|
30 | 30 | import org.eclipse.ditto.gateway.service.security.authentication.AuthenticationResult;
|
31 | 31 | import org.eclipse.ditto.gateway.service.security.authentication.jwt.JwtAuthenticationProvider;
|
32 | 32 | import org.eclipse.ditto.gateway.service.util.config.security.DevOpsConfig;
|
33 |
| -import org.slf4j.Logger; |
34 |
| -import org.slf4j.LoggerFactory; |
| 33 | +import org.eclipse.ditto.internal.utils.pekko.logging.DittoLoggerFactory; |
| 34 | +import org.eclipse.ditto.internal.utils.pekko.logging.ThreadSafeDittoLogger; |
35 | 35 |
|
36 | 36 | import scala.util.Try;
|
37 | 37 |
|
|
40 | 40 | */
|
41 | 41 | public final class DevOpsOAuth2AuthenticationDirective implements DevopsAuthenticationDirective {
|
42 | 42 |
|
43 |
| - private static final Logger LOGGER = LoggerFactory.getLogger(DevOpsOAuth2AuthenticationDirective.class); |
| 43 | + private static final ThreadSafeDittoLogger LOGGER = |
| 44 | + DittoLoggerFactory.getThreadSafeLogger(DevOpsOAuth2AuthenticationDirective.class); |
44 | 45 |
|
45 | 46 | /**
|
46 | 47 | * The Http basic auth realm for the "ditto-devops" user used for /devops resource.
|
@@ -92,55 +93,55 @@ public static DevOpsOAuth2AuthenticationDirective devops(final DevOpsConfig devO
|
92 | 93 | return new DevOpsOAuth2AuthenticationDirective(jwtAuthenticationProvider, expectedSubjects);
|
93 | 94 | }
|
94 | 95 |
|
95 |
| - /** |
96 |
| - * Authenticates the devops resources with the chosen authentication method. |
97 |
| - * |
98 |
| - * @param realm the realm to apply. |
99 |
| - * @param inner the inner route, which will be performed on successful authentication. |
100 |
| - * @return the inner route wrapped with authentication. |
101 |
| - */ |
102 |
| - public Route authenticateDevOps(final String realm, final Route inner) { |
103 |
| - LOGGER.debug("DevOps OAuth authentication is enabled for {}.", realm); |
| 96 | + @Override |
| 97 | + public Route authenticateDevOps(final String realm, final DittoHeaders dittoHeaders, final Route inner) { |
| 98 | + final ThreadSafeDittoLogger logger = LOGGER.withCorrelationId(dittoHeaders); |
| 99 | + logger.debug("DevOps OAuth authentication is enabled for {}.", realm); |
104 | 100 | return extractRequestContext(requestContext -> {
|
105 | 101 | final String authorizationHeaderValue = requestContext.getRequest()
|
106 | 102 | .getHeader("authorization")
|
107 | 103 | .map(HttpHeader::value)
|
108 | 104 | .orElse("");
|
109 |
| - LOGGER.debug("Trying to use OAuth2 authentication for authorization header <{}>", authorizationHeaderValue); |
| 105 | + logger.debug("Trying to use OAuth2 authentication for authorization header <{}>", authorizationHeaderValue); |
110 | 106 | final CompletionStage<AuthenticationResult> authenticationResult =
|
111 |
| - jwtAuthenticationProvider.authenticate(requestContext, DittoHeaders.empty()); |
| 107 | + jwtAuthenticationProvider.authenticate(requestContext, dittoHeaders); |
112 | 108 |
|
113 | 109 | final Function<Try<AuthenticationResult>, Route> handleAuthenticationTry =
|
114 |
| - authenticationResultTry -> handleAuthenticationTry(authenticationResultTry, inner, requestContext); |
| 110 | + authenticationResultTry -> |
| 111 | + handleAuthenticationTry(authenticationResultTry, dittoHeaders, inner, requestContext); |
115 | 112 |
|
116 | 113 | return Directives.onComplete(authenticationResult, handleAuthenticationTry);
|
117 | 114 | });
|
118 | 115 | }
|
119 | 116 |
|
120 |
| - private Route handleAuthenticationTry(final Try<AuthenticationResult> authenticationResultTry, final Route inner, |
| 117 | + private Route handleAuthenticationTry(final Try<AuthenticationResult> authenticationResultTry, |
| 118 | + final DittoHeaders dittoHeaders, |
| 119 | + final Route inner, |
121 | 120 | final RequestContext requestContext) {
|
122 | 121 |
|
123 | 122 | if (authenticationResultTry.isSuccess()) {
|
124 | 123 | final AuthenticationResult authenticationResult = authenticationResultTry.get();
|
| 124 | + final ThreadSafeDittoLogger logger = LOGGER.withCorrelationId(dittoHeaders); |
125 | 125 | if (!authenticationResult.isSuccess()) {
|
126 |
| - LOGGER.info("DevOps OAuth authentication was not successful for request: '{}' because of '{}'.", |
| 126 | + logger.info("DevOps OAuth authentication was not successful for request: '{}' because of '{}'.", |
127 | 127 | requestContext.getRequest(), authenticationResult.getReasonOfFailure().getMessage());
|
128 | 128 | return Directives.failWith(authenticationResult.getReasonOfFailure());
|
129 | 129 | } else {
|
130 | 130 | final List<String> authorizationSubjectIds =
|
131 | 131 | authenticationResult.getAuthorizationContext().getAuthorizationSubjectIds();
|
132 | 132 | final boolean isAuthorized = expectedSubjects.isEmpty() || authorizationSubjectIds.stream().anyMatch(expectedSubjects::contains);
|
133 | 133 | if (isAuthorized) {
|
134 |
| - LOGGER.info("DevOps Oauth authentication was successful."); |
| 134 | + logger.info("DevOps Oauth authentication was successful, user subjects {} were " + |
| 135 | + "part of expected subjects: {}", authorizationSubjectIds, expectedSubjects); |
135 | 136 | return inner;
|
136 | 137 | } else {
|
137 | 138 | final String message = String.format(
|
138 | 139 | "Unauthorized subject(s): <%s>. Expected: <%s>",
|
139 | 140 | authorizationSubjectIds, expectedSubjects
|
140 | 141 | );
|
141 | 142 | final GatewayAuthenticationFailedException reasonOfFailure =
|
142 |
| - GatewayAuthenticationFailedException.fromMessage(message, DittoHeaders.empty()); |
143 |
| - LOGGER.warn("DevOps Oauth authentication failed.", reasonOfFailure); |
| 143 | + GatewayAuthenticationFailedException.fromMessage(message, dittoHeaders); |
| 144 | + logger.warn("DevOps Oauth authentication failed.", reasonOfFailure); |
144 | 145 | return Directives.failWith(reasonOfFailure);
|
145 | 146 | }
|
146 | 147 | }
|
|
0 commit comments