1 package org
.argeo
.cms
.internal
.kernel
;
3 import static org
.argeo
.cms
.auth
.AuthConstants
.LOGIN_CONTEXT_USER
;
5 import java
.io
.IOException
;
6 import java
.io
.Serializable
;
8 import java
.security
.PrivilegedActionException
;
9 import java
.security
.PrivilegedExceptionAction
;
10 import java
.util
.Properties
;
11 import java
.util
.StringTokenizer
;
13 import javax
.jcr
.Repository
;
14 import javax
.jcr
.RepositoryException
;
15 import javax
.jcr
.Session
;
16 import javax
.security
.auth
.Subject
;
17 import javax
.security
.auth
.callback
.Callback
;
18 import javax
.security
.auth
.callback
.CallbackHandler
;
19 import javax
.security
.auth
.callback
.NameCallback
;
20 import javax
.security
.auth
.callback
.PasswordCallback
;
21 import javax
.security
.auth
.login
.CredentialNotFoundException
;
22 import javax
.security
.auth
.login
.LoginContext
;
23 import javax
.security
.auth
.login
.LoginException
;
24 import javax
.servlet
.ServletException
;
25 import javax
.servlet
.http
.HttpServletRequest
;
26 import javax
.servlet
.http
.HttpServletResponse
;
28 import org
.apache
.commons
.codec
.binary
.Base64
;
29 import org
.apache
.commons
.logging
.Log
;
30 import org
.apache
.commons
.logging
.LogFactory
;
31 import org
.apache
.jackrabbit
.server
.SessionProvider
;
32 import org
.apache
.jackrabbit
.server
.remoting
.davex
.JcrRemotingServlet
;
33 import org
.apache
.jackrabbit
.webdav
.simple
.SimpleWebdavServlet
;
34 import org
.argeo
.cms
.CmsException
;
35 import org
.argeo
.cms
.auth
.AuthConstants
;
36 import org
.argeo
.cms
.auth
.CurrentUser
;
37 import org
.argeo
.cms
.auth
.HttpRequestCallback
;
38 import org
.argeo
.cms
.auth
.HttpRequestCallbackHandler
;
39 import org
.argeo
.jcr
.ArgeoJcrConstants
;
40 import org
.argeo
.jcr
.JcrUtils
;
41 import org
.osgi
.service
.http
.HttpContext
;
42 import org
.osgi
.service
.http
.HttpService
;
43 import org
.osgi
.service
.http
.NamespaceException
;
44 import org
.osgi
.service
.useradmin
.Authorization
;
47 * Intercepts and enriches http access, mainly focusing on security and
50 class DataHttp
implements KernelConstants
, ArgeoJcrConstants
{
51 private final static Log log
= LogFactory
.getLog(DataHttp
.class);
53 // private final static String ATTR_AUTH = "auth";
54 private final static String HEADER_AUTHORIZATION
= "Authorization";
55 private final static String HEADER_WWW_AUTHENTICATE
= "WWW-Authenticate";
57 private final HttpService httpService
;
59 // FIXME Make it more unique
60 private String httpAuthRealm
= "Argeo";
62 // WebDav / JCR remoting
63 private OpenInViewSessionProvider sessionProvider
;
65 DataHttp(HttpService httpService
, NodeRepository node
) {
66 this.httpService
= httpService
;
67 sessionProvider
= new OpenInViewSessionProvider();
68 // registerRepositoryServlets(ALIAS_NODE, node);
71 public void destroy() {
72 // unregisterRepositoryServlets(ALIAS_NODE);
75 void registerRepositoryServlets(String alias
, Repository repository
) {
77 registerWebdavServlet(alias
, repository
, true);
78 registerWebdavServlet(alias
, repository
, false);
79 registerRemotingServlet(alias
, repository
, true);
80 registerRemotingServlet(alias
, repository
, false);
81 } catch (Exception e
) {
82 throw new CmsException(
83 "Could not register servlets for repository " + alias
, e
);
87 void unregisterRepositoryServlets(String alias
) {
88 // FIXME unregister servlets
91 void registerWebdavServlet(String alias
, Repository repository
,
92 boolean anonymous
) throws NamespaceException
, ServletException
{
93 WebdavServlet webdavServlet
= new WebdavServlet(repository
,
95 String pathPrefix
= anonymous ? WEBDAV_PUBLIC
: WEBDAV_PRIVATE
;
96 String path
= pathPrefix
+ "/" + alias
;
97 Properties ip
= new Properties();
98 ip
.setProperty(WebdavServlet
.INIT_PARAM_RESOURCE_CONFIG
, WEBDAV_CONFIG
);
99 ip
.setProperty(WebdavServlet
.INIT_PARAM_RESOURCE_PATH_PREFIX
, path
);
100 httpService
.registerServlet(path
, webdavServlet
, ip
,
101 new DataHttpContext(anonymous
));
104 void registerRemotingServlet(String alias
, Repository repository
,
105 boolean anonymous
) throws NamespaceException
, ServletException
{
106 String pathPrefix
= anonymous ? REMOTING_PUBLIC
: REMOTING_PRIVATE
;
107 RemotingServlet remotingServlet
= new RemotingServlet(repository
,
109 String path
= pathPrefix
+ "/" + alias
;
110 Properties ip
= new Properties();
111 ip
.setProperty(JcrRemotingServlet
.INIT_PARAM_RESOURCE_PATH_PREFIX
, path
);
113 // Looks like a bug in Jackrabbit remoting init
114 ip
.setProperty(RemotingServlet
.INIT_PARAM_HOME
,
115 KernelUtils
.getOsgiInstanceDir() + "/tmp/jackrabbit");
116 ip
.setProperty(RemotingServlet
.INIT_PARAM_TMP_DIRECTORY
, "remoting");
117 // in order to avoid annoying warning.
118 ip
.setProperty(RemotingServlet
.INIT_PARAM_PROTECTED_HANDLERS_CONFIG
, "");
119 httpService
.registerServlet(path
, remotingServlet
, ip
,
120 new DataHttpContext(anonymous
));
123 private Subject
subjectFromRequest(HttpServletRequest request
) {
124 Authorization authorization
= (Authorization
) request
125 .getAttribute(HttpContext
.AUTHORIZATION
);
126 if (authorization
== null)
127 throw new CmsException("Not authenticated");
129 LoginContext lc
= new LoginContext(
130 AuthConstants
.LOGIN_CONTEXT_USER
,
131 new HttpRequestCallbackHandler(request
));
133 return lc
.getSubject();
134 } catch (LoginException e
) {
135 throw new CmsException("Cannot login", e
);
139 private class DataHttpContext
implements HttpContext
{
140 private final boolean anonymous
;
142 DataHttpContext(boolean anonymous
) {
143 this.anonymous
= anonymous
;
147 public boolean handleSecurity(final HttpServletRequest request
,
148 HttpServletResponse response
) throws IOException
{
151 Subject subject
= KernelUtils
.anonymousLogin();
152 Authorization authorization
= subject
153 .getPrivateCredentials(Authorization
.class).iterator()
155 request
.setAttribute(REMOTE_USER
, AuthConstants
.ROLE_ANONYMOUS
);
156 request
.setAttribute(AUTHORIZATION
, authorization
);
160 if (log
.isTraceEnabled())
161 KernelUtils
.logRequestHeaders(log
, request
);
163 new LoginContext(LOGIN_CONTEXT_USER
,
164 new HttpRequestCallbackHandler(request
)).login();
166 } catch (CredentialNotFoundException e
) {
167 CallbackHandler token
= basicAuth(request
);
170 LoginContext lc
= new LoginContext(LOGIN_CONTEXT_USER
,
173 // Note: this is impossible to reliably clear the
174 // authorization header when access from a browser.
176 } catch (LoginException e1
) {
177 throw new CmsException("Could not login", e1
);
180 requestBasicAuth(request
, response
);
183 } catch (LoginException e
) {
184 throw new CmsException("Could not login", e
);
189 public URL
getResource(String name
) {
190 return Activator
.getBundleContext().getBundle().getResource(name
);
194 public String
getMimeType(String name
) {
198 private void requestBasicAuth(HttpServletRequest request
,
199 HttpServletResponse response
) {
200 response
.setStatus(401);
201 response
.setHeader(HEADER_WWW_AUTHENTICATE
, "basic realm=\""
202 + httpAuthRealm
+ "\"");
203 // request.getSession().setAttribute(ATTR_AUTH, Boolean.TRUE);
206 private CallbackHandler
basicAuth(final HttpServletRequest httpRequest
) {
207 String authHeader
= httpRequest
.getHeader(HEADER_AUTHORIZATION
);
208 if (authHeader
!= null) {
209 StringTokenizer st
= new StringTokenizer(authHeader
);
210 if (st
.hasMoreTokens()) {
211 String basic
= st
.nextToken();
212 if (basic
.equalsIgnoreCase("Basic")) {
214 // TODO manipulate char[]
215 String credentials
= new String(
216 Base64
.decodeBase64(st
.nextToken()),
218 // log.debug("Credentials: " + credentials);
219 int p
= credentials
.indexOf(":");
221 final String login
= credentials
222 .substring(0, p
).trim();
223 final char[] password
= credentials
224 .substring(p
+ 1).trim().toCharArray();
225 return new CallbackHandler() {
226 public void handle(Callback
[] callbacks
) {
227 for (Callback cb
: callbacks
) {
228 if (cb
instanceof NameCallback
)
231 else if (cb
instanceof PasswordCallback
)
232 ((PasswordCallback
) cb
)
233 .setPassword(password
);
234 else if (cb
instanceof HttpRequestCallback
)
235 ((HttpRequestCallback
) cb
)
236 .setRequest(httpRequest
);
241 throw new CmsException(
242 "Invalid authentication token");
244 } catch (Exception e
) {
245 throw new CmsException(
246 "Couldn't retrieve authentication", e
);
257 * Implements an open session in view patter: a new JCR session is created
260 private class OpenInViewSessionProvider
implements SessionProvider
,
262 private static final long serialVersionUID
= 2270957712453841368L;
264 public Session
getSession(HttpServletRequest request
, Repository rep
,
265 String workspace
) throws javax
.jcr
.LoginException
,
266 ServletException
, RepositoryException
{
267 return login(request
, rep
, workspace
);
270 protected Session
login(HttpServletRequest request
,
271 Repository repository
, String workspace
)
272 throws RepositoryException
{
273 if (log
.isTraceEnabled())
274 log
.trace("Login to workspace "
275 + (workspace
== null ?
"<default>" : workspace
)
276 + " in web session " + request
.getSession().getId());
277 return repository
.login(workspace
);
280 public void releaseSession(Session session
) {
281 JcrUtils
.logoutQuietly(session
);
282 if (log
.isTraceEnabled())
283 log
.trace("Logged out remote JCR session " + session
);
287 private class WebdavServlet
extends SimpleWebdavServlet
{
288 private static final long serialVersionUID
= -4687354117811443881L;
289 private final Repository repository
;
291 public WebdavServlet(Repository repository
,
292 SessionProvider sessionProvider
) {
293 this.repository
= repository
;
294 setSessionProvider(sessionProvider
);
297 public Repository
getRepository() {
302 protected void service(final HttpServletRequest request
,
303 final HttpServletResponse response
) throws ServletException
,
306 Subject subject
= subjectFromRequest(request
);
307 if (CurrentUser
.isAnonymous(subject
)
308 && request
.getMethod().equals("GET")) {
309 response
.setHeader("Cache-Control",
310 "no-transform, public, max-age=300, s-maxage=900");
313 Subject
.doAs(subject
, new PrivilegedExceptionAction
<Void
>() {
315 public Void
run() throws Exception
{
316 WebdavServlet
.super.service(request
, response
);
320 } catch (PrivilegedActionException e
) {
321 throw new CmsException("Cannot process webdav request",
327 private class RemotingServlet
extends JcrRemotingServlet
{
328 private static final long serialVersionUID
= 4605238259548058883L;
329 private final Repository repository
;
330 private final SessionProvider sessionProvider
;
332 public RemotingServlet(Repository repository
,
333 SessionProvider sessionProvider
) {
334 this.repository
= repository
;
335 this.sessionProvider
= sessionProvider
;
339 protected Repository
getRepository() {
344 protected SessionProvider
getSessionProvider() {
345 return sessionProvider
;
349 protected void service(final HttpServletRequest request
,
350 final HttpServletResponse response
) throws ServletException
,
353 Subject subject
= subjectFromRequest(request
);
354 Subject
.doAs(subject
, new PrivilegedExceptionAction
<Void
>() {
356 public Void
run() throws Exception
{
357 RemotingServlet
.super.service(request
, response
);
361 } catch (PrivilegedActionException e
) {
362 throw new CmsException("Cannot process JCR remoting request",