/* * JBoss, Home of Professional Open Source. * Copyright 2013, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.as.domain.management.access; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.ACCESS; import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.AUTHORIZATION; import java.util.Arrays; import java.util.List; import org.jboss.as.controller.AttributeDefinition; import org.jboss.as.controller.ListAttributeDefinition; import org.jboss.as.controller.PathElement; import org.jboss.as.controller.SimpleAttributeDefinition; import org.jboss.as.controller.SimpleAttributeDefinitionBuilder; import org.jboss.as.controller.SimpleResourceDefinition; import org.jboss.as.controller.StringListAttributeDefinition; import org.jboss.as.controller.access.CombinationPolicy; import org.jboss.as.controller.access.management.AccessConstraintUtilizationRegistry; import org.jboss.as.controller.access.management.DelegatingConfigurableAuthorizer; import org.jboss.as.controller.access.management.SensitiveTargetAccessConstraintDefinition; import org.jboss.as.controller.access.management.WritableAuthorizerConfiguration; import org.jboss.as.controller.descriptions.ModelDescriptionConstants; import org.jboss.as.controller.operations.validation.EnumValidator; import org.jboss.as.controller.registry.ManagementResourceRegistration; import org.jboss.as.controller.registry.Resource; import org.jboss.as.domain.management._private.DomainManagementResolver; import org.jboss.dmr.ModelNode; import org.jboss.dmr.ModelType; /** * {@link org.jboss.as.controller.ResourceDefinition} for the Access Control model. * * @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a> */ public class AccessAuthorizationResourceDefinition extends SimpleResourceDefinition { public static final PathElement PATH_ELEMENT = PathElement.pathElement(ACCESS, AUTHORIZATION); public enum Provider { SIMPLE("simple"), RBAC("rbac"); private final String toString; private Provider(String toString) { this.toString = toString; } @Override public String toString() { return toString; } } public static final SimpleAttributeDefinition PERMISSION_COMBINATION_POLICY = new SimpleAttributeDefinitionBuilder(ModelDescriptionConstants.PERMISSION_COMBINATION_POLICY, ModelType.STRING, true) .setDefaultValue(new ModelNode(CombinationPolicy.PERMISSIVE.toString())) .setValidator(new EnumValidator<CombinationPolicy>(CombinationPolicy.class, true, false)) .build(); public static final SimpleAttributeDefinition PROVIDER = new SimpleAttributeDefinitionBuilder(ModelDescriptionConstants.PROVIDER, ModelType.STRING, true) .setDefaultValue(new ModelNode(Provider.SIMPLE.toString())) .setValidator(new EnumValidator<Provider>(Provider.class, true, false)) .build(); public static final SimpleAttributeDefinition USE_IDENTITY_ROLES = new SimpleAttributeDefinitionBuilder(ModelDescriptionConstants.USE_IDENTITY_ROLES, ModelType.BOOLEAN, true) .setDefaultValue(new ModelNode(false)) .build(); static final ListAttributeDefinition STANDARD_ROLE_NAMES = new StringListAttributeDefinition.Builder(ModelDescriptionConstants.STANDARD_ROLE_NAMES) .setStorageRuntime() .setRuntimeServiceNotRequired() .build(); static final ListAttributeDefinition ALL_ROLE_NAMES = new StringListAttributeDefinition.Builder(ModelDescriptionConstants.ALL_ROLE_NAMES) .setStorageRuntime() .setRuntimeServiceNotRequired() .build(); public static final List<AttributeDefinition> CONFIG_ATTRIBUTES = Arrays.<AttributeDefinition>asList(PROVIDER, PERMISSION_COMBINATION_POLICY); public static AccessAuthorizationResourceDefinition forDomain(DelegatingConfigurableAuthorizer configurableAuthorizer) { return new AccessAuthorizationResourceDefinition(configurableAuthorizer, true); } public static AccessAuthorizationResourceDefinition forDomainServer(DelegatingConfigurableAuthorizer configurableAuthorizer) { return new AccessAuthorizationResourceDefinition(configurableAuthorizer, true); } public static AccessAuthorizationResourceDefinition forStandaloneServer(DelegatingConfigurableAuthorizer configurableAuthorizer) { return new AccessAuthorizationResourceDefinition(configurableAuthorizer, false); } private final DelegatingConfigurableAuthorizer configurableAuthorizer; private final boolean isDomain; private AccessAuthorizationResourceDefinition(DelegatingConfigurableAuthorizer configurableAuthorizer, boolean domain) { super(new Parameters(PATH_ELEMENT, DomainManagementResolver.getResolver("core.access-control")) .setAccessConstraints(SensitiveTargetAccessConstraintDefinition.ACCESS_CONTROL)); this.configurableAuthorizer = configurableAuthorizer; isDomain = domain; } @Override public void registerAttributes(ManagementResourceRegistration resourceRegistration) { super.registerAttributes(resourceRegistration); WritableAuthorizerConfiguration authorizerConfiguration = configurableAuthorizer.getWritableAuthorizerConfiguration(); resourceRegistration.registerReadWriteAttribute(PROVIDER, null, new AccessAuthorizationProviderWriteAttributeHander(configurableAuthorizer)); resourceRegistration.registerReadWriteAttribute(USE_IDENTITY_ROLES, null, new AccessAuthorizationUseIdentityRolesWriteAttributeHander(configurableAuthorizer.getWritableAuthorizerConfiguration())); resourceRegistration.registerReadWriteAttribute(PERMISSION_COMBINATION_POLICY, null, new AccessAuthorizationCombinationPolicyWriteAttributeHandler(authorizerConfiguration)); resourceRegistration.registerReadOnlyAttribute(STANDARD_ROLE_NAMES, AccessAuthorizationRolesHandler.getStandardRolesHandler(authorizerConfiguration)); resourceRegistration.registerReadOnlyAttribute(ALL_ROLE_NAMES, AccessAuthorizationRolesHandler.getAllRolesHandler(authorizerConfiguration)); } @Override public void registerChildren(ManagementResourceRegistration resourceRegistration) { // Role Mapping resourceRegistration.registerSubModel(RoleMappingResourceDefinition.create(configurableAuthorizer, isDomain)); // Scoped roles if (isDomain) { WritableAuthorizerConfiguration authorizerConfiguration = configurableAuthorizer.getWritableAuthorizerConfiguration(); resourceRegistration.registerSubModel(new ServerGroupScopedRoleResourceDefinition(authorizerConfiguration)); resourceRegistration.registerSubModel(new HostScopedRolesResourceDefinition(authorizerConfiguration)); } // Constraints // -- Application Type resourceRegistration.registerSubModel(ApplicationClassificationParentResourceDefinition.INSTANCE); // -- Sensitivity Classification resourceRegistration.registerSubModel(SensitivityClassificationParentResourceDefinition.INSTANCE); // -- Vault Expression resourceRegistration.registerSubModel(SensitivityResourceDefinition.createVaultExpressionConfiguration()); } @Override public void registerOperations(ManagementResourceRegistration resourceRegistration) { super.registerOperations(resourceRegistration); if (isDomain) { // Op to apply config from the master to a slave resourceRegistration.registerOperationHandler(AccessAuthorizationDomainSlaveConfigHandler.DEFINITION, new AccessAuthorizationDomainSlaveConfigHandler(configurableAuthorizer)); } } public static Resource createResource(AccessConstraintUtilizationRegistry registry) { Resource accessControlRoot = Resource.Factory.create(); accessControlRoot.registerChild(AccessConstraintResources.APPLICATION_PATH_ELEMENT, AccessConstraintResources.getApplicationConfigResource(registry)); accessControlRoot.registerChild(AccessConstraintResources.SENSITIVITY_PATH_ELEMENT, AccessConstraintResources.getSensitivityResource(registry)); accessControlRoot.registerChild(AccessConstraintResources.VAULT_PATH_ELEMENT, AccessConstraintResources.VAULT_RESOURCE); return accessControlRoot; } }