service.impl/src/main/java/com/hack23/cia/service/impl/action/application/LoginService.java

Summary

Maintainability
B
4 hrs
Test Coverage
/*
 * Copyright 2010-2021 James Pether Sörling
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *   http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 *
 *    $Id$
 *  $HeadURL$
*/
package com.hack23.cia.service.impl.action.application;

import java.util.ArrayList;
import java.util.Collection;

import org.apache.commons.lang3.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.security.access.annotation.Secured;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Propagation;
import org.springframework.transaction.annotation.Transactional;

import com.hack23.cia.model.internal.application.system.impl.ApplicationEventGroup;
import com.hack23.cia.model.internal.application.system.impl.ApplicationOperationType;
import com.hack23.cia.model.internal.application.user.impl.UserAccount;
import com.hack23.cia.model.internal.application.user.impl.UserAccount_;
import com.hack23.cia.model.internal.application.user.impl.UserLockStatus;
import com.hack23.cia.model.internal.application.user.impl.UserRole;
import com.hack23.cia.service.api.action.application.CreateApplicationEventRequest;
import com.hack23.cia.service.api.action.application.LoginRequest;
import com.hack23.cia.service.api.action.application.LoginResponse;
import com.hack23.cia.service.api.action.common.ServiceResponse.ServiceResult;
import com.hack23.cia.service.impl.action.application.access.LoginBlockedAccess;
import com.hack23.cia.service.impl.action.application.access.LoginBlockedAccess.LoginBlockResult;
import com.hack23.cia.service.impl.action.application.encryption.VaultManager;
import com.hack23.cia.service.impl.action.common.AbstractBusinessServiceImpl;
import com.warrenstrange.googleauth.GoogleAuthenticator;

/**
 * The Class LoginService.
 */
@Service
@Transactional(propagation = Propagation.REQUIRED)
public final class LoginService extends AbstractBusinessServiceImpl<LoginRequest, LoginResponse> {

    private static final String SECURITY_PREFIX = "Security:";

    /** The Constant LOGGER. */
    private static final Logger LOGGER = LoggerFactory.getLogger(LoginService.class);

    @Autowired
    private LoginBlockedAccess loginBlockedAccess;

    /** The password encoder. */
    private final PasswordEncoder passwordEncoder = new BCryptPasswordEncoder();

    @Autowired
    private VaultManager vaultManager;

    /**
     * Instantiates a new login service.
     */
    public LoginService() {
        super(LoginRequest.class);
    }

    @Override
    @Secured({ "ROLE_ANONYMOUS", "ROLE_USER", "ROLE_ADMIN" })
    public LoginResponse processService(final LoginRequest serviceRequest) {
        final LoginResponse inputValidation = inputValidation(serviceRequest);
        if (inputValidation != null) {
            return inputValidation;
        }

        final CreateApplicationEventRequest eventRequest = createApplicationEventForService(serviceRequest);

        final UserAccount userExist = getUserDAO().findFirstByProperty(UserAccount_.email, serviceRequest.getEmail());

        final LoginBlockResult loginBlockResult = loginBlockedAccess.isBlocked(serviceRequest.getSessionId(), serviceRequest.getEmail());


        LoginResponse response;
        if (!loginBlockResult.isBlocked() && userExist != null && userExist.getUserLockStatus() == UserLockStatus.UNLOCKED && passwordEncoder.matches(
                userExist.getUserId() + ".uuid" + serviceRequest.getUserpassword(), userExist.getUserpassword())) {

            final String authKey= vaultManager.getEncryptedValue(serviceRequest.getUserpassword(), userExist);

            if (verifyOtp(serviceRequest, authKey)) {
                final Collection<SimpleGrantedAuthority> authorities = new ArrayList<>();

                if (UserRole.ADMIN == userExist.getUserRole()) {
                    authorities.add(new SimpleGrantedAuthority("ROLE_ADMIN"));
                } else {
                    authorities.add(new SimpleGrantedAuthority("ROLE_USER"));
                }

                eventRequest.setUserId(userExist.getUserId());

                SecurityContextHolder.getContext().setAuthentication(
                        new UsernamePasswordAuthenticationToken(userExist.getUserId(), "n/a", authorities));

                userExist.setNumberOfVisits(userExist.getNumberOfVisits() + 1);
                getUserDAO().persist(userExist);
                response = new LoginResponse(ServiceResult.SUCCESS);
            } else {
                response = new LoginResponse(ServiceResult.FAILURE);
                response.setErrorMessage(LoginResponse.ErrorMessage.USERNAME_OR_PASSWORD_DO_NOT_MATCH.toString());
                eventRequest.setErrorMessage(SECURITY_PREFIX + "Failed MFA" + LoginResponse.ErrorMessage.USERNAME_OR_PASSWORD_DO_NOT_MATCH.toString());
            }

        } else {
            response = new LoginResponse(ServiceResult.FAILURE);
            response.setErrorMessage(LoginResponse.ErrorMessage.USERNAME_OR_PASSWORD_DO_NOT_MATCH.toString());
            if (loginBlockResult.isBlocked()) {
                eventRequest.setErrorMessage(SECURITY_PREFIX+ loginBlockResult.getMessages().toString());
            }else {
                eventRequest.setErrorMessage(SECURITY_PREFIX+ LoginResponse.ErrorMessage.USERNAME_OR_PASSWORD_DO_NOT_MATCH.toString());
            }
        }
        eventRequest.setApplicationMessage(response.getResult().toString());

        createApplicationEventService.processService(eventRequest);
        LOGGER.info("Event: {}", eventRequest);

        return response;
    }


    private static boolean verifyOtp(final LoginRequest serviceRequest, final String authKey) {
        boolean authorizedOtp = true;

        if (authKey != null) {
            final GoogleAuthenticator gAuth = new GoogleAuthenticator();

            if (!StringUtils.isBlank(serviceRequest.getOtpCode())
                    && StringUtils.isNumeric(serviceRequest.getOtpCode())) {
                authorizedOtp = gAuth.authorize(authKey,
                        Integer.parseInt(serviceRequest.getOtpCode()));
            } else {
                authorizedOtp = false;
            }
        }
        return authorizedOtp;
    }

    @Override
    protected CreateApplicationEventRequest createApplicationEventForService(final LoginRequest serviceRequest) {
        final CreateApplicationEventRequest eventRequest = createBaseApplicationEventRequest();
        eventRequest.setEventGroup(ApplicationEventGroup.USER);
        eventRequest.setApplicationOperation(ApplicationOperationType.AUTHENTICATION);
        eventRequest.setActionName(LoginRequest.class.getSimpleName());
        eventRequest.setSessionId(serviceRequest.getSessionId());
        eventRequest.setElementId(serviceRequest.getEmail());
        return eventRequest;
    }

    @Override
    protected LoginResponse createErrorResponse() {
        return new LoginResponse(ServiceResult.FAILURE);
    }

}