aboutsummaryrefslogtreecommitdiffstats
path: root/lib/src/main/java/org/onap/portalng/bff/config/IdTokenExchangeFilterFunction.java
blob: d747f3a5dc992c2767c2560148150b18039a8368 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
/*
 *
 * Copyright (c) 2022. Deutsche Telekom AG
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 *
 * SPDX-License-Identifier: Apache-2.0
 *
 *
 */

package org.onap.portalng.bff.config;

import com.nimbusds.jwt.JWTParser;
import java.text.ParseException;
import java.util.Collections;
import java.util.List;
import java.util.Optional;
import org.springframework.util.AntPathMatcher;
import org.springframework.web.reactive.function.client.ClientRequest;
import org.springframework.web.reactive.function.client.ClientResponse;
import org.springframework.web.reactive.function.client.ExchangeFilterFunction;
import org.springframework.web.reactive.function.client.ExchangeFunction;
import org.springframework.web.server.ServerWebExchange;
import org.zalando.problem.Problem;
import org.zalando.problem.Status;
import reactor.core.Exceptions;
import reactor.core.publisher.Mono;

public class IdTokenExchangeFilterFunction implements ExchangeFilterFunction {

  public static final String X_AUTH_IDENTITY_HEADER = "X-Auth-Identity";
  public static final String CLAIM_NAME_ROLES = "roles";

  private static final List<String> EXCLUDED_PATHS_PATTERNS =
      List.of(
          "/actuator/**", "**/actuator/**", "*/actuator/**", "/**/actuator/**", "/*/actuator/**");

  private static final Mono<ServerWebExchange> serverWebExchangeFromContext =
      Mono.deferContextual(Mono::just)
          .filter(context -> context.hasKey(ServerWebExchange.class))
          .map(context -> context.get(ServerWebExchange.class));

  @Override
  public Mono<ClientResponse> filter(ClientRequest request, ExchangeFunction next) {
    boolean shouldNotFilter =
        EXCLUDED_PATHS_PATTERNS.stream()
            .anyMatch(
                excludedPath ->
                    new AntPathMatcher().match(excludedPath, request.url().getRawPath()));
    if (shouldNotFilter) {
      return next.exchange(request).switchIfEmpty(Mono.defer(() -> next.exchange(request)));
    }
    return extractServerWebExchange(request)
        .flatMap(IdTokenExchangeFilterFunction::extractIdentityHeader)
        .map(idToken -> ClientRequest.from(request).header(X_AUTH_IDENTITY_HEADER, idToken).build())
        .flatMap(requestWithIdToken -> next.exchange(requestWithIdToken))
        .switchIfEmpty(Mono.defer(() -> next.exchange(request)));
  }

  private Mono<ServerWebExchange> extractServerWebExchange(ClientRequest request) {
    return Mono.justOrEmpty(request.attribute(ServerWebExchange.class.getName()))
        .cast(ServerWebExchange.class)
        .switchIfEmpty(serverWebExchangeFromContext);
  }

  private static Mono<String> extractIdentityHeader(ServerWebExchange exchange) {
    return Mono.just(exchange)
        .map(exch -> exch.getRequest().getHeaders().getOrEmpty(X_AUTH_IDENTITY_HEADER).get(0))
        .onErrorResume(ex -> Mono.error(Problem.valueOf(Status.FORBIDDEN, "ID token is missing")));
  }

  private static Mono<String> extractIdToken(ServerWebExchange exchange) {
    return extractIdentityHeader(exchange)
        .map(identityHeader -> identityHeader.replace("Bearer ", ""));
  }

  public static Mono<Void> validateAccess(
      ServerWebExchange exchange, List<String> rolesListForMethod) {

    return extractRoles(exchange)
        .map(roles -> roles.stream().anyMatch(rolesListForMethod::contains))
        .flatMap(
            match ->
                Boolean.TRUE.equals(match)
                    ? Mono.empty()
                    : Mono.error(Problem.valueOf(Status.FORBIDDEN)));
  }

  private static Mono<List<String>> extractRoles(ServerWebExchange exchange) {
    return extractIdToken(exchange)
        .map(
            token -> {
              try {
                return JWTParser.parse(token);
              } catch (ParseException e) {
                throw Exceptions.propagate(e);
              }
            })
        .map(
            jwt -> {
              try {
                return Optional.of(jwt.getJWTClaimsSet());
              } catch (ParseException e) {
                throw Exceptions.propagate(e);
              }
            })
        .map(
            optionalClaimsSet ->
                optionalClaimsSet
                    .map(claimsSet -> claimsSet.getClaim(CLAIM_NAME_ROLES))
                    .map(obj -> (List<String>) obj))
        .map(roles -> roles.orElse(Collections.emptyList()));
  }
}