GUACAMOLE-1656: Simplify, clean up, and improve documentation of KSM code.

This commit is contained in:
James Muehlner
2022-08-29 22:08:31 +00:00
parent dfc7e6dd90
commit 8a7bde8e9c
14 changed files with 216 additions and 284 deletions

View File

@@ -26,8 +26,12 @@ import org.apache.guacamole.GuacamoleException;
* Java, except that the get() function can throw GuacamoleException, which * Java, except that the get() function can throw GuacamoleException, which
* is impossible with any of the standard Java lambda type classes, since * is impossible with any of the standard Java lambda type classes, since
* none of them can handle checked exceptions * none of them can handle checked exceptions
*
* @param <T>
* The type of object which will be returned as a result of calling
* get().
*/ */
public abstract class GuacamoleExceptionSupplier<T> { public interface GuacamoleExceptionSupplier<T> {
/** /**
* Returns a value of the declared type. * Returns a value of the declared type.
@@ -38,6 +42,6 @@ public abstract class GuacamoleExceptionSupplier<T> {
* @throws GuacamoleException * @throws GuacamoleException
* If an error occurs while attemping to calculate the return value. * If an error occurs while attemping to calculate the return value.
*/ */
public abstract T get() throws GuacamoleException; public T get() throws GuacamoleException;
} }

View File

@@ -28,6 +28,8 @@ import org.apache.guacamole.form.BooleanField;
import org.apache.guacamole.form.Form; import org.apache.guacamole.form.Form;
import org.apache.guacamole.form.TextField; import org.apache.guacamole.form.TextField;
import org.apache.guacamole.vault.conf.VaultAttributeService; import org.apache.guacamole.vault.conf.VaultAttributeService;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import com.google.inject.Inject; import com.google.inject.Inject;
import com.google.inject.Singleton; import com.google.inject.Singleton;
@@ -39,7 +41,14 @@ import com.google.inject.Singleton;
@Singleton @Singleton
public class KsmAttributeService implements VaultAttributeService { public class KsmAttributeService implements VaultAttributeService {
/**
* Logger for this class.
*/
private static final Logger logger = LoggerFactory.getLogger(KsmAttributeService.class);
/**
* Service for retrieving KSM configuration details.
*/
@Inject @Inject
private KsmConfigurationService configurationService; private KsmConfigurationService configurationService;
@@ -57,7 +66,7 @@ public class KsmAttributeService implements VaultAttributeService {
Arrays.asList(new TextField(KSM_CONFIGURATION_ATTRIBUTE))); Arrays.asList(new TextField(KSM_CONFIGURATION_ATTRIBUTE)));
/** /**
* All KSM-specific attributes for users or connection groups, organized by form. * All KSM-specific attributes for users, connections, or connection groups, organized by form.
*/ */
public static final Collection<Form> KSM_ATTRIBUTES = public static final Collection<Form> KSM_ATTRIBUTES =
Collections.unmodifiableCollection(Arrays.asList(KSM_CONFIGURATION_FORM)); Collections.unmodifiableCollection(Arrays.asList(KSM_CONFIGURATION_FORM));
@@ -108,7 +117,16 @@ public class KsmAttributeService implements VaultAttributeService {
// Expose the user attributes IFF user-level KSM configuration is enabled // Expose the user attributes IFF user-level KSM configuration is enabled
return configurationService.getAllowUserConfig() ? KSM_ATTRIBUTES : Collections.emptyList(); return configurationService.getAllowUserConfig() ? KSM_ATTRIBUTES : Collections.emptyList();
} catch (GuacamoleException e) { }
catch (GuacamoleException e) {
logger.warn(
"Unable to determine if user preference attributes "
+ "should be exposed due to config parsing error: {}.", e.getMessage());
logger.debug(
"Config parsing error prevented checking user preference configuration",
e);
// If the configuration can't be parsed, default to not exposing the attribute // If the configuration can't be parsed, default to not exposing the attribute
return Collections.emptyList(); return Collections.emptyList();

View File

@@ -605,7 +605,7 @@ public class KsmClient {
* value of a specific field, custom field, or file associated with a * value of a specific field, custom field, or file associated with a
* specific record. See: https://docs.keeper.io/secrets-manager/secrets-manager/about/keeper-notation * specific record. See: https://docs.keeper.io/secrets-manager/secrets-manager/about/keeper-notation
* If a fallbackFunction is provided, it will be invoked to generate * If a fallbackFunction is provided, it will be invoked to generate
* a return value in the case where no secrest is found with the given * a return value in the case where no secret is found with the given
* keeper notation. * keeper notation.
* *
* @param notation * @param notation

View File

@@ -19,6 +19,7 @@
package org.apache.guacamole.vault.ksm.secret; package org.apache.guacamole.vault.ksm.secret;
import com.google.common.base.Objects;
import com.google.inject.Inject; import com.google.inject.Inject;
import com.google.inject.Singleton; import com.google.inject.Singleton;
import com.keepersecurity.secretsManager.core.KeeperRecord; import com.keepersecurity.secretsManager.core.KeeperRecord;
@@ -41,6 +42,7 @@ import java.util.concurrent.Future;
import javax.annotation.Nonnull; import javax.annotation.Nonnull;
import org.apache.guacamole.GuacamoleException; import org.apache.guacamole.GuacamoleException;
import org.apache.guacamole.net.auth.Attributes;
import org.apache.guacamole.net.auth.Connectable; import org.apache.guacamole.net.auth.Connectable;
import org.apache.guacamole.net.auth.Connection; import org.apache.guacamole.net.auth.Connection;
import org.apache.guacamole.net.auth.ConnectionGroup; import org.apache.guacamole.net.auth.ConnectionGroup;
@@ -159,7 +161,7 @@ public class KsmSecretService implements VaultSecretService {
// If the user config happens to be the same as admin-defined one, // If the user config happens to be the same as admin-defined one,
// don't bother trying again // don't bother trying again
if (userKsmConfig != ksmConfig) if (!Objects.equal(userKsmConfig, ksmConfig))
return getClient(userKsmConfig).getSecret(name); return getClient(userKsmConfig).getSecret(name);
return CompletableFuture.completedFuture(null); return CompletableFuture.completedFuture(null);
@@ -339,16 +341,12 @@ public class KsmSecretService implements VaultSecretService {
*/ */
private boolean isKsmUserConfigEnabled(Connectable connectable) { private boolean isKsmUserConfigEnabled(Connectable connectable) {
// If it's a connection, user-level config is enabled IFF the appropriate // User-level config is enabled IFF the appropriate attribute is set to true
// attribute is set to true if (connectable instanceof Attributes)
if (connectable instanceof Connection) return KsmAttributeService.TRUTH_VALUE.equals(((Attributes) connectable).getAttributes().get(
return KsmAttributeService.TRUTH_VALUE.equals(((Connection) connectable).getAttributes().get(
KsmAttributeService.KSM_USER_CONFIG_ENABLED_ATTRIBUTE)); KsmAttributeService.KSM_USER_CONFIG_ENABLED_ATTRIBUTE));
// KSM token replacement is not enabled for balancing groups, so for // If there's no attributes to check, the user config cannot be enabled
// now, user-level KSM configs will be explicitly disabled.
// TODO: If token replacement is implemented for balancing groups,
// implement this functionality for them as well.
return false; return false;
} }
@@ -378,10 +376,10 @@ public class KsmSecretService implements VaultSecretService {
private String getUserKSMConfig( private String getUserKSMConfig(
UserContext userContext, Connectable connectable) throws GuacamoleException { UserContext userContext, Connectable connectable) throws GuacamoleException {
// Check if user KSM configs are enabled globally, and for the given connectable // If user KSM configs are enabled globally, and for the given connectable,
// return the user-specific KSM config, if one exists
if (confService.getAllowUserConfig() && isKsmUserConfigEnabled(connectable)) if (confService.getAllowUserConfig() && isKsmUserConfigEnabled(connectable))
// Return the user-specific KSM config, if one exists
return userContext.self().getAttributes().get( return userContext.self().getAttributes().get(
KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE); KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE);
@@ -391,6 +389,106 @@ public class KsmSecretService implements VaultSecretService {
return null; return null;
} }
/**
* Use the provided KSM client to add parameter tokens tokens to the
* provided token map. The supplied filter will be used to replace
* existing tokens in the provided connection parameters before KSM
* record lookup. The supplied GuacamoleConfiguration instance will
* be used to check the protocol, in case RDP-specific behavior is
* needed.
* @param config
* The GuacamoleConfiguration associated with the Connectable for which
* tokens are being added.
*
* @param ksm
* The KSM client to use when fetching records.
*
* @param tokens
* The tokens to which any fetched KSM record values should be added.
*
* @param parameters
* The connection parameters associated with the Connectable for which
* tokens are being added.
*
* @throws GuacamoleException
* If an error occurs while attempting to fetch KSM records or check
* configuration settings.
*/
private void addConnectableTokens(
GuacamoleConfiguration config, KsmClient ksm, Map<String, Future<String>> tokens,
Map<String, String> parameters, TokenFilter filter) throws GuacamoleException {
// Retrieve and define server-specific tokens, if any
String hostname = parameters.get("hostname");
if (hostname != null && !hostname.isEmpty())
addRecordTokens(tokens, "KEEPER_SERVER_",
ksm.getRecordByHost(filter.filter(hostname)));
// Tokens specific to RDP
if ("rdp".equals(config.getProtocol())) {
// Retrieve and define gateway server-specific tokens, if any
String gatewayHostname = parameters.get("gateway-hostname");
if (gatewayHostname != null && !gatewayHostname.isEmpty())
addRecordTokens(tokens, "KEEPER_GATEWAY_",
ksm.getRecordByHost(filter.filter(gatewayHostname)));
// Retrieve and define domain tokens, if any
String domain = parameters.get("domain");
String filteredDomain = null;
if (domain != null && !domain.isEmpty()) {
filteredDomain = filter.filter(domain);
addRecordTokens(tokens, "KEEPER_DOMAIN_",
ksm.getRecordByDomain(filteredDomain));
}
// Retrieve and define gateway domain tokens, if any
String gatewayDomain = parameters.get("gateway-domain");
String filteredGatewayDomain = null;
if (gatewayDomain != null && !gatewayDomain.isEmpty()) {
filteredGatewayDomain = filter.filter(gatewayDomain);
addRecordTokens(tokens, "KEEPER_GATEWAY_DOMAIN_",
ksm.getRecordByDomain(filteredGatewayDomain));
}
// If domain matching is disabled for user records,
// explicitly set the domains to null when storing
// user records to enable username-only matching
if (!confService.getMatchUserRecordsByDomain()) {
filteredDomain = null;
filteredGatewayDomain = null;
}
// Retrieve and define user-specific tokens, if any
String username = parameters.get("username");
if (username != null && !username.isEmpty())
addRecordTokens(tokens, "KEEPER_USER_",
ksm.getRecordByLogin(filter.filter(username),
filteredDomain));
// Retrieve and define gateway user-specific tokens, if any
String gatewayUsername = parameters.get("gateway-username");
if (gatewayUsername != null && !gatewayUsername.isEmpty())
addRecordTokens(tokens, "KEEPER_GATEWAY_USER_",
ksm.getRecordByLogin(
filter.filter(gatewayUsername),
filteredGatewayDomain));
}
else {
// Retrieve and define user-specific tokens, if any
// NOTE that non-RDP connections do not have a domain
// field in the connection parameters, so the domain
// will always be null
String username = parameters.get("username");
if (username != null && !username.isEmpty())
addRecordTokens(tokens, "KEEPER_USER_",
ksm.getRecordByLogin(filter.filter(username), null));
}
}
@Override @Override
public Map<String, Future<String>> getTokens(UserContext userContext, Connectable connectable, public Map<String, Future<String>> getTokens(UserContext userContext, Connectable connectable,
GuacamoleConfiguration config, TokenFilter filter) throws GuacamoleException { GuacamoleConfiguration config, TokenFilter filter) throws GuacamoleException {
@@ -398,89 +496,18 @@ public class KsmSecretService implements VaultSecretService {
Map<String, Future<String>> tokens = new HashMap<>(); Map<String, Future<String>> tokens = new HashMap<>();
Map<String, String> parameters = config.getParameters(); Map<String, String> parameters = config.getParameters();
// Attempt to find a KSM config for this connection or group
String ksmConfig = getConnectionGroupKsmConfig(userContext, connectable);
// Create a list containing just the global / connection group config
List<KsmClient> ksmClients = new ArrayList<>(2);
ksmClients.add(getClient(ksmConfig));
// Only use the user-specific KSM config if explicitly enabled in the global // Only use the user-specific KSM config if explicitly enabled in the global
// configuration, AND for the specific connectable being connected to // configuration, AND for the specific connectable being connected to
String userKsmConfig = getUserKSMConfig(userContext, connectable); String userKsmConfig = getUserKSMConfig(userContext, connectable);
if (userKsmConfig != null && !userKsmConfig.trim().isEmpty()) if (userKsmConfig != null && !userKsmConfig.trim().isEmpty())
ksmClients.add(0, getClient(userKsmConfig)); addConnectableTokens(
config, getClient(userKsmConfig), tokens, parameters, filter);
// Iterate through the KSM clients, processing using the user-specific // Add connection group or globally defined tokens after the user-specific
// config first (if it exists), to ensure that any admin-defined values // ones to ensure that the user config will be overriden on collision
// will override the user-speicifc values String ksmConfig = getConnectionGroupKsmConfig(userContext, connectable);
Iterator<KsmClient> ksmIterator = ksmClients.iterator(); addConnectableTokens(
while (ksmIterator.hasNext()) { config, getClient(ksmConfig), tokens, parameters, filter);
KsmClient ksm = ksmIterator.next();
// Retrieve and define server-specific tokens, if any
String hostname = parameters.get("hostname");
if (hostname != null && !hostname.isEmpty())
addRecordTokens(tokens, "KEEPER_SERVER_",
ksm.getRecordByHost(filter.filter(hostname)));
// Tokens specific to RDP
if ("rdp".equals(config.getProtocol())) {
// Retrieve and define domain tokens, if any
String domain = parameters.get("domain");
String filteredDomain = null;
if (domain != null && !domain.isEmpty()) {
filteredDomain = filter.filter(domain);
addRecordTokens(tokens, "KEEPER_DOMAIN_",
ksm.getRecordByDomain(filteredDomain));
}
// Retrieve and define gateway domain tokens, if any
String gatewayDomain = parameters.get("gateway-domain");
String filteredGatewayDomain = null;
if (gatewayDomain != null && !gatewayDomain.isEmpty()) {
filteredGatewayDomain = filter.filter(gatewayDomain);
addRecordTokens(tokens, "KEEPER_GATEWAY_DOMAIN_",
ksm.getRecordByDomain(filteredGatewayDomain));
}
// If domain matching is disabled for user records,
// explicitly set the domains to null when storing
// user records to enable username-only matching
if (!confService.getMatchUserRecordsByDomain()) {
filteredDomain = null;
filteredGatewayDomain = null;
}
// Retrieve and define user-specific tokens, if any
String username = parameters.get("username");
if (username != null && !username.isEmpty())
addRecordTokens(tokens, "KEEPER_USER_",
ksm.getRecordByLogin(filter.filter(username),
filteredDomain));
// Retrieve and define gateway user-specific tokens, if any
String gatewayUsername = parameters.get("gateway-username");
if (gatewayUsername != null && !gatewayUsername.isEmpty())
addRecordTokens(tokens, "KEEPER_GATEWAY_USER_",
ksm.getRecordByLogin(
filter.filter(gatewayUsername),
filteredGatewayDomain));
}
else {
// Retrieve and define user-specific tokens, if any
// NOTE that non-RDP connections do not have a domain
// field in the connection parameters, so the domain
// will always be null
String username = parameters.get("username");
if (username != null && !username.isEmpty())
addRecordTokens(tokens, "KEEPER_USER_",
ksm.getRecordByLogin(filter.filter(username), null));
}
}
return tokens; return tokens;

View File

@@ -19,25 +19,21 @@
package org.apache.guacamole.vault.ksm.user; package org.apache.guacamole.vault.ksm.user;
import java.util.List;
import java.util.Map; import java.util.Map;
import org.apache.guacamole.net.auth.DelegatingConnection; import org.apache.guacamole.net.auth.DelegatingConnection;
import org.apache.guacamole.vault.ksm.conf.KsmAttributeService;
import org.apache.guacamole.net.auth.Connection; import org.apache.guacamole.net.auth.Connection;
import com.google.common.collect.Maps; import com.google.common.collect.Maps;
/** /**
* A Connection that explicitly adds a blank entry for any defined * A Connection that explicitly adds a blank entry for any defined KSM
* KSM connection attributes. * connection attributes. This ensures that any such field will always
* be displayed to the user when editing a connection through the UI.
*/ */
public class KsmConnection extends DelegatingConnection { public class KsmConnection extends DelegatingConnection {
/**
* The names of all connection attributes defined for the vault.
*/
private List<String> connectionAttributeNames;
/** /**
* Create a new Vault connection wrapping the provided Connection record. Any * Create a new Vault connection wrapping the provided Connection record. Any
* attributes defined in the provided connection attribute forms will have empty * attributes defined in the provided connection attribute forms will have empty
@@ -45,15 +41,9 @@ public class KsmConnection extends DelegatingConnection {
* *
* @param connection * @param connection
* The connection record to wrap. * The connection record to wrap.
*
* @param connectionAttributeNames
* The names of all connection attributes to automatically expose.
*/ */
KsmConnection(Connection connection, List<String> connectionAttributeNames) { KsmConnection(Connection connection) {
super(connection); super(connection);
this.connectionAttributeNames = connectionAttributeNames;
} }
/** /**
@@ -70,13 +60,12 @@ public class KsmConnection extends DelegatingConnection {
public Map<String, String> getAttributes() { public Map<String, String> getAttributes() {
// Make a copy of the existing map // Make a copy of the existing map
Map<String, String> attributeMap = Maps.newHashMap(super.getAttributes()); Map<String, String> attributes = Maps.newHashMap(super.getAttributes());
// Add every defined attribute // Add the configuration attribute
connectionAttributeNames.forEach( attributes.putIfAbsent(KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE, null);
attributeName -> attributeMap.putIfAbsent(attributeName, null)); return attributes;
return attributeMap;
} }
} }

View File

@@ -19,13 +19,14 @@
package org.apache.guacamole.vault.ksm.user; package org.apache.guacamole.vault.ksm.user;
import java.util.HashMap;
import java.util.Map; import java.util.Map;
import org.apache.guacamole.net.auth.ConnectionGroup; import org.apache.guacamole.net.auth.ConnectionGroup;
import org.apache.guacamole.net.auth.DelegatingConnectionGroup; import org.apache.guacamole.net.auth.DelegatingConnectionGroup;
import org.apache.guacamole.vault.ksm.conf.KsmAttributeService; import org.apache.guacamole.vault.ksm.conf.KsmAttributeService;
import com.google.common.collect.Maps;
/** /**
* A KSM-specific connection group implementation that always exposes * A KSM-specific connection group implementation that always exposes
* the KSM_CONFIGURATION_ATTRIBUTE attribute, even when no value is set. * the KSM_CONFIGURATION_ATTRIBUTE attribute, even when no value is set.
@@ -50,17 +51,11 @@ import org.apache.guacamole.vault.ksm.conf.KsmAttributeService;
@Override @Override
public Map<String, String> getAttributes() { public Map<String, String> getAttributes() {
// All attributes defined on the underlying connection group // Make a copy of the existing map
Map<String, String> attributes = super.getAttributes(); Map<String, String> attributes = Maps.newHashMap(super.getAttributes());
// If the attribute is already present, there's no need to add it - return // Add the configuration attribute
// the existing attributes as they are attributes.putIfAbsent(KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE, null);
if (attributes.containsKey(KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE))
return attributes;
// Make a copy of the existing attributes and add KSM_CONFIGURATION_ATTRIBUTE
attributes = new HashMap<>(attributes);
attributes.put(KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE, null);
return attributes; return attributes;
} }

View File

@@ -26,7 +26,6 @@ import java.util.Collections;
import java.util.HashMap; import java.util.HashMap;
import java.util.List; import java.util.List;
import java.util.Map; import java.util.Map;
import java.util.stream.Collectors;
import org.apache.guacamole.GuacamoleException; import org.apache.guacamole.GuacamoleException;
import org.apache.guacamole.language.TranslatableGuacamoleClientException; import org.apache.guacamole.language.TranslatableGuacamoleClientException;
@@ -60,12 +59,6 @@ public class KsmDirectoryService extends VaultDirectoryService {
@Inject @Inject
private KsmConfigurationService configurationService; private KsmConfigurationService configurationService;
/**
* Service for retrieving KSM-specific attributes.
*/
@Inject
private KsmAttributeService ksmAttributeService;
/** /**
* A singleton ObjectMapper for converting a Map to a JSON string when * A singleton ObjectMapper for converting a Map to a JSON string when
* generating a base64-encoded JSON KSM config blob. * generating a base64-encoded JSON KSM config blob.
@@ -235,8 +228,9 @@ public class KsmDirectoryService extends VaultDirectoryService {
public Directory<Connection> getConnectionDirectory( public Directory<Connection> getConnectionDirectory(
Directory<Connection> underlyingDirectory) throws GuacamoleException { Directory<Connection> underlyingDirectory) throws GuacamoleException {
// A Connection directory that will intercept add and update calls to // A Connection directory that will decorate all connections with a
// validate KSM configurations, and translate one-time-tokens, if possible // KsmConnection wrapper to ensure that all defined KSM fields will
// be exposed in the connection group attributes.
return new DecoratingDirectory<Connection>(underlyingDirectory) { return new DecoratingDirectory<Connection>(underlyingDirectory) {
@Override @Override
@@ -244,17 +238,13 @@ public class KsmDirectoryService extends VaultDirectoryService {
// Wrap in a KsmConnection class to ensure that all defined KSM fields will be // Wrap in a KsmConnection class to ensure that all defined KSM fields will be
// present // present
return new KsmConnection( return new KsmConnection(connection);
connection,
ksmAttributeService.getConnectionAttributes().stream().flatMap(
form -> form.getFields().stream().map(field -> field.getName())
).collect(Collectors.toList()));
} }
@Override @Override
protected Connection undecorate(Connection connection) throws GuacamoleException { protected Connection undecorate(Connection connection) throws GuacamoleException {
// Unwrap the KsmUser // Unwrap the KsmConnection
return ((KsmConnection) connection).getUnderlyingConnection(); return ((KsmConnection) connection).getUnderlyingConnection();
} }
@@ -315,6 +305,9 @@ public class KsmDirectoryService extends VaultDirectoryService {
// A User directory that will intercept add and update calls to // A User directory that will intercept add and update calls to
// validate KSM configurations, and translate one-time-tokens, if possible // validate KSM configurations, and translate one-time-tokens, if possible
// Additionally, this directory will will decorate all users with a
// KsmUser wrapper to ensure that all defined KSM fields will be exposed
// in the user attributes.
return new DecoratingDirectory<User>(underlyingDirectory) { return new DecoratingDirectory<User>(underlyingDirectory) {
@Override @Override
@@ -340,11 +333,7 @@ public class KsmDirectoryService extends VaultDirectoryService {
// Wrap in a KsmUser class to ensure that all defined KSM fields will be // Wrap in a KsmUser class to ensure that all defined KSM fields will be
// present // present
return new KsmUser( return new KsmUser(user);
user,
ksmAttributeService.getUserAttributes().stream().flatMap(
form -> form.getFields().stream().map(field -> field.getName())
).collect(Collectors.toList()));
} }
@Override @Override

View File

@@ -19,11 +19,11 @@
package org.apache.guacamole.vault.ksm.user; package org.apache.guacamole.vault.ksm.user;
import java.util.List;
import java.util.Map; import java.util.Map;
import org.apache.guacamole.net.auth.DelegatingUser; import org.apache.guacamole.net.auth.DelegatingUser;
import org.apache.guacamole.net.auth.User; import org.apache.guacamole.net.auth.User;
import org.apache.guacamole.vault.ksm.conf.KsmAttributeService;
import com.google.common.collect.Maps; import com.google.common.collect.Maps;
@@ -33,27 +33,16 @@ import com.google.common.collect.Maps;
*/ */
public class KsmUser extends DelegatingUser { public class KsmUser extends DelegatingUser {
/**
* The names of all user attributes defined for the vault.
*/
private List<String> userAttributeNames;
/** /**
* Create a new Vault user wrapping the provided User record. Any * Create a new Vault user wrapping the provided User record. Any
* attributes defined in the provided user attribute forms will have empty * KSM-specific attribute forms will have empty values automatically
* values automatically populated when getAttributes() is called. * populated when getAttributes() is called.
* *
* @param user * @param user
* The user record to wrap. * The user record to wrap.
*
* @param userAttributeNames
* The names of all user attributes to automatically expose.
*/ */
KsmUser(User user, List<String> userAttributeNames) { KsmUser(User user) {
super(user); super(user);
this.userAttributeNames = userAttributeNames;
} }
/** /**
@@ -70,13 +59,11 @@ public class KsmUser extends DelegatingUser {
public Map<String, String> getAttributes() { public Map<String, String> getAttributes() {
// Make a copy of the existing map // Make a copy of the existing map
Map<String, String> attributeMap = Maps.newHashMap(super.getAttributes()); Map<String, String> attributes = Maps.newHashMap(super.getAttributes());
// Add every defined attribute // Add the configuration attribute
userAttributeNames.forEach( attributes.putIfAbsent(KsmAttributeService.KSM_CONFIGURATION_ATTRIBUTE, null);
attributeName -> attributeMap.putIfAbsent(attributeName, null)); return attributes;
return attributeMap;
} }
} }

View File

@@ -68,7 +68,7 @@ angular.module('settings').directive('guacSettingsPreferences', [function guacSe
callback : function acknowledgeCallback() { callback : function acknowledgeCallback() {
userService.getUser(dataSource, username) userService.getUser(dataSource, username)
.then(user => $scope.user = user) .then(user => $scope.user = user)
.then(guacNotification.showStatus(false)) .then(() => guacNotification.showStatus(false));
} }
}; };
@@ -101,17 +101,6 @@ angular.module('settings').directive('guacSettingsPreferences', [function guacSe
*/ */
$scope.preferences = preferenceService.preferences; $scope.preferences = preferenceService.preferences;
/**
* All available user attributes, as a mapping of form name to form
* object. The form object contains a name, as well as a Map of fields.
*
* The Map type is used here to maintain form/name uniqueness, as well as
* insertion order, to ensure a consistent UI experience.
*
* @type Map<String, Object>
*/
$scope.attributeMap = new Map();
/** /**
* All available user attributes. This is only the set of attribute * All available user attributes. This is only the set of attribute
* definitions, organized as logical groupings of attributes, not attribute * definitions, organized as logical groupings of attributes, not attribute
@@ -263,61 +252,10 @@ angular.module('settings').directive('guacSettingsPreferences', [function guacSe
$scope.user = user; $scope.user = user;
}) })
// Get all datasources that are available for this user // Fetch all user preference attribute forms defined
authenticationService.getAvailableDataSources().forEach(function loadAttributesForDataSource(dataSource) { schemaService.getUserPreferenceAttributes(dataSource).then(function saveAttributes(attributes) {
$scope.attributes = attributes;
// Fetch all user attribute forms defined for the datasource
schemaService.getUserPreferenceAttributes(dataSource).then(function saveAttributes(attributes) {
// Iterate through all attribute forms
attributes.forEach(function addAttribute(attributeForm) {
// If the form with the retrieved name already exists
if ($scope.attributeMap.has(attributeForm.name)) {
const existingFields = $scope.attributeMap.get(attributeForm.name).fields;
// Add each field to the existing list for this form
attributeForm.fields.forEach(function addAllFieldsToExistingMap(field) {
existingFields.set(field.name, field);
})
}
else {
// Create a new entry for the form
$scope.attributeMap.set(attributeForm.name, {
name: attributeForm.name,
// With the field array from the API converted into a Map
fields: attributeForm.fields.reduce(
function addFieldToMap(currentFieldMap, field) {
currentFieldMap.set(field.name, field);
return currentFieldMap;
}, new Map()
)
})
}
});
// Re-generate the attributes array every time
$scope.attributes = Array.of(...$scope.attributeMap.values()).map(function convertFieldsToArray(formObject) {
// Convert each temporary form object to a Form type
return new Form({
name: formObject.name,
// Convert the field map to a simple array of fields
fields: Array.of(...formObject.fields.values())
})
});
});
}); });
}] }]
}; };
}]); }]);

View File

@@ -943,7 +943,7 @@
"HELP_UPDATE_PASSWORD" : "If you wish to change your password, enter your current password and the desired new password below, and click \"Update Password\". The change will take effect immediately.", "HELP_UPDATE_PASSWORD" : "If you wish to change your password, enter your current password and the desired new password below, and click \"Update Password\". The change will take effect immediately.",
"INFO_PASSWORD_CHANGED" : "Password changed.", "INFO_PASSWORD_CHANGED" : "Password changed.",
"INFO_PREFERENCE_ATTRIBUTES_CHANGED" : "User attributes saved.", "INFO_PREFERENCE_ATTRIBUTES_CHANGED" : "User settings saved.",
"NAME_INPUT_METHOD_NONE" : "@:CLIENT.NAME_INPUT_METHOD_NONE", "NAME_INPUT_METHOD_NONE" : "@:CLIENT.NAME_INPUT_METHOD_NONE",
"NAME_INPUT_METHOD_OSK" : "@:CLIENT.NAME_INPUT_METHOD_OSK", "NAME_INPUT_METHOD_OSK" : "@:CLIENT.NAME_INPUT_METHOD_OSK",

View File

@@ -77,6 +77,18 @@ module.exports = {
] ]
}, },
optimization: { optimization: {
minimizer: [
// Minify using Google Closure Compiler
new ClosureWebpackPlugin({ mode: 'STANDARD' }, {
languageIn: 'ECMASCRIPT_2020',
languageOut: 'ECMASCRIPT5',
compilationLevel: 'SIMPLE'
}),
new CssMinimizerPlugin()
],
splitChunks: { splitChunks: {
cacheGroups: { cacheGroups: {

View File

@@ -89,7 +89,7 @@ public class SchemaResource {
*/ */
@GET @GET
@Path("userPreferenceAttributes") @Path("userPreferenceAttributes")
public Collection<Form> getUserAttrigetUserPreferenceAttributesbutes() public Collection<Form> getUserPreferenceAttributes()
throws GuacamoleException { throws GuacamoleException {
// Retrieve all possible user preference attributes // Retrieve all possible user preference attributes

View File

@@ -59,9 +59,22 @@ public class UserObjectTranslator
public void filterExternalObject(UserContext userContext, APIUser object) public void filterExternalObject(UserContext userContext, APIUser object)
throws GuacamoleException { throws GuacamoleException {
// Filter object attributes by defined schema // If a user is editing themselves ...
object.setAttributes(filterAttributes(userContext.getUserAttributes(), if (object.getUsername().equals(userContext.self().getIdentifier())) {
object.getAttributes()));
// ... they may only edit preference attributes
object.setAttributes(filterAttributes(userContext.getUserPreferenceAttributes(),
object.getAttributes()));
}
else {
// In all other cases, filter object attributes by defined schema
object.setAttributes(filterAttributes(userContext.getUserAttributes(),
object.getAttributes()));
}
} }

View File

@@ -22,10 +22,6 @@ package org.apache.guacamole.rest.user;
import com.google.inject.assistedinject.Assisted; import com.google.inject.assistedinject.Assisted;
import com.google.inject.assistedinject.AssistedInject; import com.google.inject.assistedinject.AssistedInject;
import java.util.Iterator;
import java.util.Set;
import java.util.stream.Collectors;
import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletRequest;
import javax.ws.rs.Consumes; import javax.ws.rs.Consumes;
import javax.ws.rs.GET; import javax.ws.rs.GET;
@@ -150,50 +146,14 @@ public class UserResource
@Override @Override
public void updateObject(APIUser modifiedObject) throws GuacamoleException { public void updateObject(APIUser modifiedObject) throws GuacamoleException {
// A user may not use this endpoint to update their password
User currentUser = userContext.self(); User currentUser = userContext.self();
if (
// A user may not use this endpoint to modify themself, except in the case currentUser.getIdentifier().equals(modifiedObject.getUsername())
// that they are modifying one of the user attributes explicitly exposed && modifiedObject.getPassword() != null) {
// in the user preferences form throw new GuacamoleSecurityException(
if (currentUser.getIdentifier().equals(modifiedObject.getUsername())) { "Permission denied. The password update endpoint must"
+ " be used to change the current user's password.");
// A user may not use this endpoint to update their password
if (currentUser.getPassword() != null)
throw new GuacamoleSecurityException(
"Permission denied. The password update endpoint must"
+ " be used to change the current user's password.");
// All attributes exposed in the preferences forms
Set<String> preferenceAttributes = (
userContext.getUserPreferenceAttributes().stream()
.flatMap(form -> form.getFields().stream().map(
field -> field.getName())))
.collect(Collectors.toSet());
// Go through every attribute value and check if it's changed
Iterator<String> keyIterator = modifiedObject.getAttributes().keySet().iterator();
while(keyIterator.hasNext()) {
String key = keyIterator.next();
String newValue = modifiedObject.getAttributes().get(key);
// If it's not a preference attribute, editing is not allowed
if (!preferenceAttributes.contains(key)) {
String currentValue = currentUser.getAttributes().get(key);
// If the value of the attribute has been modified
if (
!(currentValue == null && newValue == null) && (
(currentValue == null && newValue != null) ||
!currentValue.equals(newValue)
)
)
throw new GuacamoleSecurityException(
"Permission denied. Only user preference attributes"
+ " can be modified for the current user.");
}
}
} }
super.updateObject(modifiedObject); super.updateObject(modifiedObject);