blob: 1270381285bda367eb70901c791a413b80af025a [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.syncope.core.logic.wa;
import java.time.LocalDateTime;
import java.util.List;
import java.util.function.Predicate;
import java.util.stream.Collectors;
import org.apache.syncope.common.lib.wa.GoogleMfaAuthToken;
import org.apache.syncope.common.lib.types.IdRepoEntitlement;
import org.apache.syncope.core.logic.AbstractAuthProfileLogic;
import org.apache.syncope.core.persistence.api.dao.NotFoundException;
import org.apache.syncope.core.persistence.api.dao.auth.AuthProfileDAO;
import org.apache.syncope.core.persistence.api.entity.EntityFactory;
import org.apache.syncope.core.persistence.api.entity.auth.AuthProfile;
import org.apache.syncope.core.provisioning.api.data.AuthProfileDataBinder;
import org.springframework.security.access.prepost.PreAuthorize;
import org.springframework.transaction.annotation.Transactional;
public class GoogleMfaAuthTokenLogic extends AbstractAuthProfileLogic {
protected final EntityFactory entityFactory;
public GoogleMfaAuthTokenLogic(
final EntityFactory entityFactory,
final AuthProfileDAO authProfileDAO,
final AuthProfileDataBinder binder) {
super(authProfileDAO, binder);
this.entityFactory = entityFactory;
}
protected void removeTokenAndSave(final AuthProfile profile, final Predicate<GoogleMfaAuthToken> criteria) {
List<GoogleMfaAuthToken> tokens = profile.getGoogleMfaAuthTokens();
if (tokens.removeIf(criteria)) {
profile.setGoogleMfaAuthTokens(tokens);
authProfileDAO.save(profile);
}
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void delete(final LocalDateTime expirationDate) {
authProfileDAO.findAll(-1, -1).forEach(profile -> removeTokenAndSave(
profile, token -> token.getIssueDate().compareTo(expirationDate) >= 0));
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void delete(final String owner, final int otp) {
authProfileDAO.findByOwner(owner).
ifPresent(profile -> removeTokenAndSave(profile, token -> token.getOtp() == otp));
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void delete(final String owner) {
authProfileDAO.findByOwner(owner).ifPresent(profile -> {
profile.setGoogleMfaAuthTokens(List.of());
authProfileDAO.save(profile);
});
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void delete(final int otp) {
authProfileDAO.findAll(-1, -1).forEach(profile -> removeTokenAndSave(
profile, token -> token.getOtp() == otp));
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void deleteAll() {
authProfileDAO.findAll(-1, -1).forEach(profile -> {
profile.setGoogleMfaAuthTokens(List.of());
authProfileDAO.save(profile);
});
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
public void store(final String owner, final GoogleMfaAuthToken token) {
AuthProfile profile = authProfileDAO.findByOwner(owner).orElseGet(() -> {
AuthProfile authProfile = entityFactory.newEntity(AuthProfile.class);
authProfile.setOwner(owner);
return authProfile;
});
List<GoogleMfaAuthToken> tokens = profile.getGoogleMfaAuthTokens();
tokens.removeIf(t -> t.getOtp() == token.getOtp());
tokens.add(token);
profile.setGoogleMfaAuthTokens(tokens);
authProfileDAO.save(profile);
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
@Transactional(readOnly = true)
public GoogleMfaAuthToken read(final String owner, final int otp) {
return authProfileDAO.findByOwner(owner).
stream().
map(AuthProfile::getGoogleMfaAuthTokens).
flatMap(List::stream).
filter(token -> token.getOtp() == otp).
findFirst().
orElseThrow(() -> new NotFoundException("Could not find token for owner " + owner + " and otp " + otp));
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
@Transactional(readOnly = true)
public List<GoogleMfaAuthToken> list() {
return authProfileDAO.findAll(-1, -1).stream().
map(AuthProfile::getGoogleMfaAuthTokens).
flatMap(List::stream).
collect(Collectors.toList());
}
@PreAuthorize("hasRole('" + IdRepoEntitlement.ANONYMOUS + "')")
@Transactional(readOnly = true)
public List<GoogleMfaAuthToken> read(final String owner) {
return authProfileDAO.findByOwner(owner).
map(AuthProfile::getGoogleMfaAuthTokens).
orElse(List.of());
}
}