/* * JBoss, Home of Professional Open Source. * Copyright 2013, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.as.controller.access.rbac; import static org.jboss.as.controller.PathAddress.EMPTY_ADDRESS; import static org.jboss.as.controller.PathAddress.pathAddress; import static org.jboss.as.controller.PathElement.pathElement; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.ACCESS_CONTROL; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.ADD; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.CHILD_TYPE; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.OUTCOME; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.READ_CHILDREN_NAMES_OPERATION; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.RESPONSE_HEADERS; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.RESULT; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.SUCCESS; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertTrue; import org.jboss.as.controller.AbstractAddStepHandler; import org.jboss.as.controller.AbstractRemoveStepHandler; import org.jboss.as.controller.ManagementModel; import org.jboss.as.controller.ProcessType; import org.jboss.as.controller.SimpleResourceDefinition; import org.jboss.as.controller.SimpleResourceDefinition.Parameters; import org.jboss.as.controller.access.constraint.SensitivityClassification; import org.jboss.as.controller.access.management.AccessConstraintDefinition; import org.jboss.as.controller.access.management.SensitiveTargetAccessConstraintDefinition; import org.jboss.as.controller.descriptions.NonResolvingResourceDescriptionResolver; import org.jboss.as.controller.operations.common.Util; import org.jboss.as.controller.operations.global.GlobalNotifications; import org.jboss.as.controller.operations.global.GlobalOperationHandlers; import org.jboss.as.controller.registry.ManagementResourceRegistration; import org.jboss.dmr.ModelNode; import org.junit.Before; import org.junit.Test; /** * Tests filtering of output from {@code read-children-names} requests. * * @author Brian Stansberry (c) 2013 Red Hat Inc. */ public class FilteredReadChildrenNamesTestCase extends AbstractRbacTestBase { public static final String UNCONSTRAINED_RESOURCE = "unconstrained-resource"; public static final String SENSITIVE_CONSTRAINED_RESOURCE = "sensitive-constrained-resource"; public static final String FOO = "foo"; public static final String BAR = "bar"; @Before public void setup() { ModelNode operation = Util.createOperation(ADD, pathAddress(UNCONSTRAINED_RESOURCE, FOO)); executeWithRoles(operation, StandardRole.SUPERUSER); operation = Util.createOperation(ADD, pathAddress(UNCONSTRAINED_RESOURCE, BAR)); executeWithRoles(operation, StandardRole.SUPERUSER); operation = Util.createOperation(ADD, pathAddress(SENSITIVE_CONSTRAINED_RESOURCE, FOO)); executeWithRoles(operation, StandardRole.SUPERUSER); operation = Util.createOperation(ADD, pathAddress(SENSITIVE_CONSTRAINED_RESOURCE, BAR)); executeWithRoles(operation, StandardRole.SUPERUSER); } @Test public void testMonitor() { test(false, StandardRole.MONITOR); } @Test public void testOperator() { test(false, StandardRole.OPERATOR); } @Test public void testMaintainer() { test(false, StandardRole.MAINTAINER); } @Test public void testAdministrator() { test(true, StandardRole.ADMINISTRATOR); } @Test public void testAuditor() { test(true, StandardRole.AUDITOR); } @Test public void testSuperuser() { test(true, StandardRole.SUPERUSER); } @Test public void testMonitorOperator() { test(false, StandardRole.MONITOR, StandardRole.OPERATOR); } @Test public void testMonitorAdministrator() { test(true, StandardRole.MONITOR, StandardRole.ADMINISTRATOR); } @Test public void testAdministratorAuditor() { test(true, StandardRole.ADMINISTRATOR, StandardRole.AUDITOR); } private void test(boolean sensitiveResourceVisible, StandardRole... roles) { ModelNode operation = Util.createOperation(READ_CHILDREN_NAMES_OPERATION, EMPTY_ADDRESS); operation.get(CHILD_TYPE).set(UNCONSTRAINED_RESOURCE); ModelNode result = executeWithRoles(operation, roles); assertEquals(SUCCESS, result.get(OUTCOME).asString()); assertTrue(has(FOO, result.get(RESULT))); assertTrue(has(BAR, result.get(RESULT))); operation.get(CHILD_TYPE).set(SENSITIVE_CONSTRAINED_RESOURCE); result = executeWithRoles(operation, roles); assertEquals(sensitiveResourceVisible, has(FOO, result.get(RESULT))); assertEquals(sensitiveResourceVisible, has(BAR, result.get(RESULT))); assertEquals(!sensitiveResourceVisible, result.get(RESPONSE_HEADERS, ACCESS_CONTROL).get(0) .get("filtered-children-types").get(0).asString().equals(SENSITIVE_CONSTRAINED_RESOURCE)); } private boolean has(String content, ModelNode list) { if (list.isDefined()) { for (ModelNode node : list.asList()) { if (content.equals(node.asString())) { return true; } } } return false; } // model definition private static final SensitivityClassification MY_SENSITIVITY = new SensitivityClassification("test", "my-sensitivity", true, true, true); private static final AccessConstraintDefinition MY_SENSITIVE_CONSTRAINT = new SensitiveTargetAccessConstraintDefinition(MY_SENSITIVITY); @Override protected void initModel(ManagementModel managementModel) { ManagementResourceRegistration registration = managementModel.getRootResourceRegistration(); GlobalOperationHandlers.registerGlobalOperations(registration, ProcessType.EMBEDDED_SERVER); GlobalNotifications.registerGlobalNotifications(registration, ProcessType.EMBEDDED_SERVER); registration.registerSubModel(new SimpleResourceDefinition( new Parameters(pathElement(UNCONSTRAINED_RESOURCE), new NonResolvingResourceDescriptionResolver()) .setAddHandler(new AbstractAddStepHandler() {}) .setRemoveHandler(new AbstractRemoveStepHandler() {}))); registration.registerSubModel(new SimpleResourceDefinition( new Parameters(pathElement(SENSITIVE_CONSTRAINED_RESOURCE), new NonResolvingResourceDescriptionResolver()) .setAddHandler(new AbstractAddStepHandler() {}) .setRemoveHandler(new AbstractRemoveStepHandler() {}) .setAccessConstraints(MY_SENSITIVE_CONSTRAINT))); } }