blob: e9d285f9b681a5456ba31ebc7b09934cbc19999b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
|
/*
* Copyright 2015 Anton Tananaev (anton.tananaev@gmail.com)
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.traccar.api;
import java.lang.reflect.Method;
import java.util.Arrays;
import java.util.HashSet;
import java.util.Set;
import javax.annotation.security.DenyAll;
import javax.annotation.security.PermitAll;
import javax.annotation.security.RolesAllowed;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.container.ResourceInfo;
import javax.ws.rs.core.Response;
public class SecurityRequestFilter implements ContainerRequestFilter {
private static final String WWW_AUTHENTICATE = "WWW-Authenticate";
private static final String BASIC_REALM = "Basic realm=\"api\"";
@javax.ws.rs.core.Context
private ResourceInfo resourceInfo;
@Override
public void filter(ContainerRequestContext requestContext) {
Method method = resourceInfo.getResourceMethod();
if (method.isAnnotationPresent(PermitAll.class)) {
return;
}
if (method.isAnnotationPresent(DenyAll.class)) {
requestContext.abortWith(Response.status(Response.Status.FORBIDDEN).build());
return;
}
UserPrincipal userPrincipal = AuthorizationBasic.getUserPrincipal(requestContext);
if (userPrincipal == null
|| userPrincipal.getName() == null
|| userPrincipal.getPassword() == null
|| !isAuthenticatedUser(userPrincipal)) {
requestContext.abortWith(
Response.status(Response.Status.UNAUTHORIZED).header(WWW_AUTHENTICATE, BASIC_REALM).build());
return;
}
if (method.isAnnotationPresent(RolesAllowed.class)) {
RolesAllowed rolesAnnotation = method.getAnnotation(RolesAllowed.class);
Set<String> roles = new HashSet<>(Arrays.asList(rolesAnnotation.value()));
if (!isAuthorizedUser(userPrincipal, roles)) {
requestContext.abortWith(Response.status(Response.Status.FORBIDDEN).build());
return;
}
}
requestContext.setSecurityContext(new SecurityContextApi(userPrincipal));
}
private boolean isAuthenticatedUser(UserPrincipal principal) {
return AuthorizationBasic.isAuthenticatedUser(principal);
}
private boolean isAuthorizedUser(UserPrincipal userPrincipal, Set<String> roles) {
return AuthorizationBasic.isAuthorizedUser(userPrincipal, roles);
}
}
|