Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

AuthenticationManager.java 19KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572
  1. /*
  2. * Copyright 2013 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.manager;
  17. import java.nio.charset.Charset;
  18. import java.security.Principal;
  19. import java.text.MessageFormat;
  20. import java.util.ArrayList;
  21. import java.util.HashMap;
  22. import java.util.List;
  23. import java.util.Map;
  24. import java.util.concurrent.TimeUnit;
  25. import javax.servlet.http.Cookie;
  26. import javax.servlet.http.HttpServletRequest;
  27. import javax.servlet.http.HttpServletResponse;
  28. import org.apache.wicket.RequestCycle;
  29. import org.slf4j.Logger;
  30. import org.slf4j.LoggerFactory;
  31. import com.gitblit.Constants;
  32. import com.gitblit.Constants.AccountType;
  33. import com.gitblit.Constants.AuthenticationType;
  34. import com.gitblit.IStoredSettings;
  35. import com.gitblit.Keys;
  36. import com.gitblit.auth.AuthenticationProvider;
  37. import com.gitblit.auth.AuthenticationProvider.UsernamePasswordAuthenticationProvider;
  38. import com.gitblit.auth.HtpasswdAuthProvider;
  39. import com.gitblit.auth.LdapAuthProvider;
  40. import com.gitblit.auth.PAMAuthProvider;
  41. import com.gitblit.auth.RedmineAuthProvider;
  42. import com.gitblit.auth.SalesforceAuthProvider;
  43. import com.gitblit.auth.WindowsAuthProvider;
  44. import com.gitblit.models.TeamModel;
  45. import com.gitblit.models.UserModel;
  46. import com.gitblit.transport.ssh.SshKey;
  47. import com.gitblit.utils.Base64;
  48. import com.gitblit.utils.HttpUtils;
  49. import com.gitblit.utils.StringUtils;
  50. import com.gitblit.utils.X509Utils.X509Metadata;
  51. import com.gitblit.wicket.GitBlitWebSession;
  52. import com.google.inject.Inject;
  53. import com.google.inject.Singleton;
  54. /**
  55. * The authentication manager handles user login & logout.
  56. *
  57. * @author James Moger
  58. *
  59. */
  60. @Singleton
  61. public class AuthenticationManager implements IAuthenticationManager {
  62. private final Logger logger = LoggerFactory.getLogger(getClass());
  63. private final IStoredSettings settings;
  64. private final IRuntimeManager runtimeManager;
  65. private final IUserManager userManager;
  66. private final List<AuthenticationProvider> authenticationProviders;
  67. private final Map<String, Class<? extends AuthenticationProvider>> providerNames;
  68. private final Map<String, String> legacyRedirects;
  69. @Inject
  70. public AuthenticationManager(
  71. IRuntimeManager runtimeManager,
  72. IUserManager userManager) {
  73. this.settings = runtimeManager.getSettings();
  74. this.runtimeManager = runtimeManager;
  75. this.userManager = userManager;
  76. this.authenticationProviders = new ArrayList<AuthenticationProvider>();
  77. // map of shortcut provider names
  78. providerNames = new HashMap<String, Class<? extends AuthenticationProvider>>();
  79. providerNames.put("htpasswd", HtpasswdAuthProvider.class);
  80. providerNames.put("ldap", LdapAuthProvider.class);
  81. providerNames.put("pam", PAMAuthProvider.class);
  82. providerNames.put("redmine", RedmineAuthProvider.class);
  83. providerNames.put("salesforce", SalesforceAuthProvider.class);
  84. providerNames.put("windows", WindowsAuthProvider.class);
  85. // map of legacy external user services
  86. legacyRedirects = new HashMap<String, String>();
  87. legacyRedirects.put("com.gitblit.HtpasswdUserService", "htpasswd");
  88. legacyRedirects.put("com.gitblit.LdapUserService", "ldap");
  89. legacyRedirects.put("com.gitblit.PAMUserService", "pam");
  90. legacyRedirects.put("com.gitblit.RedmineUserService", "redmine");
  91. legacyRedirects.put("com.gitblit.SalesforceUserService", "salesforce");
  92. legacyRedirects.put("com.gitblit.WindowsUserService", "windows");
  93. }
  94. @Override
  95. public AuthenticationManager start() {
  96. // automatically adjust legacy configurations
  97. String realm = settings.getString(Keys.realm.userService, "${baseFolder}/users.conf");
  98. if (legacyRedirects.containsKey(realm)) {
  99. logger.warn("");
  100. logger.warn(Constants.BORDER2);
  101. logger.warn(" IUserService '{}' is obsolete!", realm);
  102. logger.warn(" Please set '{}={}'", "realm.authenticationProviders", legacyRedirects.get(realm));
  103. logger.warn(Constants.BORDER2);
  104. logger.warn("");
  105. // conditionally override specified authentication providers
  106. if (StringUtils.isEmpty(settings.getString(Keys.realm.authenticationProviders, null))) {
  107. settings.overrideSetting(Keys.realm.authenticationProviders, legacyRedirects.get(realm));
  108. }
  109. }
  110. // instantiate and setup specified authentication providers
  111. List<String> providers = settings.getStrings(Keys.realm.authenticationProviders);
  112. if (providers.isEmpty()) {
  113. logger.info("External authentication disabled.");
  114. } else {
  115. for (String provider : providers) {
  116. try {
  117. Class<?> authClass;
  118. if (providerNames.containsKey(provider)) {
  119. // map the name -> class
  120. authClass = providerNames.get(provider);
  121. } else {
  122. // reflective lookup
  123. authClass = Class.forName(provider);
  124. }
  125. logger.info("setting up {}", authClass.getName());
  126. AuthenticationProvider authImpl = (AuthenticationProvider) authClass.newInstance();
  127. authImpl.setup(runtimeManager, userManager);
  128. authenticationProviders.add(authImpl);
  129. } catch (Exception e) {
  130. logger.error("", e);
  131. }
  132. }
  133. }
  134. return this;
  135. }
  136. @Override
  137. public AuthenticationManager stop() {
  138. for (AuthenticationProvider provider : authenticationProviders) {
  139. try {
  140. provider.stop();
  141. } catch (Exception e) {
  142. logger.error("Failed to stop " + provider.getClass().getSimpleName(), e);
  143. }
  144. }
  145. return this;
  146. }
  147. public void addAuthenticationProvider(AuthenticationProvider prov) {
  148. authenticationProviders.add(prov);
  149. }
  150. /**
  151. * Authenticate a user based on HTTP request parameters.
  152. *
  153. * Authentication by X509Certificate is tried first and then by cookie.
  154. *
  155. * @param httpRequest
  156. * @return a user object or null
  157. */
  158. @Override
  159. public UserModel authenticate(HttpServletRequest httpRequest) {
  160. return authenticate(httpRequest, false);
  161. }
  162. /**
  163. * Authenticate a user based on HTTP request parameters.
  164. *
  165. * Authentication by servlet container principal, X509Certificate, cookie,
  166. * and finally BASIC header.
  167. *
  168. * @param httpRequest
  169. * @param requiresCertificate
  170. * @return a user object or null
  171. */
  172. @Override
  173. public UserModel authenticate(HttpServletRequest httpRequest, boolean requiresCertificate) {
  174. // try to authenticate by servlet container principal
  175. if (!requiresCertificate) {
  176. Principal principal = httpRequest.getUserPrincipal();
  177. if (principal != null) {
  178. String username = principal.getName();
  179. if (!StringUtils.isEmpty(username)) {
  180. boolean internalAccount = userManager.isInternalAccount(username);
  181. UserModel user = userManager.getUserModel(username);
  182. if (user != null) {
  183. // existing user
  184. flagWicketSession(AuthenticationType.CONTAINER);
  185. logger.debug(MessageFormat.format("{0} authenticated by servlet container principal from {1}",
  186. user.username, httpRequest.getRemoteAddr()));
  187. return validateAuthentication(user, AuthenticationType.CONTAINER);
  188. } else if (settings.getBoolean(Keys.realm.container.autoCreateAccounts, false)
  189. && !internalAccount) {
  190. // auto-create user from an authenticated container principal
  191. user = new UserModel(username.toLowerCase());
  192. user.displayName = username;
  193. user.password = Constants.EXTERNAL_ACCOUNT;
  194. user.accountType = AccountType.CONTAINER;
  195. userManager.updateUserModel(user);
  196. flagWicketSession(AuthenticationType.CONTAINER);
  197. logger.debug(MessageFormat.format("{0} authenticated and created by servlet container principal from {1}",
  198. user.username, httpRequest.getRemoteAddr()));
  199. return validateAuthentication(user, AuthenticationType.CONTAINER);
  200. } else if (!internalAccount) {
  201. logger.warn(MessageFormat.format("Failed to find UserModel for {0}, attempted servlet container authentication from {1}",
  202. principal.getName(), httpRequest.getRemoteAddr()));
  203. }
  204. }
  205. }
  206. }
  207. // try to authenticate by certificate
  208. boolean checkValidity = settings.getBoolean(Keys.git.enforceCertificateValidity, true);
  209. String [] oids = settings.getStrings(Keys.git.certificateUsernameOIDs).toArray(new String[0]);
  210. UserModel model = HttpUtils.getUserModelFromCertificate(httpRequest, checkValidity, oids);
  211. if (model != null) {
  212. // grab real user model and preserve certificate serial number
  213. UserModel user = userManager.getUserModel(model.username);
  214. X509Metadata metadata = HttpUtils.getCertificateMetadata(httpRequest);
  215. if (user != null) {
  216. flagWicketSession(AuthenticationType.CERTIFICATE);
  217. logger.debug(MessageFormat.format("{0} authenticated by client certificate {1} from {2}",
  218. user.username, metadata.serialNumber, httpRequest.getRemoteAddr()));
  219. return validateAuthentication(user, AuthenticationType.CERTIFICATE);
  220. } else {
  221. logger.warn(MessageFormat.format("Failed to find UserModel for {0}, attempted client certificate ({1}) authentication from {2}",
  222. model.username, metadata.serialNumber, httpRequest.getRemoteAddr()));
  223. }
  224. }
  225. if (requiresCertificate) {
  226. // caller requires client certificate authentication (e.g. git servlet)
  227. return null;
  228. }
  229. UserModel user = null;
  230. // try to authenticate by cookie
  231. String cookie = getCookie(httpRequest);
  232. if (!StringUtils.isEmpty(cookie)) {
  233. user = userManager.getUserModel(cookie.toCharArray());
  234. if (user != null) {
  235. flagWicketSession(AuthenticationType.COOKIE);
  236. logger.debug(MessageFormat.format("{0} authenticated by cookie from {1}",
  237. user.username, httpRequest.getRemoteAddr()));
  238. return validateAuthentication(user, AuthenticationType.COOKIE);
  239. }
  240. }
  241. // try to authenticate by BASIC
  242. final String authorization = httpRequest.getHeader("Authorization");
  243. if (authorization != null && authorization.startsWith("Basic")) {
  244. // Authorization: Basic base64credentials
  245. String base64Credentials = authorization.substring("Basic".length()).trim();
  246. String credentials = new String(Base64.decode(base64Credentials),
  247. Charset.forName("UTF-8"));
  248. // credentials = username:password
  249. final String[] values = credentials.split(":", 2);
  250. if (values.length == 2) {
  251. String username = values[0];
  252. char[] password = values[1].toCharArray();
  253. user = authenticate(username, password);
  254. if (user != null) {
  255. flagWicketSession(AuthenticationType.CREDENTIALS);
  256. logger.debug(MessageFormat.format("{0} authenticated by BASIC request header from {1}",
  257. user.username, httpRequest.getRemoteAddr()));
  258. return validateAuthentication(user, AuthenticationType.CREDENTIALS);
  259. } else {
  260. logger.warn(MessageFormat.format("Failed login attempt for {0}, invalid credentials from {1}",
  261. username, httpRequest.getRemoteAddr()));
  262. }
  263. }
  264. }
  265. return null;
  266. }
  267. /**
  268. * Authenticate a user based on a public key.
  269. *
  270. * This implementation assumes that the authentication has already take place
  271. * (e.g. SSHDaemon) and that this is a validation/verification of the user.
  272. *
  273. * @param username
  274. * @param key
  275. * @return a user object or null
  276. */
  277. @Override
  278. public UserModel authenticate(String username, SshKey key) {
  279. if (username != null) {
  280. if (!StringUtils.isEmpty(username)) {
  281. UserModel user = userManager.getUserModel(username);
  282. if (user != null) {
  283. // existing user
  284. logger.debug(MessageFormat.format("{0} authenticated by {1} public key",
  285. user.username, key.getAlgorithm()));
  286. return validateAuthentication(user, AuthenticationType.PUBLIC_KEY);
  287. }
  288. logger.warn(MessageFormat.format("Failed to find UserModel for {0} during public key authentication",
  289. username));
  290. }
  291. } else {
  292. logger.warn("Empty user passed to AuthenticationManager.authenticate!");
  293. }
  294. return null;
  295. }
  296. /**
  297. * This method allows the authentication manager to reject authentication
  298. * attempts. It is called after the username/secret have been verified to
  299. * ensure that the authentication technique has been logged.
  300. *
  301. * @param user
  302. * @return
  303. */
  304. protected UserModel validateAuthentication(UserModel user, AuthenticationType type) {
  305. if (user == null) {
  306. return null;
  307. }
  308. if (user.disabled) {
  309. // user has been disabled
  310. logger.warn("Rejected {} authentication attempt by disabled account \"{}\"",
  311. type, user.username);
  312. return null;
  313. }
  314. return user;
  315. }
  316. protected void flagWicketSession(AuthenticationType authenticationType) {
  317. RequestCycle requestCycle = RequestCycle.get();
  318. if (requestCycle != null) {
  319. // flag the Wicket session, if this is a Wicket request
  320. GitBlitWebSession session = GitBlitWebSession.get();
  321. session.authenticationType = authenticationType;
  322. }
  323. }
  324. /**
  325. * Authenticate a user based on a username and password.
  326. *
  327. * @see IUserService.authenticate(String, char[])
  328. * @param username
  329. * @param password
  330. * @return a user object or null
  331. */
  332. @Override
  333. public UserModel authenticate(String username, char[] password) {
  334. if (StringUtils.isEmpty(username)) {
  335. // can not authenticate empty username
  336. return null;
  337. }
  338. String usernameDecoded = StringUtils.decodeUsername(username);
  339. String pw = new String(password);
  340. if (StringUtils.isEmpty(pw)) {
  341. // can not authenticate empty password
  342. return null;
  343. }
  344. UserModel user = userManager.getUserModel(usernameDecoded);
  345. // try local authentication
  346. if (user != null && user.isLocalAccount()) {
  347. return authenticateLocal(user, password);
  348. }
  349. // try registered external authentication providers
  350. for (AuthenticationProvider provider : authenticationProviders) {
  351. if (provider instanceof UsernamePasswordAuthenticationProvider) {
  352. UserModel returnedUser = provider.authenticate(usernameDecoded, password);
  353. if (returnedUser != null) {
  354. // user authenticated
  355. returnedUser.accountType = provider.getAccountType();
  356. return validateAuthentication(returnedUser, AuthenticationType.CREDENTIALS);
  357. }
  358. }
  359. }
  360. // could not authenticate locally or with a provider
  361. return null;
  362. }
  363. /**
  364. * Returns a UserModel if local authentication succeeds.
  365. *
  366. * @param user
  367. * @param password
  368. * @return a UserModel if local authentication succeeds, null otherwise
  369. */
  370. protected UserModel authenticateLocal(UserModel user, char [] password) {
  371. UserModel returnedUser = null;
  372. if (user.password.startsWith(StringUtils.MD5_TYPE)) {
  373. // password digest
  374. String md5 = StringUtils.MD5_TYPE + StringUtils.getMD5(new String(password));
  375. if (user.password.equalsIgnoreCase(md5)) {
  376. returnedUser = user;
  377. }
  378. } else if (user.password.startsWith(StringUtils.COMBINED_MD5_TYPE)) {
  379. // username+password digest
  380. String md5 = StringUtils.COMBINED_MD5_TYPE
  381. + StringUtils.getMD5(user.username.toLowerCase() + new String(password));
  382. if (user.password.equalsIgnoreCase(md5)) {
  383. returnedUser = user;
  384. }
  385. } else if (user.password.equals(new String(password))) {
  386. // plain-text password
  387. returnedUser = user;
  388. }
  389. return validateAuthentication(returnedUser, AuthenticationType.CREDENTIALS);
  390. }
  391. /**
  392. * Returns the Gitlbit cookie in the request.
  393. *
  394. * @param request
  395. * @return the Gitblit cookie for the request or null if not found
  396. */
  397. @Override
  398. public String getCookie(HttpServletRequest request) {
  399. if (settings.getBoolean(Keys.web.allowCookieAuthentication, true)) {
  400. Cookie[] cookies = request.getCookies();
  401. if (cookies != null && cookies.length > 0) {
  402. for (Cookie cookie : cookies) {
  403. if (cookie.getName().equals(Constants.NAME)) {
  404. String value = cookie.getValue();
  405. return value;
  406. }
  407. }
  408. }
  409. }
  410. return null;
  411. }
  412. /**
  413. * Sets a cookie for the specified user.
  414. *
  415. * @param response
  416. * @param user
  417. */
  418. @Override
  419. public void setCookie(HttpServletResponse response, UserModel user) {
  420. if (settings.getBoolean(Keys.web.allowCookieAuthentication, true)) {
  421. GitBlitWebSession session = GitBlitWebSession.get();
  422. boolean standardLogin = session.authenticationType.isStandard();
  423. if (standardLogin) {
  424. Cookie userCookie;
  425. if (user == null) {
  426. // clear cookie for logout
  427. userCookie = new Cookie(Constants.NAME, "");
  428. } else {
  429. // set cookie for login
  430. String cookie = userManager.getCookie(user);
  431. if (StringUtils.isEmpty(cookie)) {
  432. // create empty cookie
  433. userCookie = new Cookie(Constants.NAME, "");
  434. } else {
  435. // create real cookie
  436. userCookie = new Cookie(Constants.NAME, cookie);
  437. // expire the cookie in 7 days
  438. userCookie.setMaxAge((int) TimeUnit.DAYS.toSeconds(7));
  439. }
  440. }
  441. userCookie.setPath("/");
  442. response.addCookie(userCookie);
  443. }
  444. }
  445. }
  446. /**
  447. * Logout a user.
  448. *
  449. * @param user
  450. */
  451. @Override
  452. public void logout(HttpServletResponse response, UserModel user) {
  453. setCookie(response, null);
  454. }
  455. /**
  456. * Returns true if the user's credentials can be changed.
  457. *
  458. * @param user
  459. * @return true if the user service supports credential changes
  460. */
  461. @Override
  462. public boolean supportsCredentialChanges(UserModel user) {
  463. return (user != null && user.isLocalAccount()) || findProvider(user).supportsCredentialChanges();
  464. }
  465. /**
  466. * Returns true if the user's display name can be changed.
  467. *
  468. * @param user
  469. * @return true if the user service supports display name changes
  470. */
  471. @Override
  472. public boolean supportsDisplayNameChanges(UserModel user) {
  473. return (user != null && user.isLocalAccount()) || findProvider(user).supportsDisplayNameChanges();
  474. }
  475. /**
  476. * Returns true if the user's email address can be changed.
  477. *
  478. * @param user
  479. * @return true if the user service supports email address changes
  480. */
  481. @Override
  482. public boolean supportsEmailAddressChanges(UserModel user) {
  483. return (user != null && user.isLocalAccount()) || findProvider(user).supportsEmailAddressChanges();
  484. }
  485. /**
  486. * Returns true if the user's team memberships can be changed.
  487. *
  488. * @param user
  489. * @return true if the user service supports team membership changes
  490. */
  491. @Override
  492. public boolean supportsTeamMembershipChanges(UserModel user) {
  493. return (user != null && user.isLocalAccount()) || findProvider(user).supportsTeamMembershipChanges();
  494. }
  495. /**
  496. * Returns true if the team memberships can be changed.
  497. *
  498. * @param user
  499. * @return true if the team membership can be changed
  500. */
  501. @Override
  502. public boolean supportsTeamMembershipChanges(TeamModel team) {
  503. return (team != null && team.isLocalTeam()) || findProvider(team).supportsTeamMembershipChanges();
  504. }
  505. protected AuthenticationProvider findProvider(UserModel user) {
  506. for (AuthenticationProvider provider : authenticationProviders) {
  507. if (provider.getAccountType().equals(user.accountType)) {
  508. return provider;
  509. }
  510. }
  511. return AuthenticationProvider.NULL_PROVIDER;
  512. }
  513. protected AuthenticationProvider findProvider(TeamModel team) {
  514. for (AuthenticationProvider provider : authenticationProviders) {
  515. if (provider.getAccountType().equals(team.accountType)) {
  516. return provider;
  517. }
  518. }
  519. return AuthenticationProvider.NULL_PROVIDER;
  520. }
  521. }