org.apache.ambari.server.security.SecurityFilter.java Source code

Java tutorial

Introduction

Here is the source code for org.apache.ambari.server.security.SecurityFilter.java

Source

/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements.  See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership.  The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License.  You may obtain a copy of the License at
*
*     http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

package org.apache.ambari.server.security;

import java.io.IOException;
import java.net.URL;
import java.util.regex.Pattern;

import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;

import org.apache.ambari.server.configuration.Configuration;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

public class SecurityFilter implements Filter {

    //Allowed pathes for one way auth https
    private static String CA = "/ca";

    private static Configuration config;
    private final static Log LOG = LogFactory.getLog(SecurityFilter.class);

    @Override
    public void destroy() {
    }

    @Override
    public void doFilter(ServletRequest serReq, ServletResponse serResp, FilterChain filtCh)
            throws IOException, ServletException {

        HttpServletRequest req = (HttpServletRequest) serReq;
        String reqUrl = req.getRequestURL().toString();

        LOG.debug("Filtering " + reqUrl + " for security purposes");
        if (serReq.getLocalPort() != config.getTwoWayAuthPort()) {
            if (isRequestAllowed(reqUrl)) {
                filtCh.doFilter(serReq, serResp);
            } else {
                LOG.warn("This request is not allowed on this port: " + reqUrl);
            }
        } else {
            LOG.debug("Request can continue on secure port " + serReq.getLocalPort());
            filtCh.doFilter(serReq, serResp);
        }
    }

    @Override
    public void init(FilterConfig arg0) throws ServletException {
    }

    private boolean isRequestAllowed(String reqUrl) {
        try {
            URL url = new URL(reqUrl);
            if (!"https".equals(url.getProtocol())) {
                LOG.warn(String.format("Request %s is not using HTTPS", reqUrl));
                return false;
            }

            if (Pattern.matches("/cert/ca(/?)", url.getPath())) {
                return true;
            }

            if (Pattern.matches("/connection_info", url.getPath())) {
                return true;
            }

            if (Pattern.matches("/certs/[^/0-9][^/]*", url.getPath())) {
                return true;
            }

            if (Pattern.matches("/resources/.*", url.getPath())) {
                return true;
            }

        } catch (Exception e) {
            LOG.warn("Exception while validating if request is secure " + e.toString());
        }
        LOG.warn("Request " + reqUrl + " doesn't match any pattern.");
        return false;
    }

    public static void init(Configuration instance) {
        config = instance;
    }
}