aboutsummaryrefslogtreecommitdiff
path: root/src/main/java/com/juick/service/security/HTTPSignatureAuthenticationFilter.java
blob: ffe4a1255ed1d98fd4be2fde022b3df58ea79441 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
package com.juick.service.security;

import com.juick.User;
import com.juick.server.SignatureManager;
import com.juick.service.UserService;
import org.apache.commons.io.IOUtils;
import org.springframework.security.authentication.AnonymousAuthenticationToken;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.web.filter.OncePerRequestFilter;

import javax.annotation.Nonnull;
import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.util.Collections;
import java.util.Map;
import java.util.stream.Collectors;

public class HTTPSignatureAuthenticationFilter extends OncePerRequestFilter {

    private final SignatureManager signatureManager;
    private final UserService userService;


    public HTTPSignatureAuthenticationFilter(
            final SignatureManager signatureManager,
            final UserService userService) {
        this.signatureManager = signatureManager;
        this.userService = userService;
    }
    @Override
    protected void doFilterInternal(@Nonnull HttpServletRequest request, @Nonnull HttpServletResponse response, @Nonnull FilterChain filterChain) throws IOException, ServletException {
        if (authenticationIsRequired()) {
            Map<String, String> headers = Collections.list(request.getHeaderNames())
                    .stream()
                    .collect(Collectors.toMap(String::toLowerCase, request::getHeader));
            try {
                User user = signatureManager.verifySignature(request.getMethod(), request.getRequestURI(), headers);
                if (!user.isAnonymous()) {
                    String userUri = user.getUri().toString();
                    if (userUri.length() == 0) {
                        User userWithPassword = userService.getUserByName(user.getName());
                        userWithPassword.setAuthHash(userService.getHashByUID(userWithPassword.getUid()));
                        Authentication authentication = new UsernamePasswordAuthenticationToken(userWithPassword.getName(), userWithPassword.getCredentials());
                        SecurityContextHolder.getContext().setAuthentication(authentication);
                    } else {
                        Authentication authentication = new AnonymousAuthenticationToken(userUri, user, Collections.singletonList(new SimpleGrantedAuthority("ROLE_ANONYMOUS")));
                        SecurityContextHolder.getContext().setAuthentication(authentication);
                    }
                }
            } catch (IOException e) {
                logger.warn(String.format("Signature %s is not verified, context: %s", headers.get("Signature"),
                        IOUtils.toString(request.getInputStream(), StandardCharsets.UTF_8)), e);
            }
        }

        filterChain.doFilter(request, response);
    }

    private boolean authenticationIsRequired() {
        Authentication existingAuth = SecurityContextHolder.getContext().getAuthentication();

        return existingAuth == null ||
                !existingAuth.isAuthenticated() ||
                existingAuth instanceof AnonymousAuthenticationToken;
    }
}