All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.hazelcast.config.PermissionConfig Maven / Gradle / Ivy

The newest version!
/*
 * Copyright (c) 2008-2024, Hazelcast, Inc. All Rights Reserved.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package com.hazelcast.config;

import com.hazelcast.internal.cluster.Versions;
import com.hazelcast.internal.config.ConfigDataSerializerHook;
import com.hazelcast.internal.util.StringUtil;
import com.hazelcast.nio.ObjectDataInput;
import com.hazelcast.nio.ObjectDataOutput;
import com.hazelcast.nio.serialization.IdentifiedDataSerializable;
import com.hazelcast.nio.serialization.impl.Versioned;
import com.hazelcast.security.permission.AllPermissions;
import com.hazelcast.security.permission.AtomicLongPermission;
import com.hazelcast.security.permission.AtomicReferencePermission;
import com.hazelcast.security.permission.CPMapPermission;
import com.hazelcast.security.permission.CachePermission;
import com.hazelcast.security.permission.CardinalityEstimatorPermission;
import com.hazelcast.security.permission.ConfigPermission;
import com.hazelcast.security.permission.ConnectorPermission;
import com.hazelcast.security.permission.CountDownLatchPermission;
import com.hazelcast.security.permission.DurableExecutorServicePermission;
import com.hazelcast.security.permission.ExecutorServicePermission;
import com.hazelcast.security.permission.FlakeIdGeneratorPermission;
import com.hazelcast.security.permission.JobPermission;
import com.hazelcast.security.permission.ListPermission;
import com.hazelcast.security.permission.LockPermission;
import com.hazelcast.security.permission.ManagementPermission;
import com.hazelcast.security.permission.MapPermission;
import com.hazelcast.security.permission.MultiMapPermission;
import com.hazelcast.security.permission.PNCounterPermission;
import com.hazelcast.security.permission.QueuePermission;
import com.hazelcast.security.permission.ReliableTopicPermission;
import com.hazelcast.security.permission.ReplicatedMapPermission;
import com.hazelcast.security.permission.RingBufferPermission;
import com.hazelcast.security.permission.ScheduledExecutorPermission;
import com.hazelcast.security.permission.SemaphorePermission;
import com.hazelcast.security.permission.SetPermission;
import com.hazelcast.security.permission.SqlPermission;
import com.hazelcast.security.permission.TopicPermission;
import com.hazelcast.security.permission.TransactionPermission;
import com.hazelcast.security.permission.UserCodeDeploymentPermission;
import com.hazelcast.security.permission.UserCodeNamespacePermission;
import com.hazelcast.security.permission.VectorCollectionPermission;

import java.io.IOException;
import java.security.Permission;
import java.util.Arrays;
import java.util.Set;
import java.util.concurrent.ConcurrentHashMap;
import java.util.function.Predicate;

import static com.hazelcast.internal.util.SetUtil.createHashSet;
import static java.util.Collections.newSetFromMap;

/**
 * Contains the configuration for a permission.
 */
public class PermissionConfig implements IdentifiedDataSerializable, Versioned {

    private PermissionType type;
    private String name;
    private String principal;
    private Set endpoints = newSetFromMap(new ConcurrentHashMap<>());
    private Set actions = newSetFromMap(new ConcurrentHashMap<>());
    private boolean deny;

    public PermissionConfig() {
    }

    public PermissionConfig(PermissionType type, String name, String principal) {
        this.type = type;
        this.name = name;
        this.principal = principal;
    }

    public PermissionConfig(PermissionConfig permissionConfig) {
        this.type = permissionConfig.type;
        this.name = permissionConfig.getName();
        this.principal = permissionConfig.getPrincipal();
        for (String endpoint : permissionConfig.getEndpoints()) {
            this.endpoints.add(endpoint);
        }
        for (String action : permissionConfig.getActions()) {
            this.actions.add(action);
        }
    }

    /**
     * Type of permission
     */
    public enum PermissionType {
        /**
         * Type backed by {@link AllPermissions}, which implies all checked permissions.
         */
        ALL("all-permissions", AllPermissions.class),
        /**
         * Map
         */
        MAP("map-permission", MapPermission.class),
        /**
         * Queue
         */
        QUEUE("queue-permission", QueuePermission.class),
        /**
         * Topic
         */
        TOPIC("topic-permission", TopicPermission.class),
        /**
         * MultiMap
         */
        MULTIMAP("multimap-permission", MultiMapPermission.class),
        /**
         * List
         */
        LIST("list-permission", ListPermission.class),
        /**
         * Set
         */
        SET("set-permission", SetPermission.class),
        /**
         * Flake ID generator
         */
        FLAKE_ID_GENERATOR("flake-id-generator-permission", FlakeIdGeneratorPermission.class),
        /**
         * Lock
         */
        LOCK("lock-permission", LockPermission.class),
        /**
         * Atomic long
         */
        ATOMIC_LONG("atomic-long-permission", AtomicLongPermission.class),
        /**
         * Atomic long
         */
        ATOMIC_REFERENCE("atomic-reference-permission", AtomicReferencePermission.class),
        /**
         * Countdown Latch
         */
        COUNTDOWN_LATCH("countdown-latch-permission", CountDownLatchPermission.class),
        /**
         * Semaphore
         */
        SEMAPHORE("semaphore-permission", SemaphorePermission.class),
        /**
         * Executor Service
         */
        EXECUTOR_SERVICE("executor-service-permission", ExecutorServicePermission.class),
        /**
         * Transaction
         */
        TRANSACTION("transaction-permission", TransactionPermission.class),
        /**
         * Durable Executor Service
         */
        DURABLE_EXECUTOR_SERVICE("durable-executor-service-permission", DurableExecutorServicePermission.class),
        /**
         * Cardinality Estimator
         */
        CARDINALITY_ESTIMATOR("cardinality-estimator-permission", CardinalityEstimatorPermission.class),
        /**
         * Scheduled executor service
         */
        SCHEDULED_EXECUTOR("scheduled-executor-permission", ScheduledExecutorPermission.class),
        /**
         * JCache/ICache
         */
        CACHE("cache-permission", CachePermission.class),
        /**
         * User code deployment
         */
        USER_CODE_DEPLOYMENT("user-code-deployment-permission", UserCodeDeploymentPermission.class),
        /**
         * Configuration permission
         */
        CONFIG("config-permission", ConfigPermission.class),
        /**
         * CRDT PN Counter
         */
        PN_COUNTER("pn-counter-permission", PNCounterPermission.class),
        /**
         * RingBuffer
         */
        RING_BUFFER("ring-buffer-permission", RingBufferPermission.class),
        /**
         * ReliableTopic
         */
        RELIABLE_TOPIC("reliable-topic-permission", ReliableTopicPermission.class),
        /**
         * ReplicatedMap
         */
        REPLICATEDMAP("replicatedmap-permission", ReplicatedMapPermission.class),
        /**
         * Cluster Management
         */
        MANAGEMENT("management-permission", ManagementPermission.class),
        /**
         * Jet Job permission
         */
        JOB("job-permission", JobPermission.class),
        /**
         * Jet Connector permission
         */
        CONNECTOR("connector-permission", ConnectorPermission.class),
        /**
         * Specific SQL permissions
         */
        SQL("sql-permission", SqlPermission.class),
        /**
         * CP Map permissions
         */
        CPMAP("cpmap-permission", CPMapPermission.class),
        /**
         * User Code Namespace permissions
         */
        USER_CODE_NAMESPACE("user-code-namespace-permission", UserCodeNamespacePermission.class),
        /**
         * Vector collection permissions
         */
        VECTOR_COLLECTION("vector-collection-permission", VectorCollectionPermission.class);

        private final String nodeName;
        private final String className;

        PermissionType(String nodeName, Class permClass) {
            this.nodeName = nodeName;
            this.className = permClass.getName();
        }

        public static PermissionType getType(String nodeName) {
            return findPermissionTypeByFilter(v -> v.nodeName.equals(nodeName));
        }

        public static PermissionType getTypeByPermissionClassName(String permissionClassname) {
            return findPermissionTypeByFilter(v -> v.className.equals(permissionClassname));
        }

        public String getNodeName() {
            return nodeName;
        }

        private static PermissionType findPermissionTypeByFilter(Predicate filterPredicate) {
            return Arrays.stream(values()).filter(filterPredicate).findFirst().orElse(null);
        }
    }

    public PermissionConfig addEndpoint(String endpoint) {
        endpoints.add(endpoint);
        return this;
    }

    public PermissionConfig addAction(String action) {
        actions.add(action);
        return this;
    }

    public PermissionType getType() {
        return type;
    }

    public String getName() {
        return name;
    }

    public String getPrincipal() {
        return principal;
    }

    public Set getEndpoints() {
        return endpoints;
    }

    public Set getActions() {
        return actions;
    }

    public PermissionConfig setType(PermissionType type) {
        this.type = type;
        return this;
    }

    public PermissionConfig setName(String name) {
        this.name = name;
        return this;
    }

    public PermissionConfig setPrincipal(String principal) {
        this.principal = principal;
        return this;
    }

    public PermissionConfig setActions(Set actions) {
        this.actions = actions;
        return this;
    }

    public PermissionConfig setEndpoints(Set endpoints) {
        this.endpoints = endpoints;
        return this;
    }

    @Override
    public int getFactoryId() {
        return ConfigDataSerializerHook.F_ID;
    }

    @Override
    public int getClassId() {
        return ConfigDataSerializerHook.PERMISSION_CONFIG;
    }

    /**
     * Returns {@code true} when the permission should be subtracted (denied) instead of added (granted).
     * @return {@code true} for deny permissions
     * @since 5.4
     */
    public boolean isDeny() {
        return deny;
    }

    /**
     * Configures if this permission config is for a grant ({@code false}, default) permission or deny ({@code true})
     * @param deny value to set
     * @return this instance of the {@link PermissionConfig}
     * @since 5.4
     */
    public PermissionConfig setDeny(boolean deny) {
        this.deny = deny;
        return this;
    }

    @Override
    public void writeData(ObjectDataOutput out) throws IOException {
        out.writeString(type.getNodeName());
        out.writeString(name);
        if (StringUtil.isNullOrEmptyAfterTrim(principal)) {
            out.writeString("*");
        } else {
            out.writeString(principal);
        }

        out.writeInt(endpoints.size());
        for (String endpoint : endpoints) {
            out.writeString(endpoint);
        }

        out.writeInt(actions.size());
        for (String action : actions) {
            out.writeString(action);
        }

        if (out.getVersion().isGreaterOrEqual(Versions.V5_4)) {
            out.writeBoolean(deny);
        }
    }

    @Override
    public void readData(ObjectDataInput in) throws IOException {
        type = PermissionType.getType(in.readString());
        name = in.readString();
        principal = in.readString();

        int endpointsSize = in.readInt();
        if (endpointsSize != 0) {
            Set endpoints = createHashSet(endpointsSize);
            for (int i = 0; i < endpointsSize; i++) {
                endpoints.add(in.readString());
            }
            this.endpoints = endpoints;
        }

        int actionsSize = in.readInt();
        if (actionsSize != 0) {
            Set actions = createHashSet(actionsSize);
            for (int i = 0; i < actionsSize; i++) {
                actions.add(in.readString());
            }
            this.actions = actions;
        }

        if (in.getVersion().isGreaterOrEqual(Versions.V5_4)) {
            deny = in.readBoolean();
        }
    }

    @Override
    @SuppressWarnings("checkstyle:npathcomplexity")
    public boolean equals(Object o) {
        if (this == o) {
            return true;
        }
        if (!(o instanceof PermissionConfig that)) {
            return false;
        }

        if (type != that.type) {
            return false;
        }
        if (name != null ? !name.equals(that.name) : that.name != null) {
            return false;
        }
        if (principal != null ? !principal.equals(that.principal) : that.principal != null) {
            return false;
        }
        if (endpoints != null ? !endpoints.equals(that.endpoints) : that.endpoints != null) {
            return false;
        }
        if (deny != that.deny) {
            return false;
        }
        return actions != null ? actions.equals(that.actions) : that.actions == null;
    }

    @Override
    public int hashCode() {
        int result = type.hashCode();
        result = 31 * result + (name != null ? name.hashCode() : 0);
        result = 31 * result + (principal != null ? principal.hashCode() : 0);
        result = 31 * result + (endpoints != null ? endpoints.hashCode() : 0);
        result = 31 * result + (actions != null ? actions.hashCode() : 0);
        result = 31 * result + Boolean.hashCode(deny);
        return result;
    }

    @Override
    public String toString() {
        return "PermissionConfig{"
                + "type=" + type
                + ", name='" + name + '\''
                + ", clientUuid='" + principal + '\''
                + ", endpoints=" + endpoints
                + ", actions=" + actions
                + ", deny=" + deny
                + '}';
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy