/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.falcon.security; import org.apache.falcon.util.StartupProperties; import org.apache.log4j.Logger; import javax.servlet.Filter; import javax.servlet.FilterChain; import javax.servlet.FilterConfig; import javax.servlet.ServletException; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import javax.ws.rs.core.Response; import java.io.IOException; import java.security.cert.CertificateExpiredException; import java.security.cert.CertificateNotYetValidException; import java.security.cert.X509Certificate; /** * This verifies that the request has a valid client certificate. * Used by falcon server to talk to prism. */ public class ClientCertificateFilter implements Filter { private static final Logger LOG = Logger.getLogger(ClientCertificateFilter.class); protected boolean enableTLS = false; @Override public void init(FilterConfig filterConfig) throws ServletException { this.enableTLS = Boolean.parseBoolean(StartupProperties.get().getProperty("falcon.enableTLS", "false")); } @Override public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException { if (!(request instanceof HttpServletRequest) || !(response instanceof HttpServletResponse)) { throw new IllegalStateException("Invalid request/response object"); } HttpServletResponse httpResponse = (HttpServletResponse) response; X509Certificate[] certificates = (X509Certificate[]) request. getAttribute("javax.servlet.request.X509Certificate"); if (!enableTLS || isValid(certificates)) { chain.doFilter(request, response); } else { httpResponse.sendError(Response.Status.FORBIDDEN.getStatusCode(), "Request not authorized, valid certificates not presented"); } } private boolean isValid(X509Certificate[] certificates) { boolean valid = false; if (certificates != null) { for (X509Certificate certificate : certificates) { LOG.debug("Issuer: " + certificate.getIssuerDN() + ", Subject: " + certificate.getSubjectDN()); try { certificate.checkValidity(); valid = true; break; } catch (CertificateExpiredException e) { LOG.error("Certificate " + certificate + " expired", e); } catch (CertificateNotYetValidException e) { LOG.error("Certificate " + certificate + " not valid", e); } } } else { LOG.warn("No valid certificates present"); } return valid; } @Override public void destroy() { } }