From 4a5a55229bf066bf933dde6cb6f51a4378d67fb7 Mon Sep 17 00:00:00 2001 From: John Crygier <john.crygier@aon.com> Date: Fri, 04 May 2012 09:50:22 -0400 Subject: [PATCH] Change techique for custom properties to fall in line with reading / writing of all other properties --- src/com/gitblit/AccessRestrictionFilter.java | 237 ++++++++++++++++------------------------------------------- 1 files changed, 65 insertions(+), 172 deletions(-) diff --git a/src/com/gitblit/AccessRestrictionFilter.java b/src/com/gitblit/AccessRestrictionFilter.java index 25adc52..e9b6587 100644 --- a/src/com/gitblit/AccessRestrictionFilter.java +++ b/src/com/gitblit/AccessRestrictionFilter.java @@ -16,34 +16,22 @@ package com.gitblit; import java.io.IOException; -import java.nio.charset.Charset; -import java.security.Principal; import java.text.MessageFormat; -import java.util.Enumeration; -import java.util.HashMap; -import java.util.Map; -import javax.servlet.Filter; import javax.servlet.FilterChain; -import javax.servlet.FilterConfig; import javax.servlet.ServletException; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; -import javax.servlet.http.HttpSession; - -import org.eclipse.jgit.util.Base64; -import org.slf4j.Logger; -import org.slf4j.LoggerFactory; import com.gitblit.models.RepositoryModel; import com.gitblit.models.UserModel; import com.gitblit.utils.StringUtils; /** - * The AccessRestrictionFilter is a servlet filter that preprocesses requests - * that match its url pattern definition in the web.xml file. + * The AccessRestrictionFilter is an AuthenticationFilter that confirms that the + * requested repository can be accessed by the anonymous or named user. * * The filter extracts the name of the repository from the url and determines if * the requested action for the repository requires a Basic authentication @@ -55,19 +43,7 @@ * @author James Moger * */ -public abstract class AccessRestrictionFilter implements Filter { - - private static final String BASIC = "Basic"; - - private static final String CHALLENGE = BASIC + " realm=\"" + Constants.NAME + "\""; - - private static final String SESSION_SECURED = "com.gitblit.secured"; - - protected transient Logger logger; - - public AccessRestrictionFilter() { - logger = LoggerFactory.getLogger(getClass()); - } +public abstract class AccessRestrictionFilter extends AuthenticationFilter { /** * Extract the repository name from the url. @@ -84,6 +60,15 @@ * @return action of the request */ protected abstract String getUrlRequestAction(String url); + + /** + * Determine if the action may be executed on the repository. + * + * @param repository + * @param action + * @return true if the action may be performed + */ + protected abstract boolean isActionAllowed(RepositoryModel repository, String action); /** * Determine if the repository requires authentication. @@ -118,26 +103,7 @@ HttpServletRequest httpRequest = (HttpServletRequest) request; HttpServletResponse httpResponse = (HttpServletResponse) response; - // Wrap the HttpServletRequest with the AccessRestrictionRequest which - // overrides the servlet container user principal methods. - // JGit requires either: - // - // 1. servlet container authenticated user - // 2. http.receivepack = true in each repository's config - // - // Gitblit must conditionally authenticate users per-repository so just - // enabling http.receivepack is insufficient. - - AccessRestrictionRequest accessRequest = new AccessRestrictionRequest(httpRequest); - - String servletUrl = httpRequest.getContextPath() + httpRequest.getServletPath(); - String url = httpRequest.getRequestURI().substring(servletUrl.length()); - String params = httpRequest.getQueryString(); - if (url.length() > 0 && url.charAt(0) == '/') { - url = url.substring(1); - } - String fullUrl = url + (StringUtils.isEmpty(params) ? "" : ("?" + params)); - + String fullUrl = getFullUrl(httpRequest); String repository = extractRepositoryName(fullUrl); // Determine if the request URL is restricted @@ -148,145 +114,72 @@ RepositoryModel model = GitBlit.self().getRepositoryModel(repository); if (model == null) { // repository not found. send 404. - logger.info("ARF: " + fullUrl + " (" + HttpServletResponse.SC_NOT_FOUND + ")"); + logger.info(MessageFormat.format("ARF: {0} ({1})", fullUrl, + HttpServletResponse.SC_NOT_FOUND)); httpResponse.sendError(HttpServletResponse.SC_NOT_FOUND); return; + } + + // Confirm that the action may be executed on the repository + if (!isActionAllowed(model, urlRequestType)) { + logger.info(MessageFormat.format("ARF: action {0} on {1} forbidden ({2})", + urlRequestType, model, HttpServletResponse.SC_FORBIDDEN)); + httpResponse.sendError(HttpServletResponse.SC_FORBIDDEN); + return; + } + + // Wrap the HttpServletRequest with the AccessRestrictionRequest which + // overrides the servlet container user principal methods. + // JGit requires either: + // + // 1. servlet container authenticated user + // 2. http.receivepack = true in each repository's config + // + // Gitblit must conditionally authenticate users per-repository so just + // enabling http.receivepack is insufficient. + AuthenticatedRequest authenticatedRequest = new AuthenticatedRequest(httpRequest); + UserModel user = getUser(httpRequest); + if (user != null) { + authenticatedRequest.setUser(user); } // BASIC authentication challenge and response processing if (!StringUtils.isEmpty(urlRequestType) && requiresAuthentication(model)) { - // look for client authorization credentials in header - final String authorization = httpRequest.getHeader("Authorization"); - if (authorization != null && authorization.startsWith(BASIC)) { - // Authorization: Basic base64credentials - String base64Credentials = authorization.substring(BASIC.length()).trim(); - String credentials = new String(Base64.decode(base64Credentials), - Charset.forName("UTF-8")); - // credentials = username:password - final String[] values = credentials.split(":"); - - if (values.length == 2) { - String username = values[0]; - char[] password = values[1].toCharArray(); - UserModel user = GitBlit.self().authenticate(username, password); - if (user != null) { - accessRequest.setUser(user); - if (user.canAdmin || canAccess(model, user, urlRequestType)) { - // authenticated request permitted. - // pass processing to the restricted servlet. - newSession(accessRequest, httpResponse); - logger.info("ARF: " + fullUrl + " (" + HttpServletResponse.SC_CONTINUE - + ") authenticated"); - chain.doFilter(accessRequest, httpResponse); - return; - } - // valid user, but not for requested access. send 403. - if (GitBlit.isDebugMode()) { - logger.info("ARF: " + fullUrl + " (" + HttpServletResponse.SC_FORBIDDEN - + ")"); - logger.info(MessageFormat.format("AUTH: {0} forbidden to access {1}", - user.username, url)); - } - httpResponse.sendError(HttpServletResponse.SC_FORBIDDEN); - return; - } - } + if (user == null) { + // challenge client to provide credentials. send 401. if (GitBlit.isDebugMode()) { - logger.info(MessageFormat - .format("AUTH: invalid credentials ({0})", credentials)); + logger.info(MessageFormat.format("ARF: CHALLENGE {0}", fullUrl)); } + httpResponse.setHeader("WWW-Authenticate", CHALLENGE); + httpResponse.sendError(HttpServletResponse.SC_UNAUTHORIZED); + return; + } else { + // check user access for request + if (user.canAdmin || canAccess(model, user, urlRequestType)) { + // authenticated request permitted. + // pass processing to the restricted servlet. + newSession(authenticatedRequest, httpResponse); + logger.info(MessageFormat.format("ARF: {0} ({1}) authenticated", fullUrl, + HttpServletResponse.SC_CONTINUE)); + chain.doFilter(authenticatedRequest, httpResponse); + return; + } + // valid user, but not for requested access. send 403. + if (GitBlit.isDebugMode()) { + logger.info(MessageFormat.format("ARF: {0} forbidden to access {1}", + user.username, fullUrl)); + } + httpResponse.sendError(HttpServletResponse.SC_FORBIDDEN); + return; } - - // challenge client to provide credentials. send 401. - if (GitBlit.isDebugMode()) { - logger.info("ARF: " + fullUrl + " (" + HttpServletResponse.SC_UNAUTHORIZED + ")"); - logger.info("AUTH: Challenge " + CHALLENGE); - } - httpResponse.setHeader("WWW-Authenticate", CHALLENGE); - httpResponse.sendError(HttpServletResponse.SC_UNAUTHORIZED); - return; } if (GitBlit.isDebugMode()) { - logger.info("ARF: " + fullUrl + " (" + HttpServletResponse.SC_CONTINUE - + ") unauthenticated"); + logger.info(MessageFormat.format("ARF: {0} ({1}) unauthenticated", fullUrl, + HttpServletResponse.SC_CONTINUE)); } // unauthenticated request permitted. // pass processing to the restricted servlet. - chain.doFilter(accessRequest, httpResponse); - } - - /** - * Taken from Jetty's LoginAuthenticator.renewSessionOnAuthentication() - */ - protected void newSession(HttpServletRequest request, HttpServletResponse response) { - HttpSession oldSession = request.getSession(false); - if (oldSession != null && oldSession.getAttribute(SESSION_SECURED) == null) { - synchronized (this) { - Map<String, Object> attributes = new HashMap<String, Object>(); - Enumeration<String> e = oldSession.getAttributeNames(); - while (e.hasMoreElements()) { - String name = e.nextElement(); - attributes.put(name, oldSession.getAttribute(name)); - oldSession.removeAttribute(name); - } - oldSession.invalidate(); - - HttpSession newSession = request.getSession(true); - newSession.setAttribute(SESSION_SECURED, Boolean.TRUE); - for (Map.Entry<String, Object> entry : attributes.entrySet()) { - newSession.setAttribute(entry.getKey(), entry.getValue()); - } - } - } - } - - /** - * @see javax.servlet.Filter#init(javax.servlet.FilterConfig) - */ - @Override - public void init(final FilterConfig config) throws ServletException { - } - - /** - * @see javax.servlet.Filter#destroy() - */ - @Override - public void destroy() { - } - - /** - * Wraps a standard HttpServletRequest and overrides user principal methods. - */ - public static class AccessRestrictionRequest extends ServletRequestWrapper { - - private UserModel user; - - public AccessRestrictionRequest(HttpServletRequest req) { - super(req); - user = new UserModel("anonymous"); - } - - void setUser(UserModel user) { - this.user = user; - } - - @Override - public String getRemoteUser() { - return user.username; - } - - @Override - public boolean isUserInRole(String role) { - if (role.equals(Constants.ADMIN_ROLE)) { - return user.canAdmin; - } - return user.canAccessRepository(role); - } - - @Override - public Principal getUserPrincipal() { - return user; - } + chain.doFilter(authenticatedRequest, httpResponse); } } \ No newline at end of file -- Gitblit v1.9.1