/*
* JBoss, Home of Professional Open Source.
* Copyright 2014 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.undertow.servlet.handlers.security;
import static io.undertow.servlet.UndertowServletMessages.MESSAGES;
import io.undertow.security.handlers.SinglePortConfidentialityHandler;
import io.undertow.server.HttpHandler;
import io.undertow.server.HttpServerExchange;
import io.undertow.servlet.api.AuthorizationManager;
import io.undertow.servlet.api.ConfidentialPortManager;
import io.undertow.servlet.api.TransportGuaranteeType;
import io.undertow.servlet.handlers.ServletRequestContext;
import io.undertow.util.StatusCodes;
import javax.servlet.http.HttpServletResponse;
import java.net.URI;
import java.net.URISyntaxException;
Servlet specific extension to SinglePortConfidentialityHandler
Author: Darran Lofthouse
/**
* Servlet specific extension to {@link SinglePortConfidentialityHandler}
*
* @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a>
*/
public class ServletConfidentialityConstraintHandler extends SinglePortConfidentialityHandler {
private final ConfidentialPortManager portManager;
public ServletConfidentialityConstraintHandler(final ConfidentialPortManager portManager, final HttpHandler next) {
super(next, -1);
this.portManager = portManager;
}
@Override
public void handleRequest(HttpServerExchange exchange) throws Exception {
final ServletRequestContext servletRequestContext = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY);
final AuthorizationManager authorizationManager = servletRequestContext.getDeployment().getDeploymentInfo().getAuthorizationManager();
TransportGuaranteeType connectionGuarantee = servletRequestContext.getOriginalRequest().isSecure() ? TransportGuaranteeType.CONFIDENTIAL : TransportGuaranteeType.NONE;
TransportGuaranteeType transportGuarantee = authorizationManager.transportGuarantee(connectionGuarantee,
servletRequestContext.getTransportGuarenteeType(), servletRequestContext.getOriginalRequest());
servletRequestContext.setTransportGuarenteeType(transportGuarantee);
if (TransportGuaranteeType.REJECTED == transportGuarantee) {
HttpServletResponse response = (HttpServletResponse) servletRequestContext.getServletResponse();
response.sendError(StatusCodes.FORBIDDEN);
return;
}
super.handleRequest(exchange);
}
@Override
protected boolean confidentialityRequired(HttpServerExchange exchange) {
TransportGuaranteeType transportGuarantee = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY).getTransportGuarenteeType();
// TODO - We may be able to add more flexibility here especially with authentication mechanisms such as Digest for
// INTEGRAL - for now just use SSL.
return (TransportGuaranteeType.CONFIDENTIAL == transportGuarantee || TransportGuaranteeType.INTEGRAL == transportGuarantee);
}
@Override
protected URI getRedirectURI(HttpServerExchange exchange) throws URISyntaxException {
int port = portManager.getConfidentialPort(exchange);
if (port < 0) {
throw MESSAGES.noConfidentialPortAvailable();
}
return super.getRedirectURI(exchange, port);
}
Use the HttpServerExchange supplied to check if this request is already 'sufficiently' confidential.
Here we say 'sufficiently' as sub-classes can override this and maybe even go so far as querying the actual SSLSession.
Params: - exchange – - The
HttpServerExchange
for the request being processed.
Returns: true if the request is 'sufficiently' confidential, false otherwise.
/**
* Use the HttpServerExchange supplied to check if this request is already 'sufficiently' confidential.
*
* Here we say 'sufficiently' as sub-classes can override this and maybe even go so far as querying the actual SSLSession.
*
* @param exchange - The {@link HttpServerExchange} for the request being processed.
* @return true if the request is 'sufficiently' confidential, false otherwise.
*/
protected boolean isConfidential(final HttpServerExchange exchange) {
ServletRequestContext src = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY);
if(src != null) {
return src.getOriginalRequest().isSecure();
}
return super.isConfidential(exchange);
}
}