/sdk/core/azure-core-http-okhttp/src/main/java/com/azure/core/http/okhttp/implementation/ProxyAuthenticator.java

http://github.com/WindowsAzure/azure-sdk-for-java · Java · 204 lines · 104 code · 33 blank · 67 comment · 15 complexity · 1ec87ba3627e5dafdf556e9a2134e45c MD5 · raw file

  1. // Copyright (c) Microsoft Corporation. All rights reserved.
  2. // Licensed under the MIT License.
  3. package com.azure.core.http.okhttp.implementation;
  4. import com.azure.core.http.HttpMethod;
  5. import com.azure.core.util.AuthorizationChallengeHandler;
  6. import com.azure.core.util.CoreUtils;
  7. import com.azure.core.util.logging.ClientLogger;
  8. import okhttp3.Authenticator;
  9. import okhttp3.Challenge;
  10. import okhttp3.Interceptor;
  11. import okhttp3.Request;
  12. import okhttp3.Response;
  13. import okhttp3.Route;
  14. import java.io.IOException;
  15. import java.util.ArrayList;
  16. import java.util.List;
  17. import java.util.Map;
  18. import java.util.function.Supplier;
  19. import static com.azure.core.util.AuthorizationChallengeHandler.PROXY_AUTHENTICATION_INFO;
  20. import static com.azure.core.util.AuthorizationChallengeHandler.PROXY_AUTHORIZATION;
  21. /**
  22. * This class handles authorizing requests being sent through a proxy which require authentication.
  23. */
  24. public final class ProxyAuthenticator implements Authenticator {
  25. private static final String VALIDATION_ERROR_TEMPLATE = "The '%s' returned in the 'Proxy-Authentication-Info' "
  26. + "header doesn't match the value sent in the 'Proxy-Authorization' header. Sent: %s, received: %s.";
  27. private static final String BASIC = "basic";
  28. private static final String DIGEST = "digest";
  29. private static final String PREEMPTIVE_AUTHENTICATE = "Preemptive Authenticate";
  30. /*
  31. * Proxies use 'CONNECT' as the HTTP method.
  32. */
  33. private static final String PROXY_METHOD = HttpMethod.CONNECT.name();
  34. /*
  35. * Proxies are always the root path.
  36. */
  37. private static final String PROXY_URI_PATH = "/";
  38. /*
  39. * Digest authentication to a proxy uses the 'CONNECT' method, these can't have a request body.
  40. */
  41. private static final Supplier<byte[]> NO_BODY = () -> new byte[0];
  42. private static final String CNONCE = "cnonce";
  43. private static final String NC = "nc";
  44. private final ClientLogger logger = new ClientLogger(ProxyAuthenticator.class);
  45. private final AuthorizationChallengeHandler challengeHandler;
  46. /**
  47. * Constructs a {@link ProxyAuthenticator} which handles authenticating against proxy servers.
  48. *
  49. * @param username Username used in authentication challenges.
  50. * @param password Password used in authentication challenges.
  51. */
  52. public ProxyAuthenticator(String username, String password) {
  53. this.challengeHandler = new AuthorizationChallengeHandler(username, password);
  54. }
  55. /**
  56. * Creates an {@link Interceptor} which will attempt to capture authentication info response headers to update the
  57. * {@link ProxyAuthenticator} in preparation for future authentication challenges.
  58. *
  59. * @return An {@link Interceptor} that attempts to read headers from the response.
  60. */
  61. public Interceptor getProxyAuthenticationInfoInterceptor() {
  62. return new ProxyAuthenticationInfoInterceptor(challengeHandler);
  63. }
  64. /**
  65. * @param route Route being used to reach the server.
  66. * @param response Response from the server requesting authentication.
  67. * @return The initial request with an authorization header applied.
  68. */
  69. @Override
  70. public Request authenticate(Route route, Response response) {
  71. String authorizationHeader = challengeHandler
  72. .attemptToPipelineAuthorization(PROXY_METHOD, PROXY_URI_PATH, NO_BODY);
  73. // Pipelining was successful, use the generated authorization header.
  74. if (!CoreUtils.isNullOrEmpty(authorizationHeader)) {
  75. return response.request().newBuilder()
  76. .header(PROXY_AUTHORIZATION, authorizationHeader)
  77. .build();
  78. }
  79. // If this is a pre-emptive challenge quit now if pipelining doesn't produce anything.
  80. if (PREEMPTIVE_AUTHENTICATE.equalsIgnoreCase(response.message())) {
  81. return response.request();
  82. }
  83. boolean hasBasicChallenge = false;
  84. List<Map<String, String>> digestChallenges = new ArrayList<>();
  85. for (Challenge challenge : response.challenges()) {
  86. if (BASIC.equalsIgnoreCase(challenge.scheme())) {
  87. hasBasicChallenge = true;
  88. } else if (DIGEST.equalsIgnoreCase(challenge.scheme())) {
  89. digestChallenges.add(challenge.authParams());
  90. }
  91. }
  92. // Prefer digest challenges over basic.
  93. if (digestChallenges.size() > 0) {
  94. authorizationHeader = challengeHandler
  95. .handleDigest(PROXY_METHOD, PROXY_URI_PATH, digestChallenges, NO_BODY);
  96. }
  97. /*
  98. * If Digest proxy was attempted but it wasn't able to be computed and the server sent a Basic
  99. * challenge as well apply the basic authorization header.
  100. */
  101. if (authorizationHeader == null && hasBasicChallenge) {
  102. authorizationHeader = challengeHandler.handleBasic();
  103. }
  104. Request.Builder requestBuilder = response.request().newBuilder();
  105. if (authorizationHeader != null) {
  106. requestBuilder.header(PROXY_AUTHORIZATION, authorizationHeader);
  107. }
  108. return requestBuilder.build();
  109. }
  110. /**
  111. * This class handles intercepting the response returned from the server when proxying.
  112. */
  113. private class ProxyAuthenticationInfoInterceptor implements Interceptor {
  114. private final AuthorizationChallengeHandler challengeHandler;
  115. /**
  116. * Constructs an {@link Interceptor} which intercepts responses from the server when using proxy authentication
  117. * in an attempt to retrieve authentication info response headers.
  118. *
  119. * @param challengeHandler {@link AuthorizationChallengeHandler} that consumes authentication info response
  120. * headers.
  121. */
  122. ProxyAuthenticationInfoInterceptor(AuthorizationChallengeHandler challengeHandler) {
  123. this.challengeHandler = challengeHandler;
  124. }
  125. /**
  126. * Attempts to intercept the 'Proxy-Authentication-Info' response header sent from the server. If the header is
  127. * set it will be used to validate the request and response and update the pipelined challenge in the passed
  128. * {@link AuthorizationChallengeHandler}.
  129. *
  130. * @param chain Interceptor chain.
  131. * @return Response returned from the server.
  132. * @throws IOException If an I/O error occurs.
  133. */
  134. @Override
  135. public Response intercept(Chain chain) throws IOException {
  136. Response response = chain.proceed(chain.request());
  137. String proxyAuthenticationInfoHeader = response.header(PROXY_AUTHENTICATION_INFO);
  138. if (!CoreUtils.isNullOrEmpty(proxyAuthenticationInfoHeader)) {
  139. Map<String, String> authenticationInfoPieces = AuthorizationChallengeHandler
  140. .parseAuthenticationOrAuthorizationHeader(proxyAuthenticationInfoHeader);
  141. Map<String, String> authorizationPieces = AuthorizationChallengeHandler
  142. .parseAuthenticationOrAuthorizationHeader(chain.request().header(PROXY_AUTHORIZATION));
  143. /*
  144. * If the authentication info response contains a cnonce or nc value it MUST match the value sent in the
  145. * authorization header. This is the server performing validation to the client that it received the
  146. * information.
  147. */
  148. validateProxyAuthenticationInfoValue(CNONCE, authenticationInfoPieces, authorizationPieces);
  149. validateProxyAuthenticationInfoValue(NC, authenticationInfoPieces, authorizationPieces);
  150. challengeHandler.consumeAuthenticationInfoHeader(authenticationInfoPieces);
  151. }
  152. return response;
  153. }
  154. }
  155. /*
  156. * Validates that the value received in the 'Proxy-Authentication-Info' matches the value sent in the
  157. * 'Proxy-Authorization' header. If the values don't match an 'IllegalStateException' will be thrown with a message
  158. * outlining that the values didn't match.
  159. */
  160. private void validateProxyAuthenticationInfoValue(String name, Map<String, String> authenticationInfoPieces,
  161. Map<String, String> authorizationPieces) {
  162. if (authenticationInfoPieces.containsKey(name)) {
  163. String sentValue = authorizationPieces.get(name);
  164. String receivedValue = authenticationInfoPieces.get(name);
  165. if (!receivedValue.equalsIgnoreCase(sentValue)) {
  166. throw logger.logExceptionAsError(new IllegalStateException(
  167. String.format(VALIDATION_ERROR_TEMPLATE, name, sentValue, receivedValue)));
  168. }
  169. }
  170. }
  171. }