aboutsummaryrefslogtreecommitdiff
path: root/src/main/java/org/traccar/api/security/SecurityRequestFilter.java
diff options
context:
space:
mode:
authorAnton Tananaev <anton@traccar.org>2022-02-20 23:12:01 -0800
committerAnton Tananaev <anton@traccar.org>2022-02-20 23:12:01 -0800
commit7d66054920a496399cb0e20f10556ae78c3ee009 (patch)
treeb5c64af7cc29df89fd6909267f410fc2856e37d2 /src/main/java/org/traccar/api/security/SecurityRequestFilter.java
parent4b4201de3519ce744dcbba303bd10aaaa4d3fa7b (diff)
downloadtrackermap-server-7d66054920a496399cb0e20f10556ae78c3ee009.tar.gz
trackermap-server-7d66054920a496399cb0e20f10556ae78c3ee009.tar.bz2
trackermap-server-7d66054920a496399cb0e20f10556ae78c3ee009.zip
Add security package
Diffstat (limited to 'src/main/java/org/traccar/api/security/SecurityRequestFilter.java')
-rw-r--r--src/main/java/org/traccar/api/security/SecurityRequestFilter.java119
1 files changed, 119 insertions, 0 deletions
diff --git a/src/main/java/org/traccar/api/security/SecurityRequestFilter.java b/src/main/java/org/traccar/api/security/SecurityRequestFilter.java
new file mode 100644
index 000000000..9f20acb40
--- /dev/null
+++ b/src/main/java/org/traccar/api/security/SecurityRequestFilter.java
@@ -0,0 +1,119 @@
+/*
+ * Copyright 2015 - 2016 Anton Tananaev (anton@traccar.org)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.traccar.api.security;
+
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import org.traccar.Context;
+import org.traccar.Main;
+import org.traccar.api.resource.SessionResource;
+import org.traccar.database.StatisticsManager;
+import org.traccar.helper.DataConverter;
+import org.traccar.model.User;
+import org.traccar.storage.StorageException;
+
+import javax.annotation.security.PermitAll;
+import javax.servlet.http.HttpServletRequest;
+import javax.ws.rs.WebApplicationException;
+import javax.ws.rs.container.ContainerRequestContext;
+import javax.ws.rs.container.ContainerRequestFilter;
+import javax.ws.rs.container.ResourceInfo;
+import javax.ws.rs.core.Response;
+import javax.ws.rs.core.SecurityContext;
+import java.lang.reflect.Method;
+import java.nio.charset.StandardCharsets;
+
+public class SecurityRequestFilter implements ContainerRequestFilter {
+
+ private static final Logger LOGGER = LoggerFactory.getLogger(SecurityRequestFilter.class);
+
+ public static final String AUTHORIZATION_HEADER = "Authorization";
+ public static final String WWW_AUTHENTICATE = "WWW-Authenticate";
+ public static final String BASIC_REALM = "Basic realm=\"api\"";
+ public static final String X_REQUESTED_WITH = "X-Requested-With";
+ public static final String XML_HTTP_REQUEST = "XMLHttpRequest";
+
+ public static String[] decodeBasicAuth(String auth) {
+ auth = auth.replaceFirst("[B|b]asic ", "");
+ byte[] decodedBytes = DataConverter.parseBase64(auth);
+ if (decodedBytes != null && decodedBytes.length > 0) {
+ return new String(decodedBytes, StandardCharsets.US_ASCII).split(":", 2);
+ }
+ return null;
+ }
+
+ @javax.ws.rs.core.Context
+ private HttpServletRequest request;
+
+ @javax.ws.rs.core.Context
+ private ResourceInfo resourceInfo;
+
+ @Override
+ public void filter(ContainerRequestContext requestContext) {
+
+ if (requestContext.getMethod().equals("OPTIONS")) {
+ return;
+ }
+
+ SecurityContext securityContext = null;
+
+ try {
+
+ String authHeader = requestContext.getHeaderString(AUTHORIZATION_HEADER);
+ if (authHeader != null) {
+
+ try {
+ String[] auth = decodeBasicAuth(authHeader);
+ User user = Context.getPermissionsManager().login(auth[0], auth[1]);
+ if (user != null) {
+ Main.getInjector().getInstance(StatisticsManager.class).registerRequest(user.getId());
+ securityContext = new UserSecurityContext(new UserPrincipal(user.getId()));
+ }
+ } catch (StorageException e) {
+ throw new WebApplicationException(e);
+ }
+
+ } else if (request.getSession() != null) {
+
+ Long userId = (Long) request.getSession().getAttribute(SessionResource.USER_ID_KEY);
+ if (userId != null) {
+ Context.getPermissionsManager().checkUserEnabled(userId);
+ Main.getInjector().getInstance(StatisticsManager.class).registerRequest(userId);
+ securityContext = new UserSecurityContext(new UserPrincipal(userId));
+ }
+
+ }
+
+ } catch (SecurityException e) {
+ LOGGER.warn("Authentication error", e);
+ }
+
+ if (securityContext != null) {
+ requestContext.setSecurityContext(securityContext);
+ } else {
+ Method method = resourceInfo.getResourceMethod();
+ if (!method.isAnnotationPresent(PermitAll.class)) {
+ Response.ResponseBuilder responseBuilder = Response.status(Response.Status.UNAUTHORIZED);
+ if (!XML_HTTP_REQUEST.equals(request.getHeader(X_REQUESTED_WITH))) {
+ responseBuilder.header(WWW_AUTHENTICATE, BASIC_REALM);
+ }
+ throw new WebApplicationException(responseBuilder.build());
+ }
+ }
+
+ }
+
+}