|
6 | 6 | import java.net.URISyntaxException;
|
7 | 7 | import java.net.http.HttpClient;
|
8 | 8 | import java.net.http.HttpRequest;
|
9 |
| -import java.net.http.HttpResponse; |
10 | 9 | import java.net.http.HttpResponse.BodyHandlers;
|
11 | 10 | import java.security.PublicKey;
|
12 | 11 | import java.util.Set;
|
|
20 | 19 | import com.fasterxml.jackson.databind.ObjectMapper;
|
21 | 20 |
|
22 | 21 | import info.unterrainer.commons.httpserver.exceptions.ForbiddenException;
|
| 22 | +import info.unterrainer.commons.httpserver.exceptions.GatewayTimeoutException; |
23 | 23 | import info.unterrainer.commons.httpserver.exceptions.UnauthorizedException;
|
24 | 24 | import io.javalin.core.security.AccessManager;
|
25 | 25 | import io.javalin.core.security.Role;
|
26 | 26 | import io.javalin.http.Context;
|
27 | 27 | import io.javalin.http.Handler;
|
| 28 | +import lombok.extern.slf4j.Slf4j; |
28 | 29 |
|
| 30 | +@Slf4j |
29 | 31 | public class HttpAccessManager implements AccessManager {
|
30 | 32 |
|
31 |
| - private PublicKey publicKey; |
| 33 | + private String host; |
| 34 | + private String realm; |
| 35 | + private PublicKey publicKey = null; |
32 | 36 |
|
33 |
| - public HttpAccessManager() { |
| 37 | + public HttpAccessManager(final String host, final String realm) { |
| 38 | + this.host = host; |
| 39 | + this.realm = realm; |
34 | 40 | try {
|
35 |
| - String authUrl = "http://localhost:8080" + "/auth/realms/" + "nexus"; |
| 41 | + initPublicKey(); |
| 42 | + } catch (Exception e) { |
| 43 | + // Exceptions will terminate a request later on, but should not terminate the |
| 44 | + // main-thread here. |
| 45 | + } |
| 46 | + } |
| 47 | + |
| 48 | + @Override |
| 49 | + public void manage(final Handler handler, final Context ctx, final Set<Role> permittedRoles) throws Exception { |
| 50 | + checkAccess(ctx, permittedRoles); |
| 51 | + handler.handle(ctx); |
| 52 | + } |
| 53 | + |
| 54 | + private void initPublicKey() { |
| 55 | + if (publicKey != null) |
| 56 | + return; |
| 57 | + |
| 58 | + if (!host.endsWith("/")) |
| 59 | + host += "/"; |
| 60 | + |
| 61 | + if (!realm.startsWith("/")) |
| 62 | + realm = "/" + realm; |
36 | 63 |
|
| 64 | + String authUrl = host + "auth/realms" + realm; |
| 65 | + try { |
| 66 | + log.info("Getting public key from: [{}]", authUrl); |
37 | 67 | HttpClient client = HttpClient.newHttpClient();
|
38 | 68 | HttpRequest request = HttpRequest.newBuilder().uri(new URI(authUrl)).build();
|
39 | 69 | ObjectMapper objectMapper = new ObjectMapper();
|
40 | 70 |
|
41 |
| - client.sendAsync(request, BodyHandlers.ofString()).thenApply(HttpResponse::body).thenAccept(body -> { |
| 71 | + client.sendAsync(request, BodyHandlers.ofString()).thenApply(response -> { |
| 72 | + if (response.statusCode() >= 300) { |
| 73 | + log.error("HTTP status [{}] getting public key from keycloak instance [{}].", response.statusCode(), |
| 74 | + authUrl); |
| 75 | + throw new GatewayTimeoutException(String |
| 76 | + .format("The keycloak instance returned an error (status: %d).", response.statusCode())); |
| 77 | + } |
| 78 | + return response.body(); |
| 79 | + }).thenAccept(body -> { |
| 80 | + if (body == null) |
| 81 | + return; |
42 | 82 | try {
|
43 | 83 | publicKey = objectMapper.readValue(body, PublishedRealmRepresentation.class).getPublicKey();
|
44 | 84 | } catch (IOException e) {
|
| 85 | + log.error("Error parsing answer from keycloak."); |
45 | 86 | throw new UncheckedIOException(e);
|
46 | 87 | }
|
47 | 88 | }).join();
|
48 | 89 | } catch (URISyntaxException e) {
|
| 90 | + log.error("The keycloak URL was illegal [{}].", authUrl); |
49 | 91 | throw new IllegalStateException(e);
|
50 | 92 | }
|
51 |
| - |
52 | 93 | }
|
53 | 94 |
|
54 |
| - @Override |
55 |
| - public void manage(Handler handler, Context ctx, Set<Role> permittedRoles) throws Exception { |
56 |
| - |
57 |
| - checkAccess(ctx, permittedRoles); |
| 95 | + private void checkAccess(final Context ctx, final Set<Role> permittedRoles) { |
58 | 96 |
|
59 |
| - handler.handle(ctx); |
60 |
| - } |
61 |
| - |
62 |
| - private void checkAccess(Context ctx, Set<Role> permittedRoles) { |
63 |
| - |
64 |
| - if (permittedRoles.isEmpty() || permittedRoles.contains(DefaultRoles.PUBLIC)) { |
| 97 | + if (permittedRoles.isEmpty() || permittedRoles.contains(DefaultRoles.PUBLIC)) |
65 | 98 | return;
|
66 |
| - } |
67 | 99 |
|
| 100 | + initPublicKey(); |
68 | 101 | String authorizationHeader = ctx.header(HttpHeader.AUTHORIZATION.asString());
|
69 |
| - TokenVerifier<AccessToken> accessToken = TokenVerifier.create(authorizationHeader, AccessToken.class); |
70 |
| - accessToken.publicKey(publicKey); |
| 102 | + TokenVerifier<AccessToken> tokenVerifier = TokenVerifier.create(authorizationHeader, AccessToken.class); |
| 103 | + tokenVerifier.publicKey(publicKey); |
71 | 104 |
|
72 | 105 | try {
|
73 |
| - accessToken.verifySignature(); |
| 106 | + tokenVerifier.verifySignature(); |
74 | 107 | } catch (VerificationException e) {
|
75 | 108 | throw new UnauthorizedException();
|
76 | 109 | }
|
77 | 110 |
|
78 | 111 | try {
|
79 |
| - accessToken.verify(); |
| 112 | + tokenVerifier.verify(); |
80 | 113 | } catch (VerificationException e) {
|
81 | 114 | throw new ForbiddenException();
|
82 | 115 | }
|
|
0 commit comments