io.vertigo.account.plugins.authentication.store.StoreAuthenticationPlugin Maven / Gradle / Ivy
The newest version!
/*
* vertigo - application development platform
*
* Copyright (C) 2013-2024, Vertigo.io, [email protected]
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.vertigo.account.plugins.authentication.store;
import java.util.Optional;
import javax.inject.Inject;
import io.vertigo.account.authentication.AuthenticationToken;
import io.vertigo.account.impl.authentication.AuthenticationPlugin;
import io.vertigo.account.impl.authentication.UsernameAuthenticationToken;
import io.vertigo.account.impl.authentication.UsernamePasswordAuthenticationToken;
import io.vertigo.core.lang.Assertion;
import io.vertigo.core.node.Node;
import io.vertigo.core.node.component.Activeable;
import io.vertigo.core.param.ParamValue;
import io.vertigo.datamodel.criteria.Criteria;
import io.vertigo.datamodel.criteria.Criterions;
import io.vertigo.datamodel.data.definitions.DataDefinition;
import io.vertigo.datamodel.data.model.DataObject;
import io.vertigo.datamodel.data.model.DtList;
import io.vertigo.datamodel.data.model.DtListState;
import io.vertigo.datastore.entitystore.EntityStoreManager;
/**
* A Store implementation of the Realm interface that
* @author npiedeloup
*/
public class StoreAuthenticationPlugin implements AuthenticationPlugin, Activeable {
private final EntityStoreManager entityStoreManager;
private final String userCredentialEntity;
private final String userLoginField;
private final String userPasswordField;
private final String userTokenIdField;
private DataDefinition userCredentialDefinition;
private UsernamePasswordAuthenticationToken defaultUserTrustedCredential;
/**
* Constructor.
* @param entityStoreManager Store Manager
* @param userCredentialEntity Entity name of userCredentialObject
* @param userLoginField Login fieldName
* @param userPasswordField Encoded Password fieldName
* @param userTokenIdField TokenId fieldName
*/
@Inject
public StoreAuthenticationPlugin(
@ParamValue("userCredentialEntity") final String userCredentialEntity,
@ParamValue("userLoginField") final String userLoginField,
@ParamValue("userPasswordField") final String userPasswordField,
@ParamValue("userTokenIdField") final String userTokenIdField,
final EntityStoreManager entityStoreManager) {
Assertion.check()
.isNotNull(entityStoreManager)
.isNotBlank(userLoginField)
.isNotBlank(userPasswordField);
// -----
this.entityStoreManager = entityStoreManager;
this.userCredentialEntity = userCredentialEntity;
this.userLoginField = userLoginField;
this.userPasswordField = userPasswordField;
this.userTokenIdField = userTokenIdField;
}
/** {@inheritDoc} */
@Override
public boolean supports(final AuthenticationToken token) {
return token instanceof UsernameAuthenticationToken
|| token instanceof UsernamePasswordAuthenticationToken;
}
/** {@inheritDoc} */
@Override
public Optional authenticateAccount(final AuthenticationToken token) {
final Criteria criteriaByLogin = Criterions.isEqualTo(() -> userLoginField, token.getPrincipal());
final DtList results = entityStoreManager.find(userCredentialDefinition, criteriaByLogin, DtListState.of(2));
//may ensure, that valid or invalid login took the same time, so we don't assert no result here
Assertion.check().isTrue(results.size() <= 1, "Too many matching credentials for {0}", token.getPrincipal());
final AuthenticationToken trustedAuthenticationToken;
if (token instanceof UsernamePasswordAuthenticationToken) {
if (results.isEmpty()) {
trustedAuthenticationToken = defaultUserTrustedCredential;
} else {
final String trustedEncodedPassword = (String) userCredentialDefinition.getField(userPasswordField).getDataAccessor().getValue(results.get(0));
trustedAuthenticationToken = new UsernamePasswordAuthenticationToken(token.getPrincipal(), trustedEncodedPassword);
}
} else {
if (results.isEmpty()) {
trustedAuthenticationToken = defaultUserTrustedCredential;
} else {
trustedAuthenticationToken = new UsernameAuthenticationToken(token.getPrincipal());
}
}
//may ensure, that valid or invalid login took the same time, so we don't assert no result here
if (token.match(trustedAuthenticationToken) //tokens match
&& !results.isEmpty()) {//and Username exists (after)
final String userTokenId = String.valueOf(userCredentialDefinition.getField(userTokenIdField).getDataAccessor().getValue(results.get(0)));
return Optional.of(userTokenId);
}
return Optional.empty();
}
/** {@inheritDoc} */
@Override
public void start() {
userCredentialDefinition = Node.getNode().getDefinitionSpace().resolve(userCredentialEntity, DataDefinition.class);
defaultUserTrustedCredential = new UsernamePasswordAuthenticationToken("defaultLogin", "defaultPassword");
}
/** {@inheritDoc} */
@Override
public void stop() {
//nothing
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy