This is an automated email from the ASF dual-hosted git repository.
lmccay pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/knox.git
The following commit(s) were added to refs/heads/master by this push:
new b395f0c KNOX-2539 - Enhance JWTProvider to accept token via HTTP
Basic (#404)
b395f0c is described below
commit b395f0ca183bc8fe2b3da6717b3c9428d9f8f4d0
Author: lmccay <[email protected]>
AuthorDate: Sun Feb 28 17:54:14 2021 -0500
KNOX-2539 - Enhance JWTProvider to accept token via HTTP Basic (#404)
* KNOX-2539 - Enhance JWTProvider to accept token via HTTP Basic
---
.../federation/jwt/filter/JWTFederationFilter.java | 61 ++++++++++++++-----
.../JWTAsHTTPBasicCredsFederationFilterTest.java | 70 ++++++++++++++++++++++
2 files changed, 115 insertions(+), 16 deletions(-)
diff --git
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
index 4a7d425..3693b00 100644
---
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
+++
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
@@ -31,17 +31,22 @@ import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
+import java.nio.charset.StandardCharsets;
import java.text.ParseException;
+import java.util.Base64;
+import java.util.Locale;
public class JWTFederationFilter extends AbstractJWTFilter {
- public static final String KNOX_TOKEN_AUDIENCES = "knox.token.audiences";
- public static final String TOKEN_VERIFICATION_PEM =
"knox.token.verification.pem";
- public static final String KNOX_TOKEN_QUERY_PARAM_NAME =
"knox.token.query.param.name";
- public static final String TOKEN_PRINCIPAL_CLAIM =
"knox.token.principal.claim";
- public static final String JWKS_URL = "knox.token.jwks.url";
- private static final String BEARER = "Bearer ";
- private String paramName = "knoxtoken";
+ public static final String KNOX_TOKEN_AUDIENCES = "knox.token.audiences";
+ public static final String TOKEN_VERIFICATION_PEM =
"knox.token.verification.pem";
+ public static final String KNOX_TOKEN_QUERY_PARAM_NAME =
"knox.token.query.param.name";
+ public static final String TOKEN_PRINCIPAL_CLAIM =
"knox.token.principal.claim";
+ public static final String JWKS_URL = "knox.token.jwks.url";
+ private static final String BEARER = "Bearer ";
+ private static final String BASIC = "Basic";
+ private static final String TOKEN = "Token";
+ private String paramName;
@Override
public void init( FilterConfig filterConfig ) throws ServletException {
@@ -58,16 +63,19 @@ public class JWTFederationFilter extends AbstractJWTFilter {
if (queryParamName != null) {
paramName = queryParamName;
}
+
// JWKSUrl
String oidcjwksurl = filterConfig.getInitParameter(JWKS_URL);
if (oidcjwksurl != null) {
expectedJWKSUrl = oidcjwksurl;
}
+
// expected claim
String oidcPrincipalclaim =
filterConfig.getInitParameter(TOKEN_PRINCIPAL_CLAIM);
if (oidcPrincipalclaim != null) {
expectedPrincipalClaim = oidcPrincipalclaim;
}
+
// token verification pem
String verificationPEM =
filterConfig.getInitParameter(TOKEN_VERIFICATION_PEM);
// setup the public key of the token issuer for verification
@@ -104,15 +112,36 @@ public class JWTFederationFilter extends
AbstractJWTFilter {
}
}
- public String getWireToken(ServletRequest request) {
- final String header = ((HttpServletRequest)
request).getHeader("Authorization");
- if (header != null && header.startsWith(BEARER)) {
- // what follows the bearer designator should be the JWT token being used
to request or as an access token
- return header.substring(BEARER.length());
- } else {
- // check for query param
- return request.getParameter(paramName);
- }
+ public String getWireToken(final ServletRequest request) {
+ String token = null;
+ final String header =
((HttpServletRequest)request).getHeader("Authorization");
+ if (header != null) {
+ if (header.startsWith(BEARER)) {
+ // what follows the bearer designator should be the JWT token
being used
+ // to request or as an access token
+ token = header.substring(BEARER.length());
+ }
+ else if
(header.toLowerCase(Locale.ROOT).startsWith(BASIC.toLowerCase(Locale.ROOT))) {
+ // what follows the Basic designator should be the JWT token
being used
+ // to request or as an access token
+ token = this.parseFromHTTPBasicCredentials(token, header);
+ }
+ }
+ if (token == null) {
+ token = request.getParameter(this.paramName);
+ }
+ return token;
+ }
+
+ private String parseFromHTTPBasicCredentials(String token, final String
header) {
+ final String base64Credentials = header.substring(BASIC.length()).trim();
+ final byte[] credDecoded = Base64.getDecoder().decode(base64Credentials);
+ final String credentials = new String(credDecoded,
StandardCharsets.UTF_8);
+ final String[] values = credentials.split(":", 2);
+ if (values[0].equalsIgnoreCase(TOKEN)) {
+ token = values[1];
+ }
+ return token;
}
@Override
diff --git
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTAsHTTPBasicCredsFederationFilterTest.java
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTAsHTTPBasicCredsFederationFilterTest.java
new file mode 100644
index 0000000..68d87d3
--- /dev/null
+++
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTAsHTTPBasicCredsFederationFilterTest.java
@@ -0,0 +1,70 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.knox.gateway.provider.federation;
+
+import
org.apache.knox.gateway.provider.federation.jwt.filter.JWTFederationFilter;
+import org.junit.Test;
+import org.easymock.EasyMock;
+import java.nio.charset.StandardCharsets;
+import java.util.Base64;
+import com.nimbusds.jwt.SignedJWT;
+import javax.servlet.http.HttpServletRequest;
+import org.junit.Before;
+import org.apache.knox.gateway.services.security.token.JWTokenAuthority;
+
+public class JWTAsHTTPBasicCredsFederationFilterTest extends
AbstractJWTFilterTest
+{
+ @Before
+ public void setUp() {
+ handler = new TestJWTFederationFilter();
+ ((TestJWTFederationFilter) handler).setTokenService(new
TestJWTokenAuthority(publicKey));
+ }
+
+ @Override
+ protected void setTokenOnRequest(final HttpServletRequest request, final
SignedJWT jwt) {
+ final String token = "Basic " +
Base64.getEncoder().encodeToString(("Token:" +
jwt.serialize()).getBytes(StandardCharsets.UTF_8));
+
EasyMock.expect((Object)request.getHeader("Authorization")).andReturn((Object)token);
+ }
+
+ @Override
+ protected void setGarbledTokenOnRequest(final HttpServletRequest request,
final SignedJWT jwt) {
+ final String token = "Basic " +
Base64.getEncoder().encodeToString(("Token: ljm" +
jwt.serialize()).getBytes(StandardCharsets.UTF_8));
+
EasyMock.expect((Object)request.getHeader("Authorization")).andReturn((Object)token);
+ }
+
+ @Override
+ protected String getAudienceProperty() {
+ return "knox.token.audiences";
+ }
+
+ private static class TestJWTFederationFilter extends JWTFederationFilter {
+ void setTokenService(JWTokenAuthority ts) {
+ authority = ts;
+ }
+ }
+
+ @Override
+ protected String getVerificationPemProperty() {
+ return "knox.token.verification.pem";
+ }
+
+ @Test
+ public void doTest() {
+ }
+}
+