blob: 554ed6b59d974f719dc50feb046c4331e8b2c8bf [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.falcon.security;
import org.apache.falcon.util.StartupProperties;
import org.apache.log4j.Logger;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.ws.rs.core.Response;
import java.io.IOException;
import java.security.cert.CertificateExpiredException;
import java.security.cert.CertificateNotYetValidException;
import java.security.cert.X509Certificate;
/**
* This verifies that the request has a valid client certificate.
* Used by falcon server to talk to prism.
*/
public class ClientCertificateFilter implements Filter {
private static final Logger LOG = Logger.getLogger(ClientCertificateFilter.class);
protected boolean enableTLS = false;
@Override
public void init(FilterConfig filterConfig) throws ServletException {
this.enableTLS = Boolean.parseBoolean(StartupProperties.get().getProperty("falcon.enableTLS", "false"));
}
@Override
public void doFilter(ServletRequest request,
ServletResponse response,
FilterChain chain) throws IOException, ServletException {
if (!(request instanceof HttpServletRequest) || !(response instanceof HttpServletResponse)) {
throw new IllegalStateException("Invalid request/response object");
}
HttpServletResponse httpResponse = (HttpServletResponse) response;
X509Certificate[] certificates = (X509Certificate[]) request.
getAttribute("javax.servlet.request.X509Certificate");
if (!enableTLS || isValid(certificates)) {
chain.doFilter(request, response);
} else {
httpResponse.sendError(Response.Status.FORBIDDEN.getStatusCode(),
"Request not authorized, valid certificates not presented");
}
}
private boolean isValid(X509Certificate[] certificates) {
boolean valid = false;
if (certificates != null) {
for (X509Certificate certificate : certificates) {
LOG.debug("Issuer: " + certificate.getIssuerDN() + ", Subject: " + certificate.getSubjectDN());
try {
certificate.checkValidity();
valid = true;
break;
} catch (CertificateExpiredException e) {
LOG.error("Certificate " + certificate + " expired", e);
} catch (CertificateNotYetValidException e) {
LOG.error("Certificate " + certificate + " not valid", e);
}
}
} else {
LOG.warn("No valid certificates present");
}
return valid;
}
@Override
public void destroy() {
}
}