Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* Copyright 2022 Accenture Global Solutions Limited
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.finos.tracdap.common.auth.external;
import io.netty.buffer.ByteBufAllocator;
import io.netty.buffer.CompositeByteBuf;
import io.netty.buffer.Unpooled;
import org.finos.tracdap.common.auth.internal.JwtProcessor;
import org.finos.tracdap.common.auth.internal.SessionInfo;
import org.finos.tracdap.common.exception.EUnexpected;
import org.finos.tracdap.config.AuthenticationConfig;
import io.netty.channel.ChannelDuplexHandler;
import io.netty.channel.ChannelHandlerContext;
import io.netty.channel.ChannelPromise;
import io.netty.handler.codec.http.*;
import io.netty.util.ReferenceCountUtil;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.annotation.Nonnull;
public class Http1AuthHandler extends ChannelDuplexHandler {
private static final int PENDING_CONTENT_LIMIT = 64 * 1024;
private final Logger log = LoggerFactory.getLogger(getClass());
private final AuthenticationConfig authConfig;
private final int connId;
private final JwtProcessor jwtProcessor;
private final IAuthProvider authProvider;
private AuthResult authResult = AuthResult.FAILED();
private SessionInfo session;
private String token;
private boolean wantCookies;
private HttpRequest pendingRequest;
private CompositeByteBuf pendingContent;
public Http1AuthHandler(
AuthenticationConfig authConfig, int connId,
JwtProcessor jwtProcessor,
IAuthProvider authProvider) {
this.authConfig = authConfig;
this.connId = connId;
this.jwtProcessor = jwtProcessor;
this.authProvider = authProvider;
}
@Override
public void channelRead(@Nonnull ChannelHandlerContext ctx, @Nonnull Object msg) {
try {
// Some auth mechanisms require content as well as headers
// These mechanisms set the result NEED_CONTENT, to trigger aggregation
// Aggregated messages are fed through the normal flow once they are ready
msg = handleAggregateContent(msg);
if (msg == null)
return;
// HTTP/1 auth works purely on the request object
// Each new request will re-run the auth processing
if ((msg instanceof HttpRequest)) {
var request = (HttpRequest) msg;
processAuthentication(ctx, request);
}
// If authorization failed a response has already been sent
// Do not pass any further messages down the pipe
if (authResult.getCode() != AuthResultCode.AUTHORIZED)
return;
// Authentication succeeded, allow messages to flow on the connection
// Special handling for request objects, apply translation to the headers
if (msg instanceof HttpRequest) {
var request = (HttpRequest) msg;
if (authProvider.postAuthMatch(request.method().name(), request.uri()))
processPostAuthMatch(ctx, request);
else
processRequest(ctx, request);
}
// Everything else flows straight through
else {
ReferenceCountUtil.retain(msg);
ctx.fireChannelRead(msg);
}
}
finally {
ReferenceCountUtil.release(msg);
}
}
@Override
public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise) {
try {
// Authentication has always succeeded by this point
// Otherwise no request is made to the platform, so no response would be sent
// This does not account for pipelining, which is disabled by default in modern browsers
// Special handling for response objects, apply translation to the headers
if (msg instanceof HttpResponse) {
var response = (HttpResponse) msg;
processResponse(ctx, response, promise);
}
// Everything else flows straight through
else {
ReferenceCountUtil.retain(msg);
ctx.write(msg, promise);
}
}
finally {
ReferenceCountUtil.release(msg);
}
}
private Object handleAggregateContent(Object msg) {
if (authResult.getCode() != AuthResultCode.NEED_CONTENT)
return msg;
if (!(msg instanceof HttpContent) || pendingContent.readableBytes() > PENDING_CONTENT_LIMIT) {
pendingContent.release();
throw new EUnexpected();
}
var content = (HttpContent) msg;
pendingContent.addComponent(content.content());
pendingContent.writerIndex(pendingContent.writerIndex() + content.content().writerIndex());
if (content instanceof LastHttpContent)
return new DefaultFullHttpRequest(
pendingRequest.protocolVersion(),
pendingRequest.method(),
pendingRequest.uri(),
pendingContent,
pendingRequest.headers(),
((LastHttpContent) content).trailingHeaders());
else
return null;
}
private void processAuthentication(ChannelHandlerContext ctx, HttpRequest request) {
// Start the auth process by looking for the TRAC auth token
// If there is already a valid session, this takes priority
var headers = new Http1AuthHeaders(request.headers());
// Decide whether to send the auth response as headers or cookies
// Always send cookies for browser routes
// For API routes the client can set a header to prefer cookies in the response
var isApi =
headers.contains(HttpHeaderNames.CONTENT_TYPE) &&
headers.get(HttpHeaderNames.CONTENT_TYPE).startsWith("application/") &&
!headers.get(HttpHeaderNames.CONTENT_TYPE).equals("application/x-www-form-urlencoded");
wantCookies = !isApi || headers.contains(AuthLogic.TRAC_AUTH_COOKIES_HEADER);
// Look for an existing session token in the request
// If the token gives a valid session then authentication has succeeded
token = AuthLogic.findTracAuthToken(headers, AuthLogic.SERVER_COOKIE);
session = (token != null) ? jwtProcessor.decodeAndValidate(token) : null;
if (session != null && session.isValid()) {
// Check to see if the token needs refreshing
var sessionUpdate = AuthLogic.refreshSession(session, authConfig);
if (sessionUpdate != session) {
token = jwtProcessor.encodeToken(sessionUpdate);
session = sessionUpdate;
}
authResult = AuthResult.AUTHORIZED(session.getUserInfo());
return;
}
// If the TRAC token is not available or not valid, fall back to the primary auth mechanism
if (authResult == null || authResult.getCode() != AuthResultCode.NEED_CONTENT) {
var reason = (session == null) ? "no session available" : session.getErrorMessage();
log.info("conn = {}, authentication required ({})", connId, reason);
}
// Only one auth provider available atm, for both browser and API routes
var authRequest = AuthRequest.forHttp1Request(request, headers);
authResult = authProvider.attemptAuth(authRequest);
// If primary auth succeeded, set up the session token
if (authResult.getCode() == AuthResultCode.AUTHORIZED) {
session = AuthLogic.newSession(authResult.getUserInfo(), authConfig);
token = jwtProcessor.encodeToken(session);
}
// Send a basic error response for authentication failures for now
// If the result is REDIRECTED the auth provider already responded, so no need to respond again here
if (authResult.getCode() == AuthResultCode.FAILED) {
log.error("conn = {}, authentication failed ({})", connId, authResult.getMessage());
var response = buildFailedResponse(request, authResult);
ctx.write(response);
ctx.flush();
ctx.close();
}
if (authResult.getCode() == AuthResultCode.OTHER_RESPONSE) {
var response = buildAuthResponse(request, authResult.getOtherResponse());
ctx.write(response);
ctx.flush();
}
if (authResult.getCode() == AuthResultCode.NEED_CONTENT) {
pendingRequest = request;
pendingContent = ByteBufAllocator.DEFAULT.compositeBuffer();
}
}
private void processPostAuthMatch(ChannelHandlerContext ctx, HttpRequest request) {
var postAuthHeaders = new Http1AuthHeaders(request.headers());
var postAuthRequest = AuthRequest.forHttp1Request(request, postAuthHeaders);
var postAuthResponse = authProvider.postAuth(postAuthRequest, session.getUserInfo());
if (postAuthResponse != null) {
authResult = AuthResult.OTHER_RESPONSE(postAuthResponse);
var response = buildAuthResponse(request, postAuthResponse);
processResponse(ctx, response, ctx.newPromise());
ctx.flush();
}
}
private void processRequest(ChannelHandlerContext ctx, HttpRequest request) {
var headers = new Http1AuthHeaders(request.headers());
var emptyHeaders = new Http1AuthHeaders();
var relayHeaders = AuthLogic.setPlatformAuthHeaders(headers, emptyHeaders, token);
if (request instanceof FullHttpRequest) {
var relayContent = ((FullHttpRequest) request).content().retain();
var relayRequest = new DefaultFullHttpRequest(
request.protocolVersion(),
request.method(),
request.uri(),
relayContent,
relayHeaders.headers(),
new DefaultHttpHeaders());
ctx.fireChannelRead(relayRequest);
}
else {
var relayRequest = new DefaultHttpRequest(
request.protocolVersion(),
request.method(),
request.uri(),
relayHeaders.headers());
ctx.fireChannelRead(relayRequest);
}
}
private void processResponse(ChannelHandlerContext ctx, HttpResponse response, ChannelPromise promise) {
var headers = new Http1AuthHeaders(response.headers());
var emptyHeaders = new Http1AuthHeaders();
var relayHeaders = AuthLogic.setClientAuthHeaders(headers, emptyHeaders, token, session, wantCookies);
if (response instanceof FullHttpResponse) {
var relayContent = ((FullHttpResponse) response).content().retain();
var relayResponse = new DefaultFullHttpResponse(
response.protocolVersion(),
response.status(),
relayContent,
relayHeaders.headers(),
new DefaultHttpHeaders());
ctx.write(relayResponse, promise);
}
else {
var relayResponse = new DefaultHttpResponse(
response.protocolVersion(),
response.status(),
relayHeaders.headers());
ctx.write(relayResponse, promise);
}
}
private FullHttpResponse buildAuthResponse(HttpRequest request, AuthResponse responseDetails) {
var responseCode = HttpResponseStatus.valueOf(
responseDetails.getStatusCode(),
responseDetails.getStatusMessage());
var responseHeaders = new DefaultHttpHeaders();
for (var header : responseDetails.getHeaders())
responseHeaders.add(header.getKey(), header.getValue());
return new DefaultFullHttpResponse(
request.protocolVersion(), responseCode,
responseDetails.getContent(), responseHeaders,
new DefaultHttpHeaders());
}
private FullHttpResponse buildFailedResponse(HttpRequest request, AuthResult authResult) {
var responseCode = HttpResponseStatus.valueOf(
HttpResponseStatus.UNAUTHORIZED.code(),
authResult.getMessage());
return new DefaultFullHttpResponse(
request.protocolVersion(), responseCode,
Unpooled.EMPTY_BUFFER,
new DefaultHttpHeaders(),
new DefaultHttpHeaders());
}
}