Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue #6553 - give 401 response if UNAUTHENTICATED and auth is mandatory #6568

Merged
merged 4 commits into from Aug 24, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Expand Up @@ -572,6 +572,11 @@ else if (authentication instanceof Authentication.Deferred)
authenticator.secureResponse(request, response, isAuthMandatory, null);
}
}
gregw marked this conversation as resolved.
Show resolved Hide resolved
else if (isAuthMandatory)
{
response.sendError(HttpServletResponse.SC_UNAUTHORIZED, "unauthenticated");
baseRequest.setHandled(true);
}
lachlan-roberts marked this conversation as resolved.
Show resolved Hide resolved
else
{
baseRequest.setAuthentication(authentication);
Expand Down
@@ -0,0 +1,145 @@
//
// ========================================================================
// Copyright (c) 1995-2021 Mort Bay Consulting Pty Ltd and others.
//
// This program and the accompanying materials are made available under the
// terms of the Eclipse Public License v. 2.0 which is available at
// https://www.eclipse.org/legal/epl-2.0, or the Apache License, Version 2.0
// which is available at https://www.apache.org/licenses/LICENSE-2.0.
//
// SPDX-License-Identifier: EPL-2.0 OR Apache-2.0
// ========================================================================
//

package org.eclipse.jetty.security;

import java.io.IOException;
import java.util.concurrent.atomic.AtomicReference;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import org.eclipse.jetty.http.HttpStatus;
import org.eclipse.jetty.security.authentication.DeferredAuthentication;
import org.eclipse.jetty.security.authentication.LoginAuthenticator;
import org.eclipse.jetty.server.Authentication;
import org.eclipse.jetty.server.LocalConnector;
import org.eclipse.jetty.server.Request;
import org.eclipse.jetty.server.Server;
import org.eclipse.jetty.server.handler.AbstractHandler;
import org.eclipse.jetty.util.security.Constraint;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;

import static org.hamcrest.MatcherAssert.assertThat;
import static org.hamcrest.Matchers.containsString;

public class UnauthenticatedTest
{
private LocalConnector connector;
private TestAuthenticator authenticator;

@BeforeEach
public void beforeEach() throws Exception
{
Server server = new Server();
connector = new LocalConnector(server);
server.addConnector(connector);

// Authenticator that always returns UNAUTHENTICATED.
authenticator = new TestAuthenticator();

// Add a security handler which requires paths under /requireAuth to be authenticated.
ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler();
Constraint requireAuthentication = new Constraint();
requireAuthentication.setRoles(new String[]{"**"});
requireAuthentication.setAuthenticate(true);
ConstraintMapping constraintMapping = new ConstraintMapping();
constraintMapping.setPathSpec("/requireAuth/*");
constraintMapping.setConstraint(requireAuthentication);
securityHandler.addConstraintMapping(constraintMapping);

securityHandler.setAuthenticator(authenticator);
securityHandler.setHandler(new AbstractHandler()
{
@Override
public void handle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException
{
baseRequest.setHandled(true);
response.setStatus(HttpStatus.OK_200);
response.getWriter().println("authentication: " + baseRequest.getAuthentication());
}
});

server.setHandler(securityHandler);
server.start();
}

@Test
public void testUnauthenticated() throws Exception
{
TestAuthenticator.AUTHENTICATION.set(Authentication.UNAUTHENTICATED);

// Request to URI which doesn't require authentication can get through even though auth is UNAUTHENTICATED.
String response = connector.getResponse("GET / HTTP/1.1\r\nHost: localhost\r\n\r\n");
assertThat(response, containsString("HTTP/1.1 200 OK"));
assertThat(response, containsString("authentication: UNAUTHENTICATED"));

// This URI requires just that the request is authenticated.
response = connector.getResponse("GET /requireAuth/test HTTP/1.1\r\nHost: localhost\r\n\r\n");
assertThat(response, containsString("HTTP/1.1 401 Unauthorized"));
}

@Test
public void testDeferredAuth() throws Exception
{
TestAuthenticator.AUTHENTICATION.set(new DeferredAuthentication(authenticator));

// Request to URI which doesn't require authentication can get through even though auth is UNAUTHENTICATED.
String response = connector.getResponse("GET / HTTP/1.1\r\nHost: localhost\r\n\r\n");
assertThat(response, containsString("HTTP/1.1 200 OK"));
assertThat(response, containsString("DeferredAuthentication"));

// This URI requires just that the request is authenticated. But DeferredAuthentication can bypass this.
response = connector.getResponse("GET /requireAuth/test HTTP/1.1\r\nHost: localhost\r\n\r\n");
assertThat(response, containsString("HTTP/1.1 200 OK"));
assertThat(response, containsString("DeferredAuthentication"));
}

public static class TestAuthenticator extends LoginAuthenticator
{
static AtomicReference<Authentication> AUTHENTICATION = new AtomicReference<>();

@Override
public void setConfiguration(AuthConfiguration configuration)
{
// Do nothing.
}

@Override
public String getAuthMethod()
{
return this.getClass().getSimpleName();
}

@Override
public void prepareRequest(ServletRequest request)
{
// Do nothing.
}

@Override
public Authentication validateRequest(ServletRequest request, ServletResponse response, boolean mandatory) throws ServerAuthException
{
return AUTHENTICATION.get();
}

@Override
public boolean secureResponse(ServletRequest request, ServletResponse response, boolean mandatory, Authentication.User validatedUser) throws ServerAuthException
{
return true;
}
}
}