/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.jackrabbit.core.security;
import org.apache.jackrabbit.core.id.ItemId;
import org.apache.jackrabbit.core.security.authorization.AccessControlProvider;
import org.apache.jackrabbit.core.security.authorization.Permission;
import org.apache.jackrabbit.core.security.authorization.WorkspaceAccessManager;
import org.apache.jackrabbit.spi.Name;
import org.apache.jackrabbit.spi.Path;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.jcr.AccessDeniedException;
import javax.jcr.RepositoryException;
import java.io.File;
import java.io.FileInputStream;
import java.security.Principal;
import java.security.acl.Group;
import java.util.Enumeration;
import java.util.Properties;
/**
* The simple JBoss access manager is a specialized Access Manager to
* handle Authorization of individuals authenticated through JBoss
* login modules. It maps roles from the JBoss simplegroup class to
* Jackrabbit permissions.
*
* @author dhartford
* @see <a href="http://wiki.apache.org/jackrabbit/SimpleJbossAccessManager">http://wiki.apache.org/jackrabbit/SimpleJbossAccessManager</a>
*/
public class SimpleJBossAccessManager implements AccessManager {
/**
* Logger instance.
*/
private static Logger log =
LoggerFactory.getLogger(SimpleJBossAccessManager.class);
protected boolean system;
protected boolean anonymous;
//--------------------------------------------------------< AccessManager >
public void init(AMContext context)
throws AccessDeniedException, Exception {
init(context, null, null);
}
public void init(AMContext context, AccessControlProvider acProvider, WorkspaceAccessManager wspAccessMgr) throws AccessDeniedException, Exception {
Properties rolemaps = new Properties();
File rolemap = new File(context.getHomeDir(), "rolemapping.properties");
log.info("Loading jbossgroup role mappings from {}", rolemap.getPath());
FileInputStream rolefs = new FileInputStream(rolemap);
try {
rolemaps.load(rolefs);
} finally {
rolefs.close();
}
for (Principal principal : context.getSubject().getPrincipals()) {
if (principal instanceof Group
&& principal.getName().equalsIgnoreCase("Roles")) {
Group group = (Group) principal;
Enumeration< ? extends Principal> members = group.members();
while (members.hasMoreElements()) {
Principal member = members.nextElement();
String role = rolemaps.getProperty(member.getName());
system = system || "full".equalsIgnoreCase(role);
anonymous = anonymous || "read".equalsIgnoreCase(role);
}
}
}
// @todo check permission to access given workspace based on principals
}
public synchronized void close() {
}
public void checkPermission(ItemId id, int permissions)
throws AccessDeniedException, RepositoryException {
if (!isGranted(id, permissions)) {
throw new AccessDeniedException("Access denied");
}
}
public void checkPermission(Path absPath, int permissions) throws AccessDeniedException, RepositoryException {
if (!isGranted(absPath, permissions)) {
throw new AccessDeniedException("Access denied");
}
}
public void checkRepositoryPermission(int permissions) throws AccessDeniedException, RepositoryException {
if (!isGranted((ItemId) null, permissions)) {
throw new AccessDeniedException("Access denied");
}
}
public boolean isGranted(ItemId id, int permissions) throws RepositoryException {
// system has always all permissions
// anonymous has only READ permissions
return system || (anonymous && ((permissions & (WRITE | REMOVE)) == 0));
}
public boolean isGranted(Path absPath, int permissions) throws RepositoryException {
return internalIsGranted(permissions);
}
public boolean isGranted(Path parentPath, Name childName, int permissions) throws RepositoryException {
return internalIsGranted(permissions);
}
public boolean canRead(Path itemPath, ItemId itemId) throws RepositoryException {
return true;
}
public boolean canAccess(String workspaceName) throws RepositoryException {
return system || anonymous;
}
private boolean internalIsGranted(int permissions) {
/* system has always all permissions,
anonymous has only READ permissions */
return system || (anonymous && Permission.READ == permissions);
}
}