All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.keycloak.adapters.authorization.PathConfigMatcher Maven / Gradle / Ivy

The newest version!
/*
 * Copyright 2023 Red Hat, Inc. and/or its affiliates
 * and other contributors as indicated by the @author tags.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.keycloak.adapters.authorization;

import java.util.Collection;
import java.util.Collections;
import java.util.HashMap;
import java.util.LinkedHashMap;
import java.util.List;
import java.util.Map;

import org.jboss.logging.Logger;
import org.keycloak.authorization.client.AuthzClient;
import org.keycloak.authorization.client.resource.ProtectedResource;
import org.keycloak.common.util.PathMatcher;
import org.keycloak.representations.adapters.config.PolicyEnforcerConfig;
import org.keycloak.representations.adapters.config.PolicyEnforcerConfig.PathCacheConfig;
import org.keycloak.representations.adapters.config.PolicyEnforcerConfig.PathConfig;
import org.keycloak.representations.idm.authorization.ResourceRepresentation;

/**
 * @author Pedro Igor
 */
public class PathConfigMatcher extends PathMatcher {

    private static Logger LOGGER = Logger.getLogger(PolicyEnforcer.class);

    private final Map paths;
    private final PathCache pathCache;
    private final AuthzClient authzClient;
    private final PolicyEnforcerConfig enforcerConfig;

    PathConfigMatcher(PolicyEnforcerConfig enforcerConfig, AuthzClient authzClient) {
        this.enforcerConfig = enforcerConfig;
        PathCacheConfig cacheConfig = enforcerConfig.getPathCacheConfig();

        if (cacheConfig == null) {
            cacheConfig = new PathCacheConfig();
        }

        this.authzClient = authzClient;
        this.paths = configurePaths();
        this.pathCache = new PathCache(cacheConfig.getMaxEntries(), cacheConfig.getLifespan(), paths);

        if (LOGGER.isDebugEnabled()) {
            LOGGER.debug("Initialization complete. Path configuration:");
            for (PathConfig pathConfig : this.paths.values()) {
                LOGGER.debug(pathConfig);
            }
        }
    }

    @Override
    public PathConfig matches(String targetUri) {
        PathConfig pathConfig = pathCache.get(targetUri);

        if (pathCache.containsKey(targetUri) || pathConfig != null) {
            return pathConfig;
        }

        pathConfig = super.matches(targetUri);

        if (enforcerConfig.getLazyLoadPaths() || enforcerConfig.getPathCacheConfig() != null) {
            if ((pathConfig == null || pathConfig.isInvalidated() || pathConfig.getPath().contains("*"))) {
                try {
                    List matchingResources = authzClient.protection().resource().findByMatchingUri(targetUri);

                    if (matchingResources.isEmpty()) {
                        // if this config is invalidated (e.g.: due to cache expiration) we remove and return null
                        if (pathConfig != null && pathConfig.isInvalidated()) {
                            paths.remove(targetUri);
                            return null;
                        }
                    } else {
                        Map> cipConfig = null;
                        PolicyEnforcerConfig.EnforcementMode enforcementMode = PolicyEnforcerConfig.EnforcementMode.ENFORCING;
                        ResourceRepresentation targetResource = matchingResources.get(0);
                        List methodConfig = null;
                        boolean isStatic = false;

                        if (pathConfig != null) {
                            cipConfig = pathConfig.getClaimInformationPointConfig();
                            enforcementMode = pathConfig.getEnforcementMode();
                            methodConfig = pathConfig.getMethods();
                            isStatic = pathConfig.isStatic();
                        } else {
                            for (PathConfig existingPath : paths.values()) {
                                if (targetResource.getId().equals(existingPath.getId())
                                        && existingPath.isStatic()
                                        && !org.keycloak.representations.adapters.config.PolicyEnforcerConfig.EnforcementMode.DISABLED.equals(existingPath.getEnforcementMode())) {
                                    return null;
                                }
                            }
                        }

                        pathConfig = PathConfig.createPathConfigs(targetResource).iterator().next();

                        if (cipConfig != null) {
                            pathConfig.setClaimInformationPointConfig(cipConfig);
                        }

                        if (methodConfig != null) {
                            pathConfig.setMethods(methodConfig);
                        }

                        pathConfig.setStatic(isStatic);
                        pathConfig.setEnforcementMode(enforcementMode);
                    }
                } catch (Exception cause) {
                    LOGGER.errorf(cause, "Could not lazy load resource with path [" + targetUri + "] from server");
                    return null;
                }
            }
        }

        pathCache.put(targetUri, pathConfig);

        return pathConfig;
    }

    @Override
    protected String getPath(PathConfig entry) {
        return entry.getPath();
    }

    @Override
    protected Collection getPaths() {
        return paths.values();
    }

    public PathCache getPathCache() {
        return pathCache;
    }

    @Override
    protected PathConfig resolvePathConfig(PathConfig originalConfig, String path) {
        if (originalConfig.hasPattern()) {
            ProtectedResource resource = authzClient.protection().resource();

            // search by an exact match
            List search = resource.findByUri(path);

            // if exact match not found, try to obtain from current path the parent path.
            // if path is /resource/1/test and pattern from pathConfig is /resource/{id}/*, parent path is /resource/1
            // this logic allows to match sub resources of a resource instance (/resource/1) to the parent resource,
            // so any permission granted to parent also applies to sub resources
            if (search.isEmpty()) {
                search = resource.findByUri(buildUriFromTemplate(originalConfig.getPath(), path, true));
            }

            if (!search.isEmpty()) {
                ResourceRepresentation targetResource = search.get(0);
                PathConfig config = PathConfig.createPathConfigs(targetResource).iterator().next();

                config.setScopes(originalConfig.getScopes());
                config.setMethods(originalConfig.getMethods());
                config.setParentConfig(originalConfig);
                config.setEnforcementMode(originalConfig.getEnforcementMode());
                config.setClaimInformationPointConfig(originalConfig.getClaimInformationPointConfig());

                return config;
            }
        }

        return null;
    }

    public void removeFromCache(String pathConfig) {
        pathCache.remove(pathConfig);
    }

    public Map getPathConfig() {
        return paths;
    }

    private Map configurePaths() {
        ProtectedResource protectedResource = this.authzClient.protection().resource();
        boolean loadPathsFromServer = !enforcerConfig.getLazyLoadPaths();

        for (PathConfig pathConfig : enforcerConfig.getPaths()) {
            if (!org.keycloak.representations.adapters.config.PolicyEnforcerConfig.EnforcementMode.DISABLED.equals(pathConfig.getEnforcementMode())) {
                loadPathsFromServer = false;
                break;
            }
        }

        if (loadPathsFromServer) {
            LOGGER.info("No path provided in configuration.");
            Map paths = configureAllPathsForResourceServer(protectedResource);

            paths.putAll(configureDefinedPaths(protectedResource, enforcerConfig));

            return paths;
        } else {
            LOGGER.info("Paths provided in configuration.");
            return configureDefinedPaths(protectedResource, enforcerConfig);
        }
    }

    private Map configureDefinedPaths(ProtectedResource protectedResource, PolicyEnforcerConfig enforcerConfig) {
        Map paths = Collections.synchronizedMap(new LinkedHashMap());

        for (PathConfig pathConfig : enforcerConfig.getPaths()) {
            ResourceRepresentation resource;
            String resourceName = pathConfig.getName();
            String path = pathConfig.getPath();

            if (resourceName != null) {
                LOGGER.debugf("Trying to find resource with name [%s] for path [%s].", resourceName, path);
                resource = protectedResource.findByName(resourceName);
            } else {
                LOGGER.debugf("Trying to find resource with uri [%s] for path [%s].", path, path);
                List resources = protectedResource.findByUri(path);

                if (resources.isEmpty()) {
                    resources = protectedResource.findByMatchingUri(path);
                }

                if (resources.size() == 1) {
                    resource = resources.get(0);
                } else if (resources.size() > 1) {
                    throw new RuntimeException("Multiple resources found with the same uri");
                } else {
                    resource = null;
                }
            }

            if (resource != null) {
                pathConfig.setId(resource.getId());
                // if the resource is statically bound to a resource it means the config can not be invalidated
                if (resourceName != null) {
                    pathConfig.setStatic(true);
                }
            }

            if (org.keycloak.representations.adapters.config.PolicyEnforcerConfig.EnforcementMode.DISABLED.equals(pathConfig.getEnforcementMode())) {
                pathConfig.setStatic(true);
            }

            PathConfig existingPath = null;

            for (PathConfig current : paths.values()) {
                if (current.getPath().equals(pathConfig.getPath())) {
                    existingPath = current;
                    break;
                }
            }

            if (existingPath == null) {
                paths.put(pathConfig.getPath(), pathConfig);
            } else {
                existingPath.getMethods().addAll(pathConfig.getMethods());
                existingPath.getScopes().addAll(pathConfig.getScopes());
            }
        }

        return paths;
    }

    private Map configureAllPathsForResourceServer(ProtectedResource protectedResource) {
        LOGGER.info("Querying the server for all resources associated with this application.");
        Map paths = Collections.synchronizedMap(new HashMap());

        if (!enforcerConfig.getLazyLoadPaths()) {
            for (String id : protectedResource.findAll()) {
                ResourceRepresentation resourceDescription = protectedResource.findById(id);

                if (resourceDescription.getUris() != null && !resourceDescription.getUris().isEmpty()) {
                    for(PathConfig pathConfig : PathConfig.createPathConfigs(resourceDescription)) {
                        paths.put(pathConfig.getPath(), pathConfig);
                    }
                }
            }
        }

        return paths;
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy