au.csiro.pathling.fhir.ClientAuthInterceptor Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of terminology Show documentation
Show all versions of terminology Show documentation
Interact with a FHIR terminology server from Spark.
/*
* Copyright 2023 Commonwealth Scientific and Industrial Research
* Organisation (CSIRO) ABN 41 687 119 230.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package au.csiro.pathling.fhir;
import static java.util.Objects.requireNonNull;
import au.csiro.pathling.config.TerminologyAuthConfiguration;
import ca.uhn.fhir.interceptor.api.Hook;
import ca.uhn.fhir.interceptor.api.Interceptor;
import ca.uhn.fhir.interceptor.api.Pointcut;
import ca.uhn.fhir.rest.client.api.IHttpRequest;
import com.google.gson.FieldNamingPolicy;
import com.google.gson.Gson;
import com.google.gson.GsonBuilder;
import java.io.Closeable;
import java.io.IOException;
import java.time.Instant;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import javax.annotation.Nonnull;
import javax.annotation.Nullable;
import lombok.extern.slf4j.Slf4j;
import org.apache.http.Header;
import org.apache.http.NameValuePair;
import org.apache.http.client.ClientProtocolException;
import org.apache.http.client.config.RequestConfig;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.DefaultHttpRequestRetryHandler;
import org.apache.http.impl.client.HttpClients;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.util.EntityUtils;
@Interceptor
@Slf4j
public class ClientAuthInterceptor implements Closeable {
public static final int AUTH_CONNECT_TIMEOUT = 5_000;
public static final int AUTH_CONNECTION_REQUEST_TIMEOUT = 5_000;
public static final int AUTH_SOCKET_TIMEOUT = 5_000;
public static final int AUTH_RETRY_COUNT = 3;
@Nonnull
private CloseableHttpClient httpClient;
@Nonnull
private final String tokenEndpoint;
@Nonnull
private final String clientId;
@Nonnull
private final String clientSecret;
@Nullable
private final String scope;
private final long tokenExpiryTolerance;
@Nonnull
private static final Map accessContexts = new HashMap<>();
public ClientAuthInterceptor(@Nonnull final TerminologyAuthConfiguration configuration) {
this.httpClient = ClientAuthInterceptor.getHttpClient();
this.tokenEndpoint = requireNonNull(configuration.getTokenEndpoint());
this.clientId = requireNonNull(configuration.getClientId());
this.clientSecret = requireNonNull(configuration.getClientSecret());
this.scope = configuration.getScope();
this.tokenExpiryTolerance = configuration.getTokenExpiryTolerance();
}
ClientAuthInterceptor(@Nonnull final CloseableHttpClient httpClient,
@Nonnull final TerminologyAuthConfiguration configuration) {
this(configuration);
this.httpClient = httpClient;
}
@SuppressWarnings("unused")
@Hook(Pointcut.CLIENT_REQUEST)
public void handleClientRequest(@Nullable final IHttpRequest httpRequest) throws IOException {
if (httpRequest != null) {
final AccessContext accessContext = ensureAccessContext(clientId, clientSecret, tokenEndpoint,
scope, tokenExpiryTolerance);
// Now we should have a valid token, so we can add it to the request.
final String accessToken = accessContext.getClientCredentialsResponse().getAccessToken();
requireNonNull(accessToken);
httpRequest.addHeader("Authorization", "Bearer " + accessToken);
}
}
@Nonnull
private AccessContext ensureAccessContext(@Nonnull final String clientId,
@Nonnull final String clientSecret, @Nonnull final String tokenEndpoint,
@Nullable final String scope, final long tokenExpiryTolerance)
throws IOException {
synchronized (accessContexts) {
final AccessScope accessScope = new AccessScope(tokenEndpoint, clientId, scope);
AccessContext accessContext = accessContexts.get(accessScope);
if (accessContext == null || accessContext.getExpiryTime()
.isBefore(Instant.now().plusSeconds(tokenExpiryTolerance))) {
// We need to get a new token if:
// (1) We don't have a token yet;
// (2) The token is expired, or;
// (3) The token is about to expire (within the tolerance).
log.debug("Getting new token");
accessContext = getNewAccessContext(clientId, clientSecret, tokenEndpoint, scope,
tokenExpiryTolerance);
accessContexts.put(accessScope, accessContext);
}
return accessContext;
}
}
@Nonnull
private AccessContext getNewAccessContext(@Nonnull final String clientId,
@Nonnull final String clientSecret, @Nonnull final String tokenEndpoint,
@Nullable final String scope, final long tokenExpiryTolerance)
throws IOException {
final List authParams = new ArrayList<>();
authParams.add(new BasicNameValuePair("client_id", clientId));
authParams.add(new BasicNameValuePair("client_secret", clientSecret));
return getAccessContext(authParams, tokenEndpoint, scope, tokenExpiryTolerance);
}
@Nonnull
private AccessContext getAccessContext(@Nonnull final List authParams,
@Nonnull final String tokenEndpoint, @Nullable final String scope,
final long tokenExpiryTolerance) throws IOException {
final ClientCredentialsResponse response = clientCredentialsGrant(authParams, tokenEndpoint,
scope, tokenExpiryTolerance);
final Instant expires = getExpiryTime(response);
log.debug("New token will expire at {}", expires);
return new AccessContext(response, expires);
}
@Nonnull
private ClientCredentialsResponse clientCredentialsGrant(
@Nonnull final List authParams, @Nonnull final String tokenEndpoint,
@Nullable final String scope, final long tokenExpiryTolerance)
throws IOException {
log.debug("Performing client credentials grant using token endpoint: {}", tokenEndpoint);
final HttpPost request = new HttpPost(tokenEndpoint);
request.addHeader("Content-Type", "application/x-www-form-urlencoded");
request.addHeader("Accept", "application/json");
final List params = new ArrayList<>();
params.add(new BasicNameValuePair("grant_type", "client_credentials"));
if (scope != null) {
authParams.add(new BasicNameValuePair("scope", scope));
}
params.addAll(authParams);
request.setEntity(new UrlEncodedFormEntity(params));
final String responseString;
try (final CloseableHttpResponse response = httpClient.execute(request)) {
@Nullable final Header contentTypeHeader = response.getFirstHeader("Content-Type");
if (contentTypeHeader == null) {
throw new ClientProtocolException(
"Client credentials response contains no Content-Type header");
}
log.debug("Content-Type: {}", contentTypeHeader.getValue());
final boolean responseIsJson = contentTypeHeader.getValue()
.startsWith("application/json");
if (!responseIsJson) {
throw new ClientProtocolException(
"Invalid response from token endpoint: content type is not application/json");
}
responseString = EntityUtils.toString(response.getEntity());
}
final Gson gson = new GsonBuilder()
.setFieldNamingPolicy(FieldNamingPolicy.LOWER_CASE_WITH_UNDERSCORES)
.create();
final ClientCredentialsResponse grant = gson.fromJson(
responseString,
ClientCredentialsResponse.class);
if (grant.getAccessToken() == null) {
throw new ClientProtocolException("Client credentials grant does not contain access token");
}
if (grant.getExpiresIn() < tokenExpiryTolerance) {
throw new ClientProtocolException(
"Client credentials grant expiry is less than the tolerance: " + grant.getExpiresIn());
}
return grant;
}
@Nonnull
private static CloseableHttpClient getHttpClient() {
final RequestConfig requestConfig = RequestConfig.custom()
.setConnectTimeout(AUTH_CONNECT_TIMEOUT)
.setConnectionRequestTimeout(AUTH_CONNECTION_REQUEST_TIMEOUT)
.setSocketTimeout(AUTH_SOCKET_TIMEOUT)
.build();
return HttpClients.custom()
.setRetryHandler(new DefaultHttpRequestRetryHandler(AUTH_RETRY_COUNT, true))
.setDefaultRequestConfig(requestConfig)
.build();
}
private static Instant getExpiryTime(@Nonnull final ClientCredentialsResponse response) {
return Instant.now().plusSeconds(response.getExpiresIn());
}
public static void clearAccessContexts() {
synchronized (accessContexts) {
accessContexts.clear();
}
}
@Override
public void close() throws IOException {
httpClient.close();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy