aboutsummaryrefslogtreecommitdiff
path: root/src/main/java/com/juick/service/security/HTTPSignatureAuthenticationFilter.java
blob: 8332fc8c42da6db4f958733a8d286c078b3fe9e8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
package com.juick.service.security;

import com.juick.User;
import com.juick.server.SignatureManager;
import com.juick.service.UserService;
import com.juick.service.security.entities.JuickUser;
import org.springframework.security.authentication.AnonymousAuthenticationToken;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.web.filter.OncePerRequestFilter;

import javax.annotation.Nonnull;
import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.net.URI;
import java.util.Collections;
import java.util.Map;
import java.util.stream.Collectors;

public class HTTPSignatureAuthenticationFilter extends OncePerRequestFilter {

    private final SignatureManager signatureManager;
    private final UserService userService;


    public HTTPSignatureAuthenticationFilter(
            final SignatureManager signatureManager,
            final UserService userService) {
        this.signatureManager = signatureManager;
        this.userService = userService;
    }
    @Override
    protected void doFilterInternal(@Nonnull HttpServletRequest request, @Nonnull HttpServletResponse response, @Nonnull FilterChain filterChain) throws IOException, ServletException {
        if (authenticationIsRequired()) {
            Map<String, String> headers = Collections.list(request.getHeaderNames())
                    .stream()
                    .collect(Collectors.toMap(String::toLowerCase, request::getHeader));
            User user = signatureManager.verifySignature(request.getMethod(), request.getRequestURI(), headers);
            if (!user.isAnonymous()) {
                String userUri = user.getUri().toString();
                if (userUri.length() == 0) {
                    User userWithPassword = userService.getUserByName(user.getName());
                    userWithPassword.setAuthHash(userService.getHashByUID(userWithPassword.getUid()));
                    Authentication authentication = new UsernamePasswordAuthenticationToken(userWithPassword.getName(), userWithPassword.getCredentials());
                    SecurityContextHolder.getContext().setAuthentication(authentication);
                } else {
                    Authentication authentication = new AnonymousAuthenticationToken(userUri, user, Collections.singletonList(new SimpleGrantedAuthority("ROLE_ANONYMOUS")));
                    SecurityContextHolder.getContext().setAuthentication(authentication);
                }
            }
        }

        filterChain.doFilter(request, response);
    }

    private boolean authenticationIsRequired() {
        Authentication existingAuth = SecurityContextHolder.getContext().getAuthentication();

        return existingAuth == null ||
                !existingAuth.isAuthenticated() ||
                existingAuth instanceof AnonymousAuthenticationToken;
    }
}