use of uk.ac.cam.cl.dtg.segue.auth.exceptions.DuplicateAccountException in project isaac-api by isaacphysics.
the class UsersFacade method createUserObjectAndLogIn.
/**
* Create a user object. This method allows new user objects to be created.
*
* @param request
* - so that we can identify the user
* @param response
* to tell the browser to store the session in our own segue cookie.
* @param userObjectFromClient
* - the new user object from the clients perspective.
* @param newPassword
* - the new password for the user.
* @param userPreferenceObject
* - the new preferences for this user
* @param rememberMe
* - Boolean to indicate whether or not this cookie expiry duration should be long or short
* @return the updated user object.
*/
private Response createUserObjectAndLogIn(final HttpServletRequest request, final HttpServletResponse response, final RegisteredUser userObjectFromClient, final String newPassword, final Map<String, Map<String, Boolean>> userPreferenceObject, final boolean rememberMe) throws InvalidKeySpecException, NoSuchAlgorithmException {
try {
RegisteredUserDTO savedUser = userManager.createUserObjectAndSession(request, response, userObjectFromClient, newPassword, rememberMe);
if (userPreferenceObject != null) {
List<UserPreference> userPreferences = userPreferenceObjectToList(userPreferenceObject, savedUser.getId());
userPreferenceManager.saveUserPreferences(userPreferences);
}
return Response.ok(savedUser).build();
} catch (InvalidPasswordException e) {
log.warn("Invalid password exception occurred during registration!");
return new SegueErrorResponse(Status.BAD_REQUEST, e.getMessage()).toResponse();
} catch (FailedToHashPasswordException e) {
log.error("Failed to hash password during user registration!");
return new SegueErrorResponse(Status.INTERNAL_SERVER_ERROR, "Unable to set a password.").toResponse();
} catch (MissingRequiredFieldException e) {
log.warn("Missing field during update operation. ", e);
return new SegueErrorResponse(Status.BAD_REQUEST, "You are missing a required field. " + "Please make sure you have specified all mandatory fields in your response.").toResponse();
} catch (DuplicateAccountException e) {
log.warn(String.format("Duplicate account registration attempt for (%s)", userObjectFromClient.getEmail()));
return new SegueErrorResponse(Status.BAD_REQUEST, e.getMessage()).toResponse();
} catch (SegueDatabaseException e) {
String errorMsg = "Unable to set a password, due to an internal database error.";
log.error(errorMsg, e);
return new SegueErrorResponse(Status.INTERNAL_SERVER_ERROR, errorMsg).toResponse();
} catch (EmailMustBeVerifiedException e) {
log.warn("Someone attempted to register with an Isaac email address: " + userObjectFromClient.getEmail());
return new SegueErrorResponse(Status.BAD_REQUEST, "You cannot register with an Isaac email address.").toResponse();
} catch (InvalidNameException e) {
log.warn("Invalid name provided during registration.");
return new SegueErrorResponse(Status.BAD_REQUEST, e.getMessage()).toResponse();
}
}
use of uk.ac.cam.cl.dtg.segue.auth.exceptions.DuplicateAccountException in project isaac-api by isaacphysics.
the class AuthenticationFacade method authenticationCallback.
/**
* This is the callback url that auth providers should use to send us information about users.
*
* @param request
* - http request from user
* @param response
* to tell the browser to store the session in our own segue cookie if successful.
* @param signinProvider
* - requested signing provider string
* @return Redirect response to send the user to the home page.
*/
@GET
@Produces(MediaType.APPLICATION_JSON)
@Path("/{provider}/callback")
@ApiOperation(value = "SSO callback URL for a given provider.")
public final Response authenticationCallback(@Context final HttpServletRequest request, @Context final HttpServletResponse response, @PathParam("provider") final String signinProvider) {
try {
// TODO - review if rememberMe should default to true for SSO logins:
RegisteredUserDTO userToReturn = userManager.authenticateCallback(request, response, signinProvider, true);
this.getLogManager().logEvent(userToReturn, request, SegueServerLogType.LOG_IN, Maps.newHashMap());
return Response.ok(userToReturn).build();
} catch (IOException e) {
SegueErrorResponse error = new SegueErrorResponse(Status.INTERNAL_SERVER_ERROR, "Exception while trying to authenticate a user" + " - during callback step.", e);
log.error(error.getErrorMessage(), e);
return error.toResponse();
} catch (NoUserException e) {
SegueErrorResponse error = new SegueErrorResponse(Status.UNAUTHORIZED, "Unable to locate user information.");
log.error("No userID exception received. Unable to locate user.", e);
return error.toResponse();
} catch (AuthenticationCodeException | CrossSiteRequestForgeryException | AuthenticatorSecurityException | CodeExchangeException e) {
SegueErrorResponse error = new SegueErrorResponse(Status.UNAUTHORIZED, e.getMessage());
log.info("Error detected during authentication: " + e.getClass().toString());
return error.toResponse();
} catch (DuplicateAccountException e) {
log.debug("Duplicate user already exists in the database.", e);
return new SegueErrorResponse(Status.FORBIDDEN, e.getMessage()).toResponse();
} catch (AccountAlreadyLinkedException e) {
log.error("Internal Database error during authentication", e);
return new SegueErrorResponse(Status.BAD_REQUEST, "The account you are trying to link is already attached to a user of this system.").toResponse();
} catch (SegueDatabaseException e) {
log.error("Internal Database error during authentication", e);
return new SegueErrorResponse(Status.INTERNAL_SERVER_ERROR, "Internal database error during authentication.").toResponse();
} catch (AuthenticationProviderMappingException e) {
return new SegueErrorResponse(Status.BAD_REQUEST, "Unable to map to a known authenticator. The provider: " + signinProvider + " is unknown").toResponse();
}
}
Aggregations