You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

RuleIndex.java 28KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2022 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.rule.index;
  21. import com.google.common.base.Joiner;
  22. import java.util.ArrayList;
  23. import java.util.Arrays;
  24. import java.util.Collection;
  25. import java.util.HashMap;
  26. import java.util.Iterator;
  27. import java.util.List;
  28. import java.util.Map;
  29. import java.util.function.Function;
  30. import javax.annotation.Nullable;
  31. import org.apache.commons.lang.StringUtils;
  32. import org.apache.lucene.search.join.ScoreMode;
  33. import org.elasticsearch.action.search.SearchRequest;
  34. import org.elasticsearch.action.search.SearchResponse;
  35. import org.elasticsearch.core.TimeValue;
  36. import org.elasticsearch.index.query.BoolQueryBuilder;
  37. import org.elasticsearch.index.query.Operator;
  38. import org.elasticsearch.index.query.QueryBuilder;
  39. import org.elasticsearch.index.query.QueryBuilders;
  40. import org.elasticsearch.join.aggregations.JoinAggregationBuilders;
  41. import org.elasticsearch.join.query.HasParentQueryBuilder;
  42. import org.elasticsearch.join.query.JoinQueryBuilders;
  43. import org.elasticsearch.search.aggregations.AggregationBuilder;
  44. import org.elasticsearch.search.aggregations.AggregationBuilders;
  45. import org.elasticsearch.search.aggregations.BucketOrder;
  46. import org.elasticsearch.search.aggregations.bucket.terms.IncludeExclude;
  47. import org.elasticsearch.search.aggregations.bucket.terms.TermsAggregationBuilder;
  48. import org.elasticsearch.search.builder.SearchSourceBuilder;
  49. import org.elasticsearch.search.sort.FieldSortBuilder;
  50. import org.elasticsearch.search.sort.SortBuilders;
  51. import org.elasticsearch.search.sort.SortOrder;
  52. import org.sonar.api.rule.RuleStatus;
  53. import org.sonar.api.rule.Severity;
  54. import org.sonar.api.rules.RuleType;
  55. import org.sonar.api.utils.System2;
  56. import org.sonar.core.util.stream.MoreCollectors;
  57. import org.sonar.db.qualityprofile.QProfileDto;
  58. import org.sonar.server.es.EsClient;
  59. import org.sonar.server.es.EsUtils;
  60. import org.sonar.server.es.SearchIdResult;
  61. import org.sonar.server.es.SearchOptions;
  62. import org.sonar.server.es.StickyFacetBuilder;
  63. import org.sonar.server.es.newindex.DefaultIndexSettings;
  64. import org.sonar.server.es.textsearch.JavaTokenizer;
  65. import org.sonar.server.security.SecurityStandards;
  66. import static com.google.common.base.Preconditions.checkArgument;
  67. import static java.lang.Boolean.FALSE;
  68. import static java.lang.Boolean.TRUE;
  69. import static java.util.Collections.emptyList;
  70. import static java.util.Optional.ofNullable;
  71. import static org.elasticsearch.index.query.QueryBuilders.boolQuery;
  72. import static org.elasticsearch.index.query.QueryBuilders.matchAllQuery;
  73. import static org.elasticsearch.index.query.QueryBuilders.matchPhraseQuery;
  74. import static org.elasticsearch.index.query.QueryBuilders.matchQuery;
  75. import static org.elasticsearch.index.query.QueryBuilders.termsQuery;
  76. import static org.sonar.api.rules.RuleType.SECURITY_HOTSPOT;
  77. import static org.sonar.api.rules.RuleType.VULNERABILITY;
  78. import static org.sonar.server.es.EsUtils.SCROLL_TIME_IN_MINUTES;
  79. import static org.sonar.server.es.EsUtils.optimizeScrollRequest;
  80. import static org.sonar.server.es.EsUtils.scrollIds;
  81. import static org.sonar.server.es.IndexType.FIELD_INDEX_TYPE;
  82. import static org.sonar.server.es.StickyFacetBuilder.FACET_DEFAULT_SIZE;
  83. import static org.sonar.server.es.newindex.DefaultIndexSettingsElement.ENGLISH_HTML_ANALYZER;
  84. import static org.sonar.server.es.newindex.DefaultIndexSettingsElement.SEARCH_GRAMS_ANALYZER;
  85. import static org.sonar.server.es.newindex.DefaultIndexSettingsElement.SEARCH_WORDS_ANALYZER;
  86. import static org.sonar.server.es.newindex.DefaultIndexSettingsElement.SORTABLE_ANALYZER;
  87. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_ACTIVE_RULE_INHERITANCE;
  88. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_ACTIVE_RULE_PROFILE_UUID;
  89. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_ACTIVE_RULE_SEVERITY;
  90. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_CREATED_AT;
  91. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_CWE;
  92. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_HTML_DESCRIPTION;
  93. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_INTERNAL_KEY;
  94. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_IS_EXTERNAL;
  95. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_IS_TEMPLATE;
  96. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_KEY;
  97. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_LANGUAGE;
  98. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_NAME;
  99. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_OWASP_TOP_10;
  100. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_OWASP_TOP_10_2021;
  101. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_REPOSITORY;
  102. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_RULE_KEY;
  103. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_SANS_TOP_25;
  104. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_SEVERITY;
  105. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_SONARSOURCE_SECURITY;
  106. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_STATUS;
  107. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_TAGS;
  108. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_TEMPLATE_KEY;
  109. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_TYPE;
  110. import static org.sonar.server.rule.index.RuleIndexDefinition.FIELD_RULE_UPDATED_AT;
  111. import static org.sonar.server.rule.index.RuleIndexDefinition.TYPE_ACTIVE_RULE;
  112. import static org.sonar.server.rule.index.RuleIndexDefinition.TYPE_RULE;
  113. /**
  114. * The unique entry-point to interact with Elasticsearch index "rules".
  115. * All the requests are listed here.
  116. */
  117. public class RuleIndex {
  118. public static final String FACET_LANGUAGES = "languages";
  119. public static final String FACET_TAGS = "tags";
  120. public static final String FACET_REPOSITORIES = "repositories";
  121. public static final String FACET_SEVERITIES = "severities";
  122. public static final String FACET_ACTIVE_SEVERITIES = "active_severities";
  123. public static final String FACET_STATUSES = "statuses";
  124. public static final String FACET_TYPES = "types";
  125. public static final String FACET_OLD_DEFAULT = "true";
  126. public static final String FACET_CWE = "cwe";
  127. public static final String FACET_SANS_TOP_25 = "sansTop25";
  128. public static final String FACET_OWASP_TOP_10 = "owaspTop10";
  129. public static final String FACET_OWASP_TOP_10_2021 = "owaspTop10-2021";
  130. public static final String FACET_SONARSOURCE_SECURITY = "sonarsourceSecurity";
  131. private static final int MAX_FACET_SIZE = 100;
  132. public static final List<String> ALL_STATUSES_EXCEPT_REMOVED = Arrays.stream(RuleStatus.values())
  133. .filter(status -> !RuleStatus.REMOVED.equals(status))
  134. .map(RuleStatus::toString)
  135. .collect(MoreCollectors.toList());
  136. private static final String AGGREGATION_NAME_FOR_TAGS = "tagsAggregation";
  137. private final EsClient client;
  138. private final System2 system2;
  139. public RuleIndex(EsClient client, System2 system2) {
  140. this.client = client;
  141. this.system2 = system2;
  142. }
  143. public SearchIdResult<String> search(RuleQuery query, SearchOptions options) {
  144. SearchSourceBuilder sourceBuilder = new SearchSourceBuilder();
  145. QueryBuilder qb = buildQuery(query);
  146. Map<String, QueryBuilder> filters = buildFilters(query);
  147. if (!options.getFacets().isEmpty()) {
  148. for (AggregationBuilder aggregation : getFacets(query, options, qb, filters).values()) {
  149. sourceBuilder.aggregation(aggregation);
  150. }
  151. }
  152. setSorting(query, sourceBuilder);
  153. setPagination(options, sourceBuilder);
  154. BoolQueryBuilder fb = boolQuery();
  155. for (QueryBuilder filterBuilder : filters.values()) {
  156. fb.must(filterBuilder);
  157. }
  158. sourceBuilder.query(boolQuery().must(qb).filter(fb));
  159. SearchRequest esSearch = EsClient.prepareSearch(TYPE_RULE)
  160. .source(sourceBuilder);
  161. return new SearchIdResult<>(client.search(esSearch), input -> input, system2.getDefaultTimeZone().toZoneId());
  162. }
  163. /**
  164. * Return all rule uuids matching the search query, without pagination nor facets
  165. */
  166. public Iterator<String> searchAll(RuleQuery query) {
  167. SearchSourceBuilder sourceBuilder = new SearchSourceBuilder();
  168. optimizeScrollRequest(sourceBuilder);
  169. QueryBuilder qb = buildQuery(query);
  170. Map<String, QueryBuilder> filters = buildFilters(query);
  171. BoolQueryBuilder fb = boolQuery();
  172. for (QueryBuilder filterBuilder : filters.values()) {
  173. fb.must(filterBuilder);
  174. }
  175. sourceBuilder.query(boolQuery().must(qb).filter(fb));
  176. SearchRequest esSearch = EsClient.prepareSearch(TYPE_RULE)
  177. .scroll(TimeValue.timeValueMinutes(SCROLL_TIME_IN_MINUTES))
  178. .source(sourceBuilder);
  179. SearchResponse response = client.search(esSearch);
  180. return scrollIds(client, response, i -> i);
  181. }
  182. /* Build main query (search based) */
  183. private static QueryBuilder buildQuery(RuleQuery query) {
  184. // No contextual query case
  185. String queryText = query.getQueryText();
  186. if (StringUtils.isEmpty(queryText)) {
  187. return matchAllQuery();
  188. }
  189. // Build RuleBased contextual query
  190. BoolQueryBuilder qb = boolQuery();
  191. BoolQueryBuilder textQuery = boolQuery();
  192. JavaTokenizer.split(queryText)
  193. .stream().map(token -> boolQuery().should(
  194. matchQuery(
  195. SEARCH_GRAMS_ANALYZER.subField(FIELD_RULE_NAME),
  196. StringUtils.left(token, DefaultIndexSettings.MAXIMUM_NGRAM_LENGTH)).boost(20F))
  197. .should(
  198. matchPhraseQuery(
  199. ENGLISH_HTML_ANALYZER.subField(FIELD_RULE_HTML_DESCRIPTION),
  200. token).boost(3F)))
  201. .forEach(textQuery::must);
  202. qb.should(textQuery.boost(20F));
  203. // Match and partial Match queries
  204. // Search by key uses the "sortable" sub-field as it requires to be case-insensitive (lower-case filtering)
  205. qb.should(matchQuery(SORTABLE_ANALYZER.subField(FIELD_RULE_KEY), queryText).operator(Operator.AND).boost(30F));
  206. qb.should(matchQuery(SORTABLE_ANALYZER.subField(FIELD_RULE_RULE_KEY), queryText).operator(Operator.AND).boost(15F));
  207. qb.should(termQuery(FIELD_RULE_LANGUAGE, queryText, 3F));
  208. return qb;
  209. }
  210. private static QueryBuilder termQuery(String field, String query, float boost) {
  211. return QueryBuilders.multiMatchQuery(query,
  212. field, SEARCH_WORDS_ANALYZER.subField(field))
  213. .operator(Operator.AND)
  214. .boost(boost);
  215. }
  216. /* Build main filter (match based) */
  217. private static Map<String, QueryBuilder> buildFilters(RuleQuery query) {
  218. Map<String, QueryBuilder> filters = new HashMap<>();
  219. /* Add enforced filter on main type Rule */
  220. filters.put(
  221. FIELD_INDEX_TYPE,
  222. boolQuery().must(QueryBuilders.termsQuery(FIELD_INDEX_TYPE, TYPE_RULE.getType())));
  223. /* Add enforced filter on rules that are REMOVED */
  224. filters.put(FIELD_RULE_STATUS,
  225. boolQuery().mustNot(
  226. QueryBuilders.termQuery(FIELD_RULE_STATUS,
  227. RuleStatus.REMOVED.toString())));
  228. addFilter(filters, FIELD_RULE_INTERNAL_KEY, query.getInternalKey());
  229. addFilter(filters, FIELD_RULE_RULE_KEY, query.getRuleKey());
  230. addFilter(filters, query.getLanguages(), FIELD_RULE_LANGUAGE);
  231. addFilter(filters, query.getRepositories(), FIELD_RULE_REPOSITORY);
  232. addFilter(filters, query.getSeverities(), FIELD_RULE_SEVERITY);
  233. addSecurityStandardFilter(filters, FIELD_RULE_CWE, query.getCwe());
  234. addSecurityStandardFilter(filters, FIELD_RULE_OWASP_TOP_10, query.getOwaspTop10());
  235. addSecurityStandardFilter(filters, FIELD_RULE_OWASP_TOP_10_2021, query.getOwaspTop10For2021());
  236. addSecurityStandardFilter(filters, FIELD_RULE_SANS_TOP_25, query.getSansTop25());
  237. addSecurityStandardFilter(filters, FIELD_RULE_SONARSOURCE_SECURITY, query.getSonarsourceSecurity());
  238. addFilter(filters, FIELD_RULE_KEY, query.getKey());
  239. if (isNotEmpty(query.getTags())) {
  240. filters.put(FIELD_RULE_TAGS, buildTagsFilter(query.getTags()));
  241. }
  242. Collection<RuleType> types = query.getTypes();
  243. if (isNotEmpty(types)) {
  244. List<String> typeNames = types.stream().map(RuleType::toString).collect(MoreCollectors.toList());
  245. filters.put(FIELD_RULE_TYPE,
  246. QueryBuilders.termsQuery(FIELD_RULE_TYPE, typeNames));
  247. }
  248. if (query.getAvailableSinceLong() != null) {
  249. filters.put("availableSince", QueryBuilders.rangeQuery(FIELD_RULE_CREATED_AT)
  250. .gte(query.getAvailableSinceLong()));
  251. }
  252. if (isNotEmpty(query.getStatuses())) {
  253. Collection<String> stringStatus = new ArrayList<>();
  254. for (RuleStatus status : query.getStatuses()) {
  255. stringStatus.add(status.name());
  256. }
  257. filters.put(FIELD_RULE_STATUS,
  258. QueryBuilders.termsQuery(FIELD_RULE_STATUS, stringStatus));
  259. }
  260. Boolean isTemplate = query.isTemplate();
  261. if (isTemplate != null) {
  262. filters.put(FIELD_RULE_IS_TEMPLATE,
  263. QueryBuilders.termQuery(FIELD_RULE_IS_TEMPLATE, Boolean.toString(isTemplate)));
  264. }
  265. boolean includeExternal = query.includeExternal();
  266. if (!includeExternal) {
  267. filters.put(FIELD_RULE_IS_EXTERNAL,
  268. QueryBuilders.termQuery(FIELD_RULE_IS_EXTERNAL, false));
  269. }
  270. String template = query.templateKey();
  271. if (template != null) {
  272. filters.put(FIELD_RULE_TEMPLATE_KEY,
  273. QueryBuilders.termQuery(FIELD_RULE_TEMPLATE_KEY, template));
  274. }
  275. /* Implementation of activation query */
  276. QProfileDto profile = query.getQProfile();
  277. if (query.getActivation() != null && profile != null) {
  278. QueryBuilder childQuery = buildActivationFilter(query, profile);
  279. if (TRUE.equals(query.getActivation())) {
  280. filters.put("activation",
  281. JoinQueryBuilders.hasChildQuery(TYPE_ACTIVE_RULE.getName(),
  282. childQuery, ScoreMode.None));
  283. } else if (FALSE.equals(query.getActivation())) {
  284. filters.put("activation",
  285. boolQuery().mustNot(
  286. JoinQueryBuilders.hasChildQuery(TYPE_ACTIVE_RULE.getName(),
  287. childQuery, ScoreMode.None)));
  288. }
  289. QProfileDto compareToQProfile = query.getCompareToQProfile();
  290. if (compareToQProfile != null) {
  291. filters.put("comparison",
  292. JoinQueryBuilders.hasChildQuery(
  293. TYPE_ACTIVE_RULE.getName(),
  294. boolQuery().must(QueryBuilders.termQuery(FIELD_ACTIVE_RULE_PROFILE_UUID, compareToQProfile.getRulesProfileUuid())),
  295. ScoreMode.None));
  296. }
  297. }
  298. return filters;
  299. }
  300. private static void addSecurityStandardFilter(Map<String, QueryBuilder> filters, String key, Collection<String> values) {
  301. if (isNotEmpty(values)) {
  302. filters.put(key,
  303. boolQuery()
  304. .must(QueryBuilders.termsQuery(key, values))
  305. .must(QueryBuilders.termsQuery(FIELD_RULE_TYPE, VULNERABILITY.name(), SECURITY_HOTSPOT.name())));
  306. }
  307. }
  308. private static void addFilter(Map<String, QueryBuilder> filters, Collection<String> key, String value) {
  309. if (isNotEmpty(key)) {
  310. filters.put(value,
  311. QueryBuilders.termsQuery(value, key));
  312. }
  313. }
  314. private static void addFilter(Map<String, QueryBuilder> filters, String key, String value) {
  315. if (StringUtils.isNotEmpty(value)) {
  316. filters.put(key,
  317. QueryBuilders.termQuery(key, value));
  318. }
  319. }
  320. private static BoolQueryBuilder buildTagsFilter(Collection<String> tags) {
  321. BoolQueryBuilder q = boolQuery();
  322. for (String tag : tags) {
  323. q.should(boolQuery().filter(QueryBuilders.termQuery(FIELD_RULE_TAGS, tag)));
  324. }
  325. return q;
  326. }
  327. private static QueryBuilder buildActivationFilter(RuleQuery query, QProfileDto profile) {
  328. // ActiveRule Filter (profile and inheritance)
  329. BoolQueryBuilder activeRuleFilter = boolQuery();
  330. addTermFilter(activeRuleFilter, FIELD_ACTIVE_RULE_PROFILE_UUID, profile.getRulesProfileUuid());
  331. addTermFilter(activeRuleFilter, FIELD_ACTIVE_RULE_INHERITANCE, query.getInheritance());
  332. addTermFilter(activeRuleFilter, FIELD_ACTIVE_RULE_SEVERITY, query.getActiveSeverities());
  333. // ChildQuery
  334. QueryBuilder childQuery;
  335. if (activeRuleFilter.hasClauses()) {
  336. childQuery = activeRuleFilter;
  337. } else {
  338. childQuery = matchAllQuery();
  339. }
  340. return childQuery;
  341. }
  342. private static BoolQueryBuilder addTermFilter(BoolQueryBuilder filter, String field, @Nullable Collection<String> values) {
  343. if (isNotEmpty(values)) {
  344. BoolQueryBuilder valuesFilter = boolQuery();
  345. for (String value : values) {
  346. QueryBuilder valueFilter = QueryBuilders.termQuery(field, value);
  347. valuesFilter.should(valueFilter);
  348. }
  349. filter.must(valuesFilter);
  350. }
  351. return filter;
  352. }
  353. private static BoolQueryBuilder addTermFilter(BoolQueryBuilder filter, String field, @Nullable String value) {
  354. if (StringUtils.isNotEmpty(value)) {
  355. filter.must(QueryBuilders.termQuery(field, value));
  356. }
  357. return filter;
  358. }
  359. private static Map<String, AggregationBuilder> getFacets(RuleQuery query, SearchOptions options, QueryBuilder queryBuilder, Map<String, QueryBuilder> filters) {
  360. Map<String, AggregationBuilder> aggregations = new HashMap<>();
  361. StickyFacetBuilder stickyFacetBuilder = stickyFacetBuilder(queryBuilder, filters);
  362. addDefaultFacets(query, options, aggregations, stickyFacetBuilder);
  363. addStatusFacetIfNeeded(options, aggregations, stickyFacetBuilder);
  364. if (options.getFacets().contains(FACET_SEVERITIES)) {
  365. aggregations.put(FACET_SEVERITIES,
  366. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_SEVERITY, FACET_SEVERITIES, Severity.ALL.toArray()));
  367. }
  368. addActiveSeverityFacetIfNeeded(query, options, aggregations, stickyFacetBuilder);
  369. return aggregations;
  370. }
  371. private static void addDefaultFacets(RuleQuery query, SearchOptions options, Map<String, AggregationBuilder> aggregations, StickyFacetBuilder stickyFacetBuilder) {
  372. if (options.getFacets().contains(FACET_LANGUAGES) || options.getFacets().contains(FACET_OLD_DEFAULT)) {
  373. Collection<String> languages = query.getLanguages();
  374. aggregations.put(FACET_LANGUAGES,
  375. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_LANGUAGE, FACET_LANGUAGES, MAX_FACET_SIZE,
  376. (languages == null) ? (new String[0]) : languages.toArray()));
  377. }
  378. if (options.getFacets().contains(FACET_TAGS) || options.getFacets().contains(FACET_OLD_DEFAULT)) {
  379. Collection<String> tags = query.getTags();
  380. aggregations.put(FACET_TAGS,
  381. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_TAGS, FACET_TAGS, MAX_FACET_SIZE,
  382. (tags == null) ? (new String[0]) : tags.toArray()));
  383. }
  384. if (options.getFacets().contains(FACET_TYPES)) {
  385. Collection<RuleType> types = query.getTypes();
  386. aggregations.put(FACET_TYPES,
  387. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_TYPE, FACET_TYPES,
  388. (types == null) ? (new String[0]) : types.toArray()));
  389. }
  390. if (options.getFacets().contains(FACET_REPOSITORIES) || options.getFacets().contains(FACET_OLD_DEFAULT)) {
  391. Collection<String> repositories = query.getRepositories();
  392. aggregations.put(FACET_REPOSITORIES,
  393. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_REPOSITORY, FACET_REPOSITORIES, MAX_FACET_SIZE,
  394. (repositories == null) ? (new String[0]) : repositories.toArray()));
  395. }
  396. addDefaultSecurityFacets(query, options, aggregations, stickyFacetBuilder);
  397. }
  398. private static Function<TermsAggregationBuilder, AggregationBuilder> filterSecurityCategories() {
  399. return termsAggregation -> AggregationBuilders.filter(
  400. "filter_by_rule_types_" + termsAggregation.getName(),
  401. termsQuery(FIELD_RULE_TYPE,
  402. VULNERABILITY.name(),
  403. SECURITY_HOTSPOT.name()))
  404. .subAggregation(termsAggregation);
  405. }
  406. private static void addDefaultSecurityFacets(RuleQuery query, SearchOptions options, Map<String, AggregationBuilder> aggregations,
  407. StickyFacetBuilder stickyFacetBuilder) {
  408. if (options.getFacets().contains(FACET_CWE)) {
  409. Collection<String> categories = query.getCwe();
  410. aggregations.put(FACET_CWE,
  411. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_CWE, FACET_CWE,
  412. FACET_DEFAULT_SIZE, filterSecurityCategories(),
  413. (categories == null) ? (new String[0]) : categories.toArray()));
  414. }
  415. if (options.getFacets().contains(FACET_OWASP_TOP_10)) {
  416. Collection<String> categories = query.getOwaspTop10();
  417. aggregations.put(FACET_OWASP_TOP_10,
  418. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_OWASP_TOP_10, FACET_OWASP_TOP_10,
  419. FACET_DEFAULT_SIZE, filterSecurityCategories(),
  420. (categories == null) ? (new String[0]) : categories.toArray()));
  421. }
  422. if (options.getFacets().contains(FACET_OWASP_TOP_10_2021)) {
  423. Collection<String> categories = query.getOwaspTop10For2021();
  424. aggregations.put(FACET_OWASP_TOP_10_2021,
  425. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_OWASP_TOP_10_2021, FACET_OWASP_TOP_10_2021,
  426. FACET_DEFAULT_SIZE, filterSecurityCategories(),
  427. (categories == null) ? (new String[0]) : categories.toArray()));
  428. }
  429. if (options.getFacets().contains(FACET_SANS_TOP_25)) {
  430. Collection<String> categories = query.getSansTop25();
  431. aggregations.put(FACET_SANS_TOP_25,
  432. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_SANS_TOP_25, FACET_SANS_TOP_25,
  433. FACET_DEFAULT_SIZE, filterSecurityCategories(),
  434. (categories == null) ? (new String[0]) : categories.toArray()));
  435. }
  436. if (options.getFacets().contains(FACET_SONARSOURCE_SECURITY)) {
  437. Collection<String> categories = query.getSonarsourceSecurity();
  438. aggregations.put(FACET_SONARSOURCE_SECURITY,
  439. stickyFacetBuilder.buildStickyFacet(FIELD_RULE_SONARSOURCE_SECURITY, FACET_SONARSOURCE_SECURITY,
  440. SecurityStandards.SQCategory.values().length, filterSecurityCategories(),
  441. (categories == null) ? (new String[0]) : categories.toArray()));
  442. }
  443. }
  444. private static void addStatusFacetIfNeeded(SearchOptions options, Map<String, AggregationBuilder> aggregations, StickyFacetBuilder stickyFacetBuilder) {
  445. if (options.getFacets().contains(FACET_STATUSES)) {
  446. BoolQueryBuilder facetFilter = stickyFacetBuilder.getStickyFacetFilter(FIELD_RULE_STATUS);
  447. AggregationBuilder statuses = AggregationBuilders.filter(FACET_STATUSES + "_filter", facetFilter)
  448. .subAggregation(
  449. AggregationBuilders
  450. .terms(FACET_STATUSES)
  451. .field(FIELD_RULE_STATUS)
  452. .includeExclude(new IncludeExclude(Joiner.on('|').join(ALL_STATUSES_EXCEPT_REMOVED), RuleStatus.REMOVED.toString()))
  453. .size(ALL_STATUSES_EXCEPT_REMOVED.size()));
  454. aggregations.put(FACET_STATUSES, AggregationBuilders.global(FACET_STATUSES).subAggregation(statuses));
  455. }
  456. }
  457. private static void addActiveSeverityFacetIfNeeded(RuleQuery query, SearchOptions options, Map<String, AggregationBuilder> aggregations,
  458. StickyFacetBuilder stickyFacetBuilder) {
  459. QProfileDto profile = query.getQProfile();
  460. if (options.getFacets().contains(FACET_ACTIVE_SEVERITIES) && profile != null) {
  461. // We are building a children aggregation on active rules
  462. // so the rule filter has to be used as parent filter for active rules
  463. // from which we remove filters that concern active rules ("activation")
  464. HasParentQueryBuilder ruleFilter = JoinQueryBuilders.hasParentQuery(
  465. TYPE_RULE.getType(),
  466. stickyFacetBuilder.getStickyFacetFilter("activation"),
  467. false);
  468. // Rebuilding the active rule filter without severities
  469. BoolQueryBuilder childrenFilter = boolQuery();
  470. addTermFilter(childrenFilter, FIELD_ACTIVE_RULE_PROFILE_UUID, profile.getRulesProfileUuid());
  471. RuleIndex.addTermFilter(childrenFilter, FIELD_ACTIVE_RULE_INHERITANCE, query.getInheritance());
  472. QueryBuilder activeRuleFilter = childrenFilter.must(ruleFilter);
  473. AggregationBuilder activeSeverities = JoinAggregationBuilders.children(FACET_ACTIVE_SEVERITIES + "_children", TYPE_ACTIVE_RULE.getName())
  474. .subAggregation(
  475. AggregationBuilders.filter(FACET_ACTIVE_SEVERITIES + "_filter", activeRuleFilter)
  476. .subAggregation(
  477. AggregationBuilders
  478. .terms(FACET_ACTIVE_SEVERITIES)
  479. .field(FIELD_ACTIVE_RULE_SEVERITY)
  480. .includeExclude(new IncludeExclude(Joiner.on('|').join(Severity.ALL), null))
  481. .size(Severity.ALL.size())));
  482. aggregations.put(FACET_ACTIVE_SEVERITIES, AggregationBuilders.global(FACET_ACTIVE_SEVERITIES).subAggregation(activeSeverities));
  483. }
  484. }
  485. private static StickyFacetBuilder stickyFacetBuilder(QueryBuilder query, Map<String, QueryBuilder> filters) {
  486. return new StickyFacetBuilder(query, filters, null, BucketOrder.compound(BucketOrder.count(false), BucketOrder.key(true)));
  487. }
  488. private static void setSorting(RuleQuery query, SearchSourceBuilder esSearch) {
  489. /* integrate Query Sort */
  490. String queryText = query.getQueryText();
  491. if (query.getSortField() != null) {
  492. FieldSortBuilder sort = SortBuilders.fieldSort(appendSortSuffixIfNeeded(query.getSortField()));
  493. if (query.isAscendingSort()) {
  494. sort.order(SortOrder.ASC);
  495. } else {
  496. sort.order(SortOrder.DESC);
  497. }
  498. esSearch.sort(sort);
  499. } else if (StringUtils.isNotEmpty(queryText)) {
  500. esSearch.sort(SortBuilders.scoreSort());
  501. } else {
  502. esSearch.sort(appendSortSuffixIfNeeded(FIELD_RULE_UPDATED_AT), SortOrder.DESC);
  503. // deterministic sort when exactly the same updated_at (same millisecond)
  504. esSearch.sort(appendSortSuffixIfNeeded(FIELD_RULE_KEY), SortOrder.ASC);
  505. }
  506. }
  507. private static String appendSortSuffixIfNeeded(String field) {
  508. return field +
  509. ((field.equals(FIELD_RULE_NAME) || field.equals(FIELD_RULE_KEY))
  510. ? ("." + SORTABLE_ANALYZER.getSubFieldSuffix())
  511. : "");
  512. }
  513. private static void setPagination(SearchOptions options, SearchSourceBuilder esSearch) {
  514. esSearch.from(options.getOffset());
  515. esSearch.size(options.getLimit());
  516. }
  517. public List<String> listTags(@Nullable String query, int size) {
  518. int maxPageSize = 500;
  519. checkArgument(size <= maxPageSize, "Page size must be lower than or equals to " + maxPageSize);
  520. if (size <= 0) {
  521. return emptyList();
  522. }
  523. TermsAggregationBuilder termsAggregation = AggregationBuilders.terms(AGGREGATION_NAME_FOR_TAGS)
  524. .field(FIELD_RULE_TAGS)
  525. .size(size)
  526. .order(BucketOrder.key(true))
  527. .minDocCount(1);
  528. ofNullable(query)
  529. .map(EsUtils::escapeSpecialRegexChars)
  530. .map(queryString -> ".*" + queryString + ".*")
  531. .map(s -> new IncludeExclude(s, null))
  532. .ifPresent(termsAggregation::includeExclude);
  533. SearchRequest request = EsClient.prepareSearch(TYPE_RULE.getMainType())
  534. .source(new SearchSourceBuilder()
  535. .query(matchAllQuery())
  536. .size(0)
  537. .aggregation(termsAggregation));
  538. SearchResponse esResponse = client.search(request);
  539. return EsUtils.termsKeys(esResponse.getAggregations().get(AGGREGATION_NAME_FOR_TAGS));
  540. }
  541. private static boolean isNotEmpty(@Nullable Collection<?> list) {
  542. return list != null && !list.isEmpty();
  543. }
  544. }