/
DittoGatewayAuthenticationDirectiveFactory.java
122 lines (96 loc) · 5.93 KB
/
DittoGatewayAuthenticationDirectiveFactory.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
/*
* Copyright (c) 2017 Contributors to the Eclipse Foundation
*
* See the NOTICE file(s) distributed with this work for additional
* information regarding copyright ownership.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Public License 2.0 which is available at
* http://www.eclipse.org/legal/epl-2.0
*
* SPDX-License-Identifier: EPL-2.0
*/
package org.eclipse.ditto.services.gateway.endpoints.directives.auth;
import static org.eclipse.ditto.model.base.common.ConditionChecker.checkNotNull;
import java.util.ArrayList;
import java.util.Collection;
import java.util.HashSet;
import java.util.Set;
import java.util.concurrent.Executor;
import org.eclipse.ditto.model.policies.SubjectIssuer;
import org.eclipse.ditto.services.gateway.security.authentication.AuthenticationChain;
import org.eclipse.ditto.services.gateway.security.authentication.AuthenticationFailureAggregator;
import org.eclipse.ditto.services.gateway.security.authentication.AuthenticationFailureAggregators;
import org.eclipse.ditto.services.gateway.security.authentication.AuthenticationProvider;
import org.eclipse.ditto.services.gateway.security.authentication.dummy.DummyAuthenticationProvider;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.DefaultJwtAuthorizationContextProvider;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.DittoJwtAuthorizationSubjectsProvider;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.DittoPublicKeyProvider;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.JwtAuthenticationProvider;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.JwtSubjectIssuerConfig;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.JwtSubjectIssuersConfig;
import org.eclipse.ditto.services.gateway.security.authentication.jwt.PublicKeyProvider;
import org.eclipse.ditto.services.gateway.starter.service.util.ConfigKeys;
import org.eclipse.ditto.services.gateway.starter.service.util.HttpClientFacade;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import com.typesafe.config.Config;
/**
* Ditto's default factory for building authentication directives.
*/
public final class DittoGatewayAuthenticationDirectiveFactory implements GatewayAuthenticationDirectiveFactory {
private static final String JWT_ISSUER_GOOGLE_DOMAIN = "accounts.google.com";
private static final String JWT_ISSUER_GOOGLE_URL = "https://accounts.google.com";
private static final String JWK_RESOURCE_GOOGLE = "https://www.googleapis.com/oauth2/v2/certs";
private static final Logger LOGGER = LoggerFactory.getLogger(DittoGatewayAuthenticationDirectiveFactory.class);
private final GatewayAuthenticationDirective gatewayAuthenticationDirective;
public DittoGatewayAuthenticationDirectiveFactory(final Config config, final HttpClientFacade httpClient,
final Executor blockingDispatcher) {
checkNotNull(config, "Config");
checkNotNull(httpClient, "HTTP client");
checkNotNull(blockingDispatcher, "blocking dispatcher");
gatewayAuthenticationDirective = generateGatewayAuthenticationDirective(config, httpClient, blockingDispatcher);
}
@Override
public GatewayAuthenticationDirective buildHttpAuthentication() {
return gatewayAuthenticationDirective;
}
@Override
public GatewayAuthenticationDirective buildWsAuthentication() {
return gatewayAuthenticationDirective;
}
private static GatewayAuthenticationDirective generateGatewayAuthenticationDirective(final Config config,
final HttpClientFacade httpClient, final Executor blockingDispatcher) {
final boolean dummyAuthEnabled = config.getBoolean(ConfigKeys.AUTHENTICATION_DUMMY_ENABLED);
final Collection<AuthenticationProvider> authenticationProviders = new ArrayList<>();
if (dummyAuthEnabled) {
LOGGER.warn("Dummy authentication is enabled - Do not use this feature in production.");
authenticationProviders.add(DummyAuthenticationProvider.getInstance());
}
final JwtSubjectIssuersConfig jwtSubjectIssuersConfig = buildJwtSubjectIssuersConfig();
final PublicKeyProvider publicKeyProvider = DittoPublicKeyProvider.of(jwtSubjectIssuersConfig, httpClient,
config.getInt(ConfigKeys.CACHE_PUBLIC_KEYS_MAX),
config.getDuration(ConfigKeys.CACHE_PUBLIC_KEYS_EXPIRY), "ditto_authorization_jwt_publicKeys_cache");
final DittoJwtAuthorizationSubjectsProvider authorizationSubjectsProvider =
DittoJwtAuthorizationSubjectsProvider.of(jwtSubjectIssuersConfig);
final DefaultJwtAuthorizationContextProvider authorizationContextProvider =
DefaultJwtAuthorizationContextProvider.getInstance(authorizationSubjectsProvider);
final JwtAuthenticationProvider jwtAuthenticationProvider =
JwtAuthenticationProvider.getInstance(publicKeyProvider, authorizationContextProvider);
authenticationProviders.add(jwtAuthenticationProvider);
final AuthenticationFailureAggregator authenticationFailureAggregator =
AuthenticationFailureAggregators.getDefault();
final AuthenticationChain authenticationChain =
AuthenticationChain.getInstance(authenticationProviders, authenticationFailureAggregator,
blockingDispatcher);
return new GatewayAuthenticationDirective(authenticationChain);
}
private static JwtSubjectIssuersConfig buildJwtSubjectIssuersConfig() {
final Set<JwtSubjectIssuerConfig> configItems = new HashSet<>();
configItems.add(new JwtSubjectIssuerConfig(SubjectIssuer.GOOGLE, JWT_ISSUER_GOOGLE_DOMAIN,
JWK_RESOURCE_GOOGLE));
configItems.add(new JwtSubjectIssuerConfig(SubjectIssuer.GOOGLE, JWT_ISSUER_GOOGLE_URL,
JWK_RESOURCE_GOOGLE));
return new JwtSubjectIssuersConfig(configItems);
}
}