File size: 18,490 Bytes
688925d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
package com.dalab.autocompliance.service.impl;

import java.time.LocalDateTime;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
import java.util.UUID;
import java.util.stream.Collectors;

import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;

import com.dalab.autocompliance.dto.AssetComplianceStatusDTO;
import com.dalab.autocompliance.dto.ComplianceControlDTO;
import com.dalab.autocompliance.dto.ComplianceReportDTO;
import com.dalab.autocompliance.dto.ComplianceReportDefinitionDTO;
import com.dalab.autocompliance.dto.ControlEvaluationRequestDTO;
import com.dalab.autocompliance.dto.ControlEvaluationResponseDTO;
import com.dalab.autocompliance.dto.ReportGenerationRequestDTO;
import com.dalab.autocompliance.dto.ReportGenerationResponseDTO;
import com.dalab.autocompliance.dto.ReportJobStatusDTO;
import com.dalab.autocompliance.model.entity.ComplianceControlEntity;
import com.dalab.autocompliance.model.entity.ComplianceGeneratedReportEntity;
import com.dalab.autocompliance.model.entity.ComplianceReportDefinitionEntity;
import com.dalab.autocompliance.model.entity.ComplianceReportJobEntity;
import com.dalab.autocompliance.model.entity.ControlEvaluationJobEntity;
import com.dalab.autocompliance.model.mapper.ComplianceControlMapper;
import com.dalab.autocompliance.model.mapper.ComplianceGeneratedReportMapper;
import com.dalab.autocompliance.model.mapper.ComplianceReportDefinitionMapper;
import com.dalab.autocompliance.model.mapper.ComplianceReportJobMapper;
import com.dalab.autocompliance.model.mapper.ControlEvaluationJobMapper;
import com.dalab.autocompliance.model.repository.ComplianceControlRepository;
import com.dalab.autocompliance.model.repository.ComplianceGeneratedReportRepository;
import com.dalab.autocompliance.model.repository.ComplianceReportDefinitionRepository;
import com.dalab.autocompliance.model.repository.ComplianceReportJobRepository;
import com.dalab.autocompliance.model.repository.ControlEvaluationJobRepository;
import com.dalab.autocompliance.service.IComplianceService;
import com.dalab.autocompliance.service.exception.ControlNotFoundException;
import com.dalab.autocompliance.service.exception.GeneratedReportNotFoundException;
import com.dalab.autocompliance.service.exception.ReportDefinitionNotFoundException;
import com.dalab.autocompliance.service.exception.ReportJobNotFoundException;

import jakarta.annotation.PostConstruct;
import lombok.RequiredArgsConstructor;
import lombok.extern.slf4j.Slf4j;

@Service("complianceService")
@RequiredArgsConstructor
@Slf4j
public class ComplianceServiceImpl implements IComplianceService {

    private final ComplianceReportDefinitionRepository reportDefinitionRepository;
    private final ComplianceReportJobRepository reportJobRepository;
    private final ComplianceGeneratedReportRepository generatedReportRepository;
    private final ComplianceControlRepository controlRepository;
    private final ControlEvaluationJobRepository controlEvaluationJobRepository;

    private final ComplianceReportDefinitionMapper reportDefinitionMapper;
    private final ComplianceReportJobMapper reportJobMapper;
    private final ComplianceGeneratedReportMapper generatedReportMapper;
    private final ComplianceControlMapper controlMapper;
    private final ControlEvaluationJobMapper controlEvaluationJobMapper;

    @PostConstruct
    @Transactional
    public void initDefaultData() {
        initDefaultReportDefinitions();
        initDefaultControls();
    }

    public void initDefaultReportDefinitions() {
        if (reportDefinitionRepository.count() == 0) {
            log.info("Initializing default compliance report definitions...");
            List<ComplianceReportDefinitionEntity> defaultDefinitions = new ArrayList<>();
            defaultDefinitions.add(ComplianceReportDefinitionEntity.builder()
                .reportType("cis-gcp-foundations-v1.3")
                .displayName("CIS Google Cloud Platform Foundations Benchmark v1.3")
                .description("Checks for compliance against the CIS GCP Foundations Benchmark v1.3.")
                .version("1.3.0")
                .applicableComplianceFrameworks(List.of("CIS Benchmark"))
                .targetAssetTypes(List.of("GCP_PROJECT", "GCP_IAM_POLICY", "GCP_VPC_NETWORK"))
                .generationParametersDefinition(Map.of("gcpProjectId", "string", "targetRegions", "list_string"))
                .detailsLink("https://www.cisecurity.org/benchmark/google_cloud_computing_platform/")
                .build());

            defaultDefinitions.add(ComplianceReportDefinitionEntity.builder()
                .reportType("pci-dss-aws-v3.2.1")
                .displayName("PCI DSS v3.2.1 for AWS Infrastructure")
                .description("Assesses AWS resources against applicable PCI DSS v3.2.1 requirements.")
                .version("3.2.1")
                .applicableComplianceFrameworks(List.of("PCI DSS v3.2.1"))
                .targetAssetTypes(List.of("AWS_EC2_INSTANCE", "AWS_S3_BUCKET", "AWS_VPC"))
                .generationParametersDefinition(Map.of("awsAccountId", "string", "awsRegion", "string"))
                .detailsLink("https://aws.amazon.com/compliance/pci-dss/")
                .build());
            reportDefinitionRepository.saveAll(defaultDefinitions);
            log.info("{} default compliance report definitions initialized.", defaultDefinitions.size());
        }
    }

    public void initDefaultControls() {
        if (controlRepository.count() == 0) {
            log.info("Initializing default compliance controls...");
            List<ComplianceControlEntity> defaultControls = new ArrayList<>();
            defaultControls.add(ComplianceControlEntity.builder()
                .controlId("CIS-GCP-1.1")
                .name("Ensure that corporate login credentials are used instead of gmail.com accounts")
                .description("GCP supports using Google Workspace or Cloud Identity to manage user identities. It is recommended to use managed corporate accounts instead of personal gmail.com accounts for managing cloud resources.")
                .severity("MEDIUM")
                .applicableFrameworks(List.of("CIS GCP Foundations Benchmark v1.3"))
                .targetAssetTypes(List.of("GCP_IAM_POLICY"))
                .remediationSteps("Migrate any gmail.com accounts with IAM roles to managed corporate accounts.")
                .evaluationParametersDefinition(Map.of("gcpProjectId", "string"))
                .detailsLink("https://www.cisecurity.org/benchmark/google_cloud_computing_platform/") // Point to specific control if possible
                .enabled(true)
                .build());
            defaultControls.add(ComplianceControlEntity.builder()
                .controlId("PCI-REQ-8.2.3")
                .name("Use strong passwords (or passphrases)")
                .description("Ensure passwords/passphrases meet minimum complexity requirements as defined by PCI DSS requirement 8.2.3.")
                .severity("HIGH")
                .applicableFrameworks(List.of("PCI DSS v3.2.1"))
                .targetAssetTypes(List.of("AWS_IAM_USER", "Linux_Server")) // Example asset types
                .remediationSteps("Configure password policies to enforce complexity. For existing users, enforce password change at next login.")
                .evaluationParametersDefinition(Map.of("minPasswordLength", "integer", "requiresUppercase", "boolean")) // Example params
                .detailsLink("https://www.pcisecuritystandards.org/") // Point to specific control
                .enabled(true)
                .build());
            controlRepository.saveAll(defaultControls);
            log.info("{} default compliance controls initialized.", defaultControls.size());
        }
    }

    @Override
    @Transactional(readOnly = true)
    public List<ComplianceReportDefinitionDTO> listAvailableReportDefinitions() {
        log.debug("Fetching all available report definitions.");
        List<ComplianceReportDefinitionEntity> entities = reportDefinitionRepository.findAll();
        return reportDefinitionMapper.toDtoList(entities);
    }

    @Override
    @Transactional
    public ReportGenerationResponseDTO generateComplianceReport(String reportType, ReportGenerationRequestDTO request) {
        log.info("Request to generate report type: {} with parameters: {}", reportType, request.getParameters());

        ComplianceReportDefinitionEntity definitionEntity = reportDefinitionRepository.findByReportTypeIgnoreCase(reportType)
                .orElseThrow(() -> {
                    log.warn("Report type '{}' not found.", reportType);
                    return new ReportDefinitionNotFoundException("Report type " + reportType + " not found.");
                });

        // Validate parameters (basic check for key presence)
        if (request.getParameters() == null || 
            !request.getParameters().keySet().containsAll(definitionEntity.getGenerationParametersDefinition().keySet())) {
            String errorMsg = String.format("Missing required parameters for report type '%s'. Required: %s, Provided: %s",
                                   reportType, definitionEntity.getGenerationParametersDefinition().keySet(), 
                                   request.getParameters() != null ? request.getParameters().keySet() : "null");
            log.warn(errorMsg);
            // For immediate feedback, we can return a response, though throwing an exception is also an option.
            return ReportGenerationResponseDTO.builder()
                    .jobId(null).reportType(reportType).status("FAILED_VALIDATION")
                    .submittedAt(LocalDateTime.now()).message(errorMsg)
                    .build();
        }

        ComplianceReportJobEntity jobEntity = reportJobMapper.fromGenerationRequest(request, reportType);
        jobEntity.setJobId(UUID.randomUUID().toString());
        jobEntity.setStatus("QUEUED");
        jobEntity.setSubmittedAt(LocalDateTime.now());
        jobEntity.setReportType(definitionEntity.getReportType()); // Ensure canonical report type
        // triggeredBy and notificationEmail are mapped by mapper if present in request

        reportJobRepository.save(jobEntity);
        log.info("Report generation job {} for report type '{}' accepted and queued.", jobEntity.getJobId(), reportType);

        // TODO: Trigger actual asynchronous report generation (e.g., via @Async method or Kafka message)
        // This async process would later update the jobEntity status and link to a ComplianceGeneratedReportEntity.

        return ReportGenerationResponseDTO.builder()
                .jobId(jobEntity.getJobId()).reportType(reportType).status("ACCEPTED")
                .submittedAt(jobEntity.getSubmittedAt()).message("Report generation accepted and queued.")
                .build();
    }

    @Override
    @Transactional(readOnly = true)
    public ReportJobStatusDTO getReportGenerationJobStatus(String jobId) {
        log.debug("Fetching status for job ID: {}", jobId);
        ComplianceReportJobEntity jobEntity = reportJobRepository.findById(jobId)
                .orElseThrow(() -> {
                    log.warn("Job ID '{}' not found.", jobId);
                    return new ReportJobNotFoundException("Job ID " + jobId + " not found.");
                });
        return reportJobMapper.toDto(jobEntity);
    }

    @Override
    @Transactional(readOnly = true)
    public ComplianceReportDTO getGeneratedReport(String reportId) {
        log.debug("Fetching generated report for report ID: {}", reportId);
        ComplianceGeneratedReportEntity reportEntity = generatedReportRepository.findById(reportId)
                .orElseThrow(() -> {
                    log.warn("Report ID '{}' not found.", reportId);
                    return new GeneratedReportNotFoundException("Generated report with ID " + reportId + " not found.");
                });
        return generatedReportMapper.toDto(reportEntity);
    }

    @Override
    @Transactional(readOnly = true)
    public AssetComplianceStatusDTO getAssetComplianceStatus(String assetId) {
        log.debug("Fetching compliance status for asset ID: {}", assetId);
        
        // This is a simplified implementation. A more robust solution would involve:
        // 1. Querying `ComplianceGeneratedReportEntity` for reports containing this assetId (potentially using the native query or service-layer filtering).
        // 2. Aggregating findings from those reports.
        // 3. Determining overall status based on those findings.
        // For now, we mock it by looking for the dummy asset in any dummy report.

        List<ComplianceGeneratedReportEntity> reportsWithAsset = generatedReportRepository.findReportsContainingAssetId(assetId);

        if (reportsWithAsset.isEmpty()) {
            log.warn("Asset ID '{}' not found in any generated reports or no compliance data available.", assetId);
            return AssetComplianceStatusDTO.builder()
                    .assetId(assetId)
                    .overallComplianceStatus("UNKNOWN") // Or NOT_EVALUATED
                    .lastEvaluatedAt(LocalDateTime.now()) // Or null if never evaluated
                    .build();
        }

        List<AssetComplianceStatusDTO.ComplianceFindingSummaryDTO> assetFindingsSummaries = new ArrayList<>();
        List<String> relevantReportIds = new ArrayList<>();
        int compliantCount = 0;
        int nonCompliantCount = 0;
        String assetType = "UNKNOWN";
        String assetName = "UNKNOWN"; 
        LocalDateTime lastEvalTime = null;

        for (ComplianceGeneratedReportEntity reportEntity : reportsWithAsset) {
            relevantReportIds.add(reportEntity.getReportId());
            if (reportEntity.getFindingsData() != null) {
                for (com.dalab.autocompliance.model.entity.ReportFindingData findingData : reportEntity.getFindingsData()) {
                    if (assetId.equals(findingData.getAssetId())) {
                        // Update asset details from the first finding containing them (could be more sophisticated)
                        if ("UNKNOWN".equals(assetType) && findingData.getAssetType() != null) assetType = findingData.getAssetType();
                        if ("UNKNOWN".equals(assetName) && findingData.getAssetName() != null) assetName = findingData.getAssetName();
                        
                        if ("NON_COMPLIANT".equalsIgnoreCase(findingData.getStatus())) {
                            nonCompliantCount++;
                            assetFindingsSummaries.add(AssetComplianceStatusDTO.ComplianceFindingSummaryDTO.builder()
                                    .checkId(findingData.getCheckId())
                                    .description(findingData.getDescription())
                                    .severity(findingData.getSeverity())
                                    .reportId(reportEntity.getReportId())
                                    .findingTimestamp(reportEntity.getGenerationTimestamp()) 
                                    .build());
                        } else if ("COMPLIANT".equalsIgnoreCase(findingData.getStatus())) {
                            compliantCount++;
                        }
                        // Update last evaluation time for this asset based on reports
                        if (lastEvalTime == null || reportEntity.getGenerationTimestamp().isAfter(lastEvalTime)) {
                            lastEvalTime = reportEntity.getGenerationTimestamp();
                        }
                    }
                }
            }
        }

        String overallStatus = "UNKNOWN";
        if (compliantCount > 0 || nonCompliantCount > 0) {
            overallStatus = nonCompliantCount > 0 ? "NON_COMPLIANT" : "COMPLIANT";
        } else if (!reportsWithAsset.isEmpty()) {
             overallStatus = "NO_FINDINGS"; // Or EVALUATED_COMPLIANT if all checks were compliant
        }

        return AssetComplianceStatusDTO.builder()
                .assetId(assetId)
                .assetType(assetType)
                .assetName(assetName)
                .overallComplianceStatus(overallStatus)
                .lastEvaluatedAt(lastEvalTime != null ? lastEvalTime : LocalDateTime.now()) // Fallback, should ideally be from data
                .totalChecksApplied(compliantCount + nonCompliantCount) // This is simplified, total checks could be different
                .compliantChecks(compliantCount)
                .nonCompliantChecks(nonCompliantCount)
                .recentNonCompliantFindings(assetFindingsSummaries.stream().limit(5).collect(Collectors.toList()))
                .relevantReportIds(relevantReportIds)
                .build();
    }

    @Override
    @Transactional(readOnly = true)
    public List<ComplianceControlDTO> listAvailableControls() {
        log.debug("Fetching all available and enabled compliance controls.");
        List<ComplianceControlEntity> entities = controlRepository.findByEnabledTrue(); 
        return controlMapper.toDtoList(entities);
    }

    @Override
    @Transactional
    public ControlEvaluationResponseDTO evaluateControl(String controlId, ControlEvaluationRequestDTO request) {
        log.info("Request to evaluate control ID: {} with request: {}", controlId, request);

        ComplianceControlEntity controlEntity = controlRepository.findByControlIdIgnoreCase(controlId)
                .orElseThrow(() -> {
                    log.warn("Control ID '{}' not found.", controlId);
                    return new ControlNotFoundException("Control ID " + controlId + " not found.");
                });
        
        // Create and save the evaluation job
        ControlEvaluationJobEntity jobEntity = controlEvaluationJobMapper.fromRequestDto(request, controlId);
        jobEntity = controlEvaluationJobRepository.save(jobEntity);
        
        log.info("Created control evaluation job {} for control {}", jobEntity.getJobId(), controlId);
        
        // TODO: Implement actual control evaluation logic
        // This would typically involve:
        // 1. Fetching relevant assets based on request parameters
        // 2. Applying the control's evaluation logic
        // 3. Updating the job status and results
        
        return controlEvaluationJobMapper.toResponseDto(jobEntity);
    }
}