io.lavagna.web.helper.PermissionMethodInterceptor.java Source code

Java tutorial

Introduction

Here is the source code for io.lavagna.web.helper.PermissionMethodInterceptor.java

Source

/**
 * This file is part of lavagna.
 *
 * lavagna is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * lavagna is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with lavagna.  If not, see <http://www.gnu.org/licenses/>.
 */
package io.lavagna.web.helper;

import io.lavagna.model.Permission;
import io.lavagna.model.UserWithPermission;
import io.lavagna.service.ProjectService;
import io.lavagna.service.UserService;

import java.util.Collections;
import java.util.HashSet;
import java.util.Set;

import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.HttpStatus;
import org.springframework.stereotype.Component;
import org.springframework.web.context.WebApplicationContext;
import org.springframework.web.servlet.handler.HandlerInterceptorAdapter;

/**
 * Interceptor for enforcing {@link ExpectPermission} annotation. See
 * {@link #preHandle(HttpServletRequest, HttpServletResponse, Object)} code.
 */
@Component
public class PermissionMethodInterceptor extends HandlerInterceptorAdapter {

    @Autowired
    private UserService userService;

    @Autowired
    private ProjectService projectService;

    @Autowired
    private WebApplicationContext context;

    public static final Set<AbstractPermissionUrlPath> URL_PATTERNS_TO_CHECK;

    static {
        Set<AbstractPermissionUrlPath> p = new HashSet<>();

        p.add(new AbstractPermissionUrlPath.BoardShortNameUrlPath("/board/{shortName}", "shortName"));
        p.add(new AbstractPermissionUrlPath.BoardShortNameUrlPath("/card-mapping/{boardShortName:[A-Z0-9_]+}",
                "boardShortName:[A-Z0-9_]+"));
        p.add(new AbstractPermissionUrlPath.BoardShortNameUrlPath("/card-by-seq/{boardShortName:[A-Z0-9_]+}",
                "boardShortName:[A-Z0-9_]+"));

        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/actionitem/{actionItemId}", "actionItemId"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/actionlist/{actionListId}", "actionListId"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/comment/{commentId}", "commentId"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/file/{fileId}", "fileId"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/from-actionlist/{from}", "from"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/move-to-actionlist/{to}", "to"));
        p.add(new AbstractPermissionUrlPath.CardDataIdUrlPath("/activity/{id}", "id"));

        p.add(new AbstractPermissionUrlPath.CardIdUrlPath("/card/{cardId}", "cardId"));

        p.add(new AbstractPermissionUrlPath.ColumnIdUrlPath("/column/{columnId}", "columnId"));
        p.add(new AbstractPermissionUrlPath.ColumnIdUrlPath("/from-column/{previousColumnId}", "previousColumnId"));
        p.add(new AbstractPermissionUrlPath.ColumnIdUrlPath("/to-column/{newColumnId}", "newColumnId"));

        p.add(new AbstractPermissionUrlPath.EventIdUrlPath("/undo/{eventId}", "eventId"));

        p.add(new AbstractPermissionUrlPath.ProjectShortNameUrlPath("/project/{projectShortName}",
                "projectShortName"));
        p.add(new AbstractPermissionUrlPath.ProjectShortNameUrlPath("{projectShortName:[A-Z0-9_]+}/manage/",
                "projectShortName:[A-Z0-9_]+"));
        p.add(new AbstractPermissionUrlPath.ProjectShortNameUrlPath("{projectShortName:[A-Z0-9_]+}/milestones/",
                "projectShortName:[A-Z0-9_]+"));
        p.add(new AbstractPermissionUrlPath.ProjectShortNameUrlPath("{projectShortName:[A-Z0-9_]+}/search/",
                "projectShortName:[A-Z0-9_]+"));
        p.add(new AbstractPermissionUrlPath.ProjectShortNameUrlPath("/search/{projectShortName:[A-Z0-9_]+}",
                "projectShortName:[A-Z0-9_]+"));

        p.add(new AbstractPermissionUrlPath.LabelIdUrlPath("/label/{labelId}", "labelId"));
        p.add(new AbstractPermissionUrlPath.LabelValueIdUrlPath("/card-label-value/{labelValueId}",
                "labelValueId"));

        p.add(new AbstractPermissionUrlPath.LabelListValuedIdPath("/label-list-values/{labelListValueId}",
                "labelListValueId"));

        p.add(new AbstractPermissionUrlPath.ColumnDefinitionIdUrlPath("/redefine/{newDefinitionId}",
                "newDefinitionId"));

        URL_PATTERNS_TO_CHECK = Collections.unmodifiableSet(p);
    }

    @Override
    public boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler)
            throws Exception {

        ExpectPermission expectPermission = ExpectPermission.Helper.getAnnotation(handler);
        if (expectPermission == null) {
            return true;
        }

        Class<? extends OwnershipChecker> ownershipChecker = expectPermission.ownershipChecker();

        UserWithPermission user = UserSession.fetchFromRequest(request, userService);

        // check the base permission
        if (user.getBasePermissions().containsKey(expectPermission.value())) {
            return true;
        }

        // check if the resource has a custom ownership checker (the user must
        // have a read permission)
        if (NoOpOwnershipChecker.class != ownershipChecker && user.getBasePermissions().containsKey(Permission.READ)
                && context.getBean(expectPermission.ownershipChecker()).hasOwnership(request, user)) {
            return true;
        }
        //

        // TODO: in some cases the user pass a list of ids as a _body_. This
        // kind of bulk operation will need to ensure the correctness with the
        // right filter.

        // project level check
        Set<String> projectIds = extractProjectIdsFromRequestUri(request.getRequestURI(), projectService);
        if (allProjectsIdsHavePermission(projectIds, user, expectPermission.value())) {
            return true;
        }

        // project level ownership check
        if (NoOpOwnershipChecker.class != ownershipChecker
                && allProjectsIdsHavePermission(projectIds, user, Permission.READ)
                && context.getBean(expectPermission.ownershipChecker()).hasOwnership(request, user)) {
            return true;
        }

        response.sendError(HttpStatus.FORBIDDEN.value());
        return false;
    }

    private static Set<String> extractProjectIdsFromRequestUri(String requestUri, ProjectService projectService) {
        Set<String> projectIds = new HashSet<>();
        for (AbstractPermissionUrlPath p : URL_PATTERNS_TO_CHECK) {
            Set<String> extracted = p.tryToFetchProjectShortNames(requestUri, projectService);
            projectIds.addAll(extracted);
        }
        return projectIds;
    }

    /***
     * Check that all the related project have the expected permission
     * 
     * @param projectIds
     * @param userName
     * @param expectedPermission
     * @return
     */
    private boolean allProjectsIdsHavePermission(Set<String> projectIds, UserWithPermission user,
            Permission expectedPermission) {

        if (projectIds.isEmpty()) {
            return false;
        }

        for (String projectName : projectIds) {
            if (!user.getPermissionsForProject().containsKey(projectName)
                    || !user.getPermissionsForProject().get(projectName).containsKey(expectedPermission)) {
                return false;
            }
        }
        return true;
    }
}