/* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright (c) 2012-2016 Oracle and/or its affiliates. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common Development * and Distribution License("CDDL") (collectively, the "License"). You * may not use this file except in compliance with the License. You can * obtain a copy of the License at * http://glassfish.java.net/public/CDDL+GPL_1_1.html * or packager/legal/LICENSE.txt. See the License for the specific * language governing permissions and limitations under the License. * * When distributing the software, include this License Header Notice in each * file and include the License file at packager/legal/LICENSE.txt. * * GPL Classpath Exception: * Oracle designates this particular file as subject to the "Classpath" * exception as provided by Oracle in the GPL Version 2 section of the License * file that accompanied this code. * * Modifications: * If applicable, add the following below the License Header, with the fields * enclosed by brackets [] replaced by your own identifying information: * "Portions Copyright [year] [name of copyright owner]" * * Contributor(s): * If you wish your version of this file to be governed by only the CDDL or * only the GPL Version 2, indicate your decision by adding "[Contributor] * elects to include this software in this distribution under the [CDDL or GPL * Version 2] license." If you don't indicate a single choice of license, a * recipient has the option to distribute your version of this file under * either the CDDL, the GPL Version 2 or to extend the choice of license to * its licensees as provided above. However, if you add GPL Version 2 code * and therefore, elected the GPL Version 2 license, then the option applies * only if the new code is made subject to such option by the copyright * holder. */ package org.glassfish.jersey.server.filter; import java.io.IOException; import javax.ws.rs.ForbiddenException; import javax.ws.rs.NotAuthorizedException; import javax.ws.rs.Priorities; import javax.ws.rs.container.ContainerRequestContext; import javax.ws.rs.container.ContainerRequestFilter; import javax.ws.rs.container.DynamicFeature; import javax.ws.rs.container.ResourceInfo; import javax.ws.rs.core.FeatureContext; import javax.annotation.Priority; import javax.annotation.security.DenyAll; import javax.annotation.security.PermitAll; import javax.annotation.security.RolesAllowed; import org.glassfish.jersey.server.internal.LocalizationMessages; import org.glassfish.jersey.server.model.AnnotatedMethod; /** * A {@link DynamicFeature} supporting the {@code javax.annotation.security.RolesAllowed}, * {@code javax.annotation.security.PermitAll} and {@code javax.annotation.security.DenyAll} * on resource methods and sub-resource methods. * <p/> * The {@link javax.ws.rs.core.SecurityContext} is utilized, using the * {@link javax.ws.rs.core.SecurityContext#isUserInRole(String) } method, * to ascertain if the user is in one * of the roles declared in by a {@code @RolesAllowed}. If a user is in none of * the declared roles then a 403 (Forbidden) response is returned. * <p/> * If the {@code @DenyAll} annotation is declared then a 403 (Forbidden) response * is returned. * <p/> * If the {@code @PermitAll} annotation is declared and is not overridden then * this filter will not be applied. * <p/> * If a user is not authenticated and annotated method is restricted for certain roles then a 403 * (Not Authenticated) response is returned. * * @author Paul Sandoz * @author Martin Matula */ public class RolesAllowedDynamicFeature implements DynamicFeature { @Override public void configure(final ResourceInfo resourceInfo, final FeatureContext configuration) { final AnnotatedMethod am = new AnnotatedMethod(resourceInfo.getResourceMethod()); // DenyAll on the method take precedence over RolesAllowed and PermitAll if (am.isAnnotationPresent(DenyAll.class)) { configuration.register(new RolesAllowedRequestFilter()); return; } // RolesAllowed on the method takes precedence over PermitAll RolesAllowed ra = am.getAnnotation(RolesAllowed.class); if (ra != null) { configuration.register(new RolesAllowedRequestFilter(ra.value())); return; } // PermitAll takes precedence over RolesAllowed on the class if (am.isAnnotationPresent(PermitAll.class)) { // Do nothing. return; } // DenyAll can't be attached to classes // RolesAllowed on the class takes precedence over PermitAll ra = resourceInfo.getResourceClass().getAnnotation(RolesAllowed.class); if (ra != null) { configuration.register(new RolesAllowedRequestFilter(ra.value())); } } @Priority(Priorities.AUTHORIZATION) // authorization filter - should go after any authentication filters private static class RolesAllowedRequestFilter implements ContainerRequestFilter { private final boolean denyAll; private final String[] rolesAllowed; RolesAllowedRequestFilter() { this.denyAll = true; this.rolesAllowed = null; } RolesAllowedRequestFilter(final String[] rolesAllowed) { this.denyAll = false; this.rolesAllowed = (rolesAllowed != null) ? rolesAllowed : new String[] {}; } @Override public void filter(final ContainerRequestContext requestContext) throws IOException { if (!denyAll) { if (rolesAllowed.length > 0 && !isAuthenticated(requestContext)) { throw new ForbiddenException(LocalizationMessages.USER_NOT_AUTHORIZED()); } for (final String role : rolesAllowed) { if (requestContext.getSecurityContext().isUserInRole(role)) { return; } } } throw new ForbiddenException(LocalizationMessages.USER_NOT_AUTHORIZED()); } private static boolean isAuthenticated(final ContainerRequestContext requestContext) { return requestContext.getSecurityContext().getUserPrincipal() != null; } } }