org.graylog.plugins.views.search.SearchExecutionGuard Maven / Gradle / Ivy
/*
* Copyright (C) 2020 Graylog, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the Server Side Public License, version 1,
* as published by MongoDB, Inc.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* Server Side Public License for more details.
*
* You should have received a copy of the Server Side Public License
* along with this program. If not, see
* .
*/
package org.graylog.plugins.views.search;
import com.google.common.base.Joiner;
import org.graylog.plugins.views.search.errors.MissingCapabilitiesException;
import org.graylog.plugins.views.search.views.PluginMetadataSummary;
import org.graylog2.plugin.PluginMetaData;
import org.graylog2.shared.rest.exceptions.MissingStreamPermissionException;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.inject.Inject;
import java.util.Map;
import java.util.Set;
import java.util.function.Predicate;
import java.util.stream.Collectors;
public class SearchExecutionGuard {
private static final Logger LOG = LoggerFactory.getLogger(SearchExecutionGuard.class);
private final Map providedCapabilities;
@Inject
public SearchExecutionGuard(Map providedCapabilities) {
this.providedCapabilities = providedCapabilities;
}
public void check(Search search, Predicate hasReadPermissionForStream) {
checkUserIsPermittedToSeeStreams(search.streamIdsForPermissionsCheck(), hasReadPermissionForStream);
checkMissingRequirements(search);
}
public void checkUserIsPermittedToSeeStreams(Set streamIds, Predicate hasReadPermissionForStream) {
final Predicate isForbidden = hasReadPermissionForStream.negate();
final Set forbiddenStreams = streamIds.stream().filter(isForbidden).collect(Collectors.toSet());
if (!forbiddenStreams.isEmpty()) {
throwExceptionMentioningStreamIds(forbiddenStreams);
}
}
private void throwExceptionMentioningStreamIds(Set forbiddenStreams) {
LOG.warn("Not executing search, it is referencing inaccessible streams: [" + Joiner.on(',').join(forbiddenStreams) + "]");
throw new MissingStreamPermissionException("The search is referencing at least one stream you are not permitted to see.",
forbiddenStreams);
}
private void checkMissingRequirements(Search search) {
final Map missingRequirements = missingRequirementsForEach(search);
if (!missingRequirements.isEmpty()) {
throw new MissingCapabilitiesException(missingRequirements);
}
}
private Map missingRequirementsForEach(Search search) {
return search.requires().entrySet().stream()
.filter(entry -> !this.providedCapabilities.containsKey(entry.getKey()))
.collect(Collectors.toMap(Map.Entry::getKey, Map.Entry::getValue));
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy