/** * This file Copyright (c) 2012 Magnolia International * Ltd. (http://www.magnolia-cms.com). All rights reserved. * * * This file is dual-licensed under both the Magnolia * Network Agreement and the GNU General Public License. * You may elect to use one or the other of these licenses. * * This file is distributed in the hope that it will be * useful, but AS-IS and WITHOUT ANY WARRANTY; without even the * implied warranty of MERCHANTABILITY or FITNESS FOR A * PARTICULAR PURPOSE, TITLE, or NONINFRINGEMENT. * Redistribution, except as permitted by whichever of the GPL * or MNA you select, is prohibited. * * 1. For the GPL license (GPL), you can redistribute and/or * modify this file under the terms of the GNU General * Public License, Version 3, as published by the Free Software * Foundation. You should have received a copy of the GNU * General Public License, Version 3 along with this program; * if not, write to the Free Software Foundation, Inc., 51 * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * 2. For the Magnolia Network Agreement (MNA), this file * and the accompanying materials are made available under the * terms of the MNA which accompanies this distribution, and * is available at http://www.magnolia-cms.com/mna.html * * Any modifications to this file must keep this entire header * intact. * */ package info.magnolia.cms.core; import info.magnolia.cms.security.AccessManager; import info.magnolia.cms.security.AccessManagerImpl; import info.magnolia.cms.security.Permission; import java.util.List; import java.util.Map; import javax.jcr.NamespaceException; import javax.jcr.RepositoryException; import org.apache.jackrabbit.core.SessionImpl; import org.apache.jackrabbit.core.cache.GrowingLRUMap; import org.apache.jackrabbit.core.id.ItemId; import org.apache.jackrabbit.core.id.PropertyId; import org.apache.jackrabbit.core.security.authorization.AbstractCompiledPermissions; import org.apache.jackrabbit.core.security.authorization.PrivilegeManagerImpl; import org.apache.jackrabbit.spi.Name; import org.apache.jackrabbit.spi.Path; import org.apache.jackrabbit.spi.commons.conversion.CachingPathResolver; import org.apache.jackrabbit.spi.commons.conversion.IllegalNameException; import org.apache.jackrabbit.spi.commons.conversion.NameResolver; import org.apache.jackrabbit.spi.commons.conversion.ParsingPathResolver; import org.apache.jackrabbit.spi.commons.conversion.PathResolver; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Permission based on user ACL for given workspace. Caches the result of resolving paths from ids, the caching * implementation based {@link org.apache.jackrabbit.core.security.authorization.principalbased.ACLProvider.CompiledPermissionImpl}. */ public class DefaultACLBasedPermissions extends AbstractCompiledPermissions { protected final AccessManager ami = new AccessManagerImpl(); @SuppressWarnings("unchecked") protected final Map<ItemId, Boolean> readCache = new GrowingLRUMap(1024, 5000); protected final Object monitor = new Object(); protected SessionImpl session; private static final Logger log = LoggerFactory.getLogger(DefaultACLBasedPermissions.class); protected final long permissionMapping[][] = { {org.apache.jackrabbit.core.security.authorization.Permission.READ, Permission.READ}, {org.apache.jackrabbit.core.security.authorization.Permission.SET_PROPERTY, Permission.SET}, {org.apache.jackrabbit.core.security.authorization.Permission.ADD_NODE, Permission.ADD}, {org.apache.jackrabbit.core.security.authorization.Permission.REMOVE_NODE, Permission.REMOVE}, {org.apache.jackrabbit.core.security.authorization.Permission.REMOVE_PROPERTY, Permission.REMOVE}, {org.apache.jackrabbit.core.security.authorization.Permission.READ_AC, Permission.EXECUTE}, {org.apache.jackrabbit.core.security.authorization.Permission.MODIFY_AC, Permission.EXECUTE}, {org.apache.jackrabbit.core.security.authorization.Permission.NODE_TYPE_MNGMT, Permission.ADD}, {org.apache.jackrabbit.core.security.authorization.Permission.VERSION_MNGMT, Permission.EXECUTE}, {org.apache.jackrabbit.core.security.authorization.Permission.LOCK_MNGMT, Permission.EXECUTE}, {org.apache.jackrabbit.core.security.authorization.Permission.LIFECYCLE_MNGMT, Permission.EXECUTE}, {org.apache.jackrabbit.core.security.authorization.Permission.RETENTION_MNGMT, Permission.EXECUTE}, }; protected long convertJackrabbitPermissionsToMagnoliaPermissions(long jackRabbitPermissions) { long magnoliaPermissions = 0; for (long[] mapping : permissionMapping) { long jackrabbitPermission = mapping[0]; long magnoliaPermission = mapping[1]; if ((jackRabbitPermissions & jackrabbitPermission) != 0) { magnoliaPermissions = magnoliaPermissions | magnoliaPermission; } } return magnoliaPermissions; } /** * Used to convert a jackrabbit Path abstraction into a path string with slashes and no namespaces. */ protected final PathResolver pathResolver = new CachingPathResolver(new ParsingPathResolver(null, new NameResolver() { @Override public Name getQName(String name) throws IllegalNameException, NamespaceException { throw new UnsupportedOperationException(); } @Override public String getJCRName(Name name) throws NamespaceException { return name.getLocalName(); } })); public DefaultACLBasedPermissions(List<Permission> permissions, SessionImpl systemSession, Map<?, ?> configuration) { // TODO: use provider instead of fixed impl ami.setPermissionList(permissions); this.session = systemSession; } @Override public boolean canRead(Path itemPath, ItemId itemId) throws RepositoryException { if ((itemId != null && "cafebabe-cafe-babe-cafe-babecafebabe".equals(itemId.toString())) || (itemPath != null && "/".equals(itemPath.toString()))) { // quick check - allow access to root to all like in old mgnl security return true; } if (itemPath == null) { // we deal only with permissions on nodes if (!itemId.denotesNode()) { itemId = ((PropertyId)itemId).getParentId(); } synchronized (monitor) { if (readCache.containsKey(itemId)) { return readCache.get(itemId); } itemPath = session.getHierarchyManager().getPath(itemId); boolean canRead = canRead(itemPath, itemId); readCache.put(itemId, canRead); return canRead; } } String path = pathResolver.getJCRPath(itemPath); log.debug("Read request for " + path + " :: " + itemId); return ami.isGranted(path, Permission.READ); } @Override protected Result buildResult(Path absPath) throws RepositoryException { throw new UnsupportedOperationException(); } @Override public Result getResult(Path absPath) throws RepositoryException { throw new UnsupportedOperationException(); } @Override public boolean grants(Path absPath, int permissions) throws RepositoryException { long magnoliaPermissions = convertJackrabbitPermissionsToMagnoliaPermissions(permissions); return ami.isGranted(pathResolver.getJCRPath(absPath), magnoliaPermissions); } @Override public int getPrivileges(Path absPath) throws RepositoryException { throw new UnsupportedOperationException(); } @Override protected Result buildRepositoryResult() throws RepositoryException { throw new UnsupportedOperationException(); } @Override protected PrivilegeManagerImpl getPrivilegeManagerImpl() throws RepositoryException { throw new UnsupportedOperationException(); } }