/* * JBoss, Home of Professional Open Source. * Copyright 2013, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.as.test.integration.management.rbac; import static org.jboss.as.test.integration.management.rbac.RbacUtil.ADMINISTRATOR_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.ADMINISTRATOR_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.AUDITOR_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.AUDITOR_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.DEPLOYER_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.DEPLOYER_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.MAINTAINER_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.MAINTAINER_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.MONITOR_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.MONITOR_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.OPERATOR_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.OPERATOR_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.SUPERUSER_ROLE; import static org.jboss.as.test.integration.management.rbac.RbacUtil.SUPERUSER_USER; import static org.jboss.as.test.integration.management.rbac.RbacUtil.addRoleMapping; import static org.jboss.as.test.integration.management.rbac.RbacUtil.addRoleUser; import static org.jboss.as.test.integration.management.rbac.RbacUtil.removeRoleMapping; import static org.jboss.as.test.integration.management.rbac.RbacUtil.removeRoleUser; import java.io.IOException; import java.util.Collections; import java.util.HashMap; import java.util.Map; import java.util.Set; import org.jboss.as.controller.client.ModelControllerClient; /** Task that can add user->role mappings to the access=authorization configuration. * * @author Brian Stansberry (c) 2013 Red Hat Inc. */ public class UserRolesMappingServerSetupTask { private final Map<String, Set<String>> rolesToUsers = new HashMap<String, Set<String>>(); protected UserRolesMappingServerSetupTask(final Map<String, Set<String>> rolesToUsers) { this.rolesToUsers.putAll(rolesToUsers); } public void setup(ModelControllerClient client) throws IOException { for (Map.Entry<String, Set<String>> roleEntry : rolesToUsers.entrySet()) { String role = roleEntry.getKey(); addRoleMapping(role, client); for (String user : roleEntry.getValue()) { addRoleUser(role, user, client); } } } public void tearDown(ModelControllerClient client) throws IOException { for (Map.Entry<String, Set<String>> roleEntry : rolesToUsers.entrySet()) { String role = roleEntry.getKey(); for (String user : roleEntry.getValue()) { removeRoleUser(role, user, client); } if (!SUPERUSER_USER.equals(role)) { removeRoleMapping(role, client); } } } /** * {@link UserRolesMappingServerSetupTask} that adds a single user mapping for each standard * role, with the username the same as the role name. */ public static class StandardUsersSetup extends UserRolesMappingServerSetupTask { static { Map<String, Set<String>> rolesToUsers = new HashMap<String, Set<String>>(); rolesToUsers.put(MONITOR_ROLE, Collections.singleton(MONITOR_USER)); rolesToUsers.put(OPERATOR_ROLE, Collections.singleton(OPERATOR_USER)); rolesToUsers.put(MAINTAINER_ROLE, Collections.singleton(MAINTAINER_USER)); rolesToUsers.put(DEPLOYER_ROLE, Collections.singleton(DEPLOYER_USER)); rolesToUsers.put(ADMINISTRATOR_ROLE, Collections.singleton(ADMINISTRATOR_USER)); rolesToUsers.put(AUDITOR_ROLE, Collections.singleton(AUDITOR_USER)); rolesToUsers.put(SUPERUSER_ROLE, Collections.singleton(SUPERUSER_USER)); STANDARD_USERS = rolesToUsers; } private static final Map<String, Set<String>> STANDARD_USERS; public static final StandardUsersSetup INSTANCE = new StandardUsersSetup(); public StandardUsersSetup() { super(STANDARD_USERS); } } }