X-Git-Url: https://git.argeo.org/?a=blobdiff_plain;f=org.argeo.cms%2Fsrc%2Forg%2Fargeo%2Fcms%2Fauth%2FHttpSessionLoginModule.java;h=8cc3941bc191b9b883306706f0d95f0ee8361fad;hb=beec30ca4ad6e0a27b3fe984d987b98988e14e76;hp=ce004c58e86762e5937f4d8bae1aa8e509fe2cc4;hpb=34ba1b915e1d406f6574c0be93e1e9da3eab1978;p=lgpl%2Fargeo-commons.git diff --git a/org.argeo.cms/src/org/argeo/cms/auth/HttpSessionLoginModule.java b/org.argeo.cms/src/org/argeo/cms/auth/HttpSessionLoginModule.java index ce004c58e..8cc3941bc 100644 --- a/org.argeo.cms/src/org/argeo/cms/auth/HttpSessionLoginModule.java +++ b/org.argeo.cms/src/org/argeo/cms/auth/HttpSessionLoginModule.java @@ -2,7 +2,8 @@ package org.argeo.cms.auth; import java.io.IOException; import java.security.cert.X509Certificate; -import java.util.Collection; +import java.util.Base64; +import java.util.Locale; import java.util.Map; import java.util.StringTokenizer; @@ -12,20 +13,17 @@ import javax.security.auth.callback.CallbackHandler; import javax.security.auth.callback.UnsupportedCallbackException; import javax.security.auth.login.LoginException; import javax.security.auth.spi.LoginModule; -import javax.servlet.http.HttpServletRequest; -import javax.servlet.http.HttpServletResponse; -import org.apache.commons.codec.binary.Base64; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; -import org.argeo.cms.CmsException; +import org.argeo.cms.internal.auth.CmsSessionImpl; +import org.argeo.cms.internal.kernel.Activator; import org.osgi.framework.BundleContext; import org.osgi.framework.FrameworkUtil; -import org.osgi.framework.InvalidSyntaxException; -import org.osgi.framework.ServiceReference; import org.osgi.service.http.HttpContext; import org.osgi.service.useradmin.Authorization; +/** Use the HTTP session as the basis for authentication. */ public class HttpSessionLoginModule implements LoginModule { private final static Log log = LogFactory.getLog(HttpSessionLoginModule.class); @@ -33,12 +31,13 @@ public class HttpSessionLoginModule implements LoginModule { private CallbackHandler callbackHandler = null; private Map sharedState = null; - private HttpServletRequest request = null; - private HttpServletResponse response = null; + private HttpRequest request = null; + private HttpResponse response = null; private BundleContext bc; private Authorization authorization; + private Locale locale; @SuppressWarnings("unchecked") @Override @@ -64,40 +63,54 @@ public class HttpSessionLoginModule implements LoginModule { return false; } request = httpCallback.getRequest(); - if (request == null) - return false; - authorization = (Authorization) request.getAttribute(HttpContext.AUTHORIZATION); - if (authorization == null) {// search by session ID - String httpSessionId = request.getSession().getId(); - // authorization = (Authorization) - // request.getSession().getAttribute(HttpContext.AUTHORIZATION); - // if (authorization == null) { - Collection> sr; - try { - sr = bc.getServiceReferences(CmsSession.class, - "(" + CmsSession.SESSION_LOCAL_ID + "=" + httpSessionId + ")"); - } catch (InvalidSyntaxException e) { - throw new CmsException("Cannot get CMS session for id " + httpSessionId, e); - } - if (sr.size() == 1) { - CmsSession cmsSession = bc.getService(sr.iterator().next()); + if (request == null) { + HttpSession httpSession = httpCallback.getHttpSession(); + if (httpSession == null) + return false; + // TODO factorize with below + String httpSessionId = httpSession.getId(); +// if (log.isTraceEnabled()) +// log.trace("HTTP login: " + request.getPathInfo() + " #" + httpSessionId); + CmsSessionImpl cmsSession = CmsAuthUtils.cmsSessionFromHttpSession(bc, httpSessionId); + if (cmsSession != null) { authorization = cmsSession.getAuthorization(); - if (authorization.getName() == null) - authorization = null;// anonymous is not sufficient + locale = cmsSession.getLocale(); if (log.isTraceEnabled()) log.trace("Retrieved authorization from " + cmsSession); - } else if (sr.size() == 0) - authorization = null; - else - throw new CmsException(sr.size() + ">1 web sessions detected for http session " + httpSessionId); - + } + } else { + authorization = (Authorization) request.getAttribute(HttpContext.AUTHORIZATION); + if (authorization == null) {// search by session ID + HttpSession httpSession = request.getSession(); + if (httpSession == null) { + // TODO make sure this is always safe + if (log.isTraceEnabled()) + log.trace("Create http session"); + httpSession = request.createSession(); + } + String httpSessionId = httpSession.getId(); +// if (log.isTraceEnabled()) +// log.trace("HTTP login: " + request.getPathInfo() + " #" + httpSessionId); + CmsSessionImpl cmsSession = CmsAuthUtils.cmsSessionFromHttpSession(bc, httpSessionId); + if (cmsSession != null) { + authorization = cmsSession.getAuthorization(); + locale = cmsSession.getLocale(); + if (log.isTraceEnabled()) + log.trace("Retrieved authorization from " + cmsSession); + } + } + sharedState.put(CmsAuthUtils.SHARED_STATE_HTTP_REQUEST, request); + extractHttpAuth(request); + extractClientCertificate(request); } - sharedState.put(CmsAuthUtils.SHARED_STATE_HTTP_REQUEST, request); - extractHttpAuth(request); - extractClientCertificate(request); if (authorization == null) { + if (log.isTraceEnabled()) + log.trace("HTTP login: " + false); return false; } else { + if (log.isTraceEnabled()) + log.trace("HTTP login: " + true); + request.setAttribute(HttpContext.AUTHORIZATION, authorization); return true; } } @@ -111,7 +124,13 @@ public class HttpSessionLoginModule implements LoginModule { } if (authorization != null) { - CmsAuthUtils.addAuthorization(subject, authorization, request); + // Locale locale = request.getLocale(); + if (locale == null && request != null) + locale = request.getLocale(); + if (locale != null) + subject.getPublicCredentials().add(locale); + CmsAuthUtils.addAuthorization(subject, authorization); + CmsAuthUtils.registerSessionAuthorization(request, subject, authorization, locale); cleanUp(); return true; } else { @@ -137,8 +156,12 @@ public class HttpSessionLoginModule implements LoginModule { return true; } - private void extractHttpAuth(final HttpServletRequest httpRequest) { + private void extractHttpAuth(final HttpRequest httpRequest) { String authHeader = httpRequest.getHeader(CmsAuthUtils.HEADER_AUTHORIZATION); + extractHttpAuth(authHeader); + } + + private void extractHttpAuth(String authHeader) { if (authHeader != null) { StringTokenizer st = new StringTokenizer(authHeader); if (st.hasMoreTokens()) { @@ -146,7 +169,8 @@ public class HttpSessionLoginModule implements LoginModule { if (basic.equalsIgnoreCase("Basic")) { try { // TODO manipulate char[] - String credentials = new String(Base64.decodeBase64(st.nextToken()), "UTF-8"); + Base64.Decoder decoder = Base64.getDecoder(); + String credentials = new String(decoder.decode(st.nextToken()), "UTF-8"); // log.debug("Credentials: " + credentials); int p = credentials.indexOf(":"); if (p != -1) { @@ -155,26 +179,51 @@ public class HttpSessionLoginModule implements LoginModule { sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, login); sharedState.put(CmsAuthUtils.SHARED_STATE_PWD, password); } else { - throw new CmsException("Invalid authentication token"); + throw new IllegalStateException("Invalid authentication token"); } } catch (Exception e) { - throw new CmsException("Couldn't retrieve authentication", e); + throw new IllegalStateException("Couldn't retrieve authentication", e); } } else if (basic.equalsIgnoreCase("Negotiate")) { String spnegoToken = st.nextToken(); - byte[] authToken = Base64.decodeBase64(spnegoToken); + Base64.Decoder decoder = Base64.getDecoder(); + byte[] authToken = decoder.decode(spnegoToken); sharedState.put(CmsAuthUtils.SHARED_STATE_SPNEGO_TOKEN, authToken); } } } + + // auth token + // String mail = request.getParameter(LdapAttrs.mail.name()); + // String authPassword = request.getParameter(LdapAttrs.authPassword.name()); + // if (authPassword != null) { + // sharedState.put(CmsAuthUtils.SHARED_STATE_PWD, authPassword); + // if (mail != null) + // sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, mail); + // } } - private X509Certificate[] extractClientCertificate(HttpServletRequest req) { + private void extractClientCertificate(HttpRequest req) { X509Certificate[] certs = (X509Certificate[]) req.getAttribute("javax.servlet.request.X509Certificate"); - if (null != certs && certs.length > 0) { - return certs; + if (null != certs && certs.length > 0) {// Servlet container verified the client certificate + String certDn = certs[0].getSubjectX500Principal().getName(); + sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, certDn); + sharedState.put(CmsAuthUtils.SHARED_STATE_CERTIFICATE_CHAIN, certs); + if (log.isDebugEnabled()) + log.debug("Client certificate " + certDn + " verified by servlet container"); + } // Reverse proxy verified the client certificate + String clientDnHttpHeader = Activator.getHttpProxySslHeader(); + if (clientDnHttpHeader != null) { + String certDn = req.getHeader(clientDnHttpHeader); + // TODO retrieve more cf. https://httpd.apache.org/docs/current/mod/mod_ssl.html + // String issuerDn = req.getHeader("SSL_CLIENT_I_DN"); + if (certDn != null && !certDn.trim().equals("(null)")) { + sharedState.put(CmsAuthUtils.SHARED_STATE_NAME, certDn); + sharedState.put(CmsAuthUtils.SHARED_STATE_CERTIFICATE_CHAIN, ""); + if (log.isDebugEnabled()) + log.debug("Client certificate " + certDn + " verified by reverse proxy"); + } } - return null; } }