1 /*
2 * Copyright (C) 2018, Thomas Wolf <thomas.wolf@paranor.ch>
3 * and other copyright owners as documented in the project's IP log.
4 *
5 * This program and the accompanying materials are made available
6 * under the terms of the Eclipse Distribution License v1.0 which
7 * accompanies this distribution, is reproduced below, and is
8 * available at http://www.eclipse.org/org/documents/edl-v10.php
9 *
10 * All rights reserved.
11 *
12 * Redistribution and use in source and binary forms, with or
13 * without modification, are permitted provided that the following
14 * conditions are met:
15 *
16 * - Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 *
19 * - Redistributions in binary form must reproduce the above
20 * copyright notice, this list of conditions and the following
21 * disclaimer in the documentation and/or other materials provided
22 * with the distribution.
23 *
24 * - Neither the name of the Eclipse Foundation, Inc. nor the
25 * names of its contributors may be used to endorse or promote
26 * products derived from this software without specific prior
27 * written permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
30 * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
31 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
32 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
33 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
34 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
35 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
36 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
37 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
38 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
41 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42 */
43 package org.eclipse.jgit.internal.transport.sshd.auth;
44
45 import static java.nio.charset.StandardCharsets.UTF_8;
46
47 import java.net.Authenticator;
48 import java.net.Authenticator.RequestorType;
49 import java.net.InetSocketAddress;
50 import java.net.PasswordAuthentication;
51 import java.nio.ByteBuffer;
52 import java.nio.CharBuffer;
53 import java.security.AccessController;
54 import java.security.PrivilegedAction;
55 import java.util.Arrays;
56 import java.util.concurrent.CancellationException;
57
58 import org.eclipse.jgit.internal.transport.sshd.SshdText;
59 import org.eclipse.jgit.transport.SshConstants;
60
61 /**
62 * An abstract implementation of a username-password authentication. It can be
63 * given an initial known username-password pair; if so, this will be tried
64 * first. Subsequent rounds will then try to obtain a user name and password via
65 * the global {@link Authenticator}.
66 *
67 * @param <ParameterType>
68 * defining the parameter type for the authentication
69 * @param <TokenType>
70 * defining the token type for the authentication
71 */
72 public abstract class BasicAuthentication<ParameterType, TokenType>
73 extends AbstractAuthenticationHandler<ParameterType, TokenType> {
74
75 /** The current user name. */
76 protected String user;
77
78 /** The current password. */
79 protected byte[] password;
80
81 /**
82 * Creates a new {@link BasicAuthentication} to authenticate with the given
83 * {@code proxy}.
84 *
85 * @param proxy
86 * {@link InetSocketAddress} of the proxy to connect to
87 * @param initialUser
88 * initial user name to try; may be {@code null}
89 * @param initialPassword
90 * initial password to try, may be {@code null}
91 */
92 public BasicAuthentication(InetSocketAddress proxy, String initialUser,
93 char[] initialPassword) {
94 super(proxy);
95 this.user = initialUser;
96 this.password = convert(initialPassword);
97 }
98
99 private byte[] convert(char[] pass) {
100 if (pass == null) {
101 return new byte[0];
102 }
103 ByteBuffer bytes = UTF_8.encode(CharBuffer.wrap(pass));
104 byte[] pwd = new byte[bytes.remaining()];
105 bytes.get(pwd);
106 if (bytes.hasArray()) {
107 Arrays.fill(bytes.array(), (byte) 0);
108 }
109 Arrays.fill(pass, '\000');
110 return pwd;
111 }
112
113 /**
114 * Clears the {@link #password}.
115 */
116 protected void clearPassword() {
117 if (password != null) {
118 Arrays.fill(password, (byte) 0);
119 }
120 password = new byte[0];
121 }
122
123 @Override
124 public final void close() {
125 clearPassword();
126 done = true;
127 }
128
129 @Override
130 public final void start() throws Exception {
131 if (user != null && !user.isEmpty()
132 || password != null && password.length > 0) {
133 return;
134 }
135 askCredentials();
136 }
137
138 @Override
139 public void process() throws Exception {
140 askCredentials();
141 }
142
143 /**
144 * Asks for credentials via the global {@link Authenticator}.
145 */
146 protected void askCredentials() {
147 clearPassword();
148 PasswordAuthentication auth = AccessController.doPrivileged(
149 (PrivilegedAction<PasswordAuthentication>) () -> Authenticator
150 .requestPasswordAuthentication(proxy.getHostString(),
151 proxy.getAddress(), proxy.getPort(),
152 SshConstants.SSH_SCHEME,
153 SshdText.get().proxyPasswordPrompt, "Basic", //$NON-NLS-1$
154 null, RequestorType.PROXY));
155 if (auth == null) {
156 user = ""; //$NON-NLS-1$
157 throw new CancellationException(
158 SshdText.get().authenticationCanceled);
159 }
160 user = auth.getUserName();
161 password = convert(auth.getPassword());
162 }
163 }