View Javadoc
1   /**
2    * This file Copyright (c) 2016 Magnolia International
3    * Ltd.  (http://www.magnolia-cms.com). All rights reserved.
4    *
5    *
6    * This file is dual-licensed under both the Magnolia
7    * Network Agreement and the GNU General Public License.
8    * You may elect to use one or the other of these licenses.
9    *
10   * This file is distributed in the hope that it will be
11   * useful, but AS-IS and WITHOUT ANY WARRANTY; without even the
12   * implied warranty of MERCHANTABILITY or FITNESS FOR A
13   * PARTICULAR PURPOSE, TITLE, or NONINFRINGEMENT.
14   * Redistribution, except as permitted by whichever of the GPL
15   * or MNA you select, is prohibited.
16   *
17   * 1. For the GPL license (GPL), you can redistribute and/or
18   * modify this file under the terms of the GNU General
19   * Public License, Version 3, as published by the Free Software
20   * Foundation.  You should have received a copy of the GNU
21   * General Public License, Version 3 along with this program;
22   * if not, write to the Free Software Foundation, Inc., 51
23   * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
24   *
25   * 2. For the Magnolia Network Agreement (MNA), this file
26   * and the accompanying materials are made available under the
27   * terms of the MNA which accompanies this distribution, and
28   * is available at http://www.magnolia-cms.com/mna.html
29   *
30   * Any modifications to this file must keep this entire header
31   * intact.
32   *
33   */
34  package info.magnolia.cms.security.auth.login;
35  
36  import info.magnolia.cms.security.SecuritySupportBase;
37  import info.magnolia.cms.security.auth.callback.CredentialsCallbackHandler;
38  import info.magnolia.cms.security.auth.callback.PlainTextCallbackHandler;
39  
40  import java.nio.charset.StandardCharsets;
41  import java.util.Set;
42  
43  import javax.servlet.http.HttpServletRequest;
44  import javax.servlet.http.HttpServletResponse;
45  
46  import org.apache.commons.lang3.StringUtils;
47  import org.apache.http.NameValuePair;
48  import org.apache.http.client.utils.URLEncodedUtils;
49  import org.slf4j.Logger;
50  import org.slf4j.LoggerFactory;
51  
52  import com.google.common.collect.ImmutableSet;
53  
54  /**
55   * Uses the the {@value #PARAMETER_USER_ID} and  {@value #PARAMETER_PSWD} parameters to login.
56   */
57  public class FormLogin extends LoginHandlerBase implements LoginHandler {
58  
59      private static final Logger log = LoggerFactory.getLogger(FormLogin.class);
60  
61      public static final String PARAMETER_USER_ID = "mgnlUserId";
62  
63      public static final String PARAMETER_PSWD = "mgnlUserPSWD";
64  
65      public static final String PARAMETER_REALM = "mgnlRealm";
66  
67      public static final String PARAMETER_RETURN_TO = "mgnlReturnTo";
68  
69      public static final Set<String> AUTHENTICATION_ATTRIBUTES = ImmutableSet.of(PARAMETER_USER_ID, PARAMETER_REALM, PARAMETER_PSWD);
70  
71      /**
72       * The JAAS chain/module to use.
73       */
74      private String jaasChain = SecuritySupportBase.DEFAULT_JAAS_LOGIN_CHAIN;
75  
76      @Override
77      public LoginResult handle(HttpServletRequest request, HttpServletResponse response) {
78          String userid = request.getParameter(PARAMETER_USER_ID);
79          log.debug("handle login for {}", userid);
80          if (StringUtils.isNotEmpty(userid)) {
81              String pswd = StringUtils.defaultString(request.getParameter(PARAMETER_PSWD));
82              String realm = StringUtils.defaultString(request.getParameter(PARAMETER_REALM));
83  
84              CredentialsCallbackHandler callbackHandler = new PlainTextCallbackHandler(userid, pswd.toCharArray(), realm);
85              LoginResult result = authenticate(callbackHandler, getJaasChain());
86  
87              if (result.getStatus() == LoginResult.STATUS_SUCCEEDED && requiresRedirect(request)) {
88                  return new LoginResult(LoginResult.STATUS_SUCCEEDED_REDIRECT_REQUIRED, result.getSubject());
89              }
90              return result;
91          }
92          return LoginResult.NOT_HANDLED;
93      }
94  
95      /**
96       * We can assume that a redirect is needed in case the following criteria is met:
97       * <ul>
98       * <li>We are dealing with a {@code POST} http request</li>
99       * <li>Request query string does not contain any of the authentication parameters, because otherwise
100      * we are probably dealing with e.g. some <i>XHR</i> (e.g. a <i>Vaadin</i> request in <i>AdminCentral</i> web-app) and
101      * authentication was triggered just because the attributes leaked into the request's attribute map
102      * via query string => demanding redirect in such case only might cause some damage.
103      * </li>
104      * </ul>
105      */
106     protected boolean requiresRedirect(HttpServletRequest request) {
107         if (!request.getMethod().equalsIgnoreCase("POST")) {
108             return false;
109         }
110 
111         for (final NameValuePair queryParameter : URLEncodedUtils.parse(request.getQueryString(), StandardCharsets.UTF_8)) {
112             if (AUTHENTICATION_ATTRIBUTES.contains(queryParameter.getName())) {
113                 return false;
114             }
115         }
116 
117         return true;
118     }
119 
120     public String getJaasChain() {
121         return this.jaasChain;
122     }
123 
124 
125     public void setJaasChain(String jaasChain) {
126         this.jaasChain = jaasChain;
127     }
128 
129 }