private static ChallengeRequest getDigestChallengeRequest(ClientResource cr) { ChallengeRequest c1 = null; for (ChallengeRequest challengeRequest : cr.getChallengeRequests()) { if (ChallengeScheme.HTTP_DIGEST .equals(challengeRequest.getScheme())) { c1 = challengeRequest; break; } } return c1; } }
/** * Finds the authenticator helper supporting the given scheme. * * @param challengeScheme * The challenge scheme to match. * @param clientSide * Indicates if client side support is required. * @param serverSide * Indicates if server side support is required. * @return The authenticator helper or null. */ public org.restlet.engine.security.AuthenticatorHelper findHelper( ChallengeScheme challengeScheme, boolean clientSide, boolean serverSide) { org.restlet.engine.security.AuthenticatorHelper result = null; List<org.restlet.engine.security.AuthenticatorHelper> helpers = getRegisteredAuthenticators(); org.restlet.engine.security.AuthenticatorHelper current; for (int i = 0; (result == null) && (i < helpers.size()); i++) { current = helpers.get(i); if (current.getChallengeScheme().equals(challengeScheme) && ((clientSide && current.isClientSide()) || !clientSide) && ((serverSide && current.isServerSide()) || !serverSide)) { result = helpers.get(i); } } return result; }
SecurityScheme securityScheme = new SecurityScheme(); if (endpoint != null) { if (ChallengeScheme.HTTP_BASIC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_BASIC.getName()); securitySchemes.put(ChallengeScheme.HTTP_BASIC.getName(), securityScheme); } else if (ChallengeScheme.HTTP_OAUTH.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_BEARER.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_MAC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType("Oauth 2.0"); securitySchemes.put("oauth_2_0", securityScheme); } else if (ChallengeScheme.HTTP_DIGEST.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_DIGEST.getName()); securitySchemes.put(ChallengeScheme.HTTP_DIGEST.getName(), securityScheme); } else if (ChallengeScheme.CUSTOM.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.CUSTOM.getName());
SecurityScheme securityScheme = new SecurityScheme(); if (endpoint != null) { if (ChallengeScheme.HTTP_BASIC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_BASIC.getName()); securitySchemes.put(ChallengeScheme.HTTP_BASIC.getName(), securityScheme); } else if (ChallengeScheme.HTTP_OAUTH.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_BEARER.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_MAC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType("Oauth 2.0"); securitySchemes.put("oauth_2_0", securityScheme); } else if (ChallengeScheme.HTTP_DIGEST.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_DIGEST.getName()); securitySchemes.put(ChallengeScheme.HTTP_DIGEST.getName(), securityScheme); } else if (ChallengeScheme.CUSTOM.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.CUSTOM.getName());
SecurityScheme securityScheme = new SecurityScheme(); if (endpoint != null) { if (ChallengeScheme.HTTP_BASIC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_BASIC.getName()); securitySchemes.put(ChallengeScheme.HTTP_BASIC.getName(), securityScheme); } else if (ChallengeScheme.HTTP_OAUTH.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_BEARER.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_MAC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType("Oauth 2.0"); securitySchemes.put("oauth_2_0", securityScheme); } else if (ChallengeScheme.HTTP_DIGEST.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_DIGEST.getName()); securitySchemes.put(ChallengeScheme.HTTP_DIGEST.getName(), securityScheme); } else if (ChallengeScheme.CUSTOM.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.CUSTOM.getName());
SecurityScheme securityScheme = new SecurityScheme(); if (endpoint != null) { if (ChallengeScheme.HTTP_BASIC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_BASIC.getName()); securitySchemes.put(ChallengeScheme.HTTP_BASIC.getName(), securityScheme); } else if (ChallengeScheme.HTTP_OAUTH.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_BEARER.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_MAC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType("Oauth 2.0"); securitySchemes.put("oauth_2_0", securityScheme); } else if (ChallengeScheme.HTTP_DIGEST.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_DIGEST.getName()); securitySchemes.put(ChallengeScheme.HTTP_DIGEST.getName(), securityScheme); } else if (ChallengeScheme.CUSTOM.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.CUSTOM.getName());
SecurityScheme securityScheme = new SecurityScheme(); if (endpoint != null) { if (ChallengeScheme.HTTP_BASIC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_BASIC.getName()); securitySchemes.put(ChallengeScheme.HTTP_BASIC.getName(), securityScheme); } else if (ChallengeScheme.HTTP_OAUTH.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_BEARER.equals(endpoint .getAuthenticationProtocol()) || ChallengeScheme.HTTP_OAUTH_MAC.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType("Oauth 2.0"); securitySchemes.put("oauth_2_0", securityScheme); } else if (ChallengeScheme.HTTP_DIGEST.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.HTTP_DIGEST.getName()); securitySchemes.put(ChallengeScheme.HTTP_DIGEST.getName(), securityScheme); } else if (ChallengeScheme.CUSTOM.equals(endpoint .getAuthenticationProtocol())) { securityScheme.setType(ChallengeScheme.CUSTOM.getName());
public static ChallengeResponse getTestChallengeResponse(final List<ChallengeRequest> list, final ChallengeScheme httpDigest, final Response response, final String userName, final char[] password) { ChallengeRequest c1 = null; for(final ChallengeRequest challengeRequest : list) { if(ChallengeScheme.HTTP_DIGEST.equals(challengeRequest.getScheme())) { c1 = challengeRequest; break; } } // 2- Create the Challenge response used by the client to authenticate its requests. final ChallengeResponse challengeResponse = new ChallengeResponse(c1, response, userName, password); return challengeResponse; }
} else if (ChallengeScheme.HTTP_OAUTH_BEARER.equals(cr.getScheme())) { logger.config("Verify: Bearer"); final String bearer = cr.getRawValue();
@Override public int verify(Request request, Response response) { final String token; try { ChallengeResponse cr = request.getChallengeResponse(); if (cr == null) { return RESULT_MISSING; } else if (ChallengeScheme.HTTP_OAUTH_BEARER.equals(cr.getScheme())) { final String bearer = cr.getRawValue(); if (bearer == null || bearer.isEmpty()) { return RESULT_MISSING; } token = bearer; } else { return RESULT_UNSUPPORTED; } } catch (Exception ex) { return RESULT_INVALID; } Try<User> user = accessTokenVerificationCommandFactory.createVerificationCommand(token).executeCommand(); return user.map(u -> { org.restlet.security.User restletUser = createRestletUser(u); request.getClientInfo().setUser(restletUser); request.getAttributes().put("token", token); return RESULT_VALID; }).orElse(RESULT_INVALID); }
&& ChallengeScheme.FTP_PLAIN.equals(request .getChallengeResponse().getScheme()) && (request.getChallengeResponse().getIdentifier() != null)) {
/** {@inheritDoc} */ @Override public final boolean equals(final Object obj) { boolean result = (obj == this); // if obj == this no need to go further if (!result) { // if obj isn't a challenge request or is null don't evaluate // further if (obj instanceof ChallengeRequest) { final ChallengeRequest that = (ChallengeRequest) obj; result = (getParameters().equals(that.getParameters())); if (result) { if (getRealm() != null) { result = getRealm().equals(that.getRealm()); } else { result = (that.getRealm() == null); } if (result) { if (getScheme() != null) { result = getScheme().equals(that.getScheme()); } else { result = (that.getScheme() == null); } } } } } return result; }
if (!cr.getScheme().equals(ChallengeScheme.HTTP_BASIC)) {
&& ChallengeScheme.FTP_PLAIN.equals(request .getChallengeResponse().getScheme()) && (request.getChallengeResponse().getIdentifier() != null)) {
&& ChallengeScheme.FTP_PLAIN.equals(request .getChallengeResponse().getScheme()) && (request.getChallengeResponse().getIdentifier() != null)) {
result = getScheme().equals(that.getScheme()); } else { result = (that.getScheme() == null);
if (challengeResponse.getScheme().equals(c.getScheme())) { challengeRequest = c; break;
if (ChallengeScheme.HTTP_DIGEST.equals(challengeRequest .getScheme())) { digestChallenge = challengeRequest;