blob: a1befa7d5ae2235fb1b74c390dded2123b90e4f1 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.ambari.server.security;
import java.io.IOException;
import java.net.URL;
import java.util.regex.Pattern;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import org.apache.ambari.server.configuration.Configuration;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class SecurityFilter implements Filter {
//Allowed pathes for one way auth https
private static String CA = "/ca";
private static Configuration config;
private final static Logger LOG = LoggerFactory.getLogger(SecurityFilter.class);
@Override
public void destroy() {
}
@Override
public void doFilter(ServletRequest serReq, ServletResponse serResp,
FilterChain filtCh) throws IOException, ServletException {
HttpServletRequest req = (HttpServletRequest) serReq;
String reqUrl = req.getRequestURL().toString();
LOG.debug("Filtering {} for security purposes", reqUrl);
if (serReq.getLocalPort() != config.getTwoWayAuthPort()) {
if (isRequestAllowed(reqUrl)) {
filtCh.doFilter(serReq, serResp);
}
else {
LOG.warn("This request is not allowed on this port: " + reqUrl);
}
}
else {
LOG.debug("Request can continue on secure port {}", serReq.getLocalPort());
filtCh.doFilter(serReq, serResp);
}
}
@Override
public void init(FilterConfig arg0) throws ServletException {
}
private boolean isRequestAllowed(String reqUrl) {
try {
URL url = new URL(reqUrl);
if (!"https".equals(url.getProtocol())) {
LOG.warn(String.format("Request %s is not using HTTPS", reqUrl));
return false;
}
if (Pattern.matches("/cert/ca(/?)", url.getPath())) {
return true;
}
if (Pattern.matches("/connection_info", url.getPath())) {
return true;
}
if (Pattern.matches("/certs/[^/0-9][^/]*", url.getPath())) {
return true;
}
if (Pattern.matches("/resources/.*", url.getPath())) {
return true;
}
} catch (Exception e) {
LOG.warn("Exception while validating if request is secure " +
e);
}
LOG.warn("Request " + reqUrl + " doesn't match any pattern.");
return false;
}
public static void init(Configuration instance) {
config = instance;
}
}