aboutsummaryrefslogtreecommitdiffstats
path: root/jdisc-security-filters/src/main/java/com/yahoo/jdisc/http/filter/security/cors/CorsLogic.java
blob: f24778d12415e3f8500573812ae455cd3c5ac8ca (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.jdisc.http.filter.security.cors;

import java.time.Duration;
import java.util.ArrayList;
import java.util.Collection;
import java.util.HashSet;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.TreeMap;
import java.util.regex.Pattern;

/**
 * @author bjorncs
 */
class CorsLogic {

    static final String CORS_PREFLIGHT_REQUEST_CACHE_TTL = Long.toString(Duration.ofDays(7).getSeconds());

    static final String ALLOW_ORIGIN_HEADER = "Access-Control-Allow-Origin";

    static final Map<String, String> ACCESS_CONTROL_HEADERS = Map.of(
            "Access-Control-Max-Age", CORS_PREFLIGHT_REQUEST_CACHE_TTL,
            "Access-Control-Allow-Headers", "Origin,Content-Type,Accept,Yahoo-Principal-Auth,Okta-Identity-Token," +
                    "Okta-Access-Token,Okta-Refresh-Token,Vespa-Csrf-Token",
            "Access-Control-Allow-Methods", "OPTIONS,GET,PUT,DELETE,POST,PATCH",
            "Access-Control-Allow-Credentials", "true",
            "Vary", "*"
    );

    private final boolean allowAnyOrigin;
    private final Set<String> allowedOrigins;
    private final List<Pattern> allowedOriginPatterns;
    private CorsLogic(boolean allowAnyOrigin, Set<String> allowedOrigins, List<Pattern> allowedOriginPatterns) {
        this.allowAnyOrigin = allowAnyOrigin;
        this.allowedOrigins = Set.copyOf(allowedOrigins);
        this.allowedOriginPatterns = List.copyOf(allowedOriginPatterns);
    }

    boolean originMatches(String origin) {
        if (allowAnyOrigin) return true;
        if (allowedOrigins.contains(origin)) return true;
        return allowedOriginPatterns.stream().anyMatch(pattern -> pattern.matcher(origin).matches());
    }

    Map<String, String> createCorsResponseHeaders(String requestOriginHeader) {
        if (requestOriginHeader == null) return Map.of();

        TreeMap<String, String> headers = new TreeMap<>();
        if (originMatches(requestOriginHeader))
            headers.put(ALLOW_ORIGIN_HEADER, requestOriginHeader);
        headers.putAll(ACCESS_CONTROL_HEADERS);
        return headers;
    }

    Map<String, String> preflightResponseHeaders(String requestOriginHeader) {
        return createCorsResponseHeaders(requestOriginHeader);
    }

    static CorsLogic forAllowedOrigins(Collection<String> allowedOrigins) {
        Set<String> allowedOriginsVerbatim = new HashSet<>();
        List<Pattern> allowedOriginPatterns = new ArrayList<>();
        for (String allowedOrigin : allowedOrigins) {
            if (allowedOrigin.isBlank()) continue;
            if (allowedOrigin.length() > 0) {
                if ("*".equals(allowedOrigin))
                    return new CorsLogic(true, Set.of(), List.of());
                else if (allowedOrigin.contains("*"))
                    allowedOriginPatterns.add(Pattern.compile(allowedOrigin.replace(".", "\\.").replace("*", ".*")));
                else
                    allowedOriginsVerbatim.add(allowedOrigin);
            }
        }
        return new CorsLogic(false, allowedOriginsVerbatim, allowedOriginPatterns);
    }
}