com.caucho.security.Allow Maven / Gradle / Ivy
/*
* Copyright (c) 1998-2018 Caucho Technology -- all rights reserved
*
* This file is part of Resin(R) Open Source
*
* Each copy or derived work must preserve the copyright notice and this
* notice unmodified.
*
* Resin Open Source is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* Resin Open Source is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE, or any warranty
* of NON-INFRINGEMENT. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License
* along with Resin Open Source; if not, write to the
*
* Free Software Foundation, Inc.
* 59 Temple Place, Suite 330
* Boston, MA 02111-1307 USA
*
* @author Scott Ferguson
*/
package com.caucho.security;
import java.util.ArrayList;
import java.util.regex.Pattern;
import java.util.regex.PatternSyntaxException;
import javax.servlet.ServletContext;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import com.caucho.config.ConfigException;
import com.caucho.rewrite.RequestPredicate;
import com.caucho.server.dispatch.UrlMap;
import com.caucho.server.security.AbstractConstraint;
import com.caucho.server.security.AuthorizationResult;
import com.caucho.server.util.CauchoSystem;
/**
* The <sec:Allow> tag authorizes requests for a set of url-patterns.
* If the request URL matches, <sec:Allow> checks all its children
* ServletReqestPredicate for matches, and if all children match, the
* request is authorized.
*
* If the url-patterns match but the children don't match, Resin checks
* following <sec:Allow> and <sec:Deny> tags to see if they match.
* If of the following tags match, Resin will reject the request. This
* chaining lets you solve more complicated authorization requirements
* simply.
*
*
* <web-app xmlns="http://caucho.com/ns/resin"
* xmlns:sec="urn:java:com.caucho.security">
*
* <sec:Allow url-pattern="*.jsp"/>
*
* <sec:Allow>
* <sec:url-pattern>/admin/*<sec:url-pattern>
* <sec:url-pattern>/security/*<sec:url-pattern>
*
* <sec:IfNetwork>192.168.0.1</sec:IfNetwork>
* </sec:Allow>
*
* </web-app>
*
*/
public class Allow extends com.caucho.server.security.SecurityConstraint
{
private ArrayList _patternList
= new ArrayList();
private ArrayList _predicateList
= new ArrayList();
protected ArrayList getPredicateList()
{
return _predicateList;
}
/**
* Sets the url-pattern
*/
@Override
public void addURLPattern(String pattern)
{
String regexpPattern = UrlMap.urlPatternToRegexpPattern(pattern);
int flags = (CauchoSystem.isCaseInsensitive() ?
Pattern.CASE_INSENSITIVE :
0);
try {
_patternList.add(Pattern.compile(regexpPattern, flags));
} catch (PatternSyntaxException e) {
throw ConfigException.create(e);
}
}
/**
* Adds a match
*/
public void add(RequestPredicate predicate)
{
_predicateList.add(predicate);
}
/**
* Returns true for the URL match
*/
public boolean isMatch(String url)
{
for (int i = 0; i < _patternList.size(); i++) {
Pattern pattern = _patternList.get(i);
if (pattern.matcher(url).find())
return true;
}
return _patternList.size() == 0;
}
/**
* Returns true for a fallthrough.
*/
@Override
public boolean isFallthrough()
{
return true;
}
/**
* Returns the HTTP methods.
*/
@Override
public ArrayList getMethods(String url)
{
return null;
}
/*
@PostConstruct
public void init()
{
WebApp webApp = WebApp.getCurrent();
if (webApp == null)
throw new ConfigException(L.l("Allow must be in a context because it requires ServletRequest capabilities."));
webApp.addSecurityConstraint(this);
}
*/
/**
* return the constraint
*/
@Override
public AbstractConstraint getConstraint()
{
return new AllowConstraint(_predicateList);
}
class AllowConstraint extends AbstractConstraint
{
private RequestPredicate []_predicateList;
AllowConstraint(ArrayList predicateList)
{
_predicateList = new RequestPredicate[predicateList.size()];
predicateList.toArray(_predicateList);
}
public AuthorizationResult isAuthorized(HttpServletRequest request,
HttpServletResponse response,
ServletContext webApp)
{
for (RequestPredicate predicate : _predicateList) {
if (! predicate.isMatch(request)) {
return AuthorizationResult.DEFAULT_DENY;
}
}
return AuthorizationResult.ALLOW;
}
}
}