package org.apereo.cas.support.oauth.validator;
import org.apache.commons.lang3.StringUtils;
import org.apereo.cas.authentication.principal.ServiceFactory;
import org.apereo.cas.authentication.principal.WebApplicationService;
import org.apereo.cas.services.RegisteredService;
import org.apereo.cas.services.RegisteredServiceAccessStrategyUtils;
import org.apereo.cas.services.UnauthorizedServiceException;
import org.apereo.cas.support.oauth.OAuth20Constants;
import org.apereo.cas.support.oauth.services.OAuthRegisteredService;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.servlet.http.HttpServletRequest;
/**
* Validate OAuth inputs.
*
* @author Jerome Leleu
* @since 5.0.0
*/
public class OAuth20Validator {
private static final Logger LOGGER = LoggerFactory.getLogger(OAuth20Validator.class);
private ServiceFactory<WebApplicationService> webApplicationServiceServiceFactory;
public OAuth20Validator(final ServiceFactory<WebApplicationService> webApplicationServiceServiceFactory) {
this.webApplicationServiceServiceFactory = webApplicationServiceServiceFactory;
}
/**
* Check if a parameter exists.
*
* @param request the HTTP request
* @param name the parameter name
* @return whether the parameter exists
*/
public boolean checkParameterExist(final HttpServletRequest request, final String name) {
final String parameter = request.getParameter(name);
LOGGER.debug("[{}]: [{}]", name, parameter);
if (StringUtils.isBlank(parameter)) {
LOGGER.error("Missing: [{}]", name);
return false;
}
return true;
}
/**
* Check if the service is valid.
*
* @param registeredService the registered service
* @return whether the service is valid
*/
public boolean checkServiceValid(final RegisteredService registeredService) {
if (registeredService == null) {
return false;
}
final WebApplicationService service = webApplicationServiceServiceFactory.createService(registeredService.getServiceId());
LOGGER.debug("Check registered service: [{}]", registeredService);
try {
RegisteredServiceAccessStrategyUtils.ensureServiceAccessIsAllowed(service, registeredService);
return true;
} catch (final UnauthorizedServiceException e) {
return false;
}
}
/**
* Check if the callback url is valid.
*
* @param registeredService the registered service
* @param redirectUri the callback url
* @return whether the callback url is valid
*/
public boolean checkCallbackValid(final RegisteredService registeredService, final String redirectUri) {
final String registeredServiceId = registeredService.getServiceId();
LOGGER.debug("Found: [{}] vs redirectUri: [{}]", registeredService, redirectUri);
if (!redirectUri.matches(registeredServiceId)) {
LOGGER.error("Unsupported [{}]: [{}] does not match what is defined for registered service: [{}]. "
+ "Service is considered unauthorized. Verify the service definition in the registry is correct "
+ "and does in fact match the client [{}]",
OAuth20Constants.REDIRECT_URI, redirectUri, registeredServiceId, redirectUri);
return false;
}
return true;
}
/**
* Check the client secret.
*
* @param registeredService the registered service
* @param clientSecret the client secret
* @return whether the secret is valid
*/
public boolean checkClientSecret(final OAuthRegisteredService registeredService, final String clientSecret) {
LOGGER.debug("Found: [{}] in secret check", registeredService);
if (!StringUtils.equals(registeredService.getClientSecret(), clientSecret)) {
LOGGER.error("Wrong client secret for service: [{}]", registeredService);
return false;
}
return true;
}
}