/** * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.aurora.scheduler.http.api.security; import java.io.IOException; import javax.inject.Inject; import javax.inject.Provider; import javax.servlet.FilterChain; import javax.servlet.ServletException; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.apache.shiro.authz.UnauthenticatedException; import org.apache.shiro.subject.Subject; /** * Allows unauthenticated requests to proceed. It's up to the decorated RPCs to enforce auth * requirement by throwing {@link UnauthenticatedException}. */ public class ShiroKerberosPermissiveAuthenticationFilter extends ShiroKerberosAuthenticationFilter { @Inject ShiroKerberosPermissiveAuthenticationFilter(Provider<Subject> subjectProvider) { super(subjectProvider); } @Override protected void handleUnauthenticated( HttpServletRequest request, HttpServletResponse response, FilterChain chain) throws IOException, ServletException { // Incoming request is unauthenticated, but some RPCs might be okay with that. try { chain.doFilter(request, response); } catch (UnauthenticatedException e) { super.handleUnauthenticated(request, response, chain); } } }