org.apache.lucene.gdata.server.authentication.BlowfishAuthenticationController.java Source code

Java tutorial

Introduction

Here is the source code for org.apache.lucene.gdata.server.authentication.BlowfishAuthenticationController.java

Source

/**
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.apache.lucene.gdata.server.authentication;

import java.io.IOException;
import java.io.UnsupportedEncodingException;
import java.security.Provider;
import java.security.Security;
import java.util.StringTokenizer;
import java.util.concurrent.locks.ReentrantLock;

import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.KeyGenerator;
import javax.crypto.spec.SecretKeySpec;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.lucene.gdata.data.GDataAccount;
import org.apache.lucene.gdata.data.GDataAccount.AccountRole;
import org.apache.lucene.gdata.server.registry.Component;
import org.apache.lucene.gdata.server.registry.ComponentType;
import org.apache.lucene.gdata.server.registry.configuration.Requiered;

import sun.misc.BASE64Decoder;
import sun.misc.BASE64Encoder;

/**
 * A
 * {@link org.apache.lucene.gdata.server.authentication.AuthenticationController}
 * implmentation using a <i>Blowfish</i> algorithmn to en/decrpyt the
 * authentification token. The <i>Blowfish</i> algorithmn enables a stateless
 * authetication of the client. The token contains all information to
 * authenticate the client on possible other hosts.
 * <p>
 * The token contains the first 32 bit of the client ip (e.g. 192.168.0),
 * account name, {@link org.apache.lucene.gdata.data.GDataAccount.AccountRole}
 * and the cration time as a timestamp. The timestamp will be checked on every
 * subsequent request. If the timestamp plus the configured timeout is less
 * than the current time the client has to reauthenticate again.
 * </p>
 * <p>
 * The auth token returned by the
 * {@link BlowfishAuthenticationController#authenticatAccount(GDataAccount, String)}
 * method is a BASE64 encoded string.
 * </p>
 * 
 * @see javax.crypto.Cipher
 * @see sun.misc.BASE64Encoder
 * @see sun.misc.BASE64Decoder
 * @author Simon Willnauer
 * 
 */
@Component(componentType = ComponentType.AUTHENTICATIONCONTROLLER)
public class BlowfishAuthenticationController implements AuthenticationController {
    private static final Log LOG = LogFactory.getLog(BlowfishAuthenticationController.class);

    private static final String ALG = "Blowfish";

    private static final String TOKEN_LIMITER = "#";

    private static final String ENCODING = "UTF-8";

    private Cipher deCrypt;

    private Cipher enCrypt;

    private int minuteOffset = 30;

    private long milisecondOffset;

    private BASE64Encoder encoder = new BASE64Encoder();

    private BASE64Decoder decoder = new BASE64Decoder();

    private ReentrantLock lock = new ReentrantLock();

    private String key;

    /**
     * @see org.apache.lucene.gdata.server.authentication.AuthenticationController#initialize()
     */
    public void initialize() {
        if (this.key == null)
            throw new IllegalArgumentException("Auth key must not be null");
        if (this.key.length() < 5 || this.key.length() > 16)
            throw new IllegalArgumentException("Auth key length must be greater than 4 and less than 17");

        try {
            Provider sunJce = new com.sun.crypto.provider.SunJCE();
            Security.addProvider(sunJce);
            KeyGenerator kgen = KeyGenerator.getInstance(ALG);
            kgen.init(448); // 448 Bit^M
            byte[] raw = this.key.getBytes();
            SecretKeySpec skeySpec = new SecretKeySpec(raw, ALG);
            this.deCrypt = Cipher.getInstance(ALG);
            this.enCrypt = Cipher.getInstance(ALG);
            this.deCrypt.init(Cipher.DECRYPT_MODE, skeySpec);
            this.enCrypt.init(Cipher.ENCRYPT_MODE, skeySpec);
        } catch (Exception e) {
            throw new AuthenticatorException(
                    "Can't initialize BlowfishAuthenticationController -- " + e.getMessage(), e);

        }
        calculateTimeOffset();
    }

    /**
     * @see org.apache.lucene.gdata.server.authentication.AuthenticationController#authenticatAccount(org.apache.lucene.gdata.data.GDataAccount,
     *      java.lang.String)
     */
    public String authenticatAccount(GDataAccount account, String requestIp) {
        try {
            String passIp = requestIp.substring(0, requestIp.lastIndexOf('.'));
            String role = Integer.toString(account.getRolesAsInt());

            return calculateAuthToken(passIp, role, account.getName());
        } catch (Exception e) {
            throw new AuthenticatorException("Can not authenticat account -- " + e.getMessage(), e);

        }
    }

    /**
     * @see org.apache.lucene.gdata.server.authentication.AuthenticationController#authenticateToken(java.lang.String,
     *      java.lang.String,
     *      org.apache.lucene.gdata.data.GDataAccount.AccountRole,
     *      java.lang.String)
     */
    public boolean authenticateToken(final String token, final String requestIp, AccountRole role,
            String accountName) {
        if (LOG.isInfoEnabled())
            LOG.info("authenticate Token " + token + " for requestIp: " + requestIp);
        if (token == null || requestIp == null)
            return false;
        String passIp = requestIp.substring(0, requestIp.lastIndexOf('.'));
        String authString = null;
        try {
            authString = deCryptAuthToken(token);
        } catch (Exception e) {
            throw new AuthenticatorException("Can not decrypt token -- " + e.getMessage(), e);
        }
        if (authString == null)
            return false;
        try {
            StringTokenizer tokenizer = new StringTokenizer(authString, TOKEN_LIMITER);
            if (!tokenizer.nextToken().equals(passIp))
                return false;
            String tempAccountName = tokenizer.nextToken();
            int intRole = Integer.parseInt(tokenizer.nextToken());
            /*
             * Authentication goes either for a account role or a account. For
             * entry manipulation the account name will be retrieved by the
             * feedId otherwise it will be null If it is null the authentication
             * goes against the account role
             */
            if (tempAccountName == null
                    || (!tempAccountName.equals(accountName) && !GDataAccount.isInRole(intRole, role)))
                return false;
            long timeout = Long.parseLong(tokenizer.nextToken());

            return (timeout + this.milisecondOffset) > System.currentTimeMillis();
        } catch (Exception e) {
            LOG.error("Error occured while encrypting token " + e.getMessage(), e);
            return false;
        }

    }

    private void calculateTimeOffset() {
        this.milisecondOffset = this.minuteOffset * 60 * 1000;
    }

    protected String calculateAuthToken(final String ipAddress, final String role, String accountName)
            throws IllegalBlockSizeException, BadPaddingException, UnsupportedEncodingException {
        StringBuilder builder = new StringBuilder();
        builder.append(ipAddress).append(TOKEN_LIMITER);
        builder.append(accountName).append(TOKEN_LIMITER);
        builder.append(role).append(TOKEN_LIMITER);
        builder.append(System.currentTimeMillis());

        this.lock.lock();
        try {
            byte[] toencode = builder.toString().getBytes(ENCODING);
            byte[] result = this.enCrypt.doFinal(toencode);
            return this.encoder.encode(result);
        } finally {
            this.lock.unlock();

        }

    }

    protected String deCryptAuthToken(final String authToken)
            throws IOException, IllegalBlockSizeException, BadPaddingException {
        this.lock.lock();
        try {
            byte[] input = this.decoder.decodeBuffer(authToken);
            byte[] result = this.deCrypt.doFinal(input);
            return new String(result, ENCODING);
        } finally {
            this.lock.unlock();
        }

    }

    /**
     * @return Returns the minuteOffset.
     */
    @Requiered
    public int getLoginTimeout() {
        return this.minuteOffset;
    }

    /**
     * @param minuteOffset
     *            The minuteOffset to set.
     */
    @Requiered
    public void setLoginTimeout(int minuteOffset) {
        this.minuteOffset = minuteOffset;
        calculateTimeOffset();
    }

    /**
     * @return Returns the key.
     */
    public String getKey() {
        return this.key;
    }

    /**
     * @param key
     *            The key to set.
     */
    public void setKey(String key) {
        this.key = key;
    }

    /**
     * @see org.apache.lucene.gdata.server.registry.ServerComponent#destroy()
     */
    public void destroy() {
        //
    }

}