123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197 |
- /*
- * SonarQube
- * Copyright (C) 2009-2023 SonarSource SA
- * mailto:info AT sonarsource DOT com
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public
- * License as published by the Free Software Foundation; either
- * version 3 of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public License
- * along with this program; if not, write to the Free Software Foundation,
- * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
- */
- package org.sonar.server.permission.ws;
-
- import com.google.common.collect.Multimap;
- import com.google.common.collect.Ordering;
- import com.google.common.collect.TreeMultimap;
- import java.util.List;
- import java.util.Map;
- import java.util.Set;
- import javax.annotation.Nullable;
- import org.sonar.api.server.ws.Change;
- import org.sonar.api.server.ws.Request;
- import org.sonar.api.server.ws.Response;
- import org.sonar.api.server.ws.WebService;
- import org.sonar.api.server.ws.WebService.Param;
- import org.sonar.api.utils.Paging;
- import org.sonar.db.DbClient;
- import org.sonar.db.DbSession;
- import org.sonar.db.entity.EntityDto;
- import org.sonar.db.permission.PermissionQuery;
- import org.sonar.db.permission.UserPermissionDto;
- import org.sonar.db.user.UserDto;
- import org.sonar.server.common.avatar.AvatarResolver;
- import org.sonar.server.management.ManagedInstanceService;
- import org.sonar.server.permission.RequestValidator;
- import org.sonar.server.user.UserSession;
- import org.sonarqube.ws.Permissions;
- import org.sonarqube.ws.Permissions.UsersWsResponse;
-
- import static com.google.common.base.Strings.emptyToNull;
- import static java.util.Collections.emptyList;
- import static java.util.Optional.ofNullable;
- import static java.util.stream.Collectors.toSet;
- import static org.sonar.db.permission.PermissionQuery.DEFAULT_PAGE_SIZE;
- import static org.sonar.db.permission.PermissionQuery.RESULTS_MAX_SIZE;
- import static org.sonar.db.permission.PermissionQuery.SEARCH_QUERY_MIN_LENGTH;
- import static org.sonar.server.permission.RequestValidator.validateGlobalPermission;
- import static org.sonar.server.permission.ws.WsParameters.createProjectParameters;
- import static org.sonar.server.ws.WsUtils.writeProtobuf;
- import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_PERMISSION;
-
- public class UsersAction implements PermissionsWsAction {
-
- private final DbClient dbClient;
- private final UserSession userSession;
- private final PermissionWsSupport wsSupport;
- private final AvatarResolver avatarResolver;
- private final WsParameters wsParameters;
- private final RequestValidator requestValidator;
- private final ManagedInstanceService managedInstanceService;
-
- public UsersAction(DbClient dbClient, UserSession userSession, PermissionWsSupport wsSupport, AvatarResolver avatarResolver, WsParameters wsParameters,
- RequestValidator requestValidator, ManagedInstanceService managedInstanceService) {
- this.dbClient = dbClient;
- this.userSession = userSession;
- this.wsSupport = wsSupport;
- this.avatarResolver = avatarResolver;
- this.wsParameters = wsParameters;
- this.requestValidator = requestValidator;
- this.managedInstanceService = managedInstanceService;
- }
-
- @Override
- public void define(WebService.NewController context) {
- WebService.NewAction action = context.createAction("users")
- .setSince("5.2")
- .setDescription("Lists the users with their permissions as individual users rather than through group affiliation.<br>" +
- "This service defaults to global permissions, but can be limited to project permissions by providing project id or project key.<br> " +
- "This service defaults to all users, but can be limited to users with a specific permission by providing the desired permission.<br>" +
- "Requires one of the following permissions:" +
- "<ul>" +
- "<li>'Administer System'</li>" +
- "<li>'Administer' rights on the specified project</li>" +
- "</ul>")
- .addPagingParams(DEFAULT_PAGE_SIZE, RESULTS_MAX_SIZE)
- .setChangelog(
- new Change("10.0", "Response includes 'managed' field."),
- new Change("7.4", "The response list is returning all users even those without permissions, the users with permission are at the top of the list."))
- .setInternal(true)
- .setResponseExample(getClass().getResource("users-example.json"))
- .setHandler(this);
-
- action.createParam(Param.TEXT_QUERY)
- .setMinimumLength(SEARCH_QUERY_MIN_LENGTH)
- .setDescription("Limit search to user names that contain the supplied string. <br/>")
- .setExampleValue("eri");
-
- wsParameters.createPermissionParameter(action).setRequired(false);
- createProjectParameters(action);
- }
-
- @Override
- public void handle(Request request, Response response) throws Exception {
- try (DbSession dbSession = dbClient.openSession(false)) {
- EntityDto entity = wsSupport.findEntity(dbSession, request);
- wsSupport.checkPermissionManagementAccess(userSession, entity);
-
- PermissionQuery query = buildPermissionQuery(request, entity);
- List<UserDto> users = findUsers(dbSession, query);
- int total = dbClient.userPermissionDao().countUsersByQuery(dbSession, query);
- List<UserPermissionDto> userPermissions = findUserPermissions(dbSession, users, entity);
- Paging paging = Paging.forPageIndex(request.mandatoryParamAsInt(Param.PAGE)).withPageSize(query.getPageSize()).andTotal(total);
- Map<String, Boolean> userUuidToIsManaged = managedInstanceService.getUserUuidToManaged(dbSession, getUserUuids(users));
- UsersWsResponse usersWsResponse = buildResponse(users, userPermissions, userUuidToIsManaged, paging);
- writeProtobuf(usersWsResponse, request, response);
- }
- }
-
- private static Set<String> getUserUuids(List<UserDto> users) {
- return users.stream().map(UserDto::getUuid).collect(toSet());
- }
-
- private PermissionQuery buildPermissionQuery(Request request, @Nullable EntityDto entity) {
- String textQuery = request.param(Param.TEXT_QUERY);
- String permission = request.param(PARAM_PERMISSION);
- PermissionQuery.Builder permissionQuery = PermissionQuery.builder()
- .setPermission(permission)
- .setPageIndex(request.mandatoryParamAsInt(Param.PAGE))
- .setPageSize(request.mandatoryParamAsInt(Param.PAGE_SIZE))
- .setSearchQuery(textQuery);
-
- if (entity != null) {
- permissionQuery.setEntityUuid(entity.getUuid());
- }
-
- if (permission != null) {
- if (entity != null) {
- requestValidator.validateProjectPermission(permission);
- } else {
- validateGlobalPermission(permission);
- }
- }
-
- return permissionQuery.build();
- }
-
- private UsersWsResponse buildResponse(List<UserDto> users, List<UserPermissionDto> userPermissions, Map<String, Boolean> userUuidToIsManaged,
- Paging paging) {
- Multimap<String, String> permissionsByUserUuid = TreeMultimap.create();
- userPermissions.forEach(userPermission -> permissionsByUserUuid.put(userPermission.getUserUuid(), userPermission.getPermission()));
-
- UsersWsResponse.Builder response = UsersWsResponse.newBuilder();
- users.forEach(user -> {
- Permissions.User.Builder userResponse = response.addUsersBuilder()
- .setLogin(user.getLogin())
- .addAllPermissions(permissionsByUserUuid.get(user.getUuid()));
- ofNullable(user.getEmail()).ifPresent(userResponse::setEmail);
- ofNullable(emptyToNull(user.getEmail())).ifPresent(u -> userResponse.setAvatar(avatarResolver.create(user)));
- ofNullable(user.getName()).ifPresent(userResponse::setName);
- ofNullable(userUuidToIsManaged.get(user.getUuid())).ifPresent(userResponse::setManaged);
- });
-
- response.getPagingBuilder()
- .setPageIndex(paging.pageIndex())
- .setPageSize(paging.pageSize())
- .setTotal(paging.total())
- .build();
-
- return response.build();
- }
-
- private List<UserDto> findUsers(DbSession dbSession, PermissionQuery query) {
- List<String> orderedUuids = dbClient.userPermissionDao().selectUserUuidsByQueryAndScope(dbSession, query);
- return Ordering.explicit(orderedUuids).onResultOf(UserDto::getUuid).immutableSortedCopy(dbClient.userDao().selectByUuids(dbSession, orderedUuids));
- }
-
- private List<UserPermissionDto> findUserPermissions(DbSession dbSession, List<UserDto> users, @Nullable EntityDto entity) {
- if (users.isEmpty()) {
- return emptyList();
- }
- List<String> userUuids = users.stream().map(UserDto::getUuid).toList();
- PermissionQuery.Builder queryBuilder = PermissionQuery.builder()
- .withAtLeastOnePermission();
- if (entity != null) {
- queryBuilder.setEntityUuid(entity.getUuid());
- }
- return dbClient.userPermissionDao().selectUserPermissionsByQuery(dbSession, queryBuilder.build(), userUuids);
- }
- }
|