blob: 439d89f73ce0cc24bb39bd756fe4bf014ef796d9 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.drill.exec.server.rest;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.ws.rs.HttpMethod;
import java.io.IOException;
/**
* All forms on site have a field with a CSRF token injected by server.
* This filter compares the token with one stored in the session to ensure that the POST request is not a CSRF attack.
*/
public class CsrfTokenValidateFilter implements Filter {
@Override
public void init(FilterConfig filterConfig) throws ServletException {
}
@Override
public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException {
HttpServletRequest httpRequest = (HttpServletRequest) request;
HttpServletResponse httpResponse = (HttpServletResponse) response;
if (HttpMethod.POST.equalsIgnoreCase(httpRequest.getMethod())) {
String csrfTokenSession = WebUtils.getCsrfTokenFromHttpRequest(httpRequest);
String csrfTokenRequest = httpRequest.getParameter(WebServerConstants.CSRF_TOKEN);
if (csrfTokenSession != null && !csrfTokenSession.equals(csrfTokenRequest)) {
httpResponse.reset();
httpResponse.sendError(HttpServletResponse.SC_FORBIDDEN, "Potential CSRF detected");
return;
}
}
chain.doFilter(request, response);
}
@Override
public void destroy() {
}
}