2 * ============LICENSE_START=======================================================
4 * ================================================================================
5 * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
6 * Copyright © 2017-2018 Amdocs
7 * ================================================================================
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 * ============LICENSE_END=========================================================
21 package org.onap.aai.sparky.security.filter;
23 import java.io.FileInputStream;
24 import java.io.IOException;
25 import java.io.InputStream;
26 import java.io.UnsupportedEncodingException;
27 import java.net.URLDecoder;
28 import java.net.URLEncoder;
29 import java.nio.charset.StandardCharsets;
30 import java.util.ArrayList;
31 import java.util.Arrays;
32 import java.util.List;
33 import java.util.Properties;
35 import javax.servlet.Filter;
36 import javax.servlet.FilterChain;
37 import javax.servlet.FilterConfig;
38 import javax.servlet.ServletException;
39 import javax.servlet.ServletRequest;
40 import javax.servlet.ServletResponse;
41 import javax.servlet.http.Cookie;
42 import javax.servlet.http.HttpServletRequest;
43 import javax.servlet.http.HttpServletResponse;
45 import org.onap.aai.cl.api.Logger;
46 import org.onap.aai.cl.eelf.LoggerFactory;
47 import org.onap.aai.cl.mdc.MdcContext;
48 import org.onap.aai.sparky.logging.AaiUiMsgs;
49 import org.onap.aai.sparky.util.NodeUtils;
50 import org.onap.aai.sparky.viewandinspect.config.SparkyConstants;
52 // import esGateKeeper.esGateKeeper;
55 * Redirects to the AT&T global login page if the user is not authenticated.<br>
56 * Filter properties need to be configured in: csp-cookie-filter.properties
58 public class CspCookieFilter implements Filter {
60 /** Redirect URL for the login page. */
61 private String globalLoginUrl;
63 /** Application identifier. */
64 private String applicationId;
66 /** Gatekeeper environment setting (development or production). */
67 private String gateKeeperEnvironment;
69 private static final String FILTER_PARAMETER_CONFIG = "config";
70 private static final String PROPERTY_GLOBAL_LOGIN_URL = "global.login.url";
71 private static final String PROPERTY_APPLICATION_ID = "application.id";
72 private static final String PROPERTY_GATEKEEPER_ENVIRONMENT = "gatekeeper.environment";
73 // valid open redirect domains
74 private List<String> redirectDomains = new ArrayList<>();
75 private static final String PROPERTY_REDIRECT_DOMAINS = "redirect-domain";
77 /** Needed by esGateKeeper, does not accept any other value. */
78 private static final String GATEKEEPER_ACCOUNT_NAME = "CSP";
80 private static final Logger LOG = LoggerFactory.getInstance().getLogger(CspCookieFilter.class);
84 * @see javax.servlet.Filter#init(javax.servlet.FilterConfig)
87 public void init(FilterConfig filterConfig) throws ServletException {
88 String txnID = NodeUtils.getRandomTxnId();
89 MdcContext.initialize(txnID, "CspCookieFilter", "", "Init", "");
92 setConfigurationProperties(filterConfig);
93 } catch (IOException exc) {
94 LOG.error(AaiUiMsgs.ERROR_CSP_CONFIG_FILE);
95 throw new ServletException(exc);
101 * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest, javax.servlet.ServletResponse, javax.servlet.FilterChain)
104 public void doFilter(ServletRequest req, ServletResponse res, FilterChain chain)
105 throws IOException, ServletException {
106 HttpServletRequest request = (HttpServletRequest) req;
107 HttpServletResponse response = (HttpServletResponse) res;
109 Cookie[] cookies = request.getCookies();
110 if ((cookies == null) || (cookies.length == 0)) {
111 doLogin(request, response);
116 * String attEsSec = getSecurityCookie(cookies);
118 * if (attESSec == null || attESSec.length() == 0) { doLogin(request, response); return; }
120 * String attESSecUnEncrypted = esGateKeeper.esGateKeeper(attESSec, GATEKEEPER_ACCOUNT_NAME,
121 * gateKeeperEnvironment); if (attESSecUnEncrypted == null) { doLogin(request, response); } else
124 // LOG.info("User has valid cookie");
125 chain.doFilter(request, response);
131 * @see javax.servlet.Filter#destroy()
134 public void destroy() {}
137 * Sets all required properties needed by this filter.
139 * @param filterConfig the filter configuration defined in the application web.xml
140 * @throws IOException if the properties failed to load.
142 private void setConfigurationProperties(FilterConfig filterConfig) throws IOException {
143 try (InputStream inputStream = new FileInputStream(SparkyConstants.CONFIG_HOME
144 + filterConfig.getInitParameter(FILTER_PARAMETER_CONFIG))) {
145 Properties cspProperties = new Properties();
146 cspProperties.load(inputStream);
147 globalLoginUrl = cspProperties.getProperty(PROPERTY_GLOBAL_LOGIN_URL);
148 applicationId = cspProperties.getProperty(PROPERTY_APPLICATION_ID);
149 gateKeeperEnvironment = cspProperties.getProperty(PROPERTY_GATEKEEPER_ENVIRONMENT);
151 Arrays.asList(cspProperties.getProperty(PROPERTY_REDIRECT_DOMAINS).split(","));
156 * Returns the attESSec cookie if found in the client.
158 * @param cookies the cookies available in the client
159 * @return the attESSec authentication cookie generated by the login page.
161 private String getSecurityCookie(Cookie[] cookies) {
162 String attEsSec = null;
163 for (int i = 0; i < cookies.length; i++) {
164 Cookie thisCookie = cookies[i];
165 String cookieName = thisCookie.getName();
167 if ("attESSec".equals(cookieName)) {
168 attEsSec = thisCookie.getValue();
176 * Redirects to the AT&T global login page. If this is an AJAX request it returns an unauthorized
177 * HTTP error in the response.
179 * @param request the filter request object
180 * @param response the filter response object
181 * @throws IOException if there is an error setting the error response
183 private void doLogin(HttpServletRequest request, HttpServletResponse response)
185 if (isAjaxRequest(request)) {
186 response.sendError(HttpServletResponse.SC_UNAUTHORIZED,
187 "User is not authorized. Please login to application");
189 // Fix for Safari 7.0.2 onwards to avoid login page cache
190 response.addHeader("Cache-Control", "no-cache, no-store");
191 String redirectURL = createRedirectUrl(request);
192 if (this.isValidRedirectURL(redirectURL)){
193 response.sendRedirect(redirectURL);
194 LOG.debug(AaiUiMsgs.VALID_REDIRECT_URL, redirectURL);
196 response.sendError(400, "Bad redirect URL");
197 LOG.error(AaiUiMsgs.INVALID_REDIRECT_URL, redirectURL);
203 * Checks if a redirect url is valid
204 * @param url URL to validate
205 * @return true if URL is a valid redirect URL, false otherwise
207 private boolean isValidRedirectURL (String url){
208 String redirectTo = url.substring(url.indexOf("?retURL=")+ "?retURL=".length());
210 redirectTo = URLDecoder.decode(redirectTo, StandardCharsets.UTF_8.toString());
211 } catch (UnsupportedEncodingException e) {
212 LOG.error(AaiUiMsgs.UNSUPPORTED_URL_ENCODING, e.getLocalizedMessage());
215 for (String domain: this.redirectDomains){
216 if (redirectTo.endsWith(domain))
224 * Returns <code>true</code> if the request is an AJAX request.
226 * @param request the filter request object
227 * @return <code>true</code> if the request is an AJAX request.
229 private boolean isAjaxRequest(HttpServletRequest request) {
230 String headerValue = request.getHeader("X-Requested-With");
231 if ("XMLHttpRequest".equals(headerValue)) {
238 * Returns the redirection URL to the AT&T Global login page.
240 * @param request the request
242 * @throws UnsupportedEncodingException the unsupported encoding exception
244 private String createRedirectUrl(HttpServletRequest request) throws UnsupportedEncodingException {
245 String returnUrl = getReturnUrl(request);
247 return globalLoginUrl + "?retURL=" + returnUrl + "&sysName=" + applicationId;
251 * Gets the URL encoded return URL.
253 * @param request the HTTP request
254 * @return an encoded URL to return to following login
255 * @throws UnsupportedEncodingException the unsupported encoding exception
257 private String getReturnUrl(HttpServletRequest request) throws UnsupportedEncodingException {
258 StringBuffer retUrl = request.getRequestURL();
259 String urlParams = request.getQueryString();
260 if (urlParams != null) {
261 retUrl.append("?" + urlParams);
263 return URLEncoder.encode(retUrl.toString(), StandardCharsets.UTF_8.toString());