/** * This file Copyright (c) 2003-2012 Magnolia International * Ltd. (http://www.magnolia-cms.com). All rights reserved. * * * This file is dual-licensed under both the Magnolia * Network Agreement and the GNU General Public License. * You may elect to use one or the other of these licenses. * * This file is distributed in the hope that it will be * useful, but AS-IS and WITHOUT ANY WARRANTY; without even the * implied warranty of MERCHANTABILITY or FITNESS FOR A * PARTICULAR PURPOSE, TITLE, or NONINFRINGEMENT. * Redistribution, except as permitted by whichever of the GPL * or MNA you select, is prohibited. * * 1. For the GPL license (GPL), you can redistribute and/or * modify this file under the terms of the GNU General * Public License, Version 3, as published by the Free Software * Foundation. You should have received a copy of the GNU * General Public License, Version 3 along with this program; * if not, write to the Free Software Foundation, Inc., 51 * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * 2. For the Magnolia Network Agreement (MNA), this file * and the accompanying materials are made available under the * terms of the MNA which accompanies this distribution, and * is available at http://www.magnolia-cms.com/mna.html * * Any modifications to this file must keep this entire header * intact. * */ package info.magnolia.cms.security; import info.magnolia.context.MgnlContext; import java.io.IOException; import javax.jcr.Session; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * This Filter protects URI as defined by ROLE(s)/GROUP(s) ACL. * * @version $Id$ */ public class URISecurityFilter extends BaseSecurityFilter { private static final Logger log = LoggerFactory.getLogger(URISecurityFilter.class); public static final String URI_REPOSITORY = "uri"; public static final String URI_WORKSPACE = "default"; /** * Checks access from Listener / Authenticator / AccessLock. * @param request HttpServletRequest as received by the service method * @param response HttpServletResponse as received by the service method * @return boolean <code>true</code> if access to the resource is allowed * @throws IOException can be thrown when the servlet is unable to write to the response stream */ @Override public boolean isAllowed(HttpServletRequest request, HttpServletResponse response) throws IOException { // todo MAGNOLIA-1617 move this to separate filter final IPSecurityManager ipSecurityManager = IPSecurityManager.Factory.getInstance(); if (!ipSecurityManager.isAllowed(request)) { response.setStatus(HttpServletResponse.SC_FORBIDDEN); return false; } if (Lock.isSystemLocked()) { // todo - move Lock checks to separate filter response.setStatus(HttpServletResponse.SC_SERVICE_UNAVAILABLE); return false; } final boolean authorized = isAuthorized(request); if (!authorized) { final int statusCode = SecurityUtil.isAnonymous() ? HttpServletResponse.SC_UNAUTHORIZED : HttpServletResponse.SC_FORBIDDEN; response.setStatus(statusCode); } return authorized; } /** * Validates user permissions on URI. * * @deprecated since 4.5 use {@link #isAuthorized(HttpServletRequest)} instead. */ @Deprecated protected boolean isAuthorized(AccessManager accessManager, HttpServletRequest request) { return isAuthorized(request); } /** * Validates user permissions on URI. */ protected boolean isAuthorized(HttpServletRequest request) { String permission; if (request.getMethod().equalsIgnoreCase("HEAD") || request.getMethod().equalsIgnoreCase("GET")) { permission = Session.ACTION_READ; } else { permission = Session.ACTION_ADD_NODE; } final String uri = MgnlContext.getAggregationState().getCurrentURI(); boolean grant = PermissionUtil.isGranted("uri", uri, permission); log.debug("user {} has " + (grant ? "" : "NOT ") + "been granted permission {} to access uri {}", new Object[] { MgnlContext.getUser().getName(), permission, uri }); return grant; } }