Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

PermissionTemplateService.java 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2020 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.permission;
  21. import java.text.MessageFormat;
  22. import java.util.ArrayList;
  23. import java.util.Collection;
  24. import java.util.Iterator;
  25. import java.util.List;
  26. import java.util.Map;
  27. import java.util.Set;
  28. import java.util.stream.Collectors;
  29. import javax.annotation.CheckForNull;
  30. import javax.annotation.Nullable;
  31. import org.apache.commons.lang.StringUtils;
  32. import org.sonar.api.resources.Qualifiers;
  33. import org.sonar.api.server.ServerSide;
  34. import org.sonar.core.util.UuidFactory;
  35. import org.sonar.db.DbClient;
  36. import org.sonar.db.DbSession;
  37. import org.sonar.db.component.ComponentDto;
  38. import org.sonar.db.organization.DefaultTemplates;
  39. import org.sonar.db.permission.GroupPermissionDto;
  40. import org.sonar.db.permission.UserPermissionDto;
  41. import org.sonar.db.permission.template.PermissionTemplateCharacteristicDto;
  42. import org.sonar.db.permission.template.PermissionTemplateDto;
  43. import org.sonar.db.permission.template.PermissionTemplateGroupDto;
  44. import org.sonar.db.permission.template.PermissionTemplateUserDto;
  45. import org.sonar.db.user.UserDto;
  46. import org.sonar.server.es.ProjectIndexer;
  47. import org.sonar.server.es.ProjectIndexers;
  48. import org.sonar.server.organization.DefaultOrganizationProvider;
  49. import org.sonar.server.permission.DefaultTemplatesResolver.ResolvedDefaultTemplates;
  50. import org.sonar.server.user.UserSession;
  51. import static com.google.common.base.Preconditions.checkArgument;
  52. import static java.lang.String.format;
  53. import static java.util.Collections.singletonList;
  54. import static org.sonar.api.security.DefaultGroups.isAnyone;
  55. import static org.sonar.api.web.UserRole.PUBLIC_PERMISSIONS;
  56. import static org.sonar.db.permission.OrganizationPermission.SCAN;
  57. @ServerSide
  58. public class PermissionTemplateService {
  59. private final DbClient dbClient;
  60. private final ProjectIndexers projectIndexers;
  61. private final UserSession userSession;
  62. private final DefaultTemplatesResolver defaultTemplatesResolver;
  63. private final UuidFactory uuidFactory;
  64. private final DefaultOrganizationProvider defaultOrganizationProvider;
  65. public PermissionTemplateService(DbClient dbClient, ProjectIndexers projectIndexers, UserSession userSession,
  66. DefaultTemplatesResolver defaultTemplatesResolver, UuidFactory uuidFactory, DefaultOrganizationProvider defaultOrganizationProvider) {
  67. this.dbClient = dbClient;
  68. this.projectIndexers = projectIndexers;
  69. this.userSession = userSession;
  70. this.defaultTemplatesResolver = defaultTemplatesResolver;
  71. this.uuidFactory = uuidFactory;
  72. this.defaultOrganizationProvider = defaultOrganizationProvider;
  73. }
  74. public boolean wouldUserHaveScanPermissionWithDefaultTemplate(DbSession dbSession, @Nullable String userUuid, String projectKey) {
  75. if (userSession.hasPermission(SCAN)) {
  76. return true;
  77. }
  78. ComponentDto dto = new ComponentDto().setDbKey(projectKey).setQualifier(Qualifiers.PROJECT);
  79. PermissionTemplateDto template = findTemplate(dbSession, dto);
  80. if (template == null) {
  81. return false;
  82. }
  83. List<String> potentialPermissions = dbClient.permissionTemplateDao().selectPotentialPermissionsByUserUuidAndTemplateUuid(dbSession, userUuid, template.getUuid());
  84. return potentialPermissions.contains(SCAN.getKey());
  85. }
  86. /**
  87. * Apply a permission template to a set of projects. Authorization to administrate these projects
  88. * is not verified. The projects must exist, so the "project creator" permissions defined in the
  89. * template are ignored.
  90. */
  91. public void applyAndCommit(DbSession dbSession, PermissionTemplateDto template, Collection<ComponentDto> projects) {
  92. if (projects.isEmpty()) {
  93. return;
  94. }
  95. for (ComponentDto project : projects) {
  96. copyPermissions(dbSession, template, project, null);
  97. }
  98. projectIndexers.commitAndIndexComponents(dbSession, projects, ProjectIndexer.Cause.PERMISSION_CHANGE);
  99. }
  100. /**
  101. * Apply the default permission template to project. The project can already exist (so it has permissions) or
  102. * can be provisioned (so has no permissions yet).
  103. * @param projectCreatorUserId id of the user who creates the project, only if project is provisioned. He will
  104. */
  105. public void applyDefault(DbSession dbSession, ComponentDto component, @Nullable String projectCreatorUserId) {
  106. PermissionTemplateDto template = findTemplate(dbSession, component);
  107. checkArgument(template != null, "Cannot retrieve default permission template");
  108. copyPermissions(dbSession, template, component, projectCreatorUserId);
  109. }
  110. public boolean hasDefaultTemplateWithPermissionOnProjectCreator(DbSession dbSession, ComponentDto component) {
  111. PermissionTemplateDto template = findTemplate(dbSession, component);
  112. return hasProjectCreatorPermission(dbSession, template);
  113. }
  114. private boolean hasProjectCreatorPermission(DbSession dbSession, @Nullable PermissionTemplateDto template) {
  115. return template != null && dbClient.permissionTemplateCharacteristicDao().selectByTemplateUuids(dbSession, singletonList(template.getUuid())).stream()
  116. .anyMatch(PermissionTemplateCharacteristicDto::getWithProjectCreator);
  117. }
  118. private void copyPermissions(DbSession dbSession, PermissionTemplateDto template, ComponentDto project, @Nullable String projectCreatorUserUuid) {
  119. dbClient.groupPermissionDao().deleteByRootComponentUuid(dbSession, project.uuid());
  120. dbClient.userPermissionDao().deleteProjectPermissions(dbSession, project.uuid());
  121. List<PermissionTemplateUserDto> usersPermissions = dbClient.permissionTemplateDao().selectUserPermissionsByTemplateId(dbSession, template.getUuid());
  122. Map<String, String> userDtoMap = dbClient.userDao().selectByUuids(dbSession, usersPermissions.stream().map(PermissionTemplateUserDto::getUserUuid).collect(Collectors.toSet()))
  123. .stream().collect(Collectors.toMap(UserDto::getUuid, UserDto::getUuid));
  124. usersPermissions
  125. .stream()
  126. .filter(up -> permissionValidForProject(project, up.getPermission()))
  127. .forEach(up -> {
  128. UserPermissionDto dto = new UserPermissionDto(uuidFactory.create(), up.getPermission(), userDtoMap.get(up.getUserUuid()), project.uuid());
  129. dbClient.userPermissionDao().insert(dbSession, dto);
  130. });
  131. List<PermissionTemplateGroupDto> groupsPermissions = dbClient.permissionTemplateDao().selectGroupPermissionsByTemplateUuid(dbSession, template.getUuid());
  132. groupsPermissions
  133. .stream()
  134. .filter(gp -> groupNameValidForProject(project, gp.getGroupName()))
  135. .filter(gp -> permissionValidForProject(project, gp.getPermission()))
  136. .forEach(gp -> {
  137. GroupPermissionDto dto = new GroupPermissionDto()
  138. .setUuid(uuidFactory.create())
  139. .setGroupUuid(isAnyone(gp.getGroupName()) ? null : gp.getGroupUuid())
  140. .setRole(gp.getPermission())
  141. .setComponentUuid(project.uuid());
  142. dbClient.groupPermissionDao().insert(dbSession, dto);
  143. });
  144. List<PermissionTemplateCharacteristicDto> characteristics = dbClient.permissionTemplateCharacteristicDao().selectByTemplateUuids(dbSession, singletonList(template.getUuid()));
  145. if (projectCreatorUserUuid != null) {
  146. Set<String> permissionsForCurrentUserAlreadyInDb = usersPermissions.stream()
  147. .filter(userPermission -> projectCreatorUserUuid.equals(userPermission.getUserUuid()))
  148. .map(PermissionTemplateUserDto::getPermission)
  149. .collect(java.util.stream.Collectors.toSet());
  150. UserDto userDto = dbClient.userDao().selectByUuid(dbSession, projectCreatorUserUuid);
  151. characteristics.stream()
  152. .filter(PermissionTemplateCharacteristicDto::getWithProjectCreator)
  153. .filter(up -> permissionValidForProject(project, up.getPermission()))
  154. .filter(characteristic -> !permissionsForCurrentUserAlreadyInDb.contains(characteristic.getPermission()))
  155. .forEach(c -> {
  156. UserPermissionDto dto = new UserPermissionDto(uuidFactory.create(), c.getPermission(), userDto.getUuid(), project.uuid());
  157. dbClient.userPermissionDao().insert(dbSession, dto);
  158. });
  159. }
  160. }
  161. private static boolean permissionValidForProject(ComponentDto project, String permission) {
  162. return project.isPrivate() || !PUBLIC_PERMISSIONS.contains(permission);
  163. }
  164. private static boolean groupNameValidForProject(ComponentDto project, String groupName) {
  165. return !project.isPrivate() || !isAnyone(groupName);
  166. }
  167. /**
  168. * Return the permission template for the given component. If no template key pattern match then consider default
  169. * template for the component qualifier.
  170. */
  171. @CheckForNull
  172. private PermissionTemplateDto findTemplate(DbSession dbSession, ComponentDto component) {
  173. String organizationUuid = defaultOrganizationProvider.get().getUuid();
  174. List<PermissionTemplateDto> allPermissionTemplates = dbClient.permissionTemplateDao().selectAll(dbSession, null);
  175. List<PermissionTemplateDto> matchingTemplates = new ArrayList<>();
  176. for (PermissionTemplateDto permissionTemplateDto : allPermissionTemplates) {
  177. String keyPattern = permissionTemplateDto.getKeyPattern();
  178. if (StringUtils.isNotBlank(keyPattern) && component.getDbKey().matches(keyPattern)) {
  179. matchingTemplates.add(permissionTemplateDto);
  180. }
  181. }
  182. checkAtMostOneMatchForComponentKey(component.getDbKey(), matchingTemplates);
  183. if (matchingTemplates.size() == 1) {
  184. return matchingTemplates.get(0);
  185. }
  186. DefaultTemplates defaultTemplates = dbClient.organizationDao().getDefaultTemplates(dbSession, organizationUuid)
  187. .orElseThrow(() -> new IllegalStateException(
  188. format("No Default templates defined for organization with uuid '%s'", organizationUuid)));
  189. String qualifier = component.qualifier();
  190. ResolvedDefaultTemplates resolvedDefaultTemplates = defaultTemplatesResolver.resolve(defaultTemplates);
  191. switch (qualifier) {
  192. case Qualifiers.PROJECT:
  193. return dbClient.permissionTemplateDao().selectByUuid(dbSession, resolvedDefaultTemplates.getProject());
  194. case Qualifiers.VIEW:
  195. String portDefaultTemplateUuid = resolvedDefaultTemplates.getPortfolio().orElseThrow(
  196. () -> new IllegalStateException("Attempt to create a view when Governance plugin is not installed"));
  197. return dbClient.permissionTemplateDao().selectByUuid(dbSession, portDefaultTemplateUuid);
  198. case Qualifiers.APP:
  199. String appDefaultTemplateUuid = resolvedDefaultTemplates.getApplication().orElseThrow(
  200. () -> new IllegalStateException("Attempt to create a view when Governance plugin is not installed"));
  201. return dbClient.permissionTemplateDao().selectByUuid(dbSession, appDefaultTemplateUuid);
  202. default:
  203. throw new IllegalArgumentException(format("Qualifier '%s' is not supported", qualifier));
  204. }
  205. }
  206. private static void checkAtMostOneMatchForComponentKey(String componentKey, List<PermissionTemplateDto> matchingTemplates) {
  207. if (matchingTemplates.size() > 1) {
  208. StringBuilder templatesNames = new StringBuilder();
  209. for (Iterator<PermissionTemplateDto> it = matchingTemplates.iterator(); it.hasNext();) {
  210. templatesNames.append("\"").append(it.next().getName()).append("\"");
  211. if (it.hasNext()) {
  212. templatesNames.append(", ");
  213. }
  214. }
  215. throw new IllegalStateException(MessageFormat.format(
  216. "The \"{0}\" key matches multiple permission templates: {1}."
  217. + " A system administrator must update these templates so that only one of them matches the key.",
  218. componentKey,
  219. templatesNames.toString()));
  220. }
  221. }
  222. }