
com.caucho.v5.amp.remote.ServerAuthManager Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of baratine Show documentation
Show all versions of baratine Show documentation
A reactive Java web server.
/*
* Copyright (c) 1998-2015 Caucho Technology -- all rights reserved
*
* This file is part of Baratine(TM)
*
* Each copy or derived work must preserve the copyright notice and this
* notice unmodified.
*
* Baratine is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* Baratine is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE, or any warranty
* of NON-INFRINGEMENT. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License
* along with Baratine; if not, write to the
*
* Free Software Foundation, Inc.
* 59 Temple Place, Suite 330
* Boston, MA 02111-1307 USA
*
* @author Scott Ferguson
*/
package com.caucho.v5.amp.remote;
import java.security.Key;
import java.security.KeyPair;
import java.security.Principal;
import java.util.logging.Logger;
import javax.crypto.Cipher;
import com.caucho.v5.cloud.security.SecuritySystem;
import com.caucho.v5.config.Admin;
import com.caucho.v5.http.security.AuthenticatorRole;
import com.caucho.v5.http.security.BasicPrincipal;
import com.caucho.v5.http.security.DigestCredentials;
import com.caucho.v5.http.security.PasswordCredentials;
import com.caucho.v5.inject.InjectorAmp;
import com.caucho.v5.ramp.hamp.NonceQuery;
import com.caucho.v5.ramp.hamp.SignedCredentials;
import com.caucho.v5.util.CurrentTime;
import com.caucho.v5.util.L10N;
import com.caucho.v5.util.LruCache;
import io.baratine.service.ServiceExceptionNotAuthorized;
import io.baratine.service.ServiceExceptionSecurity;
/**
* Manages links on the server
*/
public class ServerAuthManager {
private static final Logger log
= Logger.getLogger(ServerAuthManager.class.getName());
private static final L10N L = new L10N(ServerAuthManager.class);
private SecuritySystem _security;
private AuthenticatorRole _auth;
private KeyPair _authKeyPair; // authentication key pair
private boolean _isAuthenticationRequired = true;
private LruCache _nonceMap
= new LruCache(4096);
public ServerAuthManager()
{
_security = SecuritySystem.getCurrent();
InjectorAmp injectManager = InjectorAmp.current();
_auth = injectManager.instance(io.baratine.inject.Key.of(AuthenticatorRole.class,
Admin.class));
if (_auth == null) {
_auth = injectManager.instance(AuthenticatorRole.class);
}
}
public void setAuthenticationRequired(boolean isAuthenticationRequired)
{
_isAuthenticationRequired = isAuthenticationRequired;
}
public AuthenticatorRole getAuth()
{
if (_auth != null)
return _auth;
else
return _security.getAuthenticator();
}
public boolean isClusterSystemKey()
{
return _security.isSystemAuthKey();
}
//
// authentication
//
public Key decryptKey(String keyAlgorithm, byte []encKey)
{
try {
Cipher cipher = Cipher.getInstance("RSA");
cipher.init(Cipher.UNWRAP_MODE, _authKeyPair.getPrivate());
Key key = cipher.unwrap(encKey, keyAlgorithm, Cipher.SECRET_KEY);
return key;
} catch (Exception e) {
throw new RuntimeException(e);
}
}
void authenticate(String to, Object credentials, String ipAddress)
{
AuthenticatorRole auth = getAuth();
if (credentials instanceof SignedCredentials) {
SignedCredentials signedCred = (SignedCredentials) credentials;
String uid = signedCred.getUid();
String nonce = signedCred.getNonce();
String signature = signedCred.getSignature();
/*
String savedNonce = _nonceMap.get(uid);
if (savedNonce == null)
throw new NotAuthorizedException(L.l("'{0}' has invalid credentials",
uid));
*/
String serverSignature;
if (uid != null && ! uid.equals("")) {
serverSignature = _security.signSystem(uid, nonce);
}
else if (_security.isSystemAuthKey() || ! _isAuthenticationRequired)
serverSignature = _security.signSystem(uid, nonce);
else {
log.info("Authentication failed because cluster-system-key is not configured");
throw new ServiceExceptionSecurity(L.l("No user and password credentials were presented and cluster-system-key is not configured"));
}
if (! serverSignature.equals(signature)) {
throw new ServiceExceptionSecurity(L.l("'{0}' has invalid credentials",
credentials));
}
}
else if (auth == null && ! _isAuthenticationRequired) {
}
else if (auth == null) {
log.finer("Authentication failed because no authenticator configured");
throw new ServiceExceptionSecurity(L.l("'{0}' has missing authenticator",
to));
}
else if (credentials instanceof DigestCredentials) {
DigestCredentials digestCred = (DigestCredentials) credentials;
Principal user = new BasicPrincipal(digestCred.getUserName());
user = auth.authenticate(user, digestCred, null);
if (user == null) {
throw new ServiceExceptionNotAuthorized(L.l("'{0}' has invalid digest credentials",
digestCred.getUserName()));
}
}
else if (credentials instanceof String) {
String password = (String) credentials;
Principal user = new BasicPrincipal(to);
PasswordCredentials pwdCred = new PasswordCredentials(password);
if (auth.authenticate(user, pwdCred, null) == null) {
throw new ServiceExceptionNotAuthorized(L.l("'{0}' has invalid password credentials",
to));
}
}
/*
else if (server.getAdminCookie() == null && credentials == null) {
if (! "127.0.0.1".equals(ipAddress)) {
throw new NotAuthorizedException(L.l("'{0}' is an invalid local address for '{1}', because no password credentials are available",
ipAddress, uid));
}
}
*/
else {
throw new ServiceExceptionNotAuthorized(L.l("'{0}' is an unknown credential",
credentials));
}
}
NonceQuery generateNonce(NonceQuery query)
{
String uid = query.getUid();
String clientNonce = query.getNonce();
String clientSignature = _security.signSystem(uid, clientNonce);
String algorithm = _security.getAlgorithm(uid);
String nonce = String.valueOf(CurrentTime.currentTime());
return new NonceQuery(algorithm, uid, nonce, clientSignature);
}
@Override
public String toString()
{
return getClass().getSimpleName() + "[" + getAuth() + "]";
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy