All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.undertow.server.handlers.AccessControlListHandler Maven / Gradle / Ivy

Go to download

This artifact provides a single jar that contains all classes required to use remote EJB and JMS, including all dependencies. It is intended for use by those not using maven, maven users should just import the EJB and JMS BOM's instead (shaded JAR's cause lots of problems with maven, as it is very easy to inadvertently end up with different versions on classes on the class path).

The newest version!
/*
 * JBoss, Home of Professional Open Source.
 * Copyright 2014 Red Hat, Inc., and individual contributors
 * as indicated by the @author tags.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 *  Unless required by applicable law or agreed to in writing, software
 *  distributed under the License is distributed on an "AS IS" BASIS,
 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *  See the License for the specific language governing permissions and
 *  limitations under the License.
 */

package io.undertow.server.handlers;

import io.undertow.UndertowMessages;
import io.undertow.attribute.ExchangeAttribute;
import io.undertow.server.HandlerWrapper;
import io.undertow.server.HttpHandler;
import io.undertow.server.HttpServerExchange;
import io.undertow.server.handlers.builder.HandlerBuilder;
import io.undertow.util.StatusCodes;

import java.util.ArrayList;
import java.util.HashMap;
import java.util.HashSet;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.concurrent.CopyOnWriteArrayList;
import java.util.regex.Pattern;
import java.util.regex.PatternSyntaxException;

/**
 * Handler that can accept or reject a request based on an attribute of the remote peer
 *
 * todo: should we support non-regex values for performance reasons?
 * @author Stuart Douglas
 * @author Andre Dietisheim
 */
public class AccessControlListHandler implements HttpHandler {

    private volatile HttpHandler next;
    private volatile boolean defaultAllow = false;
    private final ExchangeAttribute attribute;
    private final List acl = new CopyOnWriteArrayList<>();

    public AccessControlListHandler(final HttpHandler next, ExchangeAttribute attribute) {
        this.next = next;
        this.attribute = attribute;
    }

    public AccessControlListHandler(ExchangeAttribute attribute) {
        this.attribute = attribute;
        this.next = ResponseCodeHandler.HANDLE_404;
    }

    @Override
    public void handleRequest(final HttpServerExchange exchange) throws Exception {
        String attribute = this.attribute.readAttribute(exchange);
        if (isAllowed(attribute)) {
            next.handleRequest(exchange);
        } else {
            exchange.setStatusCode(StatusCodes.FORBIDDEN);
            exchange.endExchange();
        }
    }

    //package private for unit tests
    boolean isAllowed(String attribute) {
        if (attribute != null) {
            for (AclMatch rule : acl) {
                if (rule.matches(attribute)) {
                    return !rule.isDeny();
                }
            }
        }
        return defaultAllow;
    }

    public boolean isDefaultAllow() {
        return defaultAllow;
    }

    public AccessControlListHandler setDefaultAllow(final boolean defaultAllow) {
        this.defaultAllow = defaultAllow;
        return this;
    }

    public HttpHandler getNext() {
        return next;
    }

    public AccessControlListHandler setNext(final HttpHandler next) {
        this.next = next;
        return this;
    }

    /**
     * Adds an allowed user agent peer to the ACL list
     * 

* User agent may be given as regex * * @param pattern The pattern to add to the ACL */ public AccessControlListHandler addAllow(final String pattern) { return addRule(pattern, false); } /** * Adds an denied user agent to the ACL list *

* User agent may be given as regex * * @param pattern The user agent to add to the ACL */ public AccessControlListHandler addDeny(final String pattern) { return addRule(pattern, true); } public AccessControlListHandler clearRules() { this.acl.clear(); return this; } private AccessControlListHandler addRule(final String userAgent, final boolean deny) { this.acl.add(new AclMatch(deny, userAgent)); return this; } static class AclMatch { private final boolean deny; private final Pattern pattern; protected AclMatch(final boolean deny, final String pattern) { this.deny = deny; this.pattern = createPattern(pattern); } private Pattern createPattern(final String pattern) { try { return Pattern.compile(pattern); } catch (PatternSyntaxException e) { throw UndertowMessages.MESSAGES.notAValidRegularExpressionPattern(pattern); } } boolean matches(final String attribute) { return pattern.matcher(attribute).matches(); } boolean isDeny() { return deny; } @Override public String toString() { return getClass().getSimpleName() + "{" + "deny=" + deny + ", pattern='" + pattern + '\'' + '}'; } } public static class Builder implements HandlerBuilder { @Override public String name() { return "access-control"; } @Override public Map> parameters() { Map> params = new HashMap<>(); params.put("acl", String[].class); params.put("default-allow", boolean.class); params.put("attribute", ExchangeAttribute.class); return params; } @Override public Set requiredParameters() { final HashSet ret = new HashSet<>(); ret.add("acl"); ret.add("attribute"); return ret; } @Override public String defaultParameter() { return null; } @Override public HandlerWrapper build(Map config) { String[] acl = (String[]) config.get("acl"); Boolean defaultAllow = (Boolean) config.get("default-allow"); ExchangeAttribute attribute = (ExchangeAttribute) config.get("attribute"); List peerMatches = new ArrayList<>(); for(String rule :acl) { String[] parts = rule.split(" "); if(parts.length != 2) { throw UndertowMessages.MESSAGES.invalidAclRule(rule); } if(parts[1].trim().equals("allow")) { peerMatches.add(new AclMatch(false, parts[0].trim())); } else if(parts[1].trim().equals("deny")) { peerMatches.add(new AclMatch(true, parts[0].trim())); } else { throw UndertowMessages.MESSAGES.invalidAclRule(rule); } } return new Wrapper(peerMatches, defaultAllow == null ? false : defaultAllow, attribute); } } private static class Wrapper implements HandlerWrapper { private final List peerMatches; private final boolean defaultAllow; private final ExchangeAttribute attribute; private Wrapper(List peerMatches, boolean defaultAllow, ExchangeAttribute attribute) { this.peerMatches = peerMatches; this.defaultAllow = defaultAllow; this.attribute = attribute; } @Override public HttpHandler wrap(HttpHandler handler) { AccessControlListHandler res = new AccessControlListHandler(handler, attribute); for(AclMatch match: peerMatches) { if(match.deny) { res.addDeny(match.pattern.pattern()); } else { res.addAllow(match.pattern.pattern()); } } res.setDefaultAllow(defaultAllow); return res; } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy