/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.gateway.provider.federation.jwt.filter; import java.io.IOException; import java.security.AccessController; import java.util.HashMap; import javax.security.auth.Subject; import javax.servlet.FilterChain; import javax.servlet.FilterConfig; import javax.servlet.ServletException; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; import org.apache.hadoop.gateway.filter.security.AbstractIdentityAssertionFilter; import org.apache.hadoop.gateway.services.GatewayServices; import org.apache.hadoop.gateway.services.registry.ServiceRegistry; import org.apache.hadoop.gateway.services.security.token.JWTokenAuthority; import org.apache.hadoop.gateway.services.security.token.TokenServiceException; import org.apache.hadoop.gateway.services.security.token.impl.JWTToken; import org.apache.hadoop.gateway.util.JsonUtils; public class JWTAuthCodeAssertionFilter extends AbstractIdentityAssertionFilter { private static final String BEARER = "Bearer "; private JWTokenAuthority authority = null; private ServiceRegistry sr; @Override public void init( FilterConfig filterConfig ) throws ServletException { super.init(filterConfig); String validityStr = filterConfig.getInitParameter("validity"); if (validityStr == null) { validityStr = "3600"; // 1 hr. in secs } // validity = Long.parseLong(validityStr); GatewayServices services = (GatewayServices) filterConfig.getServletContext().getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE); authority = (JWTokenAuthority) services.getService(GatewayServices.TOKEN_SERVICE); sr = (ServiceRegistry) services.getService(GatewayServices.SERVICE_REGISTRY_SERVICE); } @Override public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException { Subject subject = Subject.getSubject(AccessController.getContext()); String principalName = getPrincipalName(subject); principalName = mapper.mapUserPrincipal(principalName); JWTToken authCode; try { authCode = authority.issueToken(subject, "RS256"); // get the url for the token service String url = null; if (sr != null) { url = sr.lookupServiceURL("token", "TGS"); } HashMap<String, Object> map = new HashMap<String, Object>(); // TODO: populate map from JWT authorization code // Coverity CID 1327960 if( authCode != null ) { map.put( "iss", authCode.getIssuer() ); map.put( "sub", authCode.getPrincipal() ); map.put( "aud", authCode.getAudience() ); map.put( "exp", authCode.getExpires() ); map.put( "code", authCode.toString() ); } if (url != null) { map.put("tke", url); } String jsonResponse = JsonUtils.renderAsJsonString(map); response.getWriter().write(jsonResponse); //KNOX-685: response.getWriter().flush(); } catch (TokenServiceException e) { // TODO Auto-generated catch block e.printStackTrace(); } return; // break filter chain } }