1 package org
.argeo
.cms
.internal
.kernel
;
3 import static org
.argeo
.cms
.auth
.AuthConstants
.LOGIN_CONTEXT_USER
;
5 import java
.io
.IOException
;
6 import java
.io
.Serializable
;
8 import java
.security
.PrivilegedActionException
;
9 import java
.security
.PrivilegedExceptionAction
;
10 import java
.util
.Properties
;
11 import java
.util
.StringTokenizer
;
13 import javax
.jcr
.Repository
;
14 import javax
.jcr
.RepositoryException
;
15 import javax
.jcr
.Session
;
16 import javax
.security
.auth
.Subject
;
17 import javax
.security
.auth
.callback
.Callback
;
18 import javax
.security
.auth
.callback
.CallbackHandler
;
19 import javax
.security
.auth
.callback
.NameCallback
;
20 import javax
.security
.auth
.callback
.PasswordCallback
;
21 import javax
.security
.auth
.login
.CredentialNotFoundException
;
22 import javax
.security
.auth
.login
.LoginContext
;
23 import javax
.security
.auth
.login
.LoginException
;
24 import javax
.servlet
.ServletException
;
25 import javax
.servlet
.http
.HttpServletRequest
;
26 import javax
.servlet
.http
.HttpServletResponse
;
28 import org
.apache
.commons
.codec
.binary
.Base64
;
29 import org
.apache
.commons
.logging
.Log
;
30 import org
.apache
.commons
.logging
.LogFactory
;
31 import org
.apache
.jackrabbit
.server
.SessionProvider
;
32 import org
.apache
.jackrabbit
.server
.remoting
.davex
.JcrRemotingServlet
;
33 import org
.apache
.jackrabbit
.webdav
.simple
.SimpleWebdavServlet
;
34 import org
.argeo
.cms
.CmsException
;
35 import org
.argeo
.cms
.auth
.AuthConstants
;
36 import org
.argeo
.cms
.auth
.CurrentUser
;
37 import org
.argeo
.cms
.auth
.HttpRequestCallback
;
38 import org
.argeo
.cms
.auth
.HttpRequestCallbackHandler
;
39 import org
.argeo
.jcr
.ArgeoJcrConstants
;
40 import org
.argeo
.jcr
.JcrUtils
;
41 import org
.osgi
.service
.http
.HttpContext
;
42 import org
.osgi
.service
.http
.HttpService
;
43 import org
.osgi
.service
.http
.NamespaceException
;
44 import org
.osgi
.service
.useradmin
.Authorization
;
47 * Intercepts and enriches http access, mainly focusing on security and
50 class DataHttp
implements KernelConstants
, ArgeoJcrConstants
{
51 private final static Log log
= LogFactory
.getLog(DataHttp
.class);
53 // private final static String ATTR_AUTH = "auth";
54 private final static String HEADER_AUTHORIZATION
= "Authorization";
55 private final static String HEADER_WWW_AUTHENTICATE
= "WWW-Authenticate";
57 private final HttpService httpService
;
59 // FIXME Make it more unique
60 private String httpAuthRealm
= "Argeo";
62 // WebDav / JCR remoting
63 private OpenInViewSessionProvider sessionProvider
;
65 DataHttp(HttpService httpService
) {
66 this.httpService
= httpService
;
67 sessionProvider
= new OpenInViewSessionProvider();
68 // registerRepositoryServlets(ALIAS_NODE, node);
71 public void destroy() {
72 // unregisterRepositoryServlets(ALIAS_NODE);
75 void registerRepositoryServlets(String alias
, Repository repository
) {
77 registerWebdavServlet(alias
, repository
, true);
78 registerWebdavServlet(alias
, repository
, false);
79 registerRemotingServlet(alias
, repository
, true);
80 registerRemotingServlet(alias
, repository
, false);
81 } catch (Exception e
) {
82 throw new CmsException("Could not register servlets for repository " + alias
, e
);
86 void unregisterRepositoryServlets(String alias
) {
87 // FIXME unregister servlets
90 void registerWebdavServlet(String alias
, Repository repository
, boolean anonymous
)
91 throws NamespaceException
, ServletException
{
92 WebdavServlet webdavServlet
= new WebdavServlet(repository
, sessionProvider
);
93 String pathPrefix
= anonymous ? WEBDAV_PUBLIC
: WEBDAV_PRIVATE
;
94 String path
= pathPrefix
+ "/" + alias
;
95 Properties ip
= new Properties();
96 ip
.setProperty(WebdavServlet
.INIT_PARAM_RESOURCE_CONFIG
, WEBDAV_CONFIG
);
97 ip
.setProperty(WebdavServlet
.INIT_PARAM_RESOURCE_PATH_PREFIX
, path
);
98 httpService
.registerServlet(path
, webdavServlet
, ip
, new DataHttpContext(anonymous
));
101 void registerRemotingServlet(String alias
, Repository repository
, boolean anonymous
)
102 throws NamespaceException
, ServletException
{
103 String pathPrefix
= anonymous ? REMOTING_PUBLIC
: REMOTING_PRIVATE
;
104 RemotingServlet remotingServlet
= new RemotingServlet(repository
, sessionProvider
);
105 String path
= pathPrefix
+ "/" + alias
;
106 Properties ip
= new Properties();
107 ip
.setProperty(JcrRemotingServlet
.INIT_PARAM_RESOURCE_PATH_PREFIX
, path
);
109 // Looks like a bug in Jackrabbit remoting init
110 ip
.setProperty(RemotingServlet
.INIT_PARAM_HOME
, KernelUtils
.getOsgiInstanceDir() + "/tmp/jackrabbit");
111 ip
.setProperty(RemotingServlet
.INIT_PARAM_TMP_DIRECTORY
, "remoting");
112 // in order to avoid annoying warning.
113 ip
.setProperty(RemotingServlet
.INIT_PARAM_PROTECTED_HANDLERS_CONFIG
, "");
114 httpService
.registerServlet(path
, remotingServlet
, ip
, new DataHttpContext(anonymous
));
117 private Subject
subjectFromRequest(HttpServletRequest request
) {
118 Authorization authorization
= (Authorization
) request
.getAttribute(HttpContext
.AUTHORIZATION
);
119 if (authorization
== null)
120 throw new CmsException("Not authenticated");
122 LoginContext lc
= new LoginContext(AuthConstants
.LOGIN_CONTEXT_USER
,
123 new HttpRequestCallbackHandler(request
));
125 return lc
.getSubject();
126 } catch (LoginException e
) {
127 throw new CmsException("Cannot login", e
);
131 private class DataHttpContext
implements HttpContext
{
132 private final boolean anonymous
;
134 DataHttpContext(boolean anonymous
) {
135 this.anonymous
= anonymous
;
139 public boolean handleSecurity(final HttpServletRequest request
, HttpServletResponse response
)
143 Subject subject
= KernelUtils
.anonymousLogin();
144 Authorization authorization
= subject
.getPrivateCredentials(Authorization
.class).iterator().next();
145 request
.setAttribute(REMOTE_USER
, AuthConstants
.ROLE_ANONYMOUS
);
146 request
.setAttribute(AUTHORIZATION
, authorization
);
150 if (log
.isTraceEnabled())
151 KernelUtils
.logRequestHeaders(log
, request
);
153 new LoginContext(LOGIN_CONTEXT_USER
, new HttpRequestCallbackHandler(request
)).login();
155 } catch (CredentialNotFoundException e
) {
156 CallbackHandler token
= basicAuth(request
);
159 LoginContext lc
= new LoginContext(LOGIN_CONTEXT_USER
, token
);
161 // Note: this is impossible to reliably clear the
162 // authorization header when access from a browser.
164 } catch (LoginException e1
) {
165 throw new CmsException("Could not login", e1
);
168 String path
= request
.getServletPath();
169 if (path
.startsWith(REMOTING_PRIVATE
))
170 requestBasicAuth(request
, response
);
173 } catch (LoginException e
) {
174 throw new CmsException("Could not login", e
);
179 public URL
getResource(String name
) {
180 return Activator
.getBundleContext().getBundle().getResource(name
);
184 public String
getMimeType(String name
) {
188 private void requestBasicAuth(HttpServletRequest request
, HttpServletResponse response
) {
189 response
.setStatus(401);
190 response
.setHeader(HEADER_WWW_AUTHENTICATE
, "basic realm=\"" + httpAuthRealm
+ "\"");
191 // request.getSession().setAttribute(ATTR_AUTH, Boolean.TRUE);
194 private CallbackHandler
basicAuth(final HttpServletRequest httpRequest
) {
195 String authHeader
= httpRequest
.getHeader(HEADER_AUTHORIZATION
);
196 if (authHeader
!= null) {
197 StringTokenizer st
= new StringTokenizer(authHeader
);
198 if (st
.hasMoreTokens()) {
199 String basic
= st
.nextToken();
200 if (basic
.equalsIgnoreCase("Basic")) {
202 // TODO manipulate char[]
203 String credentials
= new String(Base64
.decodeBase64(st
.nextToken()), "UTF-8");
204 // log.debug("Credentials: " + credentials);
205 int p
= credentials
.indexOf(":");
207 final String login
= credentials
.substring(0, p
).trim();
208 final char[] password
= credentials
.substring(p
+ 1).trim().toCharArray();
209 return new CallbackHandler() {
210 public void handle(Callback
[] callbacks
) {
211 for (Callback cb
: callbacks
) {
212 if (cb
instanceof NameCallback
)
213 ((NameCallback
) cb
).setName(login
);
214 else if (cb
instanceof PasswordCallback
)
215 ((PasswordCallback
) cb
).setPassword(password
);
216 else if (cb
instanceof HttpRequestCallback
)
217 ((HttpRequestCallback
) cb
).setRequest(httpRequest
);
222 throw new CmsException("Invalid authentication token");
224 } catch (Exception e
) {
225 throw new CmsException("Couldn't retrieve authentication", e
);
236 * Implements an open session in view patter: a new JCR session is created
239 private class OpenInViewSessionProvider
implements SessionProvider
, Serializable
{
240 private static final long serialVersionUID
= 2270957712453841368L;
242 public Session
getSession(HttpServletRequest request
, Repository rep
, String workspace
)
243 throws javax
.jcr
.LoginException
, ServletException
, RepositoryException
{
244 return login(request
, rep
, workspace
);
247 protected Session
login(HttpServletRequest request
, Repository repository
, String workspace
)
248 throws RepositoryException
{
249 if (log
.isTraceEnabled())
250 log
.trace("Login to workspace " + (workspace
== null ?
"<default>" : workspace
) + " in web session "
251 + request
.getSession().getId());
252 return repository
.login(workspace
);
255 public void releaseSession(Session session
) {
256 JcrUtils
.logoutQuietly(session
);
257 if (log
.isTraceEnabled())
258 log
.trace("Logged out remote JCR session " + session
);
262 private class WebdavServlet
extends SimpleWebdavServlet
{
263 private static final long serialVersionUID
= -4687354117811443881L;
264 private final Repository repository
;
266 public WebdavServlet(Repository repository
, SessionProvider sessionProvider
) {
267 this.repository
= repository
;
268 setSessionProvider(sessionProvider
);
271 public Repository
getRepository() {
276 protected void service(final HttpServletRequest request
, final HttpServletResponse response
)
277 throws ServletException
, IOException
{
279 Subject subject
= subjectFromRequest(request
);
280 if (CurrentUser
.isAnonymous(subject
) && request
.getMethod().equals("GET")) {
281 response
.setHeader("Cache-Control", "no-transform, public, max-age=300, s-maxage=900");
284 Subject
.doAs(subject
, new PrivilegedExceptionAction
<Void
>() {
286 public Void
run() throws Exception
{
287 WebdavServlet
.super.service(request
, response
);
291 } catch (PrivilegedActionException e
) {
292 throw new CmsException("Cannot process webdav request", e
.getException());
297 private class RemotingServlet
extends JcrRemotingServlet
{
298 private static final long serialVersionUID
= 4605238259548058883L;
299 private final Repository repository
;
300 private final SessionProvider sessionProvider
;
302 public RemotingServlet(Repository repository
, SessionProvider sessionProvider
) {
303 this.repository
= repository
;
304 this.sessionProvider
= sessionProvider
;
308 protected Repository
getRepository() {
313 protected SessionProvider
getSessionProvider() {
314 return sessionProvider
;
318 protected void service(final HttpServletRequest request
, final HttpServletResponse response
)
319 throws ServletException
, IOException
{
321 Subject subject
= subjectFromRequest(request
);
322 Subject
.doAs(subject
, new PrivilegedExceptionAction
<Void
>() {
324 public Void
run() throws Exception
{
325 RemotingServlet
.super.service(request
, response
);
329 } catch (PrivilegedActionException e
) {
330 throw new CmsException("Cannot process JCR remoting request", e
.getException());