org.apereo.cas.web.flow.resolver.impl.mfa.GroovyScriptMultifactorAuthenticationPolicyEventResolver   A
last analyzed

Complexity

Total Complexity 13

Size/Duplication

Total Lines 77
Duplicated Lines 0 %

Importance

Changes 0
Metric Value
dl 0
loc 77
c 0
b 0
f 0
rs 10
wmc 13

2 Methods

Rating   Name   Duplication   Size   Complexity  
F resolveInternal(RequestContext) 0 58 12
A GroovyScriptMultifactorAuthenticationPolicyEventResolver(AuthenticationSystemSupport,CentralAuthentic 0 12 1
1
package org.apereo.cas.web.flow.resolver.impl.mfa;
2
3
import org.apache.commons.lang3.StringUtils;
4
import org.apereo.cas.CentralAuthenticationService;
5
import org.apereo.cas.authentication.Authentication;
6
import org.apereo.cas.authentication.AuthenticationException;
7
import org.apereo.cas.authentication.AuthenticationServiceSelectionPlan;
8
import org.apereo.cas.authentication.AuthenticationSystemSupport;
9
import org.apereo.cas.authentication.MultifactorAuthenticationUtils;
10
import org.apereo.cas.authentication.principal.Service;
11
import org.apereo.cas.configuration.CasConfigurationProperties;
12
import org.apereo.cas.services.MultifactorAuthenticationProvider;
13
import org.apereo.cas.services.MultifactorAuthenticationProviderSelector;
14
import org.apereo.cas.services.RegisteredService;
15
import org.apereo.cas.services.ServicesManager;
16
import org.apereo.cas.ticket.registry.TicketRegistrySupport;
17
import org.apereo.cas.util.CollectionUtils;
18
import org.apereo.cas.util.ResourceUtils;
19
import org.apereo.cas.util.ScriptingUtils;
20
import org.apereo.cas.web.flow.authentication.BaseMultifactorAuthenticationProviderEventResolver;
21
import org.apereo.cas.web.support.WebUtils;
22
import org.slf4j.Logger;
23
import org.slf4j.LoggerFactory;
24
import org.springframework.core.io.Resource;
25
import org.springframework.web.util.CookieGenerator;
26
import org.springframework.webflow.execution.Event;
27
import org.springframework.webflow.execution.RequestContext;
28
29
import java.util.Map;
30
import java.util.Optional;
31
import java.util.Set;
32
33
/**
34
 * This is {@link GroovyScriptMultifactorAuthenticationPolicyEventResolver}
35
 * that conditionally evaluates a groovy script to resolve the mfa provider id
36
 * and event.
37
 *
38
 * @author Misagh Moayyed
39
 * @since 5.1.0
40
 */
41
public class GroovyScriptMultifactorAuthenticationPolicyEventResolver extends BaseMultifactorAuthenticationProviderEventResolver {
42
    private static final Logger LOGGER = LoggerFactory.getLogger(GroovyScriptMultifactorAuthenticationPolicyEventResolver.class);
43
44
    private final Resource groovyScript;
45
46
    public GroovyScriptMultifactorAuthenticationPolicyEventResolver(final AuthenticationSystemSupport authenticationSystemSupport,
47
                                                                    final CentralAuthenticationService centralAuthenticationService,
48
                                                                    final ServicesManager servicesManager,
49
                                                                    final TicketRegistrySupport ticketRegistrySupport,
50
                                                                    final CookieGenerator warnCookieGenerator,
51
                                                                    final AuthenticationServiceSelectionPlan authenticationSelectionStrategies,
52
                                                                    final MultifactorAuthenticationProviderSelector selector,
53
                                                                    final CasConfigurationProperties casProperties) {
54
        super(authenticationSystemSupport, centralAuthenticationService, servicesManager,
55
                ticketRegistrySupport, warnCookieGenerator,
56
                authenticationSelectionStrategies, selector);
57
        groovyScript = casProperties.getAuthn().getMfa().getGroovyScript();
58
    }
59
60
    @Override
61
    public Set<Event> resolveInternal(final RequestContext context) {
62
        final Service service = resolveServiceFromAuthenticationRequest(context);
63
        final RegisteredService registeredService = resolveRegisteredServiceInRequestContext(context);
64
        final Authentication authentication = WebUtils.getAuthentication(context);
65
66
        if (groovyScript == null) {
67
            LOGGER.debug("No groovy script is configured for multifactor authentication");
68
            return null;
69
        }
70
71
        if (!ResourceUtils.doesResourceExist(groovyScript)) {
72
            LOGGER.warn("No groovy script is found at [{}] for multifactor authentication", groovyScript);
73
            return null;
74
        }
75
        
76
        if (authentication == null) {
77
            LOGGER.debug("No authentication is available to determine event for principal");
78
            return null;
79
        }
80
        if (registeredService == null || service == null) {
81
            LOGGER.debug("No registered service is available to determine event for principal [{}]", authentication.getPrincipal());
82
            return null;
83
        }
84
85
        final Map<String, MultifactorAuthenticationProvider> providerMap =
86
                MultifactorAuthenticationUtils.getAvailableMultifactorAuthenticationProviders(this.applicationContext);
87
        if (providerMap == null || providerMap.isEmpty()) {
88
            LOGGER.error("No multifactor authentication providers are available in the application context");
89
            throw new AuthenticationException();
90
        }
91
92
        try {
93
            final Object[] args = {service, registeredService, authentication, LOGGER};
94
            final String provider = ScriptingUtils.executeGroovyScript(groovyScript, args, String.class);
95
            LOGGER.debug("Groovy script run for [{}] returned the provider id [{}]", service, provider);
96
            if (StringUtils.isBlank(provider)) {
97
                return null;
98
            }
99
100
            final Optional<MultifactorAuthenticationProvider> providerFound = resolveProvider(providerMap, provider);
101
            if (providerFound.isPresent()) {
102
                final MultifactorAuthenticationProvider multifactorAuthenticationProvider = providerFound.get();
103
                if (multifactorAuthenticationProvider.isAvailable(registeredService)) {
104
                    final Event event = validateEventIdForMatchingTransitionInContext(multifactorAuthenticationProvider.getId(), context,
105
                            buildEventAttributeMap(authentication.getPrincipal(), registeredService, multifactorAuthenticationProvider));
106
                    return CollectionUtils.wrapSet(event);
107
                }
108
                LOGGER.warn("Located multifactor provider [{}], yet the provider cannot be reached or verified", multifactorAuthenticationProvider);
109
                return null;
110
            }
111
            LOGGER.warn("No multifactor provider could be found for [{}]", provider);
112
            throw new AuthenticationException();
113
114
        } catch (final Exception e) {
115
            LOGGER.error(e.getMessage(), e);
116
        }
117
        return null;
118
    }
119
}
120