forked from hawtio/hawtio
/
LoginRedirectFilter.java
99 lines (79 loc) · 3.5 KB
/
LoginRedirectFilter.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
package io.hawt.web.auth;
import java.io.IOException;
import java.util.Arrays;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import io.hawt.system.AuthHelpers;
import io.hawt.system.AuthenticateResult;
import io.hawt.system.Authenticator;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* Redirect to login page when authentication is enabled.
*/
public class LoginRedirectFilter implements Filter {
private static final transient Logger LOG = LoggerFactory.getLogger(LoginRedirectFilter.class);
private int timeout;
private AuthenticationConfiguration authConfiguration;
private final String[] unsecuredPaths;
private Redirector redirector = new Redirector();
public LoginRedirectFilter() {
this(AuthenticationConfiguration.UNSECURED_PATHS);
}
public LoginRedirectFilter(String[] unsecuredPaths) {
this.unsecuredPaths = unsecuredPaths;
}
@Override
public void init(FilterConfig filterConfig) throws ServletException {
authConfiguration = AuthenticationConfiguration.getConfiguration(filterConfig.getServletContext());
timeout = AuthSessionHelpers.getSessionTimeout(filterConfig.getServletContext());
LOG.info("Hawtio loginRedirectFilter is using {} sec. HttpSession timeout", timeout);
}
@Override
public void doFilter(final ServletRequest request, final ServletResponse response, final FilterChain chain) throws IOException, ServletException {
LOG.trace("Applying {}", getClass().getSimpleName());
HttpServletRequest httpRequest = (HttpServletRequest) request;
HttpServletResponse httpResponse = (HttpServletResponse) response;
HttpSession session = httpRequest.getSession(false);
String path = httpRequest.getServletPath();
if (isRedirectRequired(session, path, httpRequest)) {
redirector.doRedirect(httpRequest, httpResponse, AuthenticationConfiguration.LOGIN_URL);
} else {
chain.doFilter(request, response);
}
}
private boolean isRedirectRequired(HttpSession session, String path, HttpServletRequest request) {
return authConfiguration.isEnabled()
&& !authConfiguration.isKeycloakEnabled()
&& !AuthSessionHelpers.isSpringSecurityEnabled()
&& !AuthSessionHelpers.isAuthenticated(session)
&& isSecuredPath(path)
&& !tryAuthenticateRequest(request, session);
}
boolean tryAuthenticateRequest(HttpServletRequest request, HttpSession session) {
AuthenticateResult result = new Authenticator(request, authConfiguration).authenticate(
subject -> {
String username = AuthHelpers.getUsername(subject);
LOG.info("Logging in user: {}", username);
AuthSessionHelpers.setup(session != null ? session :
request.getSession(true), subject, username, timeout);
});
return result == AuthenticateResult.AUTHORIZED;
}
boolean isSecuredPath(String path) {
return !Arrays.stream(unsecuredPaths).anyMatch(path::startsWith);
}
@Override
public void destroy() {
}
public void setRedirector(Redirector redirector) {
this.redirector = redirector;
}
}