1
|
|
|
package org.apereo.cas.oidc.web.flow; |
2
|
|
|
|
3
|
|
|
import org.apache.commons.lang3.StringUtils; |
4
|
|
|
import org.apereo.cas.CentralAuthenticationService; |
5
|
|
|
import org.apereo.cas.authentication.Authentication; |
6
|
|
|
import org.apereo.cas.authentication.AuthenticationException; |
7
|
|
|
import org.apereo.cas.authentication.AuthenticationServiceSelectionPlan; |
8
|
|
|
import org.apereo.cas.authentication.AuthenticationSystemSupport; |
9
|
|
|
import org.apereo.cas.authentication.MultifactorAuthenticationUtils; |
10
|
|
|
import org.apereo.cas.services.MultifactorAuthenticationProvider; |
11
|
|
|
import org.apereo.cas.services.MultifactorAuthenticationProviderSelector; |
12
|
|
|
import org.apereo.cas.services.RegisteredService; |
13
|
|
|
import org.apereo.cas.services.ServicesManager; |
14
|
|
|
import org.apereo.cas.support.oauth.OAuth20Constants; |
15
|
|
|
import org.apereo.cas.ticket.registry.TicketRegistrySupport; |
16
|
|
|
import org.apereo.cas.util.CollectionUtils; |
17
|
|
|
import org.apereo.cas.web.flow.authentication.BaseMultifactorAuthenticationProviderEventResolver; |
18
|
|
|
import org.apereo.cas.web.support.WebUtils; |
19
|
|
|
import org.jasig.cas.client.util.URIBuilder; |
20
|
|
|
import org.slf4j.Logger; |
21
|
|
|
import org.slf4j.LoggerFactory; |
22
|
|
|
import org.springframework.web.util.CookieGenerator; |
23
|
|
|
import org.springframework.webflow.execution.Event; |
24
|
|
|
import org.springframework.webflow.execution.RequestContext; |
25
|
|
|
|
26
|
|
|
import javax.servlet.http.HttpServletRequest; |
27
|
|
|
import java.util.Collection; |
28
|
|
|
import java.util.Map; |
29
|
|
|
import java.util.Optional; |
30
|
|
|
import java.util.Set; |
31
|
|
|
|
32
|
|
|
/** |
33
|
|
|
* This is {@link OidcAuthenticationContextWebflowEventEventResolver}. |
34
|
|
|
* |
35
|
|
|
* @author Misagh Moayyed |
36
|
|
|
* @since 5.0.0 |
37
|
|
|
*/ |
38
|
|
|
public class OidcAuthenticationContextWebflowEventEventResolver extends BaseMultifactorAuthenticationProviderEventResolver { |
39
|
|
|
private static final Logger LOGGER = LoggerFactory.getLogger(OidcAuthenticationContextWebflowEventEventResolver.class); |
40
|
|
|
|
41
|
|
|
public OidcAuthenticationContextWebflowEventEventResolver(final AuthenticationSystemSupport authenticationSystemSupport, |
42
|
|
|
final CentralAuthenticationService centralAuthenticationService, |
43
|
|
|
final ServicesManager servicesManager, |
44
|
|
|
final TicketRegistrySupport ticketRegistrySupport, |
45
|
|
|
final CookieGenerator warnCookieGenerator, |
46
|
|
|
final AuthenticationServiceSelectionPlan authenticationSelectionStrategies, |
47
|
|
|
final MultifactorAuthenticationProviderSelector selector) { |
48
|
|
|
super(authenticationSystemSupport, centralAuthenticationService, servicesManager, |
49
|
|
|
ticketRegistrySupport, warnCookieGenerator, |
50
|
|
|
authenticationSelectionStrategies, selector); |
51
|
|
|
} |
52
|
|
|
|
53
|
|
|
@Override |
54
|
|
|
public Set<Event> resolveInternal(final RequestContext context) { |
55
|
|
|
final RegisteredService service = resolveRegisteredServiceInRequestContext(context); |
56
|
|
|
final Authentication authentication = WebUtils.getAuthentication(context); |
57
|
|
|
final HttpServletRequest request = WebUtils.getHttpServletRequestFromExternalWebflowContext(context); |
58
|
|
|
|
59
|
|
|
if (service == null || authentication == null) { |
60
|
|
|
LOGGER.debug("No service or authentication is available to determine event for principal"); |
61
|
|
|
return null; |
62
|
|
|
} |
63
|
|
|
|
64
|
|
|
String acr = request.getParameter(OAuth20Constants.ACR_VALUES); |
65
|
|
|
if (StringUtils.isBlank(acr)) { |
66
|
|
|
final URIBuilder builderContext = new URIBuilder(StringUtils.trimToEmpty(context.getFlowExecutionUrl())); |
67
|
|
|
final Optional<URIBuilder.BasicNameValuePair> parameter = builderContext.getQueryParams() |
68
|
|
|
.stream().filter(p -> p.getName().equals(OAuth20Constants.ACR_VALUES)) |
69
|
|
|
.findFirst(); |
70
|
|
|
if (parameter.isPresent()) { |
71
|
|
|
acr = parameter.get().getValue(); |
72
|
|
|
} |
73
|
|
|
} |
74
|
|
|
if (StringUtils.isBlank(acr)) { |
75
|
|
|
LOGGER.debug("No ACR provided in the authentication request"); |
76
|
|
|
return null; |
77
|
|
|
} |
78
|
|
|
final Set<String> values = org.springframework.util.StringUtils.commaDelimitedListToSet(acr); |
79
|
|
|
if (values.isEmpty()) { |
80
|
|
|
LOGGER.debug("No ACR provided in the authentication request"); |
81
|
|
|
return null; |
82
|
|
|
} |
83
|
|
|
|
84
|
|
|
final Map<String, MultifactorAuthenticationProvider> providerMap = |
85
|
|
|
MultifactorAuthenticationUtils.getAvailableMultifactorAuthenticationProviders(this.applicationContext); |
86
|
|
|
if (providerMap == null || providerMap.isEmpty()) { |
87
|
|
|
LOGGER.error("No multifactor authentication providers are available in the application context to handle [{}]", values); |
88
|
|
|
throw new AuthenticationException(); |
89
|
|
|
} |
90
|
|
|
|
91
|
|
|
final Collection<MultifactorAuthenticationProvider> flattenedProviders = flattenProviders(providerMap.values()); |
92
|
|
|
final Optional<MultifactorAuthenticationProvider> provider = flattenedProviders |
93
|
|
|
.stream() |
94
|
|
|
.filter(v -> values.contains(v.getId())) |
95
|
|
|
.findAny(); |
96
|
|
|
|
97
|
|
|
if (provider.isPresent()) { |
98
|
|
|
return CollectionUtils.wrapSet(new Event(this, provider.get().getId())); |
99
|
|
|
} |
100
|
|
|
LOGGER.warn("The requested authentication class [{}] cannot be satisfied by any of the MFA providers available", values); |
101
|
|
|
throw new AuthenticationException(); |
102
|
|
|
} |
103
|
|
|
} |
104
|
|
|
|