This is an automated email from the ASF dual-hosted git repository.

pgil pushed a commit to branch release17.12
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git


The following commit(s) were added to refs/heads/release17.12 by this push:
     new 73b7abb  Fixed: Error in user impersonation with sub permission 
(OFBIZ-11342)
73b7abb is described below

commit 73b7abbdd0ab150a646415fd5c10f9e05b55c286
Author: Gil Portenseigne <gil.portensei...@nereide.fr>
AuthorDate: Fri Feb 7 17:54:52 2020 +0100

    Fixed: Error in user impersonation with sub permission
    (OFBIZ-11342)
    
    Add unit tests for permission control feature.
    Add new method to manage multilevel permission control.
    This allowing an user with PARTYMGR_ADMIN permission to impersonate
    another user with PARTYMGR_PCM_CREATE permission.
---
 .../org/apache/ofbiz/security/SecurityUtil.java    | 168 +++++++++++++++++++++
 .../apache/ofbiz/security/SecurityUtilTest.java    |  47 ++++++
 2 files changed, 215 insertions(+)

diff --git 
a/framework/security/src/main/java/org/apache/ofbiz/security/SecurityUtil.java 
b/framework/security/src/main/java/org/apache/ofbiz/security/SecurityUtil.java
new file mode 100644
index 0000000..37aa15f
--- /dev/null
+++ 
b/framework/security/src/main/java/org/apache/ofbiz/security/SecurityUtil.java
@@ -0,0 +1,168 @@
+/*******************************************************************************
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ 
*******************************************************************************/
+package org.apache.ofbiz.security;
+
+
+import java.util.ArrayList;
+import java.util.List;
+import java.util.Map;
+import java.util.stream.Collectors;
+import org.apache.ofbiz.base.util.Debug;
+import org.apache.ofbiz.base.util.StringUtil;
+import org.apache.ofbiz.base.util.UtilMisc;
+import org.apache.ofbiz.base.util.UtilValidate;
+import org.apache.ofbiz.entity.Delegator;
+import org.apache.ofbiz.entity.GenericEntityException;
+import org.apache.ofbiz.entity.GenericValue;
+import org.apache.ofbiz.entity.condition.EntityCondition;
+import org.apache.ofbiz.entity.condition.EntityOperator;
+import org.apache.ofbiz.entity.util.EntityQuery;
+import org.apache.ofbiz.entity.util.EntityUtil;
+import org.apache.ofbiz.service.ServiceUtil;
+import org.apache.ofbiz.webapp.control.JWTManager;
+
+/**
+ * A <code>Security</code> util.
+ */
+public final class SecurityUtil {
+
+    public static final String module = SecurityUtil.class.getName();
+    private static final List<String> adminPermissions = UtilMisc.toList(
+            "IMPERSONATE_ADMIN",
+            "ARTIFACT_INFO_VIEW",
+            "SERVICE_MAINT",
+            "ENTITY_MAINT",
+            "UTIL_CACHE_VIEW",
+            "UTIL_DEBUG_VIEW");
+
+    /**
+     * Return true if given userLogin possess at least one of the 
adminPermission
+     *
+     * @param delegator
+     * @param userLoginId
+     * @return
+     */
+    public static boolean hasUserLoginAdminPermission(Delegator delegator, 
String userLoginId) {
+        if (UtilValidate.isEmpty(userLoginId)) return false;
+        try {
+            return EntityQuery.use(delegator)
+                    .from("UserLoginAndPermission")
+                    .where(EntityCondition.makeCondition(
+                            EntityCondition.makeCondition("userLoginId", 
userLoginId),
+                            EntityCondition.makeCondition("permissionId", 
EntityOperator.IN, adminPermissions)))
+                    .filterByDate("fromDate", "thruDate", 
"permissionFromDate", "permissionThruDate")
+                    .queryCount() != 0;
+        } catch (GenericEntityException e) {
+            Debug.logError("Failed to resolve user permissions", module);
+        }
+        return false;
+    }
+
+    /**
+     * Return the list of missing permission, if toUserLoginId has more 
permission thant userLoginId, emptyList either.
+     *
+     * @param delegator
+     * @param userLoginId
+     * @param toUserLoginId
+     * @return
+     */
+    public static List<String> hasUserLoginMorePermissionThan(Delegator 
delegator, String userLoginId, String toUserLoginId) {
+        ArrayList<String> returnList = new ArrayList<>();
+        if (UtilValidate.isEmpty(userLoginId) || 
UtilValidate.isEmpty(toUserLoginId)) return returnList;
+        List<String> userLoginPermissionIds;
+        List<String> toUserLoginPermissionIds;
+        try {
+            userLoginPermissionIds = EntityUtil.getFieldListFromEntityList(
+                    EntityQuery.use(delegator)
+                            .from("UserLoginAndPermission")
+                            .where("userLoginId", userLoginId)
+                            .filterByDate("fromDate", "thruDate", 
"permissionFromDate", "permissionThruDate")
+                            .queryList(), "permissionId", true);
+            toUserLoginPermissionIds = EntityUtil.getFieldListFromEntityList(
+                    EntityQuery.use(delegator)
+                            .from("UserLoginAndPermission")
+                            .where("userLoginId", toUserLoginId)
+                            .filterByDate("fromDate", "thruDate", 
"permissionFromDate", "permissionThruDate")
+                            .queryList(), "permissionId", true);
+        } catch (GenericEntityException e) {
+            Debug.logError("Failed to resolve user permissions", module);
+            return returnList;
+        }
+
+        if (UtilValidate.isEmpty(userLoginPermissionIds)) return 
toUserLoginPermissionIds;
+        if (UtilValidate.isEmpty(toUserLoginPermissionIds)) return returnList;
+
+        //Resolve all ADMIN permissions associated with the origin user
+        List<String> adminPermissions = userLoginPermissionIds.stream()
+                .filter(perm -> perm.endsWith("_ADMIN"))
+                .map(perm -> StringUtil.replaceString(perm, "_ADMIN", ""))
+                .collect(Collectors.toList());
+
+        // if toUserLoginPermissionIds contains at least one permission that 
is not in admin permission or userLoginPermissionIds
+        // return the list of missing permission
+        return toUserLoginPermissionIds.stream()
+                .filter(perm ->
+                        !userLoginPermissionIds.contains(perm)
+                        && 
!checkMultiLevelAdminPermissionValidity(adminPermissions, perm))
+                .collect(Collectors.toList());
+    }
+
+    /**
+     * Return if an admin permission is valid for the given list of 
permissions.
+     *
+     * @param permissionIds List of admin permission value without "_ADMIN" 
suffix
+     * @param permission permission to be checked with its suffix
+     *
+     */
+    public static boolean checkMultiLevelAdminPermissionValidity(List<String> 
permissionIds, String permission) {
+        while (permission.lastIndexOf("_") != -1) {
+            permission = permission.substring(0, permission.lastIndexOf("_"));
+            if (permissionIds.contains(permission)) return true;
+        }
+        return false;
+    }
+
+    /**
+     * Return a JWToken for authenticate a userLogin with salt the token by 
userLoginId and currentPassword
+     */
+    public static String generateJwtToAuthenticateUserLogin(Delegator 
delegator, String userLoginId)
+    throws GenericEntityException {
+        GenericValue userLogin = 
EntityQuery.use(delegator).from("UserLogin").where("userLoginId", 
userLoginId).queryOne();
+        Map<String, String> claims = UtilMisc.toMap("userLoginId", 
userLogin.getString("userLoginId"));
+        return JWTManager.createJwt(delegator, claims,
+                userLogin.getString("userLoginId") + 
userLogin.getString("currentPassword"), - 1);
+    }
+
+    /**
+     * For a jwtToken and userLoginId check the coherence between them
+     */
+    public static boolean authenticateUserLoginByJWT(Delegator delegator, 
String userLoginId, String jwtToken) {
+        if (UtilValidate.isNotEmpty(jwtToken)) {
+            try {
+                GenericValue userLogin = 
EntityQuery.use(delegator).from("UserLogin").where("userLoginId", 
userLoginId).queryOne();
+                Map<String, Object> claims = 
JWTManager.validateToken(delegator, jwtToken,
+                        userLogin.getString("userLoginId") + 
userLogin.getString("currentPassword"));
+                return (! ServiceUtil.isError(claims)) && 
userLoginId.equals(claims.get("userLoginId"));
+            } catch (GenericEntityException e) {
+                Debug.logWarning("failed to validate a jwToken for user " + 
userLoginId, module);
+            }
+        }
+        return false;
+    }
+}
diff --git 
a/framework/security/src/test/java/org/apache/ofbiz/security/SecurityUtilTest.java
 
b/framework/security/src/test/java/org/apache/ofbiz/security/SecurityUtilTest.java
new file mode 100644
index 0000000..5f9b339
--- /dev/null
+++ 
b/framework/security/src/test/java/org/apache/ofbiz/security/SecurityUtilTest.java
@@ -0,0 +1,47 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.ofbiz.security;
+
+import java.util.Arrays;
+import java.util.List;
+
+import org.junit.Test;
+
+import static org.junit.Assert.assertTrue;
+import static org.junit.Assert.assertFalse;
+
+public class SecurityUtilTest {
+    @Test
+    public void basicAdminPermissionTesting() {
+        List<String> adminPermissions = Arrays.asList("PARTYMGR", "EXAMPLE", 
"ACCTG_PREF");
+        
assertTrue(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "PARTYMGR_CREATE"));
+        
assertTrue(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "EXAMPLE_CREATE "));
+        
assertTrue(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "EXAMPLE_ADMIN"));
+        
assertFalse(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "ACCTG_ADMIN"));
+    }
+
+    @Test
+    public void multiLevelAdminPermissionTesting() {
+        List<String> adminPermissions = Arrays.asList("PARTYMGR", "EXAMPLE", 
"ACCTG_PREF");
+        
assertTrue(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "PARTYMGR_CME_CREATE"));
+        assertTrue(SecurityUtil.checkMultiLevelAdminPermissionValidity(
+                    adminPermissions, "EXAMPLE_WITH_MULTI_LEVEL_ADMIN"));
+        
assertFalse(SecurityUtil.checkMultiLevelAdminPermissionValidity(adminPermissions,
 "ACCTG_ADMIN"));
+    }
+}

Reply via email to