/* * Copyright 2000-2004 The Apache Software Foundation. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.jetspeed.services.security.nosecurity; import java.util.Iterator; import java.util.Vector; // Jetspeed Security import org.apache.jetspeed.services.security.RoleManagement; import org.apache.jetspeed.om.security.Role; import org.apache.jetspeed.services.JetspeedSecurity; import org.apache.jetspeed.om.security.BaseJetspeedRole; // Jetspeed Security Exceptions import org.apache.jetspeed.services.security.JetspeedSecurityException; // Turbine import org.apache.turbine.services.TurbineBaseService; /** * <p> The <code>NoRoleManagement</code> class is a Jetspeed * security provider, implementing the <code>RoleManagement</code> interface. * It provides no role management - only the "user" role exists for any user, no roles are * listed or saved, any role requested is supplied with a temp. Role object. * * @author <a href="mailto:ggolden@apache.org">Glenn R. Golden</a> * @version $Id: NoRoleManagement.java,v 1.3 2004/02/23 03:53:24 jford Exp $ */ public class NoRoleManagement extends TurbineBaseService implements RoleManagement { /** * Retrieves all <code>Role</code>s for a given username principal. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @param username a user principal identity to be retrieved. * @return Iterator over all roles associated to the user principal. * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public Iterator getRoles(String username) throws JetspeedSecurityException { // give everyone the "user" role Vector v = new Vector(1); BaseJetspeedRole r = new BaseJetspeedRole(); //r.setNew(false); r.setName(JetspeedSecurity.JETSPEED_ROLE_USER); r.setId(JetspeedSecurity.JETSPEED_ROLE_USER); v.add(r); return v.iterator(); } /** * Retrieves all <code>Role</code>s. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @return Iterator over all roles. * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public Iterator getRoles() throws JetspeedSecurityException { return new Vector().iterator(); } /** * Adds a <code>Role</code> into permanent storage. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void addRole(Role role) throws JetspeedSecurityException { } /** * Saves a <code>Role</code> into permanent storage. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void saveRole(Role role) throws JetspeedSecurityException { } /** * Removes a <code>Role</code> from the permanent store. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @param rolename the principal identity of the role to be retrieved. * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void removeRole(String rolename) throws JetspeedSecurityException { } /** * Grants a role to a user. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure retrieving roles. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void grantRole(String username, String rolename) throws JetspeedSecurityException { } public void grantRole(String username, String rolename, String groupname) throws JetspeedSecurityException { } /** * Grants a role to a user for a specific group. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure retrieving roles. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void grantGroupRole(String username, String groupname, String rolename) throws JetspeedSecurityException { } /** * Revokes a role from a user. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure retrieving roles. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void revokeRole(String username, String rolename) throws JetspeedSecurityException { } /** * Revokes a role from a user for a specific group. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure retrieving roles. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public void revokeRole(String username, String rolename, String groupname) throws JetspeedSecurityException { } /** * Checks for the relationship of user has a role. Returns true when the user has the given role. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @exception RoleException when the security provider has a general failure retrieving roles. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public boolean hasRole(String username, String rolename) throws JetspeedSecurityException { // give everyone the "user" role if (rolename.equals(JetspeedSecurity.JETSPEED_ROLE_USER)) return true; return false; } public boolean hasRole(String username, String rolename, String groupname) throws JetspeedSecurityException { // give everyone the "user" role if (rolename.equals(JetspeedSecurity.JETSPEED_ROLE_USER) && groupname.equals(JetspeedSecurity.JETSPEED_GROUP)) return true; return false; } /** * Retrieves a single <code>Role</code> for a given rolename principal. * * The security service may optionally check the current user context * to determine if the requestor has permission to perform this action. * * @param rolename a role principal identity to be retrieved. * @return Role the role record retrieved. * @exception RoleException when the security provider has a general failure. * @exception InsufficientPrivilegeException when the requestor is denied due to insufficient privilege */ public Role getRole(String rolename) throws JetspeedSecurityException { BaseJetspeedRole r = new BaseJetspeedRole(); //r.setNew(false); r.setName(rolename); r.setId(rolename); return r; } }