentication token since there is no
            // Authorization header.
            return createToken("", "", request, response);
        }

        if (LOG.isDebugEnabled()) {
            LOG.debug("Attempting to execute login with headers [" + authorizationHeader + "]");
        }

        String[] prinCred = getPrincipalsAndCredentials(authorizationHeader, request);
        if (prinCred == null || prinCred.length < 2) {
            // Create an authentication token with an empty password,
            // since one hasn't been provided in the request.
            String username = prinCred == null || prinCred.length == 0 ? "" : prinCred[0];
            return createToken(username, "", request, response);
        }

        String username = prinCred[0];
        String password = prinCred[1];

        return createToken(username, password, request, response);
    }


    private static class ODLHttpAuthenticationHelperFilter extends ODLHttpAuthenticationFilter{

        ODLHttpAuthenticationHelperFilter(){
            super();
        }

        @Override
        protected boolean isLoginAttempt(String authzHeader) {
            return super.isLoginAttempt(authzHeader);
        }
        @Override
        protected String[] getPrincipalsAndCredentials(String scheme, String encoded) {
            return super.getPrincipalsAndCredentials(scheme, encoded);
        }
        @Override
        protected boolean isAccessAllowed(ServletRequest request, ServletResponse response, Object mappedValue) {
            return super.isAccessAllowed(request, response, mappedValue);
        }
    }
}