| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.ambari.server.security; |
| |
| import java.io.IOException; |
| import java.net.URL; |
| import java.util.regex.Pattern; |
| |
| import javax.servlet.Filter; |
| import javax.servlet.FilterChain; |
| import javax.servlet.FilterConfig; |
| import javax.servlet.ServletException; |
| import javax.servlet.ServletRequest; |
| import javax.servlet.ServletResponse; |
| import javax.servlet.http.HttpServletRequest; |
| |
| import org.apache.ambari.server.configuration.Configuration; |
| import org.slf4j.Logger; |
| import org.slf4j.LoggerFactory; |
| |
| public class SecurityFilter implements Filter { |
| |
| //Allowed pathes for one way auth https |
| private static String CA = "/ca"; |
| |
| private static Configuration config; |
| private final static Logger LOG = LoggerFactory.getLogger(SecurityFilter.class); |
| |
| @Override |
| public void destroy() { |
| } |
| |
| @Override |
| public void doFilter(ServletRequest serReq, ServletResponse serResp, |
| FilterChain filtCh) throws IOException, ServletException { |
| |
| HttpServletRequest req = (HttpServletRequest) serReq; |
| String reqUrl = req.getRequestURL().toString(); |
| |
| LOG.debug("Filtering {} for security purposes", reqUrl); |
| if (serReq.getLocalPort() != config.getTwoWayAuthPort()) { |
| if (isRequestAllowed(reqUrl)) { |
| filtCh.doFilter(serReq, serResp); |
| } |
| else { |
| LOG.warn("This request is not allowed on this port: " + reqUrl); |
| } |
| } |
| else { |
| LOG.debug("Request can continue on secure port {}", serReq.getLocalPort()); |
| filtCh.doFilter(serReq, serResp); |
| } |
| } |
| |
| @Override |
| public void init(FilterConfig arg0) throws ServletException { |
| } |
| |
| private boolean isRequestAllowed(String reqUrl) { |
| try { |
| URL url = new URL(reqUrl); |
| if (!"https".equals(url.getProtocol())) { |
| LOG.warn(String.format("Request %s is not using HTTPS", reqUrl)); |
| return false; |
| } |
| |
| if (Pattern.matches("/cert/ca(/?)", url.getPath())) { |
| return true; |
| } |
| |
| if (Pattern.matches("/connection_info", url.getPath())) { |
| return true; |
| } |
| |
| if (Pattern.matches("/certs/[^/0-9][^/]*", url.getPath())) { |
| return true; |
| } |
| |
| if (Pattern.matches("/resources/.*", url.getPath())) { |
| return true; |
| } |
| |
| } catch (Exception e) { |
| LOG.warn("Exception while validating if request is secure " + |
| e); |
| } |
| LOG.warn("Request " + reqUrl + " doesn't match any pattern."); |
| return false; |
| } |
| |
| public static void init(Configuration instance) { |
| config = instance; |
| } |
| } |