diff options
Diffstat (limited to 'src/main/java/com/gitblit/HtpasswdUserService.java')
-rw-r--r-- | src/main/java/com/gitblit/HtpasswdUserService.java | 361 |
1 files changed, 0 insertions, 361 deletions
diff --git a/src/main/java/com/gitblit/HtpasswdUserService.java b/src/main/java/com/gitblit/HtpasswdUserService.java deleted file mode 100644 index ca5295c9..00000000 --- a/src/main/java/com/gitblit/HtpasswdUserService.java +++ /dev/null @@ -1,361 +0,0 @@ -/* - * Copyright 2013 Florian Zschocke - * Copyright 2013 gitblit.com - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ -package com.gitblit; - -import java.io.File; -import java.io.FileInputStream; -import java.text.MessageFormat; -import java.util.Map; -import java.util.Scanner; -import java.util.concurrent.ConcurrentHashMap; -import java.util.regex.Matcher; -import java.util.regex.Pattern; - -import org.apache.commons.codec.binary.Base64; -import org.apache.commons.codec.digest.Crypt; -import org.apache.commons.codec.digest.DigestUtils; -import org.apache.commons.codec.digest.Md5Crypt; -import org.slf4j.Logger; -import org.slf4j.LoggerFactory; - -import com.gitblit.Constants.AccountType; -import com.gitblit.manager.IRuntimeManager; -import com.gitblit.models.UserModel; -import com.gitblit.utils.ArrayUtils; -import com.gitblit.utils.StringUtils; - - -/** - * Implementation of a user service using an Apache htpasswd file for authentication. - * - * This user service implement custom authentication using entries in a file created - * by the 'htpasswd' program of an Apache web server. All possible output - * options of the 'htpasswd' program version 2.2 are supported: - * plain text (only on Windows and Netware), - * glibc crypt() (not on Windows and NetWare), - * Apache MD5 (apr1), - * unsalted SHA-1. - * - * Configuration options: - * realm.htpasswd.backingUserService - Specify the backing user service that is used - * to keep the user data other than the password. - * The default is '${baseFolder}/users.conf'. - * realm.htpasswd.userfile - The text file with the htpasswd entries to be used for - * authentication. - * The default is '${baseFolder}/htpasswd'. - * realm.htpasswd.overrideLocalAuthentication - Specify if local accounts are overwritten - * when authentication matches for an - * external account. - * - * @author Florian Zschocke - * - */ -public class HtpasswdUserService extends GitblitUserService -{ - - private static final String KEY_BACKING_US = Keys.realm.htpasswd.backingUserService; - private static final String DEFAULT_BACKING_US = "${baseFolder}/users.conf"; - - private static final String KEY_HTPASSWD_FILE = Keys.realm.htpasswd.userfile; - private static final String DEFAULT_HTPASSWD_FILE = "${baseFolder}/htpasswd"; - - private static final String KEY_OVERRIDE_LOCALAUTH = Keys.realm.htpasswd.overrideLocalAuthentication; - private static final boolean DEFAULT_OVERRIDE_LOCALAUTH = true; - - private static final String KEY_SUPPORT_PLAINTEXT_PWD = "realm.htpasswd.supportPlaintextPasswords"; - - private final boolean SUPPORT_PLAINTEXT_PWD; - - private IRuntimeManager runtimeManager; - private IStoredSettings settings; - private File htpasswdFile; - - - private final Logger logger = LoggerFactory.getLogger(HtpasswdUserService.class); - - private final Map<String, String> htUsers = new ConcurrentHashMap<String, String>(); - - private volatile long lastModified; - - private volatile boolean forceReload; - - - - public HtpasswdUserService() - { - super(); - - String os = System.getProperty("os.name").toLowerCase(); - if (os.startsWith("windows") || os.startsWith("netware")) { - SUPPORT_PLAINTEXT_PWD = true; - } - else { - SUPPORT_PLAINTEXT_PWD = false; - } - } - - - - /** - * Setup the user service. - * - * The HtpasswdUserService extends the GitblitUserService and is thus - * backed by the available user services provided by the GitblitUserService. - * In addition the setup tries to read and parse the htpasswd file to be used - * for authentication. - * - * @param runtimeManager - * @since 1.4.0 - */ - @Override - public void setup(IRuntimeManager runtimeManager) - { - this.runtimeManager = runtimeManager; - this.settings = runtimeManager.getSettings(); - - // This is done in two steps in order to avoid calling GitBlit.getFileOrFolder(String, String) which will segfault for unit tests. - String file = settings.getString(KEY_BACKING_US, DEFAULT_BACKING_US); - File realmFile = runtimeManager.getFileOrFolder(file); - serviceImpl = createUserService(realmFile); - logger.info("Htpasswd User Service backed by " + serviceImpl.toString()); - - read(); - - logger.debug("Read " + htUsers.size() + " users from htpasswd file: " + this.htpasswdFile); - } - - - - /** - * For now, credentials are defined in the htpasswd file and can not be manipulated - * from Gitblit. - * - * @return false - * @since 1.0.0 - */ - @Override - public boolean supportsCredentialChanges() - { - return false; - } - - - - /** - * Authenticate a user based on a username and password. - * - * If the account is determined to be a local account, authentication - * will be done against the locally stored password. - * Otherwise, the configured htpasswd file is read. All current output options - * of htpasswd are supported: clear text, crypt(), Apache MD5 and unsalted SHA-1. - * - * @param username - * @param password - * @return a user object or null - */ - @Override - public UserModel authenticate(String username, char[] password) - { - if (isLocalAccount(username)) { - // local account, bypass htpasswd authentication - return super.authenticate(username, password); - } - - - read(); - String storedPwd = htUsers.get(username); - if (storedPwd != null) { - boolean authenticated = false; - final String passwd = new String(password); - - // test Apache MD5 variant encrypted password - if ( storedPwd.startsWith("$apr1$") ) { - if ( storedPwd.equals(Md5Crypt.apr1Crypt(passwd, storedPwd)) ) { - logger.debug("Apache MD5 encoded password matched for user '" + username + "'"); - authenticated = true; - } - } - // test unsalted SHA password - else if ( storedPwd.startsWith("{SHA}") ) { - String passwd64 = Base64.encodeBase64String(DigestUtils.sha1(passwd)); - if ( storedPwd.substring("{SHA}".length()).equals(passwd64) ) { - logger.debug("Unsalted SHA-1 encoded password matched for user '" + username + "'"); - authenticated = true; - } - } - // test libc crypt() encoded password - else if ( supportCryptPwd() && storedPwd.equals(Crypt.crypt(passwd, storedPwd)) ) { - logger.debug("Libc crypt encoded password matched for user '" + username + "'"); - authenticated = true; - } - // test clear text - else if ( supportPlaintextPwd() && storedPwd.equals(passwd) ){ - logger.debug("Clear text password matched for user '" + username + "'"); - authenticated = true; - } - - - if (authenticated) { - logger.debug("Htpasswd authenticated: " + username); - - UserModel user = getUserModel(username); - if (user == null) { - // create user object for new authenticated user - user = new UserModel(username); - } - - // create a user cookie - if (StringUtils.isEmpty(user.cookie) && !ArrayUtils.isEmpty(password)) { - user.cookie = StringUtils.getSHA1(user.username + passwd); - } - - // Set user attributes, hide password from backing user service. - user.password = Constants.EXTERNAL_ACCOUNT; - user.accountType = getAccountType(); - - // Push the looked up values to backing file - super.updateUserModel(user); - - return user; - } - } - - return null; - } - - - - /** - * Determine if the account is to be treated as a local account. - * - * This influences authentication. A local account will be authenticated - * by the backing user service while an external account will be handled - * by this user service. - * <br/> - * The decision also depends on the setting of the key - * realm.htpasswd.overrideLocalAuthentication. - * If it is set to true, then passwords will first be checked against the - * htpasswd store. If an account exists and is marked as local in the backing - * user service, that setting will be overwritten by the result. This - * means that an account that looks local to the backing user service will - * be turned into an external account upon valid login of a user that has - * an entry in the htpasswd file. - * If the key is set to false, then it is determined if the account is local - * according to the logic of the GitblitUserService. - */ - @Override - protected boolean isLocalAccount(String username) - { - if ( settings.getBoolean(KEY_OVERRIDE_LOCALAUTH, DEFAULT_OVERRIDE_LOCALAUTH) ) { - read(); - if ( htUsers.containsKey(username) ) return false; - } - return super.isLocalAccount(username); - } - - - - /** - * Get the account type used for this user service. - * - * @return AccountType.HTPASSWD - */ - @Override - public AccountType getAccountType() - { - return AccountType.HTPASSWD; - } - - - - private String htpasswdFilePath = null; - /** - * Reads the realm file and rebuilds the in-memory lookup tables. - */ - protected synchronized void read() - { - - // This is done in two steps in order to avoid calling GitBlit.getFileOrFolder(String, String) which will segfault for unit tests. - String file = settings.getString(KEY_HTPASSWD_FILE, DEFAULT_HTPASSWD_FILE); - if ( !file.equals(htpasswdFilePath) ) { - // The htpasswd file setting changed. Rediscover the file. - this.htpasswdFilePath = file; - this.htpasswdFile = runtimeManager.getFileOrFolder(file); - this.htUsers.clear(); - this.forceReload = true; - } - - if (htpasswdFile.exists() && (forceReload || (htpasswdFile.lastModified() != lastModified))) { - forceReload = false; - lastModified = htpasswdFile.lastModified(); - htUsers.clear(); - - Pattern entry = Pattern.compile("^([^:]+):(.+)"); - - Scanner scanner = null; - try { - scanner = new Scanner(new FileInputStream(htpasswdFile)); - while( scanner.hasNextLine()) { - String line = scanner.nextLine().trim(); - if ( !line.isEmpty() && !line.startsWith("#") ) { - Matcher m = entry.matcher(line); - if ( m.matches() ) { - htUsers.put(m.group(1), m.group(2)); - } - } - } - } catch (Exception e) { - logger.error(MessageFormat.format("Failed to read {0}", htpasswdFile), e); - } - finally { - if (scanner != null) scanner.close(); - } - } - } - - - - private boolean supportPlaintextPwd() - { - return this.settings.getBoolean(KEY_SUPPORT_PLAINTEXT_PWD, SUPPORT_PLAINTEXT_PWD); - } - - - private boolean supportCryptPwd() - { - return !supportPlaintextPwd(); - } - - - - @Override - public String toString() - { - return getClass().getSimpleName() + "(" + ((htpasswdFile != null) ? htpasswdFile.getAbsolutePath() : "null") + ")"; - } - - - - - /* - * Method only used for unit tests. Return number of users read from htpasswd file. - */ - public int getNumberHtpasswdUsers() - { - return this.htUsers.size(); - } -} |