aboutsummaryrefslogtreecommitdiff
path: root/src/main/java/com/juick/service/security/HTTPSignatureAuthenticationFilter.java
blob: a851ef363aa16369294c07578f2f0523f0559781 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
/*
 * Copyright (C) 2008-2020, Juick
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU Affero General Public License as
 * published by the Free Software Foundation, either version 3 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU Affero General Public License for more details.
 *
 * You should have received a copy of the GNU Affero General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

package com.juick.service.security;

import com.juick.model.User;
import com.juick.service.ActivityPubService;
import com.juick.service.UserService;
import com.juick.service.security.entities.JuickUser;
import jakarta.servlet.FilterChain;
import jakarta.servlet.ServletException;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import org.apache.commons.lang3.StringUtils;
import org.springframework.security.authentication.AnonymousAuthenticationToken;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder;

import java.io.IOException;
import java.util.Collections;
import java.util.Map;
import java.util.stream.Collectors;

public class HTTPSignatureAuthenticationFilter extends BaseAuthenticationFilter {

    private final ActivityPubService signatureManager;
    private final UserService userService;

    public HTTPSignatureAuthenticationFilter(
            final ActivityPubService activityPubService,
            final UserService userService) {
        this.signatureManager = activityPubService;
        this.userService = userService;
    }

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response,
            FilterChain filterChain) throws IOException, ServletException {
        if (authenticationIsRequired()) {
            Map<String, String> headers = Collections.list(request.getHeaderNames())
                    .stream()
                    .collect(Collectors.toMap(String::toLowerCase, request::getHeader));
            var user = signatureManager.verifyActor(request.getMethod(), request.getRequestURI(), headers);
            String userUri = user.getUri().toString();
            if (!user.isAnonymous() || userUri.length() > 0) {
                if (userUri.length() == 0) {
                    User userWithPassword = userService.getUserByName(user.getName());
                    userWithPassword.setAuthHash(userService.getHashByUID(userWithPassword.getUid()));
                    Authentication authentication = new UsernamePasswordAuthenticationToken(
                            new JuickUser(user), userWithPassword.getCredentials(), JuickUser.USER_AUTHORITY);
                    SecurityContextHolder.getContext().setAuthentication(authentication);
                } else {
                    // anonymous must have with uri
                    Authentication authentication = new AnonymousAuthenticationToken(userUri,
                            new JuickUser(user), JuickUser.ANONYMOUS_AUTHORITY);
                    SecurityContextHolder.getContext().setAuthentication(authentication);
                }
            }
        }

        filterChain.doFilter(request, response);
    }
}