You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

AuthenticationManager.java 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500
  1. /*
  2. * Copyright 2013 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.manager;
  17. import java.nio.charset.Charset;
  18. import java.security.Principal;
  19. import java.text.MessageFormat;
  20. import java.util.ArrayList;
  21. import java.util.HashMap;
  22. import java.util.List;
  23. import java.util.Map;
  24. import java.util.concurrent.TimeUnit;
  25. import javax.servlet.http.Cookie;
  26. import javax.servlet.http.HttpServletRequest;
  27. import javax.servlet.http.HttpServletResponse;
  28. import org.apache.wicket.RequestCycle;
  29. import org.slf4j.Logger;
  30. import org.slf4j.LoggerFactory;
  31. import com.gitblit.Constants;
  32. import com.gitblit.Constants.AccountType;
  33. import com.gitblit.Constants.AuthenticationType;
  34. import com.gitblit.IStoredSettings;
  35. import com.gitblit.Keys;
  36. import com.gitblit.auth.AuthenticationProvider;
  37. import com.gitblit.auth.AuthenticationProvider.UsernamePasswordAuthenticationProvider;
  38. import com.gitblit.auth.HtpasswdAuthProvider;
  39. import com.gitblit.auth.LdapAuthProvider;
  40. import com.gitblit.auth.PAMAuthProvider;
  41. import com.gitblit.auth.RedmineAuthProvider;
  42. import com.gitblit.auth.SalesforceAuthProvider;
  43. import com.gitblit.auth.WindowsAuthProvider;
  44. import com.gitblit.models.TeamModel;
  45. import com.gitblit.models.UserModel;
  46. import com.gitblit.utils.Base64;
  47. import com.gitblit.utils.HttpUtils;
  48. import com.gitblit.utils.StringUtils;
  49. import com.gitblit.utils.X509Utils.X509Metadata;
  50. import com.gitblit.wicket.GitBlitWebSession;
  51. /**
  52. * The authentication manager handles user login & logout.
  53. *
  54. * @author James Moger
  55. *
  56. */
  57. public class AuthenticationManager implements IAuthenticationManager {
  58. private final Logger logger = LoggerFactory.getLogger(getClass());
  59. private final IStoredSettings settings;
  60. private final IRuntimeManager runtimeManager;
  61. private final IUserManager userManager;
  62. private final List<AuthenticationProvider> authenticationProviders;
  63. private final Map<String, Class<? extends AuthenticationProvider>> providerNames;
  64. private final Map<String, String> legacyRedirects;
  65. public AuthenticationManager(
  66. IRuntimeManager runtimeManager,
  67. IUserManager userManager) {
  68. this.settings = runtimeManager.getSettings();
  69. this.runtimeManager = runtimeManager;
  70. this.userManager = userManager;
  71. this.authenticationProviders = new ArrayList<AuthenticationProvider>();
  72. // map of shortcut provider names
  73. providerNames = new HashMap<String, Class<? extends AuthenticationProvider>>();
  74. providerNames.put("htpasswd", HtpasswdAuthProvider.class);
  75. providerNames.put("ldap", LdapAuthProvider.class);
  76. providerNames.put("pam", PAMAuthProvider.class);
  77. providerNames.put("redmine", RedmineAuthProvider.class);
  78. providerNames.put("salesforce", SalesforceAuthProvider.class);
  79. providerNames.put("windows", WindowsAuthProvider.class);
  80. // map of legacy external user services
  81. legacyRedirects = new HashMap<String, String>();
  82. legacyRedirects.put("com.gitblit.HtpasswdUserService", "htpasswd");
  83. legacyRedirects.put("com.gitblit.LdapUserService", "ldap");
  84. legacyRedirects.put("com.gitblit.PAMUserService", "pam");
  85. legacyRedirects.put("com.gitblit.RedmineUserService", "redmine");
  86. legacyRedirects.put("com.gitblit.SalesforceUserService", "salesforce");
  87. legacyRedirects.put("com.gitblit.WindowsUserService", "windows");
  88. }
  89. @Override
  90. public AuthenticationManager start() {
  91. // automatically adjust legacy configurations
  92. String realm = settings.getString(Keys.realm.userService, "${baseFolder}/users.conf");
  93. if (legacyRedirects.containsKey(realm)) {
  94. logger.warn("");
  95. logger.warn(Constants.BORDER2);
  96. logger.warn(" IUserService '{}' is obsolete!", realm);
  97. logger.warn(" Please set '{}={}'", "realm.authenticationProviders", legacyRedirects.get(realm));
  98. logger.warn(Constants.BORDER2);
  99. logger.warn("");
  100. // conditionally override specified authentication providers
  101. if (StringUtils.isEmpty(settings.getString(Keys.realm.authenticationProviders, null))) {
  102. settings.overrideSetting(Keys.realm.authenticationProviders, legacyRedirects.get(realm));
  103. }
  104. }
  105. // instantiate and setup specified authentication providers
  106. List<String> providers = settings.getStrings(Keys.realm.authenticationProviders);
  107. if (providers.isEmpty()) {
  108. logger.info("External authentication disabled.");
  109. } else {
  110. for (String provider : providers) {
  111. try {
  112. Class<?> authClass;
  113. if (providerNames.containsKey(provider)) {
  114. // map the name -> class
  115. authClass = providerNames.get(provider);
  116. } else {
  117. // reflective lookup
  118. authClass = Class.forName(provider);
  119. }
  120. logger.info("setting up {}", authClass.getName());
  121. AuthenticationProvider authImpl = (AuthenticationProvider) authClass.newInstance();
  122. authImpl.setup(runtimeManager, userManager);
  123. authenticationProviders.add(authImpl);
  124. } catch (Exception e) {
  125. logger.error("", e);
  126. }
  127. }
  128. }
  129. return this;
  130. }
  131. @Override
  132. public AuthenticationManager stop() {
  133. for (AuthenticationProvider provider : authenticationProviders) {
  134. try {
  135. provider.stop();
  136. } catch (Exception e) {
  137. logger.error("Failed to stop " + provider.getClass().getSimpleName(), e);
  138. }
  139. }
  140. return this;
  141. }
  142. /**
  143. * Authenticate a user based on HTTP request parameters.
  144. *
  145. * Authentication by X509Certificate is tried first and then by cookie.
  146. *
  147. * @param httpRequest
  148. * @return a user object or null
  149. */
  150. @Override
  151. public UserModel authenticate(HttpServletRequest httpRequest) {
  152. return authenticate(httpRequest, false);
  153. }
  154. /**
  155. * Authenticate a user based on HTTP request parameters.
  156. *
  157. * Authentication by servlet container principal, X509Certificate, cookie,
  158. * and finally BASIC header.
  159. *
  160. * @param httpRequest
  161. * @param requiresCertificate
  162. * @return a user object or null
  163. */
  164. @Override
  165. public UserModel authenticate(HttpServletRequest httpRequest, boolean requiresCertificate) {
  166. // try to authenticate by servlet container principal
  167. if (!requiresCertificate) {
  168. Principal principal = httpRequest.getUserPrincipal();
  169. if (principal != null) {
  170. String username = principal.getName();
  171. if (!StringUtils.isEmpty(username)) {
  172. boolean internalAccount = userManager.isInternalAccount(username);
  173. UserModel user = userManager.getUserModel(username);
  174. if (user != null) {
  175. // existing user
  176. flagWicketSession(AuthenticationType.CONTAINER);
  177. logger.debug(MessageFormat.format("{0} authenticated by servlet container principal from {1}",
  178. user.username, httpRequest.getRemoteAddr()));
  179. return user;
  180. } else if (settings.getBoolean(Keys.realm.container.autoCreateAccounts, false)
  181. && !internalAccount) {
  182. // auto-create user from an authenticated container principal
  183. user = new UserModel(username.toLowerCase());
  184. user.displayName = username;
  185. user.password = Constants.EXTERNAL_ACCOUNT;
  186. user.accountType = AccountType.CONTAINER;
  187. userManager.updateUserModel(user);
  188. flagWicketSession(AuthenticationType.CONTAINER);
  189. logger.debug(MessageFormat.format("{0} authenticated and created by servlet container principal from {1}",
  190. user.username, httpRequest.getRemoteAddr()));
  191. return user;
  192. } else if (!internalAccount) {
  193. logger.warn(MessageFormat.format("Failed to find UserModel for {0}, attempted servlet container authentication from {1}",
  194. principal.getName(), httpRequest.getRemoteAddr()));
  195. }
  196. }
  197. }
  198. }
  199. // try to authenticate by certificate
  200. boolean checkValidity = settings.getBoolean(Keys.git.enforceCertificateValidity, true);
  201. String [] oids = settings.getStrings(Keys.git.certificateUsernameOIDs).toArray(new String[0]);
  202. UserModel model = HttpUtils.getUserModelFromCertificate(httpRequest, checkValidity, oids);
  203. if (model != null) {
  204. // grab real user model and preserve certificate serial number
  205. UserModel user = userManager.getUserModel(model.username);
  206. X509Metadata metadata = HttpUtils.getCertificateMetadata(httpRequest);
  207. if (user != null) {
  208. flagWicketSession(AuthenticationType.CERTIFICATE);
  209. logger.debug(MessageFormat.format("{0} authenticated by client certificate {1} from {2}",
  210. user.username, metadata.serialNumber, httpRequest.getRemoteAddr()));
  211. return user;
  212. } else {
  213. logger.warn(MessageFormat.format("Failed to find UserModel for {0}, attempted client certificate ({1}) authentication from {2}",
  214. model.username, metadata.serialNumber, httpRequest.getRemoteAddr()));
  215. }
  216. }
  217. if (requiresCertificate) {
  218. // caller requires client certificate authentication (e.g. git servlet)
  219. return null;
  220. }
  221. UserModel user = null;
  222. // try to authenticate by cookie
  223. String cookie = getCookie(httpRequest);
  224. if (!StringUtils.isEmpty(cookie)) {
  225. user = userManager.getUserModel(cookie.toCharArray());
  226. if (user != null) {
  227. flagWicketSession(AuthenticationType.COOKIE);
  228. logger.debug(MessageFormat.format("{0} authenticated by cookie from {1}",
  229. user.username, httpRequest.getRemoteAddr()));
  230. return user;
  231. }
  232. }
  233. // try to authenticate by BASIC
  234. final String authorization = httpRequest.getHeader("Authorization");
  235. if (authorization != null && authorization.startsWith("Basic")) {
  236. // Authorization: Basic base64credentials
  237. String base64Credentials = authorization.substring("Basic".length()).trim();
  238. String credentials = new String(Base64.decode(base64Credentials),
  239. Charset.forName("UTF-8"));
  240. // credentials = username:password
  241. final String[] values = credentials.split(":", 2);
  242. if (values.length == 2) {
  243. String username = values[0];
  244. char[] password = values[1].toCharArray();
  245. user = authenticate(username, password);
  246. if (user != null) {
  247. flagWicketSession(AuthenticationType.CREDENTIALS);
  248. logger.debug(MessageFormat.format("{0} authenticated by BASIC request header from {1}",
  249. user.username, httpRequest.getRemoteAddr()));
  250. return user;
  251. } else {
  252. logger.warn(MessageFormat.format("Failed login attempt for {0}, invalid credentials from {1}",
  253. username, httpRequest.getRemoteAddr()));
  254. }
  255. }
  256. }
  257. return null;
  258. }
  259. protected void flagWicketSession(AuthenticationType authenticationType) {
  260. RequestCycle requestCycle = RequestCycle.get();
  261. if (requestCycle != null) {
  262. // flag the Wicket session, if this is a Wicket request
  263. GitBlitWebSession session = GitBlitWebSession.get();
  264. session.authenticationType = authenticationType;
  265. }
  266. }
  267. /**
  268. * Authenticate a user based on a username and password.
  269. *
  270. * @see IUserService.authenticate(String, char[])
  271. * @param username
  272. * @param password
  273. * @return a user object or null
  274. */
  275. @Override
  276. public UserModel authenticate(String username, char[] password) {
  277. if (StringUtils.isEmpty(username)) {
  278. // can not authenticate empty username
  279. return null;
  280. }
  281. String usernameDecoded = StringUtils.decodeUsername(username);
  282. String pw = new String(password);
  283. if (StringUtils.isEmpty(pw)) {
  284. // can not authenticate empty password
  285. return null;
  286. }
  287. UserModel user = userManager.getUserModel(usernameDecoded);
  288. // try local authentication
  289. if (user != null && user.isLocalAccount()) {
  290. UserModel returnedUser = null;
  291. if (user.password.startsWith(StringUtils.MD5_TYPE)) {
  292. // password digest
  293. String md5 = StringUtils.MD5_TYPE + StringUtils.getMD5(new String(password));
  294. if (user.password.equalsIgnoreCase(md5)) {
  295. returnedUser = user;
  296. }
  297. } else if (user.password.startsWith(StringUtils.COMBINED_MD5_TYPE)) {
  298. // username+password digest
  299. String md5 = StringUtils.COMBINED_MD5_TYPE
  300. + StringUtils.getMD5(username.toLowerCase() + new String(password));
  301. if (user.password.equalsIgnoreCase(md5)) {
  302. returnedUser = user;
  303. }
  304. } else if (user.password.equals(new String(password))) {
  305. // plain-text password
  306. returnedUser = user;
  307. }
  308. return returnedUser;
  309. }
  310. // try registered external authentication providers
  311. if (user == null) {
  312. for (AuthenticationProvider provider : authenticationProviders) {
  313. if (provider instanceof UsernamePasswordAuthenticationProvider) {
  314. user = provider.authenticate(usernameDecoded, password);
  315. if (user != null) {
  316. // user authenticated
  317. user.accountType = provider.getAccountType();
  318. return user;
  319. }
  320. }
  321. }
  322. }
  323. return user;
  324. }
  325. /**
  326. * Returns the Gitlbit cookie in the request.
  327. *
  328. * @param request
  329. * @return the Gitblit cookie for the request or null if not found
  330. */
  331. @Override
  332. public String getCookie(HttpServletRequest request) {
  333. if (settings.getBoolean(Keys.web.allowCookieAuthentication, true)) {
  334. Cookie[] cookies = request.getCookies();
  335. if (cookies != null && cookies.length > 0) {
  336. for (Cookie cookie : cookies) {
  337. if (cookie.getName().equals(Constants.NAME)) {
  338. String value = cookie.getValue();
  339. return value;
  340. }
  341. }
  342. }
  343. }
  344. return null;
  345. }
  346. /**
  347. * Sets a cookie for the specified user.
  348. *
  349. * @param response
  350. * @param user
  351. */
  352. @Override
  353. public void setCookie(HttpServletResponse response, UserModel user) {
  354. if (settings.getBoolean(Keys.web.allowCookieAuthentication, true)) {
  355. GitBlitWebSession session = GitBlitWebSession.get();
  356. boolean standardLogin = session.authenticationType.isStandard();
  357. if (standardLogin) {
  358. Cookie userCookie;
  359. if (user == null) {
  360. // clear cookie for logout
  361. userCookie = new Cookie(Constants.NAME, "");
  362. } else {
  363. // set cookie for login
  364. String cookie = userManager.getCookie(user);
  365. if (StringUtils.isEmpty(cookie)) {
  366. // create empty cookie
  367. userCookie = new Cookie(Constants.NAME, "");
  368. } else {
  369. // create real cookie
  370. userCookie = new Cookie(Constants.NAME, cookie);
  371. // expire the cookie in 7 days
  372. userCookie.setMaxAge((int) TimeUnit.DAYS.toSeconds(7));
  373. }
  374. }
  375. userCookie.setPath("/");
  376. response.addCookie(userCookie);
  377. }
  378. }
  379. }
  380. /**
  381. * Logout a user.
  382. *
  383. * @param user
  384. */
  385. @Override
  386. public void logout(HttpServletResponse response, UserModel user) {
  387. setCookie(response, null);
  388. }
  389. /**
  390. * Returns true if the user's credentials can be changed.
  391. *
  392. * @param user
  393. * @return true if the user service supports credential changes
  394. */
  395. @Override
  396. public boolean supportsCredentialChanges(UserModel user) {
  397. return (user != null && user.isLocalAccount()) || findProvider(user).supportsCredentialChanges();
  398. }
  399. /**
  400. * Returns true if the user's display name can be changed.
  401. *
  402. * @param user
  403. * @return true if the user service supports display name changes
  404. */
  405. @Override
  406. public boolean supportsDisplayNameChanges(UserModel user) {
  407. return (user != null && user.isLocalAccount()) || findProvider(user).supportsDisplayNameChanges();
  408. }
  409. /**
  410. * Returns true if the user's email address can be changed.
  411. *
  412. * @param user
  413. * @return true if the user service supports email address changes
  414. */
  415. @Override
  416. public boolean supportsEmailAddressChanges(UserModel user) {
  417. return (user != null && user.isLocalAccount()) || findProvider(user).supportsEmailAddressChanges();
  418. }
  419. /**
  420. * Returns true if the user's team memberships can be changed.
  421. *
  422. * @param user
  423. * @return true if the user service supports team membership changes
  424. */
  425. @Override
  426. public boolean supportsTeamMembershipChanges(UserModel user) {
  427. return (user != null && user.isLocalAccount()) || findProvider(user).supportsTeamMembershipChanges();
  428. }
  429. /**
  430. * Returns true if the team memberships can be changed.
  431. *
  432. * @param user
  433. * @return true if the team membership can be changed
  434. */
  435. @Override
  436. public boolean supportsTeamMembershipChanges(TeamModel team) {
  437. return (team != null && team.isLocalTeam()) || findProvider(team).supportsTeamMembershipChanges();
  438. }
  439. protected AuthenticationProvider findProvider(UserModel user) {
  440. for (AuthenticationProvider provider : authenticationProviders) {
  441. if (provider.getAccountType().equals(user.accountType)) {
  442. return provider;
  443. }
  444. }
  445. return AuthenticationProvider.NULL_PROVIDER;
  446. }
  447. protected AuthenticationProvider findProvider(TeamModel team) {
  448. for (AuthenticationProvider provider : authenticationProviders) {
  449. if (provider.getAccountType().equals(team.accountType)) {
  450. return provider;
  451. }
  452. }
  453. return AuthenticationProvider.NULL_PROVIDER;
  454. }
  455. }