Chris Aniszczyk
14 years ago
committed by
Code Review
3 changed files with 373 additions and 24 deletions
@ -0,0 +1,317 @@
|
||||
/* |
||||
* Copyright (C) 2010, Google Inc. |
||||
* and other copyright owners as documented in the project's IP log. |
||||
* |
||||
* This program and the accompanying materials are made available |
||||
* under the terms of the Eclipse Distribution License v1.0 which |
||||
* accompanies this distribution, is reproduced below, and is |
||||
* available at http://www.eclipse.org/org/documents/edl-v10.php
|
||||
* |
||||
* All rights reserved. |
||||
* |
||||
* Redistribution and use in source and binary forms, with or |
||||
* without modification, are permitted provided that the following |
||||
* conditions are met: |
||||
* |
||||
* - Redistributions of source code must retain the above copyright |
||||
* notice, this list of conditions and the following disclaimer. |
||||
* |
||||
* - Redistributions in binary form must reproduce the above |
||||
* copyright notice, this list of conditions and the following |
||||
* disclaimer in the documentation and/or other materials provided |
||||
* with the distribution. |
||||
* |
||||
* - Neither the name of the Eclipse Foundation, Inc. nor the |
||||
* names of its contributors may be used to endorse or promote |
||||
* products derived from this software without specific prior |
||||
* written permission. |
||||
* |
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
||||
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
||||
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF |
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
*/ |
||||
|
||||
package org.eclipse.jgit.transport; |
||||
|
||||
import static org.eclipse.jgit.util.HttpSupport.HDR_AUTHORIZATION; |
||||
import static org.eclipse.jgit.util.HttpSupport.HDR_WWW_AUTHENTICATE; |
||||
|
||||
import java.io.IOException; |
||||
import java.io.UnsupportedEncodingException; |
||||
import java.net.HttpURLConnection; |
||||
import java.security.MessageDigest; |
||||
import java.security.NoSuchAlgorithmException; |
||||
import java.util.Collections; |
||||
import java.util.HashMap; |
||||
import java.util.Map; |
||||
import java.util.Random; |
||||
|
||||
import org.eclipse.jgit.util.Base64; |
||||
|
||||
/** |
||||
* Support class to populate user authentication data on a connection. |
||||
* <p> |
||||
* Instances of an HttpAuthMethod are not thread-safe, as some implementations |
||||
* may need to maintain per-connection state information. |
||||
*/ |
||||
abstract class HttpAuthMethod { |
||||
/** No authentication is configured. */ |
||||
static final HttpAuthMethod NONE = new None(); |
||||
|
||||
/** |
||||
* Handle an authentication failure and possibly return a new response. |
||||
* |
||||
* @param conn |
||||
* the connection that failed. |
||||
* @return new authentication method to try. |
||||
*/ |
||||
static HttpAuthMethod scanResponse(HttpURLConnection conn) { |
||||
String hdr = conn.getHeaderField(HDR_WWW_AUTHENTICATE); |
||||
if (hdr == null || hdr.length() == 0) |
||||
return NONE; |
||||
|
||||
int sp = hdr.indexOf(' '); |
||||
if (sp < 0) |
||||
return NONE; |
||||
|
||||
String type = hdr.substring(0, sp); |
||||
if (Basic.NAME.equals(type)) |
||||
return new Basic(); |
||||
else if (Digest.NAME.equals(type)) |
||||
return new Digest(hdr.substring(sp + 1)); |
||||
else |
||||
return NONE; |
||||
} |
||||
|
||||
/** |
||||
* Update this method with the credentials from the URIish. |
||||
* |
||||
* @param uri |
||||
* the URI used to create the connection. |
||||
*/ |
||||
void authorize(URIish uri) { |
||||
authorize(uri.getUser(), uri.getPass()); |
||||
} |
||||
|
||||
/** |
||||
* Update this method with the given username and password pair. |
||||
* |
||||
* @param user |
||||
* @param pass |
||||
*/ |
||||
abstract void authorize(String user, String pass); |
||||
|
||||
/** |
||||
* Update connection properties based on this authentication method. |
||||
* |
||||
* @param conn |
||||
* @throws IOException |
||||
*/ |
||||
abstract void configureRequest(HttpURLConnection conn) throws IOException; |
||||
|
||||
/** Performs no user authentication. */ |
||||
private static class None extends HttpAuthMethod { |
||||
@Override |
||||
void authorize(String user, String pass) { |
||||
// Do nothing when no authentication is enabled.
|
||||
} |
||||
|
||||
@Override |
||||
void configureRequest(HttpURLConnection conn) throws IOException { |
||||
// Do nothing when no authentication is enabled.
|
||||
} |
||||
} |
||||
|
||||
/** Performs HTTP basic authentication (plaintext username/password). */ |
||||
private static class Basic extends HttpAuthMethod { |
||||
static final String NAME = "Basic"; |
||||
|
||||
private String user; |
||||
|
||||
private String pass; |
||||
|
||||
@Override |
||||
void authorize(final String username, final String password) { |
||||
this.user = username; |
||||
this.pass = password; |
||||
} |
||||
|
||||
@Override |
||||
void configureRequest(final HttpURLConnection conn) throws IOException { |
||||
String ident = user + ":" + pass; |
||||
String enc = Base64.encodeBytes(ident.getBytes("UTF-8")); |
||||
conn.setRequestProperty(HDR_AUTHORIZATION, NAME + " " + enc); |
||||
} |
||||
} |
||||
|
||||
/** Performs HTTP digest authentication. */ |
||||
private static class Digest extends HttpAuthMethod { |
||||
static final String NAME = "Digest"; |
||||
|
||||
private static final Random PRNG = new Random(); |
||||
|
||||
private final Map<String, String> params; |
||||
|
||||
private int requestCount; |
||||
|
||||
private String user; |
||||
|
||||
private String pass; |
||||
|
||||
Digest(String hdr) { |
||||
params = parse(hdr); |
||||
|
||||
final String qop = params.get("qop"); |
||||
if ("auth".equals(qop)) { |
||||
final byte[] bin = new byte[8]; |
||||
PRNG.nextBytes(bin); |
||||
params.put("cnonce", Base64.encodeBytes(bin)); |
||||
} |
||||
} |
||||
|
||||
@Override |
||||
void authorize(final String username, final String password) { |
||||
this.user = username; |
||||
this.pass = password; |
||||
} |
||||
|
||||
@SuppressWarnings("boxing") |
||||
@Override |
||||
void configureRequest(final HttpURLConnection conn) throws IOException { |
||||
final Map<String, String> p = new HashMap<String, String>(params); |
||||
p.put("username", user); |
||||
|
||||
final String realm = p.get("realm"); |
||||
final String nonce = p.get("nonce"); |
||||
final String uri = p.get("uri"); |
||||
final String qop = p.get("qop"); |
||||
final String method = conn.getRequestMethod(); |
||||
|
||||
final String A1 = user + ":" + realm + ":" + pass; |
||||
final String A2 = method + ":" + uri; |
||||
|
||||
final String expect; |
||||
if ("auth".equals(qop)) { |
||||
final String c = p.get("cnonce"); |
||||
final String nc = String.format("%8.8x", ++requestCount); |
||||
p.put("nc", nc); |
||||
expect = KD(H(A1), nonce + ":" + nc + ":" + c + ":" + qop + ":" |
||||
+ H(A2)); |
||||
} else { |
||||
expect = KD(H(A1), nonce + ":" + H(A2)); |
||||
} |
||||
p.put("response", expect); |
||||
|
||||
StringBuilder v = new StringBuilder(); |
||||
for (Map.Entry<String, String> e : p.entrySet()) { |
||||
if (v.length() > 0) { |
||||
v.append(", "); |
||||
} |
||||
v.append(e.getKey()); |
||||
v.append('='); |
||||
v.append('"'); |
||||
v.append(e.getValue()); |
||||
v.append('"'); |
||||
} |
||||
conn.setRequestProperty(HDR_AUTHORIZATION, NAME + " " + v); |
||||
} |
||||
|
||||
private static String H(String data) { |
||||
try { |
||||
MessageDigest md = newMD5(); |
||||
md.update(data.getBytes("UTF-8")); |
||||
return LHEX(md.digest()); |
||||
} catch (UnsupportedEncodingException e) { |
||||
throw new RuntimeException("UTF-8 encoding not available", e); |
||||
} |
||||
} |
||||
|
||||
private static String KD(String secret, String data) { |
||||
try { |
||||
MessageDigest md = newMD5(); |
||||
md.update(secret.getBytes("UTF-8")); |
||||
md.update((byte) ':'); |
||||
md.update(data.getBytes("UTF-8")); |
||||
return LHEX(md.digest()); |
||||
} catch (UnsupportedEncodingException e) { |
||||
throw new RuntimeException("UTF-8 encoding not available", e); |
||||
} |
||||
} |
||||
|
||||
private static MessageDigest newMD5() { |
||||
try { |
||||
return MessageDigest.getInstance("MD5"); |
||||
} catch (NoSuchAlgorithmException e) { |
||||
throw new RuntimeException("No MD5 available", e); |
||||
} |
||||
} |
||||
|
||||
private static final char[] LHEX = { '0', '1', '2', '3', '4', '5', '6', |
||||
'7', '8', '9', //
|
||||
'a', 'b', 'c', 'd', 'e', 'f' }; |
||||
|
||||
private static String LHEX(byte[] bin) { |
||||
StringBuilder r = new StringBuilder(bin.length * 2); |
||||
for (int i = 0; i < bin.length; i++) { |
||||
byte b = bin[i]; |
||||
r.append(LHEX[(b >>> 4) & 0x0f]); |
||||
r.append(LHEX[b & 0x0f]); |
||||
} |
||||
return r.toString(); |
||||
} |
||||
|
||||
private static Map<String, String> parse(String auth) { |
||||
Map<String, String> p = new HashMap<String, String>(); |
||||
int next = 0; |
||||
while (next < auth.length()) { |
||||
if (next < auth.length() && auth.charAt(next) == ',') { |
||||
next++; |
||||
} |
||||
while (next < auth.length() |
||||
&& Character.isWhitespace(auth.charAt(next))) { |
||||
next++; |
||||
} |
||||
|
||||
int eq = auth.indexOf('=', next); |
||||
if (eq < 0 || eq + 1 == auth.length()) { |
||||
return Collections.emptyMap(); |
||||
} |
||||
|
||||
final String name = auth.substring(next, eq); |
||||
final String value; |
||||
if (auth.charAt(eq + 1) == '"') { |
||||
int dq = auth.indexOf('"', eq + 2); |
||||
if (dq < 0) { |
||||
return Collections.emptyMap(); |
||||
} |
||||
value = auth.substring(eq + 2, dq); |
||||
next = dq + 1; |
||||
|
||||
} else { |
||||
int space = auth.indexOf(' ', eq + 1); |
||||
int comma = auth.indexOf(',', eq + 1); |
||||
if (space < 0) |
||||
space = auth.length(); |
||||
if (comma < 0) |
||||
comma = auth.length(); |
||||
|
||||
final int e = Math.min(space, comma); |
||||
value = auth.substring(eq + 1, e); |
||||
next = e + 1; |
||||
} |
||||
p.put(name, value); |
||||
} |
||||
return p; |
||||
} |
||||
} |
||||
} |
Loading…
Reference in new issue