All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.gravitee.am.gateway.handler.uma.resources.endpoint.PermissionEndpoint Maven / Gradle / Ivy

/**
 * Copyright (C) 2015 The Gravitee team (http://gravitee.io)
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *         http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package io.gravitee.am.gateway.handler.uma.resources.endpoint;

import com.fasterxml.jackson.core.type.TypeReference;
import com.fasterxml.jackson.databind.DeserializationFeature;
import com.fasterxml.jackson.databind.ObjectMapper;
import io.gravitee.am.common.exception.oauth2.InvalidRequestException;
import io.gravitee.am.common.utils.ConstantKeys;
import io.gravitee.am.gateway.handler.uma.resources.request.PermissionTicketRequest;
import io.gravitee.am.gateway.handler.uma.resources.response.PermissionTicketResponse;
import io.gravitee.am.model.Domain;
import io.gravitee.am.model.oidc.Client;
import io.gravitee.am.model.uma.PermissionRequest;
import io.gravitee.am.service.PermissionTicketService;
import io.gravitee.common.http.HttpHeaders;
import io.gravitee.common.http.HttpStatusCode;
import io.gravitee.common.http.MediaType;
import io.reactivex.rxjava3.core.Single;
import io.vertx.core.Handler;
import io.vertx.core.json.Json;
import io.vertx.rxjava3.ext.web.RoutingContext;

import java.util.List;
import java.util.function.Predicate;
import java.util.stream.Collectors;

/**
 * 
 * This endpoint is part of the UMA 2.0 Protection API.
 * The permission endpoint defines a means for the Resource Server to request one or more permissions (resource identifiers and corresponding scopes)
 * with the Authorization Server on the client's behalf, and to receive a permission ticket in return.
 * See here
 * 
* * @author Alexandre FARIA (contact at alexandrefaria.net) * @author GraviteeSource Team */ public class PermissionEndpoint implements Handler { private PermissionTicketService permissionTicketService; private Domain domain; public PermissionEndpoint(Domain domain, PermissionTicketService permissionTicketService) { this.domain = domain; this.permissionTicketService = permissionTicketService; } @Override public void handle(RoutingContext context) { Client client = context.get(ConstantKeys.CLIENT_CONTEXT_KEY); this.extractRequest(context) .flatMap(this::bodyValidation) .map(this::toPermissionRequest) .flatMap(permissionRequests -> permissionTicketService.create(permissionRequests, domain.getId(), client.getId())) .map(PermissionTicketResponse::from) .subscribe( permission -> context.response() .putHeader(HttpHeaders.CACHE_CONTROL, "no-store") .putHeader(HttpHeaders.PRAGMA, "no-cache") .putHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON) .setStatusCode(HttpStatusCode.CREATED_201) .end(Json.encodePrettily(permission)) , context::fail ); } /** * Specification state : * Requesting multiple permissions might be appropriate, for example, in cases where the resource server expects the requesting party * to need access to several related resources if they need access to any one of the resources * * Means : Body can either be a JsonArray or a JsonObject, we need to handle both case. * * See here * @param context RoutingContext * @return List of PermissionRequest */ private Single> extractRequest(RoutingContext context) { List result; try { ObjectMapper objectMapper = new ObjectMapper().enable(DeserializationFeature.ACCEPT_SINGLE_VALUE_AS_ARRAY); return Single.just(objectMapper.readValue(context.body().asString(), new TypeReference<>() { })); } catch (Exception err) { return Single.error(new InvalidRequestException("Unable to parse body permission request")); } } private List toPermissionRequest(List requestedPermissions) { return requestedPermissions.stream() .map(request -> new PermissionRequest().setResourceId(request.getResourceId()).setResourceScopes(request.getResourceScopes())) .collect(Collectors.toList()); } /** * Both resource_id & resource_scopes are mandatory fields. */ private Single> bodyValidation(List toValidate) { if (toValidate.stream().anyMatch(invalidPermissionRequest())) { return Single.error(new InvalidRequestException("resource_id and resource_scopes are mandatory.")); } return Single.just(toValidate); } /** * Rules inspired from specification here * * Requesting a permission with no scopes might be appropriate, for example, in cases where an access attempt involves an API call * that is ambiguous without further context (role-based scopes such as user and admin could have this ambiguous quality, * and an explicit client request for a particular scope at the token endpoint later can clarify the desired access). * * This predicate checks if a permission request is invalid based on the following rules: * - The permission request is null. * - The resource ID of the permission request is null or empty. * - The permission request contains resource scopes, and any of these scopes are null or empty. * * @return a predicate that tests if a permission request is invalid. */ private static Predicate invalidPermissionRequest() { return permission -> permission == null || // Permission resource id is not correct (permission.getResourceId() == null || permission.getResourceId().isEmpty()) || // Permission is empty list (permission.getResourceScopes() != null && permission.getResourceScopes().isEmpty()) || // Or Permission request contains empty string scopes (only checking for empty scope values, scopes may not be informed as defined into the specification) (permission.getResourceScopes() != null && !permission.getResourceScopes().isEmpty() && permission.getResourceScopes().stream().anyMatch(s -> (s == null || s.isEmpty()))); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy