package it.inaf.ia2.gms.service; import it.inaf.ia2.gms.exception.UnauthorizedException; import it.inaf.ia2.gms.model.Permission; import it.inaf.ia2.gms.model.RapUser; import it.inaf.ia2.gms.model.UserPermission; import it.inaf.ia2.gms.persistence.LoggingDAO; import it.inaf.ia2.gms.persistence.model.PermissionEntity; import it.inaf.ia2.gms.persistence.PermissionsDAO; import it.inaf.ia2.gms.persistence.model.GroupEntity; import it.inaf.ia2.gms.rap.RapClient; import java.util.ArrayList; import java.util.List; import java.util.Map; import java.util.Optional; import java.util.Set; import java.util.function.Function; import java.util.stream.Collectors; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Service; @Service public class PermissionsService { private final PermissionsDAO permissionsDAO; private final RapClient rapClient; private final LoggingDAO loggingDAO; @Autowired public PermissionsService(PermissionsDAO permissionsDAO, RapClient rapClient, LoggingDAO loggingDAO) { this.permissionsDAO = permissionsDAO; this.rapClient = rapClient; this.loggingDAO = loggingDAO; } public List getAllPermissions(GroupEntity group) { List permissions = permissionsDAO.getGroupsPermissions(group.getId()); Set userIdentifiers = permissions.stream() .map(p -> p.getUserId()) .collect(Collectors.toSet()); Map users = rapClient.getUsers(userIdentifiers).stream() .collect(Collectors.toMap(RapUser::getId, Function.identity())); List result = new ArrayList<>(); for (PermissionEntity p : permissions) { RapUser rapUser = users.get(p.getUserId()); if (rapUser != null) { UserPermission permission = new UserPermission(); permission.setPermission(p.getPermission()); permission.setUser(rapUser); result.add(permission); } } return result; } public void verifyUserCanManagePermissions(GroupEntity group, String userId) { Permission currentNodePermissions = getUserPermissionForGroup(group, userId); if (currentNodePermissions != Permission.ADMIN) { loggingDAO.logAction("Unauthorized attempt to manage permissions"); throw new UnauthorizedException("Only admin users can handle permissions"); } } public Permission getUserPermissionForGroup(GroupEntity group, String userId) { List permissions = permissionsDAO.findUserPermissions(userId, group.getPath()); return PermissionUtils.getGroupPermission(group, permissions).orElse(null); } public void removePermission(GroupEntity group, String userId) { permissionsDAO.deletePermission(group.getId(), userId); } public PermissionEntity addPermission(GroupEntity group, String userId, Permission permission) { Optional existingPermissionEntity = permissionsDAO.findPermissionEntity(group.getId(), userId); PermissionEntity permissionEntity; if (existingPermissionEntity.isPresent()) { permissionEntity = existingPermissionEntity.get(); Permission resultingPermission = Permission.addPermission(permissionEntity.getPermission(), permission); if (resultingPermission == permissionEntity.getPermission()) { return permissionEntity; } else { permissionEntity.setPermission(resultingPermission); } } else { permissionEntity = new PermissionEntity(); permissionEntity.setGroupId(group.getId()); permissionEntity.setUserId(userId); permissionEntity.setPermission(permission); permissionEntity.setGroupPath(group.getPath()); } return permissionsDAO.createOrUpdatePermission(permissionEntity); } }