/*
* Copyright 2014 - 2015 SoftInstigate.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.restheart.security;
import io.undertow.security.api.SecurityContext;
import io.undertow.security.idm.Account;
import io.undertow.security.idm.IdentityManager;
import io.undertow.security.idm.PasswordCredential;
import io.undertow.security.impl.BasicAuthenticationMechanism;
import io.undertow.server.HttpServerExchange;
import io.undertow.util.FlexBase64;
import static io.undertow.util.Headers.AUTHORIZATION;
import static io.undertow.util.Headers.BASIC;
import static io.undertow.util.StatusCodes.UNAUTHORIZED;
import java.io.IOException;
import java.nio.ByteBuffer;
import java.nio.charset.Charset;
import java.util.List;
import org.restheart.security.impl.AuthTokenIdentityManager;
/**
*
* @author Andrea Di Cesare {@literal <andrea@softinstigate.com>}
this extends the undertow BasicAuthenticationMechanism and authenticate the
request using the AuthTokenIdentityManager.
if user already authenticated via a different mechanism, that a token is
generated so that later calls can be use the token instead of the actual
password
*
*/
public class AuthTokenAuthenticationMechanism extends BasicAuthenticationMechanism {
private static final Charset UTF_8 = Charset.forName("UTF-8");
private final String mechanismName = "TOKEN";
private static final String BASIC_PREFIX = BASIC + " ";
private static final int PREFIX_LENGTH = BASIC_PREFIX.length();
private static final String COLON = ":";
/**
*
* @param realmName
*/
public AuthTokenAuthenticationMechanism(String realmName) {
super(realmName, "TOKEN", true);
}
@Override
public AuthenticationMechanismOutcome authenticate(HttpServerExchange exchange, SecurityContext securityContext) {
List<String> authHeaders = exchange.getRequestHeaders().get(AUTHORIZATION);
if (authHeaders != null) {
for (String current : authHeaders) {
if (current.startsWith(BASIC_PREFIX)) {
String base64Challenge = current.substring(PREFIX_LENGTH);
String plainChallenge = null;
try {
ByteBuffer decode = FlexBase64.decode(base64Challenge);
plainChallenge = new String(decode.array(), decode.arrayOffset(), decode.limit(), UTF_8);
} catch (IOException e) {
}
int colonPos;
if (plainChallenge != null && (colonPos = plainChallenge.indexOf(COLON)) > -1) {
String userName = plainChallenge.substring(0, colonPos);
char[] password = plainChallenge.substring(colonPos + 1).toCharArray();
// this is where the token cache comes into play
IdentityManager idm = AuthTokenIdentityManager.getInstance();
PasswordCredential credential = new PasswordCredential(password);
try {
final AuthenticationMechanismOutcome result;
Account account = idm.verify(userName, credential);
if (account != null) {
securityContext.authenticationComplete(account, mechanismName, false);
result = AuthenticationMechanismOutcome.AUTHENTICATED;
} else {
result = AuthenticationMechanismOutcome.NOT_ATTEMPTED;
}
return result;
} finally {
clear(password);
}
}
return AuthenticationMechanismOutcome.NOT_ATTEMPTED;
}
}
}
return AuthenticationMechanismOutcome.NOT_ATTEMPTED;
}
@Override
public ChallengeResult sendChallenge(HttpServerExchange exchange, SecurityContext securityContext) {
String authHeader = exchange.getRequestHeaders().getFirst(AUTHORIZATION);
if (authHeader == null) {
return new ChallengeResult(false); // --> FORBIDDEN
} else {
return new ChallengeResult(true, UNAUTHORIZED);
}
}
private static void clear(final char[] array) {
for (int i = 0; i < array.length; i++) {
array[i] = 0x00;
}
}
}