📄 securityhandler.java
字号:
// ========================================================================// Copyright 199-2004 Mort Bay Consulting Pty. Ltd.// ------------------------------------------------------------------------// Licensed under the Apache License, Version 2.0 (the "License");// you may not use this file except in compliance with the License.// You may obtain a copy of the License at // http://www.apache.org/licenses/LICENSE-2.0// Unless required by applicable law or agreed to in writing, software// distributed under the License is distributed on an "AS IS" BASIS,// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.// See the License for the specific language governing permissions and// limitations under the License.// ========================================================================package org.mortbay.jetty.security;import java.io.IOException;import java.security.Principal;import java.util.Map;import javax.servlet.ServletException;import javax.servlet.http.HttpServletRequest;import javax.servlet.http.HttpServletResponse;import org.mortbay.jetty.Connector;import org.mortbay.jetty.HttpConnection;import org.mortbay.jetty.Request;import org.mortbay.jetty.Response;import org.mortbay.jetty.handler.HandlerWrapper;import org.mortbay.jetty.servlet.PathMap;import org.mortbay.log.Log;import org.mortbay.util.LazyList;import org.mortbay.util.StringUtil;/* ------------------------------------------------------------ *//** Handler to enforce SecurityConstraints. * * @author Greg Wilkins (gregw) */public class SecurityHandler extends HandlerWrapper{ /* ------------------------------------------------------------ */ private String _authMethod=Constraint.__BASIC_AUTH; private UserRealm _userRealm; private ConstraintMapping[] _constraintMappings; private PathMap _constraintMap=new PathMap(); private Authenticator _authenticator; private NotChecked _notChecked=new NotChecked(); private boolean _checkWelcomeFiles=false; /* ------------------------------------------------------------ */ /** * @return Returns the authenticator. */ public Authenticator getAuthenticator() { return _authenticator; } /* ------------------------------------------------------------ */ /** * @param authenticator The authenticator to set. */ public void setAuthenticator(Authenticator authenticator) { _authenticator = authenticator; } /* ------------------------------------------------------------ */ /** * @return Returns the userRealm. */ public UserRealm getUserRealm() { return _userRealm; } /* ------------------------------------------------------------ */ /** * @param userRealm The userRealm to set. */ public void setUserRealm(UserRealm userRealm) { _userRealm = userRealm; } /* ------------------------------------------------------------ */ /** * @return Returns the contraintMappings. */ public ConstraintMapping[] getConstraintMappings() { return _constraintMappings; } /* ------------------------------------------------------------ */ /** * @param contraintMappings The contraintMappings to set. */ public void setConstraintMappings(ConstraintMapping[] constraintMappings) { _constraintMappings=constraintMappings; if (_constraintMappings!=null) { this._constraintMappings = constraintMappings; _constraintMap.clear(); for (int i=0;i<_constraintMappings.length;i++) { Object mappings = _constraintMap.get(_constraintMappings[i].getPathSpec()); mappings=LazyList.add(mappings, _constraintMappings[i]); _constraintMap.put(_constraintMappings[i].getPathSpec(),mappings); } } } /* ------------------------------------------------------------ */ public String getAuthMethod() { return _authMethod; } /* ------------------------------------------------------------ */ public void setAuthMethod(String method) { if (isStarted() && _authMethod!=null && !_authMethod.equals(method)) throw new IllegalStateException("Handler started"); _authMethod = method; } /* ------------------------------------------------------------ */ public boolean hasConstraints() { return _constraintMappings != null && _constraintMappings.length > 0; } /* ------------------------------------------------------------ */ /** * @return True if forwards to welcome files are authenticated */ public boolean isCheckWelcomeFiles() { return _checkWelcomeFiles; } /* ------------------------------------------------------------ */ /** * @param authenticateWelcomeFiles True if forwards to welcome files are authenticated */ public void setCheckWelcomeFiles(boolean authenticateWelcomeFiles) { _checkWelcomeFiles=authenticateWelcomeFiles; } /* ------------------------------------------------------------ */ public void doStart() throws Exception { if (_authenticator==null) { // Find out the Authenticator. if (Constraint.__BASIC_AUTH.equalsIgnoreCase(_authMethod)) _authenticator=new BasicAuthenticator(); else if (Constraint.__DIGEST_AUTH.equalsIgnoreCase(_authMethod)) _authenticator=new DigestAuthenticator(); else if (Constraint.__CERT_AUTH.equalsIgnoreCase(_authMethod)) _authenticator=new ClientCertAuthenticator(); else if (Constraint.__FORM_AUTH.equalsIgnoreCase(_authMethod)) _authenticator=new FormAuthenticator(); else Log.warn("Unknown Authentication method:"+_authMethod); } super.doStart(); } /* ------------------------------------------------------------ */ /* * @see org.mortbay.jetty.Handler#handle(java.lang.String, javax.servlet.http.HttpServletRequest, javax.servlet.http.HttpServletResponse, int) */ public void handle(String target, HttpServletRequest request, HttpServletResponse response, int dispatch) throws IOException, ServletException { Request base_request = (request instanceof Request) ? (Request)request:HttpConnection.getCurrentConnection().getRequest(); Response base_response = (response instanceof Response) ? (Response)response:HttpConnection.getCurrentConnection().getResponse(); UserRealm old_realm = base_request.getUserRealm(); try { base_request.setUserRealm(getUserRealm()); if (dispatch==REQUEST && !checkSecurityConstraints(target,base_request,base_response)) { base_request.setHandled(true); return; } if (dispatch==FORWARD && _checkWelcomeFiles && request.getAttribute("org.mortbay.jetty.welcome")!=null) { request.removeAttribute("org.mortbay.jetty.welcome"); if (!checkSecurityConstraints(target,base_request,base_response)) { base_request.setHandled(true); return; } } if (_authenticator instanceof FormAuthenticator && target.endsWith(FormAuthenticator.__J_SECURITY_CHECK)) { _authenticator.authenticate(getUserRealm(),target,base_request,base_response); base_request.setHandled(true); return; } if (getHandler()!=null) getHandler().handle(target, request, response, dispatch); } finally { if (_userRealm!=null) { if (dispatch==REQUEST) { _userRealm.disassociate(base_request.getUserPrincipal()); } } base_request.setUserRealm(old_realm); } } /* ------------------------------------------------------------ */ public boolean checkSecurityConstraints( String pathInContext, Request request, Response response) throws IOException { Object mapping_entries= _constraintMap.getLazyMatches(pathInContext); String pattern=null; Object constraints= null; // for each path match // Add only constraints that have the correct method // break if the matching pattern changes. This allows only // constraints with matching pattern and method to be combined. if (mapping_entries!=null) { loop: for (int m=0;m<LazyList.size(mapping_entries); m++) { Map.Entry entry= (Map.Entry)LazyList.get(mapping_entries,m); Object mappings= entry.getValue(); String path_spec=(String)entry.getKey(); for (int c=0;c<LazyList.size(mappings);c++) { ConstraintMapping mapping=(ConstraintMapping)LazyList.get(mappings,c); if (mapping.getMethod()!=null && !mapping.getMethod().equalsIgnoreCase(request.getMethod())) continue; if (pattern!=null && !pattern.equals(path_spec)) break loop; pattern=path_spec; constraints= LazyList.add(constraints, mapping.getConstraint()); } } return check(constraints,_authenticator,_userRealm,pathInContext,request,response); }
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -