net.yacy.data.TransactionManager.java Source code

Java tutorial

Introduction

Here is the source code for net.yacy.data.TransactionManager.java

Source

// TransactionManager.java
// Copyright 2017 by luccioman; https://github.com/luccioman
//
// This is a part of YaCy, a peer-to-peer based web search engine
//
// LICENSE
//
// This program is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA

package net.yacy.data;

import java.nio.charset.StandardCharsets;
import java.security.MessageDigest;
import java.util.UUID;

import org.apache.commons.codec.digest.HmacAlgorithms;
import org.apache.commons.codec.digest.HmacUtils;

import net.yacy.cora.order.Base64Order;
import net.yacy.cora.protocol.HeaderFramework;
import net.yacy.cora.protocol.RequestHeader;
import net.yacy.http.servlets.DisallowedMethodException;
import net.yacy.http.servlets.TemplateMissingParameterException;
import net.yacy.search.Switchboard;
import net.yacy.search.SwitchboardConstants;
import net.yacy.server.serverObjects;

/**
 * This class provides transaction tokens generation and checking for protected operations.
 * These tokens should be designed to be hard to forge by an unauthenticated user.
 */
public class TransactionManager {

    /** Parameter name of the transaction token */
    public static final String TRANSACTION_TOKEN_PARAM = "transactionToken";

    /** Secret signing key valid until next server restart */
    private static final String SIGNING_KEY = UUID.randomUUID().toString();

    /** Random token seed valid until next server restart */
    private static final String TOKEN_SEED = UUID.randomUUID().toString();

    /**
     * @param header
     *            current request header. Must not be null.
     * @return the name of the currently authenticated user (administrator user
     *         name when the request comes from local host and unauthenticated local
     *         access as administrator is enabled), or null when no authenticated.
     * @throws NullPointerException
     *             when header parameter is null.
     */
    private static String getCurrentUserName(final RequestHeader header) {
        String userName = header.getRemoteUser();

        if (userName == null && header.accessFromLocalhost() && Switchboard.getSwitchboard() != null) {
            final String adminAccountUserName = Switchboard.getSwitchboard()
                    .getConfig(SwitchboardConstants.ADMIN_ACCOUNT_USER_NAME, "admin");
            final String adminAccountBase64MD5 = Switchboard.getSwitchboard()
                    .getConfig(SwitchboardConstants.ADMIN_ACCOUNT_B64MD5, "");

            if (Switchboard.getSwitchboard().getConfigBool(SwitchboardConstants.ADMIN_ACCOUNT_FOR_LOCALHOST,
                    false)) {
                /* Unauthenticated local access as administrator can be enabled */
                userName = adminAccountUserName;
            } else {
                /* authorization by encoded password, only for localhost access (used by bash scripts)*/
                String pass = Base64Order.standardCoder
                        .encodeString(adminAccountUserName + ":" + adminAccountBase64MD5);

                /* get the authorization string from the header */
                final String realmProp = (header.get(RequestHeader.AUTHORIZATION, "")).trim();
                final String realmValue = realmProp.isEmpty() ? null : realmProp.substring(6); // take out "BASIC "

                if (pass.equals(realmValue)) { // assume realmValue as is in cfg
                    userName = adminAccountUserName;
                }
            }
        }

        return userName;
    }

    /**
     * Get a transaction token to be used later on a protected HTTP post method
     * call on the same path with the currently authenticated user.
     * 
     * @param header
     *            current request header
     * @return a transaction token
     * @throws IllegalArgumentException
     *             when header parameter is null or when the user is not authenticated.
     */
    public static String getTransactionToken(final RequestHeader header) {
        if (header == null) {
            throw new IllegalArgumentException("Missing required header parameter");
        }

        return getTransactionToken(header, header.getPathInfo());
    }

    /**
     * Get a transaction token to be used later on a protected HTTP post method
     * call on the specified path with the currently authenticated user.
     * 
     * @param header
     *            current request header
     * @param path the relative path for which the token will be valid
     * @return a transaction token for the specified path
     * @throws IllegalArgumentException
     *             when a parameter is null or when the user is not authenticated.
     */
    public static String getTransactionToken(final RequestHeader header, final String path) {
        if (header == null) {
            throw new IllegalArgumentException("Missing required header parameter");
        }

        /* Check this comes from an authenticated user */
        final String userName = getCurrentUserName(header);
        if (userName == null) {
            throw new IllegalArgumentException("User is not authenticated");
        }

        /* Produce a token by signing a message with the server secret key : 
         * The token is not unique per request and thus keeps the service stateless 
         * (no need to store tokens until they are consumed).
         * On the other hand, it is supposed to remain hard enough to forge because the secret key and token seed 
         * are initialized with a random value at each server startup */
        final String token = new HmacUtils(HmacAlgorithms.HMAC_SHA_1, SIGNING_KEY)
                .hmacHex(TOKEN_SEED + userName + path);

        return token;
    }

    /**
     * Check the current request is a valid HTTP POST transaction : the current user is authenticated, 
     * and the request post parameters contain a valid transaction token.
     * @param header current request header
     * @param post request parameters
     * @throws IllegalArgumentException when a parameter is null.
     * @throws DisallowedMethodException when the HTTP method is something else than post
     * @throws TemplateMissingParameterException when the transaction token is missing
     * @throws BadTransactionException when a condition for valid transaction is not met.
     */
    public static void checkPostTransaction(final RequestHeader header, final serverObjects post) {
        if (header == null || post == null) {
            throw new IllegalArgumentException("Missing required parameters.");
        }

        if (!HeaderFramework.METHOD_POST.equals(header.getMethod())) {
            throw new DisallowedMethodException("HTTP POST method is the only one authorized.");
        }

        String userName = getCurrentUserName(header);
        if (userName == null) {
            throw new BadTransactionException("User is not authenticated.");
        }

        final String transactionToken = post.get(TRANSACTION_TOKEN_PARAM);
        if (transactionToken == null) {
            throw new TemplateMissingParameterException("Missing transaction token.");
        }

        final String token = new HmacUtils(HmacAlgorithms.HMAC_SHA_1, SIGNING_KEY)
                .hmacHex(TOKEN_SEED + userName + header.getPathInfo());

        /* Compare the server generated token with the one received in the post parameters, 
         * using a time constant function */
        if (!MessageDigest.isEqual(token.getBytes(StandardCharsets.UTF_8),
                transactionToken.getBytes(StandardCharsets.UTF_8))) {
            throw new BadTransactionException("Invalid transaction token.");
        }
    }

}