/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2010-2015 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* http://glassfish.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package org.glassfish.jersey.server.oauth1;
import java.io.IOException;
import java.lang.reflect.Method;
import java.util.Collections;
import java.util.HashSet;
import java.util.Set;
import java.util.concurrent.TimeUnit;
import java.util.regex.Pattern;
import javax.ws.rs.Priorities;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.core.Configuration;
import javax.ws.rs.core.Response;
import javax.annotation.Priority;
import javax.inject.Inject;
import javax.inject.Provider;
import org.glassfish.jersey.internal.util.PropertiesHelper;
import org.glassfish.jersey.oauth1.signature.OAuth1Parameters;
import org.glassfish.jersey.oauth1.signature.OAuth1Secrets;
import org.glassfish.jersey.oauth1.signature.OAuth1Signature;
import org.glassfish.jersey.oauth1.signature.OAuth1SignatureException;
import org.glassfish.jersey.server.ExtendedUriInfo;
import org.glassfish.jersey.server.oauth1.internal.OAuthServerRequest;
/**
* OAuth request filter that filters all requests indicating in the Authorization
* header they use OAuth. Checks if the incoming requests are properly authenticated
* and populates the security context with the corresponding user principal and roles.
* <p>
*
* @author Paul C. Bryan <pbryan@sun.com>
* @author Martin Matula
*/
@Priority(Priorities.AUTHENTICATION)
class OAuth1ServerFilter implements ContainerRequestFilter {
/** OAuth Server */
@Inject
private OAuth1Provider provider;
/** Manages and validates incoming nonces. */
private final NonceManager nonces;
/** Value to return in www-authenticate header when 401 response returned. */
private final String wwwAuthenticateHeader;
/** OAuth protocol versions that are supported. */
private final Set<String> versions;
/** Regular expression pattern for path to ignore. */
private final Pattern ignorePathPattern;
@Inject
private OAuth1Signature oAuth1Signature;
@Inject
private Provider<ExtendedUriInfo> uriInfo;
private final boolean optional;
/**
* Create a new filter.
* @param rc Resource config.
*/
@Inject
public OAuth1ServerFilter(Configuration rc) {
// establish supported OAuth protocol versions
HashSet<String> v = new HashSet<String>();
v.add(null);
v.add("1.0");
versions = Collections.unmodifiableSet(v);
// optional initialization parameters (defaulted)
String realm = OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.REALM, "default", String.class);
/* Maximum age (in milliseconds) of timestamp to accept in incoming messages. */
int maxAge = OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.MAX_AGE, 300000);
/* Average requests to process between nonce garbage collection passes. */
int gcPeriod = OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.GC_PERIOD, 100);
ignorePathPattern = pattern(
OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.IGNORE_PATH_PATTERN,
null, String.class)); // no pattern
optional = PropertiesHelper.isProperty(rc.getProperties(), OAuth1ServerProperties.NO_FAIL);
final String timeUnitStr = OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.TIMESTAMP_UNIT,
String.class);
final TimeUnit timeUnit = timeUnitStr != null ? TimeUnit.valueOf(timeUnitStr) : TimeUnit.SECONDS;
final int maxCacheSize = OAuth1ServerProperties.getValue(rc.getProperties(), OAuth1ServerProperties.MAX_NONCE_CACHE_SIZE,
2000000);
nonces = new NonceManager(maxAge, gcPeriod, timeUnit, maxCacheSize);
// www-authenticate header for the life of the object
wwwAuthenticateHeader = "OAuth realm=\"" + realm + "\"";
}
@Override
public void filter(ContainerRequestContext request) throws IOException {
// do not filter requests that do not use OAuth authentication
String authHeader = request.getHeaderString(OAuth1Parameters.AUTHORIZATION_HEADER);
if (authHeader == null || !authHeader.toUpperCase().startsWith(OAuth1Parameters.SCHEME.toUpperCase())) {
return;
}
// do not filter requests that matches to access or token resources
final Method handlingMethod = uriInfo.get().getMatchedResourceMethod().getInvocable().getHandlingMethod();
if (handlingMethod.isAnnotationPresent(TokenResource.class)
|| handlingMethod.getDeclaringClass().isAnnotationPresent(TokenResource.class)) {
return;
}
// do not filter if the request path matches pattern to ignore
if (match(ignorePathPattern, request.getUriInfo().getPath())) {
return;
}
OAuth1SecurityContext sc;
try {
sc = getSecurityContext(request);
} catch (OAuth1Exception e) {
if (optional) {
return;
} else {
throw e;
}
}
request.setSecurityContext(sc);
}
private OAuth1SecurityContext getSecurityContext(ContainerRequestContext request) throws OAuth1Exception {
OAuthServerRequest osr = new OAuthServerRequest(request);
OAuth1Parameters params = new OAuth1Parameters().readRequest(osr);
// apparently not signed with any OAuth parameters; unauthorized
if (params.size() == 0) {
throw newUnauthorizedException();
}
// get required OAuth parameters
String consumerKey = requiredOAuthParam(params.getConsumerKey());
String token = params.getToken();
String timestamp = requiredOAuthParam(params.getTimestamp());
String nonce = requiredOAuthParam(params.getNonce());
// enforce other supported and required OAuth parameters
requiredOAuthParam(params.getSignature());
supportedOAuthParam(params.getVersion(), versions);
// retrieve secret for consumer key
OAuth1Consumer consumer = provider.getConsumer(consumerKey);
if (consumer == null) {
throw newUnauthorizedException();
}
OAuth1Secrets secrets = new OAuth1Secrets().consumerSecret(consumer.getSecret());
OAuth1SecurityContext sc;
String nonceKey;
if (token == null) {
if (consumer.getPrincipal() == null) {
throw newUnauthorizedException();
}
nonceKey = "c:" + consumerKey;
sc = new OAuth1SecurityContext(consumer, request.getSecurityContext().isSecure());
} else {
OAuth1Token accessToken = provider.getAccessToken(token);
if (accessToken == null) {
throw newUnauthorizedException();
}
OAuth1Consumer atConsumer = accessToken.getConsumer();
if (atConsumer == null || !consumerKey.equals(atConsumer.getKey())) {
throw newUnauthorizedException();
}
nonceKey = "t:" + token;
secrets.tokenSecret(accessToken.getSecret());
sc = new OAuth1SecurityContext(accessToken, request.getSecurityContext().isSecure());
}
if (!verifySignature(osr, params, secrets)) {
throw newUnauthorizedException();
}
if (!nonces.verify(nonceKey, timestamp, nonce)) {
throw newUnauthorizedException();
}
return sc;
}
private static String requiredOAuthParam(String value) throws OAuth1Exception {
if (value == null) {
throw newBadRequestException();
}
return value;
}
private static String supportedOAuthParam(String value, Set<String> set) throws OAuth1Exception {
if (!set.contains(value)) {
throw newBadRequestException();
}
return value;
}
private static Pattern pattern(String p) {
if (p == null) {
return null;
}
return Pattern.compile(p);
}
private static boolean match(Pattern pattern, String value) {
return (pattern != null && value != null && pattern.matcher(value).matches());
}
private boolean verifySignature(OAuthServerRequest osr, OAuth1Parameters params, OAuth1Secrets secrets) {
try {
return oAuth1Signature.verify(osr, params, secrets);
} catch (OAuth1SignatureException ose) {
throw newBadRequestException();
}
}
private static OAuth1Exception newBadRequestException() throws OAuth1Exception {
return new OAuth1Exception(Response.Status.BAD_REQUEST, null);
}
private OAuth1Exception newUnauthorizedException() throws OAuth1Exception {
return new OAuth1Exception(Response.Status.UNAUTHORIZED, wwwAuthenticateHeader);
}
}