/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.ambari.server.security; import java.io.IOException; import java.net.URL; import java.util.regex.Pattern; import javax.servlet.Filter; import javax.servlet.FilterChain; import javax.servlet.FilterConfig; import javax.servlet.ServletException; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; import javax.servlet.http.HttpServletRequest; import org.apache.ambari.server.configuration.Configuration; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; public class SecurityFilter implements Filter { //Allowed pathes for one way auth https private static String CA = "/ca"; private static Configuration config; private final static Log LOG = LogFactory.getLog(SecurityFilter.class); @Override public void destroy() { } @Override public void doFilter(ServletRequest serReq, ServletResponse serResp, FilterChain filtCh) throws IOException, ServletException { HttpServletRequest req = (HttpServletRequest) serReq; String reqUrl = req.getRequestURL().toString(); LOG.debug("Filtering " + reqUrl + " for security purposes"); if (serReq.getLocalPort() != config.getTwoWayAuthPort()) { if (isRequestAllowed(reqUrl)) { filtCh.doFilter(serReq, serResp); } else { LOG.warn("This request is not allowed on this port: " + reqUrl); } } else { LOG.debug("Request can continue on secure port " + serReq.getLocalPort()); filtCh.doFilter(serReq, serResp); } } @Override public void init(FilterConfig arg0) throws ServletException { } private boolean isRequestAllowed(String reqUrl) { try { URL url = new URL(reqUrl); if (!"https".equals(url.getProtocol())) { LOG.warn(String.format("Request %s is not using HTTPS", reqUrl)); return false; } if (Pattern.matches("/cert/ca(/?)", url.getPath())) { return true; } if (Pattern.matches("/connection_info", url.getPath())) { return true; } if (Pattern.matches("/certs/[^/0-9][^/]*", url.getPath())) { return true; } if (Pattern.matches("/resources/.*", url.getPath())) { return true; } } catch (Exception e) { LOG.warn("Exception while validating if request is secure " + e.toString()); } LOG.warn("Request " + reqUrl + " doesn't match any pattern."); return false; } public static void init(Configuration instance) { config = instance; } }