All Downloads are FREE. Search and download functionalities are using the official Maven repository.

net.krotscheck.kangaroo.authz.common.util.ValidationUtil Maven / Gradle / Ivy

There is a newer version: 1.4.0
Show newest version
/*
 * Copyright (c) 2017 Michael Krotscheck
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy
 * of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *
 * See the License for the specific language governing permissions and
 * limitations under the License.
 *
 */

package net.krotscheck.kangaroo.authz.common.util;

import net.krotscheck.kangaroo.authz.common.authenticator.AuthenticatorType;
import net.krotscheck.kangaroo.authz.common.database.entity.AbstractClientUri;
import net.krotscheck.kangaroo.authz.common.database.entity.ApplicationScope;
import net.krotscheck.kangaroo.authz.common.database.entity.Authenticator;
import net.krotscheck.kangaroo.authz.common.database.entity.Client;
import net.krotscheck.kangaroo.authz.common.database.entity.ClientRedirect;
import net.krotscheck.kangaroo.authz.common.database.entity.ClientType;
import net.krotscheck.kangaroo.authz.common.database.entity.Role;
import net.krotscheck.kangaroo.authz.oauth2.exception.RFC6749.InvalidRequestException;
import net.krotscheck.kangaroo.authz.oauth2.exception.RFC6749.InvalidScopeException;
import net.krotscheck.kangaroo.authz.oauth2.exception.RFC6749.UnsupportedResponseTypeException;
import org.apache.commons.lang3.StringUtils;
import org.apache.http.NameValuePair;
import org.apache.http.client.utils.URLEncodedUtils;

import javax.ws.rs.core.MultivaluedHashMap;
import javax.ws.rs.core.MultivaluedMap;
import javax.ws.rs.core.UriBuilder;
import java.net.URI;
import java.net.URLDecoder;
import java.util.Collection;
import java.util.HashSet;
import java.util.List;
import java.util.Map.Entry;
import java.util.Set;
import java.util.SortedMap;
import java.util.TreeMap;
import java.util.stream.Collectors;

/**
 * A utility filled with validation tools.
 *
 * @author Michael Krotscheck
 */
public final class ValidationUtil {

    /**
     * Utility class, private constructor.
     */
    private ValidationUtil() {

    }

    /**
     * Validate that a response type is appropriate for a given client.
     *
     * @param client       The client to check.
     * @param responseType The requested response type.
     */
    public static void validateResponseType(final Client client,
                                            final String responseType) {
        if (client != null) {
            if (ClientType.Implicit.equals(client.getType())
                    && "token".equals(responseType)) {
                return;
            } else if (ClientType.AuthorizationGrant.equals(client.getType())
                    && "code".equals(responseType)) {
                return;
            }
        }
        throw new UnsupportedResponseTypeException();
    }

    /**
     * Require that the provided string matches the set of redirection URL's.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI requireValidRedirect(
            final URI redirect, final List redirects) {
        URI validRedirect = validateRedirect(redirect, redirects);
        if (validRedirect == null) {
            throw new InvalidRequestException();
        }
        return validRedirect;
    }

    /**
     * Require that the provided string matches the set of redirection URL's.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI requireValidRedirect(
            final String redirect, final List redirects) {
        URI validRedirect = validateRedirect(redirect, redirects);
        if (validRedirect == null) {
            throw new InvalidRequestException();
        }
        return validRedirect;
    }

    /**
     * Require that the provided string matches the set of redirection URL's.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI requireValidRedirect(final String redirect,
                                           final Set redirects) {
        URI validRedirect = validateRedirect(redirect, redirects);
        if (validRedirect == null) {
            throw new InvalidRequestException();
        }
        return validRedirect;
    }

    /**
     * This method assists in determining if a particular URI is valid for
     * the scope of this client.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI validateRedirect(final URI redirect,
                                       final List redirects) {
        if (redirect == null) {
            return validateRedirect((String) null, redirects);
        }
        return validateRedirect(redirect.toString(), redirects);
    }

    /**
     * This method assists in determining if a particular URI is valid for
     * the scope of this client.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI validateRedirect(final String redirect,
                                       final List redirects) {
        Set redirectUris = redirects.stream()
                .map(AbstractClientUri::getUri)
                .collect(Collectors.toSet());
        return validateRedirect(redirect, redirectUris);
    }

    /**
     * This method assists in determining if a particular URI is valid for
     * the scope of this client.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI validateRedirect(final URI redirect,
                                       final Set redirects) {
        if (redirect == null) {
            return validateRedirect((String) null, redirects);
        }
        return validateRedirect(redirect.toString(), redirects);
    }

    /**
     * This method assists in determining if a particular URI is valid for
     * the scope of this client.
     *
     * @param redirect  The URI to check.
     * @param redirects A set of redirect url's to check against.
     * @return The validated redirect URI, or null.
     */
    public static URI validateRedirect(final String redirect,
                                       final Set redirects) {
        // Quick exit
        if (redirects.size() == 0) {
            return null;
        }

        // Can we default?
        if (StringUtils.isEmpty(redirect)) {
            if (redirects.size() == 1) {
                URI[] redirectArray =
                        redirects.toArray(new URI[redirects.size()]);
                return redirectArray[0];
            } else {
                return null;
            }
        }

        // Make sure the passed string is valid.
        URI redirectUri;
        try {
            redirectUri = UriBuilder.fromUri(redirect).build();
        } catch (Exception e) {
            return null;
        }

        // Convert the query parameters into a multivaluedMap
        MultivaluedMap params = extractParams(redirectUri);
        Set keySet = new HashSet<>(params.keySet());
        params.keySet().retainAll(keySet);

        uriloop:
        for (URI test : redirects) {
            // Test the scheme
            if (!test.getScheme().equals(redirectUri.getScheme())) {
                continue;
            }
            // Test the host
            if (!test.getHost().equals(redirectUri.getHost())) {
                continue;
            }
            // Test the port
            if (test.getPort() != redirectUri.getPort()) {
                continue;
            }
            // Test the path
            if (!test.getPath().equals(redirectUri.getPath())) {
                continue;
            }

            MultivaluedMap testParams = extractParams(test);
            keySet.addAll(testParams.keySet()); // This modifies 'params'.

            // All variables in testParams must exist in params to pass.
            for (Entry> entry : testParams.entrySet()) {
                if (!params.get(entry.getKey()).containsAll(entry.getValue())) {
                    continue uriloop;
                }
            }

            return redirectUri; // NOPMD
        }
        return null;
    }

    /**
     * Convert a URI and its query parameters into a MultivaluedMap, for
     * later comparison.
     *
     * @param redirectUri The URI to parse.
     * @return A map of all results.
     */
    private static MultivaluedMap extractParams(
            final URI redirectUri) {
        MultivaluedMap results = new MultivaluedHashMap<>();
        for (NameValuePair pair : URLEncodedUtils.parse(redirectUri, "UTF-8")) {
            results.add(pair.getName(), pair.getValue());
        }
        return results;
    }

    /**
     * Creates a collection of scopes from a list of valid scopes. If the
     * requested scopes are not in that valid list, it will throw an exception.
     *
     * @param requestedScopes An array of requested scopes.
     * @param validScopes     A list of valid scopes.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap validateScope(
            final String[] requestedScopes,
            final SortedMap validScopes) {

        if (requestedScopes == null || requestedScopes.length == 0) {
            return new TreeMap<>();
        }

        if (validScopes == null) {
            throw new InvalidScopeException();
        }

        // Make sure all requested scopes are in the map.
        SortedMap results = new TreeMap<>();
        for (String scope : requestedScopes) {
            if (validScopes.containsKey(scope)) {
                results.put(scope, validScopes.get(scope));
            }
        }
        return results;
    }

    /**
     * Creates a collection of scopes from a list of valid scopes. If the
     * requested scopes are not in that valid list, it will throw an exception.
     *
     * @param requestedScopes An array of requested scopes.
     * @param validScopes     A string of valid scopes.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap validateScope(
            final String requestedScopes,
            final SortedMap validScopes) {
        if (StringUtils.isEmpty(requestedScopes)) {
            return new TreeMap<>();
        }
        String decodedScopes = URLDecoder.decode(requestedScopes);
        return validateScope(decodedScopes.split(" "), validScopes);
    }

    /**
     * Ensure that a requested list of scopes is permitted for a specific role.
     *
     * @param requestedScopes The requested client scopes.
     * @param role            The role.
     * @return A valid map of scopes.
     */
    public static SortedMap validateScope(
            final SortedMap requestedScopes,
            final Role role) {
        if (role == null) {
            throw new InvalidScopeException();
        }

        // All requested client scopes MUST exit in the user role.
        Collection roleScope = role.getScopes().values();
        for (ApplicationScope s : requestedScopes.values()) {
            if (!roleScope.contains(s)) {
                throw new InvalidScopeException();
            }
        }

        return requestedScopes;
    }

    /**
     * Validate a list of scopes against a role.
     *
     * @param requestedScopes An array of requested scopes.
     * @param role            The role.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap validateScope(
            final String requestedScopes, final Role role) {
        if (role == null) {
            throw new InvalidScopeException();
        }
        return validateScope(requestedScopes, role.getScopes());
    }

    /**
     * Revalidates a list of provided scopes against the originally granted
     * scopes, as well as the current list of valid scopes. If the list of
     * valid scopes has changed since the original token list, any missing
     * scopes will be quietly dropped.
     *
     * @param requestedScopes An array of requested scopes.
     * @param originalScopes  The original set of scopes.
     * @param validScopes     The current list of valid scopes.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap revalidateScope(
            final String[] requestedScopes,
            final SortedMap originalScopes,
            final SortedMap validScopes) {

        if (validScopes == null || originalScopes == null) {
            throw new InvalidScopeException();
        }

        if (requestedScopes == null || requestedScopes.length == 0) {
            return new TreeMap<>();
        }

        // Reduce the valid scope list down by the original scopes.
        SortedMap results = new TreeMap<>();
        for (String scope : requestedScopes) {
            if (!originalScopes.containsKey(scope)) {
                throw new InvalidScopeException();
            } else if (validScopes.containsKey(scope)) {
                results.put(scope, validScopes.get(scope));
            }
        }

        return results;
    }

    /**
     * Revalidates a list of provided scopes against the originally granted
     * scopes, as well as the current list of valid scopes. If the list of
     * valid scopes has changed since the original token list, any missing
     * scopes will be quietly dropped.
     *
     * @param requestedScopes An array of requested scopes.
     * @param originalScopes  The original set of scopes.
     * @param validScopes     The current list of valid scopes.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap revalidateScope(
            final String requestedScopes,
            final SortedMap originalScopes,
            final SortedMap validScopes) {
        if (StringUtils.isEmpty(requestedScopes)) {
            return new TreeMap<>();
        }
        return revalidateScope(requestedScopes.split(" "),
                originalScopes,
                validScopes);
    }

    /**
     * Revalidate a list of scopes against an originally granted list, as
     * well as the current list of valid scopes from a user's role.
     *
     * @param requestedScopes A space-separated list of scopes.
     * @param originalScopes  The original set of scopes.
     * @param role            The user's role to check for a scope list.
     * @return A list of the requested scopes, as database instances.
     */
    public static SortedMap revalidateScope(
            final String requestedScopes,
            final SortedMap originalScopes,
            final Role role) {
        if (role == null) {
            throw new InvalidScopeException();
        }

        // Convert the role scope list into a sorted map.
        return revalidateScope(requestedScopes, originalScopes,
                role.getScopes());
    }

    /**
     * Ensure that an authenticator, requested by name, is valid within a
     * specific list of authenticators. If no string is provided, and yet the
     * list of authenticators only contains one, this will default to that
     * authenticator.
     *
     * @param type           The requested authenticator type.
     * @param authenticators The list of authenticators to test against.
     * @return The valid authenticator.
     */
    public static Authenticator validateAuthenticator(
            final AuthenticatorType type,
            final List authenticators) {
        // Quick exit
        if (authenticators.size() == 0) {
            throw new InvalidRequestException();
        }

        // Can we default?
        if (type == null) {
            if (authenticators.size() == 1) {
                return authenticators.get(0);
            } else {
                throw new InvalidRequestException();
            }
        }

        // Iterate through the set, comparing as we go.
        for (Authenticator test : authenticators) {
            if (test.getType().equals(type)) {
                return test;
            }
        }
        throw new InvalidRequestException();
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy