com.devicehive.model.oauth.GoogleAuthProvider.java Source code

Java tutorial

Introduction

Here is the source code for com.devicehive.model.oauth.GoogleAuthProvider.java

Source

package com.devicehive.model.oauth;

/*
 * #%L
 * DeviceHive Java Server Common business logic
 * %%
 * Copyright (C) 2016 DataArt
 * %%
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * #L%
 */

import com.devicehive.configuration.Constants;
import com.devicehive.configuration.Messages;
import com.devicehive.exceptions.HiveException;
import com.devicehive.model.enums.UserStatus;
import com.devicehive.service.IdentityProviderService;
import com.devicehive.service.OAuthTokenService;
import com.devicehive.service.UserService;
import com.devicehive.service.configuration.ConfigurationService;
import com.devicehive.vo.*;
import com.google.api.client.auth.oauth2.BearerToken;
import com.google.api.client.http.javanet.NetHttpTransport;
import com.google.gson.JsonElement;
import com.google.gson.JsonObject;
import com.google.gson.JsonParser;
import org.apache.commons.lang3.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.core.env.Environment;
import org.springframework.stereotype.Component;

import javax.annotation.PostConstruct;
import javax.validation.constraints.NotNull;
import javax.ws.rs.core.Response;
import java.util.HashMap;
import java.util.Map;

import static javax.ws.rs.core.Response.Status.UNAUTHORIZED;

/**
 * Created by tmatvienko on 1/9/15.
 */
@Component
public class GoogleAuthProvider extends AuthProvider {
    private static final Logger logger = LoggerFactory.getLogger(GoogleAuthProvider.class);

    private static final String GOOGLE_PROVIDER_NAME = "Google";

    private IdentityProviderVO identityProvider;

    @Autowired
    private IdentityProviderService identityProviderService;
    @Autowired
    private Environment env;
    @Autowired
    private ConfigurationService configurationService;
    @Autowired
    private UserService userService;
    @Autowired
    private OAuthTokenService tokenService;
    @Autowired
    private IdentityProviderUtils identityProviderUtils;

    @PostConstruct
    private void initialize() {
        identityProvider = identityProviderService.find(Constants.GOOGLE_IDENTITY_PROVIDER_ID);
    }

    @Override
    public boolean isIdentityProviderAllowed() {
        return Boolean.valueOf(configurationService.get(Constants.GOOGLE_IDENTITY_ALLOWED));
    }

    @Override
    public JwtTokenVO createAccessKey(@NotNull final OauthJwtRequestVO request) {
        if (isIdentityProviderAllowed()) {
            final String accessToken = request.getAccessToken() == null
                    ? getAccessToken(request.getCode(), request.getRedirectUri())
                    : request.getAccessToken();
            final String userEmail = getIdentityProviderEmail(accessToken);
            final UserVO user = findUser(userEmail);
            return tokenService.authenticate(user);
        }
        logger.error(String.format(Messages.IDENTITY_PROVIDER_NOT_ALLOWED, GOOGLE_PROVIDER_NAME));
        throw new HiveException(String.format(Messages.IDENTITY_PROVIDER_NOT_ALLOWED, GOOGLE_PROVIDER_NAME),
                Response.Status.UNAUTHORIZED.getStatusCode());
    }

    private String getAccessToken(final String code, final String redirectUrl) {
        if (StringUtils.isBlank(code) || StringUtils.isBlank(redirectUrl)) {
            logger.error(Messages.INVALID_AUTH_REQUEST_PARAMETERS);
            throw new HiveException(Messages.INVALID_AUTH_REQUEST_PARAMETERS,
                    Response.Status.BAD_REQUEST.getStatusCode());
        }
        final String endpoint = identityProvider.getTokenEndpoint();
        Map<String, String> params = new HashMap<>();
        params.put("code", code);
        params.put("client_id", configurationService.get(Constants.GOOGLE_IDENTITY_CLIENT_ID));
        params.put("client_secret", configurationService.get(Constants.GOOGLE_IDENTITY_CLIENT_SECRET));
        params.put("redirect_uri", redirectUrl);
        params.put("grant_type", "authorization_code");
        final String response = identityProviderUtils.executePost(new NetHttpTransport(), params, endpoint,
                GOOGLE_PROVIDER_NAME);
        final JsonObject jsonObject = new JsonParser().parse(response).getAsJsonObject();
        try {
            return jsonObject.get("access_token").getAsString();
        } catch (IllegalStateException ex) {
            logger.error("Exception has been caught during Identity Provider GET request execution", response);
            throw new HiveException(
                    String.format(Messages.OAUTH_ACCESS_TOKEN_VERIFICATION_FAILED, GOOGLE_PROVIDER_NAME, response),
                    Response.Status.UNAUTHORIZED.getStatusCode());
        }
    }

    private String getIdentityProviderEmail(final String accessToken) {
        final JsonElement verificationResponse = getVerificationResponse(accessToken);
        final JsonElement verificationElement = verificationResponse.getAsJsonObject().get("issued_to");
        final boolean isValid = verificationElement != null && verificationElement.getAsString()
                .startsWith(configurationService.get(Constants.GOOGLE_IDENTITY_CLIENT_ID));
        if (!isValid) {
            logger.error("OAuth token verification for Google identity provider failed. Provider response: {}",
                    verificationResponse);
            throw new HiveException(
                    String.format(Messages.OAUTH_ACCESS_TOKEN_VERIFICATION_FAILED, GOOGLE_PROVIDER_NAME),
                    Response.Status.UNAUTHORIZED.getStatusCode());
        }
        return verificationResponse.getAsJsonObject().get("email").getAsString();
    }

    private UserVO findUser(final String email) {
        final UserVO user = userService.findGoogleUser(email);
        if (user == null) {
            logger.error("No user with email {} found for identity provider {}", email, GOOGLE_PROVIDER_NAME);
            throw new HiveException(Messages.USER_NOT_FOUND, Response.Status.UNAUTHORIZED.getStatusCode());
        } else if (user.getStatus() != UserStatus.ACTIVE) {
            logger.error("User {} is locked, disabled or deleted", email);
            throw new HiveException(Messages.USER_NOT_ACTIVE, UNAUTHORIZED.getStatusCode());
        }
        return user;
    }

    private JsonElement getVerificationResponse(final String accessToken) {
        return identityProviderUtils.executeGet(new NetHttpTransport(), BearerToken.queryParameterAccessMethod(),
                accessToken, identityProvider.getVerificationEndpoint(), GOOGLE_PROVIDER_NAME);
    }
}