/*
* Copyright (c) 2008 WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
*
* WSO2 Inc. licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.wso2.carbon.user.mgt.listeners;
import org.wso2.carbon.CarbonConstants;
import org.wso2.carbon.registry.core.RegistryConstants;
import org.wso2.carbon.registry.core.utils.RegistryUtils;
import org.wso2.carbon.user.core.AuthorizationManager;
import org.wso2.carbon.user.core.UserStoreException;
import org.wso2.carbon.user.core.common.AbstractAuthorizationManagerListener;
import org.wso2.carbon.user.core.listener.AuthorizationManagerListener;
/**
* Class to restrict set authorization for super tenant permission nodes
*/
public class PermissionAuthorizationListener extends AbstractAuthorizationManagerListener
implements AuthorizationManagerListener {
@Override
public int getExecutionOrderId() {
return AuthorizationManagerListener.PERMISSION_AUTHORIZATION_LISTENER;
}
@Override
public boolean isRoleAuthorized(String roleName, String resourceId, String action,
AuthorizationManager authorizationManager) throws
UserStoreException {
return isAuthorized(resourceId, authorizationManager);
}
@Override
public boolean isUserAuthorized(String userName, String resourceId, String action,
AuthorizationManager authorizationManager) throws
UserStoreException {
return isAuthorized(resourceId, authorizationManager);
}
public boolean isAuthorized(String resourceId,
AuthorizationManager authorizationManager) throws
UserStoreException {
int tenantId = authorizationManager.getTenantId();
if (tenantId == CarbonConstants.SUPER_TENANT_ID) {
// no restrictions for the super tenant
return true;
}
// so don't allow the rest of the tenants to set any permission to protected nodes
String protectedPermissionPath = RegistryUtils.getAbsolutePath(null,
RegistryConstants.CONFIG_REGISTRY_BASE_PATH +
CarbonConstants.UI_PROTECTED_PERMISSION_COLLECTION);
return !(resourceId.startsWith(protectedPermissionPath));
}
public void resetPermissionOnUpdateRole(String roleName, String newRoleName)
throws UserStoreException {
return;
}
}