You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

PermissionTemplateService.java 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2024 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.common.permission;
  21. import java.text.MessageFormat;
  22. import java.util.ArrayList;
  23. import java.util.Collection;
  24. import java.util.Iterator;
  25. import java.util.List;
  26. import java.util.Map;
  27. import java.util.Set;
  28. import java.util.stream.Collectors;
  29. import javax.annotation.CheckForNull;
  30. import javax.annotation.Nullable;
  31. import org.apache.commons.lang3.StringUtils;
  32. import org.sonar.api.resources.Qualifiers;
  33. import org.sonar.api.server.ServerSide;
  34. import org.sonar.core.util.UuidFactory;
  35. import org.sonar.db.DbClient;
  36. import org.sonar.db.DbSession;
  37. import org.sonar.db.entity.EntityDto;
  38. import org.sonar.db.permission.GroupPermissionDto;
  39. import org.sonar.db.permission.UserPermissionDto;
  40. import org.sonar.db.permission.template.PermissionTemplateCharacteristicDto;
  41. import org.sonar.db.permission.template.PermissionTemplateDto;
  42. import org.sonar.db.permission.template.PermissionTemplateGroupDto;
  43. import org.sonar.db.permission.template.PermissionTemplateUserDto;
  44. import org.sonar.db.project.ProjectDto;
  45. import org.sonar.db.user.UserDto;
  46. import org.sonar.db.user.UserId;
  47. import org.sonar.server.es.Indexers;
  48. import org.sonar.server.exceptions.TemplateMatchingKeyException;
  49. import org.sonar.server.user.UserSession;
  50. import static com.google.common.base.Preconditions.checkArgument;
  51. import static java.lang.String.format;
  52. import static java.util.Collections.singletonList;
  53. import static org.sonar.api.security.DefaultGroups.isAnyone;
  54. import static org.sonar.api.web.UserRole.PUBLIC_PERMISSIONS;
  55. import static org.sonar.db.permission.GlobalPermission.SCAN;
  56. @ServerSide
  57. public class PermissionTemplateService {
  58. private final DbClient dbClient;
  59. private final Indexers indexers;
  60. private final UserSession userSession;
  61. private final DefaultTemplatesResolver defaultTemplatesResolver;
  62. private final UuidFactory uuidFactory;
  63. public PermissionTemplateService(DbClient dbClient, Indexers indexers, UserSession userSession,
  64. DefaultTemplatesResolver defaultTemplatesResolver, UuidFactory uuidFactory) {
  65. this.dbClient = dbClient;
  66. this.indexers = indexers;
  67. this.userSession = userSession;
  68. this.defaultTemplatesResolver = defaultTemplatesResolver;
  69. this.uuidFactory = uuidFactory;
  70. }
  71. public boolean wouldUserHaveScanPermissionWithDefaultTemplate(DbSession dbSession, @Nullable String userUuid, String projectKey) {
  72. if (userSession.hasPermission(SCAN)) {
  73. return true;
  74. }
  75. ProjectDto projectDto = new ProjectDto().setKey(projectKey).setQualifier(Qualifiers.PROJECT);
  76. PermissionTemplateDto template = findTemplate(dbSession, projectDto);
  77. if (template == null) {
  78. return false;
  79. }
  80. List<String> potentialPermissions = dbClient.permissionTemplateDao().selectPotentialPermissionsByUserUuidAndTemplateUuid(dbSession, userUuid, template.getUuid());
  81. return potentialPermissions.contains(SCAN.getKey());
  82. }
  83. /**
  84. * Apply a permission template to a set of projects. Authorization to administrate these projects
  85. * is not verified. The projects must exist, so the "project creator" permissions defined in the
  86. * template are ignored.
  87. */
  88. public void applyAndCommit(DbSession dbSession, PermissionTemplateDto template, Collection<EntityDto> entities) {
  89. if (entities.isEmpty()) {
  90. return;
  91. }
  92. for (EntityDto entity : entities) {
  93. dbClient.groupPermissionDao().deleteByEntityUuid(dbSession, entity);
  94. dbClient.userPermissionDao().deleteEntityPermissions(dbSession, entity);
  95. copyPermissions(dbSession, template, entity, null);
  96. }
  97. indexers.commitAndIndexEntities(dbSession, entities, Indexers.EntityEvent.PERMISSION_CHANGE);
  98. }
  99. /**
  100. * Apply the default permission template to a new project (has no permissions yet).
  101. *
  102. * @param projectCreatorUserId id of the user creating the project.
  103. */
  104. public void applyDefaultToNewComponent(DbSession dbSession, EntityDto entityDto, @Nullable String projectCreatorUserId) {
  105. PermissionTemplateDto template = findTemplate(dbSession, entityDto);
  106. checkArgument(template != null, "Cannot retrieve default permission template");
  107. copyPermissions(dbSession, template, entityDto, projectCreatorUserId);
  108. }
  109. public boolean hasDefaultTemplateWithPermissionOnProjectCreator(DbSession dbSession, ProjectDto projectDto) {
  110. PermissionTemplateDto template = findTemplate(dbSession, projectDto);
  111. return hasProjectCreatorPermission(dbSession, template);
  112. }
  113. private boolean hasProjectCreatorPermission(DbSession dbSession, @Nullable PermissionTemplateDto template) {
  114. return template != null && dbClient.permissionTemplateCharacteristicDao().selectByTemplateUuids(dbSession, singletonList(template.getUuid())).stream()
  115. .anyMatch(PermissionTemplateCharacteristicDto::getWithProjectCreator);
  116. }
  117. private void copyPermissions(DbSession dbSession, PermissionTemplateDto template, EntityDto entity, @Nullable String projectCreatorUserUuid) {
  118. List<PermissionTemplateUserDto> usersPermissions = dbClient.permissionTemplateDao().selectUserPermissionsByTemplateId(dbSession, template.getUuid());
  119. Set<String> permissionTemplateUserUuids = usersPermissions.stream().map(PermissionTemplateUserDto::getUserUuid).collect(Collectors.toSet());
  120. Map<String, UserId> userIdByUuid = dbClient.userDao().selectByUuids(dbSession, permissionTemplateUserUuids).stream().collect(Collectors.toMap(UserDto::getUuid, u -> u));
  121. usersPermissions
  122. .stream()
  123. .filter(up -> permissionValidForProject(entity.isPrivate(), up.getPermission()))
  124. .forEach(up -> {
  125. UserPermissionDto dto = new UserPermissionDto(uuidFactory.create(), up.getPermission(), up.getUserUuid(), entity.getUuid());
  126. dbClient.userPermissionDao().insert(dbSession, dto, entity, userIdByUuid.get(up.getUserUuid()), template);
  127. });
  128. List<PermissionTemplateGroupDto> groupsPermissions = dbClient.permissionTemplateDao().selectGroupPermissionsByTemplateUuid(dbSession, template.getUuid());
  129. groupsPermissions
  130. .stream()
  131. .filter(gp -> groupNameValidForProject(entity.isPrivate(), gp.getGroupName()))
  132. .filter(gp -> permissionValidForProject(entity.isPrivate(), gp.getPermission()))
  133. .forEach(gp -> {
  134. String groupUuid = isAnyone(gp.getGroupName()) ? null : gp.getGroupUuid();
  135. String groupName = groupUuid == null ? null : dbClient.groupDao().selectByUuid(dbSession, groupUuid).getName();
  136. GroupPermissionDto dto = new GroupPermissionDto()
  137. .setUuid(uuidFactory.create())
  138. .setGroupUuid(groupUuid)
  139. .setGroupName(groupName)
  140. .setRole(gp.getPermission())
  141. .setEntityUuid(entity.getUuid())
  142. .setEntityName(entity.getName());
  143. dbClient.groupPermissionDao().insert(dbSession, dto, entity, template);
  144. });
  145. List<PermissionTemplateCharacteristicDto> characteristics = dbClient.permissionTemplateCharacteristicDao().selectByTemplateUuids(dbSession, singletonList(template.getUuid()));
  146. if (projectCreatorUserUuid != null) {
  147. Set<String> permissionsForCurrentUserAlreadyInDb = usersPermissions.stream()
  148. .filter(userPermission -> projectCreatorUserUuid.equals(userPermission.getUserUuid()))
  149. .map(PermissionTemplateUserDto::getPermission)
  150. .collect(java.util.stream.Collectors.toSet());
  151. UserDto userDto = dbClient.userDao().selectByUuid(dbSession, projectCreatorUserUuid);
  152. characteristics.stream()
  153. .filter(PermissionTemplateCharacteristicDto::getWithProjectCreator)
  154. .filter(up -> permissionValidForProject(entity.isPrivate(), up.getPermission()))
  155. .filter(characteristic -> !permissionsForCurrentUserAlreadyInDb.contains(characteristic.getPermission()))
  156. .forEach(c -> {
  157. UserPermissionDto dto = new UserPermissionDto(uuidFactory.create(), c.getPermission(), userDto.getUuid(), entity.getUuid());
  158. dbClient.userPermissionDao().insert(dbSession, dto, entity, userDto, template);
  159. });
  160. }
  161. }
  162. private static boolean permissionValidForProject(boolean isPrivateEntity, String permission) {
  163. return isPrivateEntity || !PUBLIC_PERMISSIONS.contains(permission);
  164. }
  165. private static boolean groupNameValidForProject(boolean isPrivateEntity, String groupName) {
  166. return !isPrivateEntity || !isAnyone(groupName);
  167. }
  168. /**
  169. * Return the permission template for the given component. If no template key pattern match then consider default
  170. * template for the component qualifier.
  171. */
  172. @CheckForNull
  173. private PermissionTemplateDto findTemplate(DbSession dbSession, EntityDto entityDto) {
  174. List<PermissionTemplateDto> allPermissionTemplates = dbClient.permissionTemplateDao().selectAll(dbSession, null);
  175. List<PermissionTemplateDto> matchingTemplates = new ArrayList<>();
  176. for (PermissionTemplateDto permissionTemplateDto : allPermissionTemplates) {
  177. String keyPattern = permissionTemplateDto.getKeyPattern();
  178. if (StringUtils.isNotBlank(keyPattern) && entityDto.getKey().matches(keyPattern)) {
  179. matchingTemplates.add(permissionTemplateDto);
  180. }
  181. }
  182. checkAtMostOneMatchForComponentKey(entityDto.getKey(), matchingTemplates);
  183. if (matchingTemplates.size() == 1) {
  184. return matchingTemplates.get(0);
  185. }
  186. String qualifier = entityDto.getQualifier();
  187. DefaultTemplatesResolver.ResolvedDefaultTemplates resolvedDefaultTemplates = defaultTemplatesResolver.resolve(dbSession);
  188. switch (qualifier) {
  189. case Qualifiers.PROJECT:
  190. return dbClient.permissionTemplateDao().selectByUuid(dbSession, resolvedDefaultTemplates.getProject());
  191. case Qualifiers.VIEW:
  192. String portDefaultTemplateUuid = resolvedDefaultTemplates.getPortfolio().orElseThrow(
  193. () -> new IllegalStateException("Failed to find default template for portfolios"));
  194. return dbClient.permissionTemplateDao().selectByUuid(dbSession, portDefaultTemplateUuid);
  195. case Qualifiers.APP:
  196. String appDefaultTemplateUuid = resolvedDefaultTemplates.getApplication().orElseThrow(
  197. () -> new IllegalStateException("Failed to find default template for applications"));
  198. return dbClient.permissionTemplateDao().selectByUuid(dbSession, appDefaultTemplateUuid);
  199. default:
  200. throw new IllegalArgumentException(format("Qualifier '%s' is not supported", qualifier));
  201. }
  202. }
  203. private static void checkAtMostOneMatchForComponentKey(String componentKey, List<PermissionTemplateDto> matchingTemplates) {
  204. if (matchingTemplates.size() > 1) {
  205. StringBuilder templatesNames = new StringBuilder();
  206. for (Iterator<PermissionTemplateDto> it = matchingTemplates.iterator(); it.hasNext(); ) {
  207. templatesNames.append("\"").append(it.next().getName()).append("\"");
  208. if (it.hasNext()) {
  209. templatesNames.append(", ");
  210. }
  211. }
  212. throw new TemplateMatchingKeyException(MessageFormat.format(
  213. "The \"{0}\" key matches multiple permission templates: {1}."
  214. + " A system administrator must update these templates so that only one of them matches the key.",
  215. componentKey,
  216. templatesNames.toString()));
  217. }
  218. }
  219. }