You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

PermissionTemplateService.java 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2018 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.permission;
  21. import java.text.MessageFormat;
  22. import java.util.ArrayList;
  23. import java.util.Collection;
  24. import java.util.Iterator;
  25. import java.util.List;
  26. import java.util.Set;
  27. import javax.annotation.CheckForNull;
  28. import javax.annotation.Nullable;
  29. import org.apache.commons.lang.StringUtils;
  30. import org.sonar.api.resources.Qualifiers;
  31. import org.sonar.api.server.ServerSide;
  32. import org.sonar.db.DbClient;
  33. import org.sonar.db.DbSession;
  34. import org.sonar.db.component.ComponentDto;
  35. import org.sonar.db.organization.DefaultTemplates;
  36. import org.sonar.db.permission.GroupPermissionDto;
  37. import org.sonar.db.permission.OrganizationPermission;
  38. import org.sonar.db.permission.UserPermissionDto;
  39. import org.sonar.db.permission.template.PermissionTemplateCharacteristicDto;
  40. import org.sonar.db.permission.template.PermissionTemplateDto;
  41. import org.sonar.db.permission.template.PermissionTemplateGroupDto;
  42. import org.sonar.db.permission.template.PermissionTemplateUserDto;
  43. import org.sonar.server.es.ProjectIndexer;
  44. import org.sonar.server.es.ProjectIndexers;
  45. import org.sonar.server.permission.ws.template.DefaultTemplatesResolver;
  46. import org.sonar.server.permission.ws.template.DefaultTemplatesResolverImpl;
  47. import org.sonar.server.user.UserSession;
  48. import static com.google.common.base.Preconditions.checkArgument;
  49. import static java.lang.String.format;
  50. import static java.util.Collections.singletonList;
  51. import static org.sonar.api.security.DefaultGroups.isAnyone;
  52. import static org.sonar.api.web.UserRole.PUBLIC_PERMISSIONS;
  53. @ServerSide
  54. public class PermissionTemplateService {
  55. private final DbClient dbClient;
  56. private final ProjectIndexers projectIndexers;
  57. private final UserSession userSession;
  58. private final DefaultTemplatesResolver defaultTemplatesResolver;
  59. public PermissionTemplateService(DbClient dbClient, ProjectIndexers projectIndexers, UserSession userSession,
  60. DefaultTemplatesResolver defaultTemplatesResolver) {
  61. this.dbClient = dbClient;
  62. this.projectIndexers = projectIndexers;
  63. this.userSession = userSession;
  64. this.defaultTemplatesResolver = defaultTemplatesResolver;
  65. }
  66. public boolean wouldUserHaveScanPermissionWithDefaultTemplate(DbSession dbSession,
  67. String organizationUuid, @Nullable Integer userId,
  68. String projectKey, String qualifier) {
  69. if (userSession.hasPermission(OrganizationPermission.SCAN, organizationUuid)) {
  70. return true;
  71. }
  72. ComponentDto dto = new ComponentDto().setOrganizationUuid(organizationUuid).setDbKey(projectKey).setQualifier(qualifier);
  73. PermissionTemplateDto template = findTemplate(dbSession, organizationUuid, dto);
  74. if (template == null) {
  75. return false;
  76. }
  77. List<String> potentialPermissions = dbClient.permissionTemplateDao().selectPotentialPermissionsByUserIdAndTemplateId(dbSession, userId, template.getId());
  78. return potentialPermissions.contains(OrganizationPermission.SCAN.getKey());
  79. }
  80. /**
  81. * Apply a permission template to a set of projects. Authorization to administrate these projects
  82. * is not verified. The projects must exist, so the "project creator" permissions defined in the
  83. * template are ignored.
  84. */
  85. public void applyAndCommit(DbSession dbSession, PermissionTemplateDto template, Collection<ComponentDto> projects) {
  86. if (projects.isEmpty()) {
  87. return;
  88. }
  89. for (ComponentDto project : projects) {
  90. copyPermissions(dbSession, template, project, null);
  91. }
  92. projectIndexers.commitAndIndex(dbSession, projects, ProjectIndexer.Cause.PERMISSION_CHANGE);
  93. }
  94. /**
  95. * Apply the default permission template to project. The project can already exist (so it has permissions) or
  96. * can be provisioned (so has no permissions yet).
  97. * @param projectCreatorUserId id of the user who creates the project, only if project is provisioned. He will
  98. */
  99. public void applyDefault(DbSession dbSession, String organizationUuid, ComponentDto component, @Nullable Integer projectCreatorUserId) {
  100. PermissionTemplateDto template = findTemplate(dbSession, organizationUuid, component);
  101. checkArgument(template != null, "Cannot retrieve default permission template");
  102. copyPermissions(dbSession, template, component, projectCreatorUserId);
  103. }
  104. public boolean hasDefaultTemplateWithPermissionOnProjectCreator(DbSession dbSession, String organizationUuid, ComponentDto component) {
  105. PermissionTemplateDto template = findTemplate(dbSession, organizationUuid, component);
  106. return hasProjectCreatorPermission(dbSession, template);
  107. }
  108. private boolean hasProjectCreatorPermission(DbSession dbSession, @Nullable PermissionTemplateDto template) {
  109. return template != null && dbClient.permissionTemplateCharacteristicDao().selectByTemplateIds(dbSession, singletonList(template.getId())).stream()
  110. .anyMatch(PermissionTemplateCharacteristicDto::getWithProjectCreator);
  111. }
  112. private void copyPermissions(DbSession dbSession, PermissionTemplateDto template, ComponentDto project, @Nullable Integer projectCreatorUserId) {
  113. dbClient.groupPermissionDao().deleteByRootComponentId(dbSession, project.getId());
  114. dbClient.userPermissionDao().deleteProjectPermissions(dbSession, project.getId());
  115. List<PermissionTemplateUserDto> usersPermissions = dbClient.permissionTemplateDao().selectUserPermissionsByTemplateId(dbSession, template.getId());
  116. String organizationUuid = template.getOrganizationUuid();
  117. usersPermissions
  118. .stream()
  119. .filter(up -> permissionValidForProject(project, up.getPermission()))
  120. .forEach(up -> {
  121. UserPermissionDto dto = new UserPermissionDto(organizationUuid, up.getPermission(), up.getUserId(), project.getId());
  122. dbClient.userPermissionDao().insert(dbSession, dto);
  123. });
  124. List<PermissionTemplateGroupDto> groupsPermissions = dbClient.permissionTemplateDao().selectGroupPermissionsByTemplateId(dbSession, template.getId());
  125. groupsPermissions
  126. .stream()
  127. .filter(gp -> groupNameValidForProject(project, gp.getGroupName()))
  128. .filter(gp -> permissionValidForProject(project, gp.getPermission()))
  129. .forEach(gp -> {
  130. GroupPermissionDto dto = new GroupPermissionDto()
  131. .setOrganizationUuid(organizationUuid)
  132. .setGroupId(isAnyone(gp.getGroupName()) ? null : gp.getGroupId())
  133. .setRole(gp.getPermission())
  134. .setResourceId(project.getId());
  135. dbClient.groupPermissionDao().insert(dbSession, dto);
  136. });
  137. List<PermissionTemplateCharacteristicDto> characteristics = dbClient.permissionTemplateCharacteristicDao().selectByTemplateIds(dbSession, singletonList(template.getId()));
  138. if (projectCreatorUserId != null) {
  139. Set<String> permissionsForCurrentUserAlreadyInDb = usersPermissions.stream()
  140. .filter(userPermission -> projectCreatorUserId.equals(userPermission.getUserId()))
  141. .map(PermissionTemplateUserDto::getPermission)
  142. .collect(java.util.stream.Collectors.toSet());
  143. characteristics.stream()
  144. .filter(PermissionTemplateCharacteristicDto::getWithProjectCreator)
  145. .filter(up -> permissionValidForProject(project, up.getPermission()))
  146. .filter(characteristic -> !permissionsForCurrentUserAlreadyInDb.contains(characteristic.getPermission()))
  147. .forEach(c -> {
  148. UserPermissionDto dto = new UserPermissionDto(organizationUuid, c.getPermission(), projectCreatorUserId, project.getId());
  149. dbClient.userPermissionDao().insert(dbSession, dto);
  150. });
  151. }
  152. }
  153. private static boolean permissionValidForProject(ComponentDto project, String permission) {
  154. return project.isPrivate() || !PUBLIC_PERMISSIONS.contains(permission);
  155. }
  156. private static boolean groupNameValidForProject(ComponentDto project, String groupName) {
  157. return !project.isPrivate() || !isAnyone(groupName);
  158. }
  159. /**
  160. * Return the permission template for the given component. If no template key pattern match then consider default
  161. * template for the component qualifier.
  162. */
  163. @CheckForNull
  164. private PermissionTemplateDto findTemplate(DbSession dbSession, String organizationUuid, ComponentDto component) {
  165. List<PermissionTemplateDto> allPermissionTemplates = dbClient.permissionTemplateDao().selectAll(dbSession, organizationUuid, null);
  166. List<PermissionTemplateDto> matchingTemplates = new ArrayList<>();
  167. for (PermissionTemplateDto permissionTemplateDto : allPermissionTemplates) {
  168. String keyPattern = permissionTemplateDto.getKeyPattern();
  169. if (StringUtils.isNotBlank(keyPattern) && component.getDbKey().matches(keyPattern)) {
  170. matchingTemplates.add(permissionTemplateDto);
  171. }
  172. }
  173. checkAtMostOneMatchForComponentKey(component.getDbKey(), matchingTemplates);
  174. if (matchingTemplates.size() == 1) {
  175. return matchingTemplates.get(0);
  176. }
  177. DefaultTemplates defaultTemplates = dbClient.organizationDao().getDefaultTemplates(dbSession, organizationUuid)
  178. .orElseThrow(() -> new IllegalStateException(
  179. format("No Default templates defined for organization with uuid '%s'", organizationUuid)));
  180. String qualifier = component.qualifier();
  181. DefaultTemplatesResolverImpl.ResolvedDefaultTemplates resolvedDefaultTemplates = defaultTemplatesResolver.resolve(defaultTemplates);
  182. switch (qualifier) {
  183. case Qualifiers.PROJECT:
  184. return dbClient.permissionTemplateDao().selectByUuid(dbSession, resolvedDefaultTemplates.getProject());
  185. case Qualifiers.VIEW:
  186. String portDefaultTemplateUuid = resolvedDefaultTemplates.getPortfolio().orElseThrow(
  187. () -> new IllegalStateException("Attempt to create a view when Governance plugin is not installed"));
  188. return dbClient.permissionTemplateDao().selectByUuid(dbSession, portDefaultTemplateUuid);
  189. case Qualifiers.APP:
  190. String appDefaultTemplateUuid = resolvedDefaultTemplates.getApplication().orElseThrow(
  191. () -> new IllegalStateException("Attempt to create a view when Governance plugin is not installed"));
  192. return dbClient.permissionTemplateDao().selectByUuid(dbSession, appDefaultTemplateUuid);
  193. default:
  194. throw new IllegalArgumentException(format("Qualifier '%s' is not supported", qualifier));
  195. }
  196. }
  197. private static void checkAtMostOneMatchForComponentKey(String componentKey, List<PermissionTemplateDto> matchingTemplates) {
  198. if (matchingTemplates.size() > 1) {
  199. StringBuilder templatesNames = new StringBuilder();
  200. for (Iterator<PermissionTemplateDto> it = matchingTemplates.iterator(); it.hasNext();) {
  201. templatesNames.append("\"").append(it.next().getName()).append("\"");
  202. if (it.hasNext()) {
  203. templatesNames.append(", ");
  204. }
  205. }
  206. throw new IllegalStateException(MessageFormat.format(
  207. "The \"{0}\" key matches multiple permission templates: {1}."
  208. + " A system administrator must update these templates so that only one of them matches the key.",
  209. componentKey,
  210. templatesNames.toString()));
  211. }
  212. }
  213. }