All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.graylog2.shared.security.ShiroSecurityContextFilter Maven / Gradle / Ivy

There is a newer version: 6.0.2
Show newest version
/*
 * Copyright (C) 2020 Graylog, Inc.
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the Server Side Public License, version 1,
 * as published by MongoDB, Inc.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 * Server Side Public License for more details.
 *
 * You should have received a copy of the Server Side Public License
 * along with this program. If not, see
 * .
 */
package org.graylog2.shared.security;

import com.google.common.base.Strings;
import org.apache.shiro.authc.AuthenticationToken;
import org.apache.shiro.authc.UsernamePasswordToken;
import org.apache.shiro.mgt.DefaultSecurityManager;
import org.apache.shiro.subject.Subject;
import org.glassfish.grizzly.http.server.Request;
import org.graylog2.rest.RestTools;
import org.graylog2.utilities.IpSubnet;

import javax.annotation.Priority;
import javax.inject.Inject;
import javax.inject.Named;
import javax.inject.Provider;
import javax.ws.rs.BadRequestException;
import javax.ws.rs.Priorities;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.core.Cookie;
import javax.ws.rs.core.HttpHeaders;
import javax.ws.rs.core.MultivaluedMap;
import javax.ws.rs.core.SecurityContext;
import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.util.Base64;
import java.util.Map;
import java.util.Set;

import static java.util.Objects.requireNonNull;

// Give this a higher priority so it's run before the authentication filter
@Priority(Priorities.AUTHENTICATION - 10)
public class ShiroSecurityContextFilter implements ContainerRequestFilter {
    public static final String SESSION_COOKIE_NAME = "authentication";

    private final DefaultSecurityManager securityManager;
    private final Provider grizzlyRequestProvider;
    private final Set trustedProxies;

    @Inject
    public ShiroSecurityContextFilter(DefaultSecurityManager securityManager,
                                      Provider grizzlyRequestProvider,
                                      @Named("trusted_proxies") Set trustedProxies) {
        this.securityManager = requireNonNull(securityManager);
        this.grizzlyRequestProvider = grizzlyRequestProvider;
        this.trustedProxies = trustedProxies;
    }

    @Override
    public void filter(ContainerRequestContext requestContext) throws IOException {
        final boolean secure = requestContext.getSecurityContext().isSecure();
        final MultivaluedMap headers = requestContext.getHeaders();
        final Map cookies = requestContext.getCookies();
        final Request grizzlyRequest = grizzlyRequestProvider.get();

        final String host = RestTools.getRemoteAddrFromRequest(grizzlyRequest, trustedProxies);
        final String authHeader = headers.getFirst(HttpHeaders.AUTHORIZATION);

        final SecurityContext securityContext;
        if (authHeader != null && authHeader.startsWith("Basic")) {
            final String base64UserPass = authHeader.substring(authHeader.indexOf(' ') + 1);
            final String userPass = decodeBase64(base64UserPass);
            final String[] split = userPass.split(":", 2);

            if (split.length != 2) {
                throw new BadRequestException("Invalid credentials in Authorization header");
            }

            securityContext = createSecurityContext(split[0],
                    split[1],
                    secure,
                    SecurityContext.BASIC_AUTH,
                    host,
                    grizzlyRequest.getRemoteAddr(),
                    headers,
                    cookies);

        } else {
            securityContext = createSecurityContext(null, null, secure, null, host,
                    grizzlyRequest.getRemoteAddr(),
                    headers,
                    cookies);
        }

        requestContext.setSecurityContext(securityContext);
    }

    private String decodeBase64(String s) {
        try {
            return new String(Base64.getDecoder().decode(s), StandardCharsets.US_ASCII);
        } catch (IllegalArgumentException e) {
            return "";
        }
    }

    private SecurityContext createSecurityContext(String userName,
                                                  String credential,
                                                  boolean isSecure,
                                                  String authcScheme,
                                                  String host,
                                                  String remoteAddr,
                                                  MultivaluedMap headers,
                                                  Map cookies) {
        final AuthenticationToken authToken = createAuthenticationToken(userName, credential, host, remoteAddr, cookies);

        final Subject subject = new Subject.Builder(securityManager)
                .host(host)
                .sessionCreationEnabled(true)
                .buildSubject();

        return new ShiroSecurityContext(subject, authToken, isSecure, authcScheme, headers);
    }

    private AuthenticationToken createAuthenticationToken(String userName, String credential, String host, String remoteAddr, Map cookies) {
        if ("session".equalsIgnoreCase(credential)) {
            return new SessionIdToken(userName, host, remoteAddr);
        }
        if ("token".equalsIgnoreCase(credential)) {
            return new AccessTokenAuthToken(userName, host);
        }
        if (!Strings.isNullOrEmpty(userName) && !Strings.isNullOrEmpty(credential)) {
            return new UsernamePasswordToken(userName, credential, host);
        }
        if (cookies.containsKey(SESSION_COOKIE_NAME)) {
            final Cookie authenticationCookie = cookies.get(SESSION_COOKIE_NAME);
            return new SessionIdToken(authenticationCookie.getValue(), host, remoteAddr);
        }

        return new PossibleTrustedHeaderToken(host, remoteAddr);
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy