All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.elasticsearch.xpack.core.security.authz.privilege.ApplicationPrivilege Maven / Gradle / Ivy

/*
 * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
 * or more contributor license agreements. Licensed under the Elastic License
 * 2.0; you may not use this file except in compliance with the Elastic License
 * 2.0.
 */
package org.elasticsearch.xpack.core.security.authz.privilege;

import org.elasticsearch.common.Strings;
import org.elasticsearch.xpack.core.security.support.Automatons;

import java.util.Arrays;
import java.util.Collection;
import java.util.Collections;
import java.util.HashSet;
import java.util.Map;
import java.util.Objects;
import java.util.Set;
import java.util.function.Function;
import java.util.function.Predicate;
import java.util.regex.Pattern;
import java.util.stream.Collectors;

/**
 * An application privilege has an application name (e.g. {@code "my-app"}) that identifies an application (that exists
 * outside of elasticsearch), a privilege name (e.g. {@code "admin}) that is meaningful to that application, and one or
 * more "action patterns" (e.g {@code "admin/user/*", "admin/team/*"}).
 * Action patterns must contain at least one special character from ({@code /}, {@code :}, {@code *}) to distinguish them
 * from privilege names.
 * The action patterns are entirely optional - many application will find that simple "privilege names" are sufficient, but
 * they allow applications to define high level abstract privileges that map to multiple low level capabilities.
 */
public final class ApplicationPrivilege extends Privilege {

    private static final Pattern VALID_APPLICATION_PREFIX = Pattern.compile("^[a-z][A-Za-z0-9]*$");
    private static final Pattern WHITESPACE = Pattern.compile("[\\v\\h]");
    private static final Pattern VALID_NAME = Pattern.compile("^[a-z][a-zA-Z0-9_.-]*$");

    /**
     * A name or action must be composed of printable, visible ASCII characters.
     * That is: letters, numbers & symbols, but no whitespace.
     */
    private static final Pattern VALID_NAME_OR_ACTION = Pattern.compile("^\\p{Graph}*$");

    public static final Function NONE = app -> new ApplicationPrivilege(app, "none", new String[0]);

    private final String application;
    private final String[] patterns;

    public ApplicationPrivilege(String application, String privilegeName, String... patterns) {
        this(application, Collections.singleton(privilegeName), patterns);
    }

    public ApplicationPrivilege(String application, Set name, String... patterns) {
        super(name, patterns);
        this.application = application;
        this.patterns = patterns;
    }

    public String getApplication() {
        return application;
    }

    // Package level for testing
    String[] getPatterns() {
        return patterns;
    }

    /**
     * Validate that the provided application name is valid, and throws an exception otherwise
     *
     * @throws IllegalArgumentException if the name is not valid
     */
    public static void validateApplicationName(String application) {
        validateApplicationName(application, false);
    }

    /**
     * Validate that the provided name is a valid application, or a wildcard pattern for an application and throws an exception otherwise
     *
     * @throws IllegalArgumentException if the name is not valid
     */
    public static void validateApplicationNameOrWildcard(String application) {
        validateApplicationName(application, true);
    }

    /**
     * Validates that an application name matches the following rules:
     * - consist of a "prefix", optionally followed by either "-" or "_" and a suffix
     * - the prefix must begin with a lowercase ASCII letter
     * - the prefix only contain ASCII letter or digits
     * - the prefix must be at least 3 characters long
     * - the suffix must only contain {@link Strings#validFileName valid filename} characters
     * - no part of the name may contain whitespace
     * If {@code allowWildcard} is true, then the names that end with a '*', and would match a valid
     * application name are also accepted.
     */
    private static void validateApplicationName(String application, boolean allowWildcard) {
        if (Strings.isEmpty(application)) {
            throw new IllegalArgumentException("Application names cannot be blank");
        }
        final int asterisk = application.indexOf('*');
        if (asterisk != -1) {
            if (allowWildcard == false) {
                throw new IllegalArgumentException("Application names may not contain '*' (found '" + application + "')");
            }
            if (application.equals("*")) {
                // this is allowed and short-circuiting here makes the later validation simpler
                return;
            }
            if (asterisk != application.length() - 1) {
                throw new IllegalArgumentException("Application name patterns only support trailing wildcards (found '" + application
                    + "')");
            }
        }
        if (WHITESPACE.matcher(application).find()) {
            throw new IllegalArgumentException("Application names may not contain whitespace (found '" + application + "')");
        }

        final String[] parts = application.split("[_-]", 2);
        String prefix = parts[0];
        if (prefix.endsWith("*")) {
            prefix = prefix.substring(0, prefix.length() - 1);
        }
        if (VALID_APPLICATION_PREFIX.matcher(prefix).matches() == false) {
            throw new IllegalArgumentException("An application name prefix must match the pattern " + VALID_APPLICATION_PREFIX.pattern()
                + " (found '" + prefix + "')");
        }
        if (prefix.length() < 3 && asterisk == -1) {
            throw new IllegalArgumentException("An application name prefix must be at least 3 characters long (found '" + prefix + "')");
        }

        if (parts.length > 1) {
            String suffix = parts[1];
            if (allowWildcard && suffix.endsWith("*")) {
                suffix = suffix.substring(0, suffix.length() - 1);
            }
            if (Strings.validFileName(suffix) == false) {
                throw new IllegalArgumentException("An application name suffix may not contain any of the characters '" +
                    Strings.collectionToDelimitedString(Strings.INVALID_FILENAME_CHARS, "") + "' (found '" + suffix + "')");
            }
        }
    }

    /**
     * Validate that the provided privilege name is valid, and throws an exception otherwise
     *
     * @throws IllegalArgumentException if the name is not valid
     */
    public static void validatePrivilegeName(String name) {
        if (isValidPrivilegeName(name) == false) {
            throw new IllegalArgumentException("Application privilege names must match the pattern " + VALID_NAME.pattern()
                + " (found '" + name + "')");
        }
    }

    private static boolean isValidPrivilegeName(String name) {
        return VALID_NAME.matcher(name).matches();
    }

    /**
     * Validate that the provided name is a valid privilege name or action name, and throws an exception otherwise
     *
     * @throws IllegalArgumentException if the name is not valid
     */
    public static void validatePrivilegeOrActionName(String name) {
        if (VALID_NAME_OR_ACTION.matcher(name).matches() == false) {
            throw new IllegalArgumentException("Application privilege names and actions must match the pattern "
                + VALID_NAME_OR_ACTION.pattern() + " (found '" + name + "')");
        }
    }

    /**
     * Finds or creates a collection of application privileges with the provided names.
     * If application is a wildcard, it will be expanded to all matching application names in {@code stored}
     * Each element in {@code name} may be the name of a stored privilege (to be resolved from {@code stored}, or a bespoke action pattern.
     */
    public static Set get(String application, Set name, Collection stored) {
        if (name.isEmpty()) {
            return Collections.singleton(NONE.apply(application));
        } else if (application.contains("*")) {
            Predicate predicate = Automatons.predicate(application);
            final Set result = stored.stream()
                .map(ApplicationPrivilegeDescriptor::getApplication)
                .filter(predicate)
                .distinct()
                .map(appName -> resolve(appName, name, stored))
                .collect(Collectors.toSet());
            if (result.isEmpty()) {
                return Collections.singleton(resolve(application, name, Collections.emptyMap()));
            } else {
                return result;
            }
        } else {
            return Collections.singleton(resolve(application, name, stored));
        }
    }

    private static ApplicationPrivilege resolve(String application, Set name, Collection stored) {
        final Map lookup = stored.stream()
            .filter(apd -> apd.getApplication().equals(application))
            .collect(Collectors.toMap(ApplicationPrivilegeDescriptor::getName, Function.identity()));
        return resolve(application, name, lookup);
    }

    private static ApplicationPrivilege resolve(String application, Set names, Map lookup) {
        final int size = names.size();
        if (size == 0) {
            throw new IllegalArgumentException("empty set should not be used");
        }

        Set actions = new HashSet<>();
        Set patterns = new HashSet<>();
        for (String name : names) {
            if (isValidPrivilegeName(name)) {
                ApplicationPrivilegeDescriptor descriptor = lookup.get(name);
                if (descriptor != null) {
                    patterns.addAll(descriptor.getActions());
                }
            } else {
                actions.add(name);
            }
        }

        patterns.addAll(actions);
        return new ApplicationPrivilege(application, names, patterns.toArray(new String[patterns.size()]));
    }

    @Override
    public String toString() {
        return application + ":" + super.toString() + "(" + Strings.arrayToCommaDelimitedString(patterns) + ")";
    }

    @Override
    public int hashCode() {
        int result = super.hashCode();
        result = 31 * result + Objects.hashCode(application);
        result = 31 * result + Arrays.hashCode(patterns);
        return result;
    }

    @Override
    public boolean equals(Object o) {
        return super.equals(o)
            && Objects.equals(this.application, ((ApplicationPrivilege) o).application)
            && Arrays.equals(this.patterns, ((ApplicationPrivilege) o).patterns);
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy