/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.sling.jackrabbit.usermanager.impl; import java.io.UnsupportedEncodingException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.util.Collection; import java.util.Map; import javax.jcr.RepositoryException; import javax.jcr.Session; import javax.servlet.Servlet; import org.apache.jackrabbit.api.security.user.Authorizable; import org.apache.jackrabbit.api.security.user.User; import org.apache.jackrabbit.api.security.user.UserManager; import org.apache.sling.commons.osgi.OsgiUtil; import org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo; import org.apache.sling.jcr.base.util.AccessControlUtil; import org.osgi.framework.BundleContext; import org.osgi.framework.InvalidSyntaxException; import org.osgi.framework.ServiceReference; import org.osgi.service.component.annotations.Activate; import org.osgi.service.component.annotations.Component; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Helper class to assist in the usage of access control of users/groups from scripts. * * The default access control policy defined by this provider has the following * characteristics: * <ul> * <li>everybody has READ permission to all items,</li> * * <li>every known user is allowed to modify it's own properties except for * her/his group membership,</li> * </ul> */ @Component(service=AuthorizablePrivilegesInfo.class, property={ AuthorizablePrivilegesInfoImpl.PAR_USER_ADMIN_GROUP_NAME + "=" + AuthorizablePrivilegesInfoImpl.DEFAULT_USER_ADMIN_GROUP_NAME, AuthorizablePrivilegesInfoImpl.PAR_GROUP_ADMIN_GROUP_NAME + "=" + AuthorizablePrivilegesInfoImpl.DEFAULT_GROUP_ADMIN_GROUP_NAME }) public class AuthorizablePrivilegesInfoImpl implements AuthorizablePrivilegesInfo { /** default log */ private final Logger log = LoggerFactory.getLogger(getClass()); /** * The default 'User administrator' group name * * @see #PAR_USER_ADMIN_GROUP_NAME */ static final String DEFAULT_USER_ADMIN_GROUP_NAME = "UserAdmin"; /** * The name of the configuration parameter providing the * 'User administrator' group name. */ static final String PAR_USER_ADMIN_GROUP_NAME = "user.admin.group.name"; /** * The default 'User administrator' group name * * @see #PAR_GROUP_ADMIN_GROUP_NAME */ static final String DEFAULT_GROUP_ADMIN_GROUP_NAME = "GroupAdmin"; /** * The name of the configuration parameter providing the * 'Group administrator' group name. */ static final String PAR_GROUP_ADMIN_GROUP_NAME = "group.admin.group.name"; /* (non-Javadoc) * @see org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo#canAddGroup(javax.jcr.Session) */ public boolean canAddGroup(Session jcrSession) { try { UserManager userManager = AccessControlUtil.getUserManager(jcrSession); Authorizable currentUser = userManager.getAuthorizable(jcrSession.getUserID()); if (currentUser != null) { if (((User)currentUser).isAdmin()) { return true; //admin user has full control } } } catch (RepositoryException e) { log.warn("Failed to determine if {} can add a new group", jcrSession.getUserID()); } return false; } /* (non-Javadoc) * @see org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo#canAddUser(javax.jcr.Session) */ public boolean canAddUser(Session jcrSession) { try { //if self-registration is enabled, then anyone can create a user if (bundleContext != null) { String filter = "(&(sling.servlet.resourceTypes=sling/users)(|(sling.servlet.methods=POST)(sling.servlet.selectors=create)))"; Collection<ServiceReference<Servlet>> serviceReferences = bundleContext.getServiceReferences(Servlet.class, filter); if (serviceReferences != null) { String propName = "self.registration.enabled"; for (ServiceReference<Servlet> serviceReference : serviceReferences) { Object propValue = serviceReference.getProperty(propName); if (propValue != null) { boolean selfRegEnabled = Boolean.TRUE.equals(propValue); if (selfRegEnabled) { return true; } break; } } } } UserManager userManager = AccessControlUtil.getUserManager(jcrSession); Authorizable currentUser = userManager.getAuthorizable(jcrSession.getUserID()); if (currentUser != null) { if (((User)currentUser).isAdmin()) { return true; //admin user has full control } } } catch (RepositoryException e) { log.warn("Failed to determine if {} can add a new user", jcrSession.getUserID()); } catch (InvalidSyntaxException e) { log.warn("Failed to determine if {} can add a new user", jcrSession.getUserID()); } return false; } /* (non-Javadoc) * @see org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo#canRemove(javax.jcr.Session, java.lang.String) */ public boolean canRemove(Session jcrSession, String principalId) { try { UserManager userManager = AccessControlUtil.getUserManager(jcrSession); Authorizable currentUser = userManager.getAuthorizable(jcrSession.getUserID()); if (((User)currentUser).isAdmin()) { return true; //admin user has full control } } catch (RepositoryException e) { log.warn("Failed to determine if {} can remove authorizable {}", jcrSession.getUserID(), principalId); } return false; } /* (non-Javadoc) * @see org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo#canUpdateGroupMembers(javax.jcr.Session, java.lang.String) */ public boolean canUpdateGroupMembers(Session jcrSession, String groupId) { try { UserManager userManager = AccessControlUtil.getUserManager(jcrSession); Authorizable currentUser = userManager.getAuthorizable(jcrSession.getUserID()); if (((User)currentUser).isAdmin()) { return true; //admin user has full control } } catch (RepositoryException e) { log.warn("Failed to determine if {} can remove authorizable {}", jcrSession.getUserID(), groupId); } return false; } /* (non-Javadoc) * @see org.apache.sling.jackrabbit.usermanager.AuthorizablePrivilegesInfo#canUpdateProperties(javax.jcr.Session, java.lang.String) */ public boolean canUpdateProperties(Session jcrSession, String principalId) { try { if (jcrSession.getUserID().equals(principalId)) { //user is allowed to update it's own properties return true; } UserManager userManager = AccessControlUtil.getUserManager(jcrSession); Authorizable currentUser = userManager.getAuthorizable(jcrSession.getUserID()); if (((User)currentUser).isAdmin()) { return true; //admin user has full control } } catch (RepositoryException e) { log.warn("Failed to determine if {} can remove authorizable {}", jcrSession.getUserID(), principalId); } return false; } // ---------- SCR Integration ---------------------------------------------- //keep track of the bundle context private BundleContext bundleContext; @Activate protected void activate(BundleContext bundleContext, Map<String, Object> properties) throws InvalidKeyException, NoSuchAlgorithmException, IllegalStateException, UnsupportedEncodingException { this.bundleContext = bundleContext; String userAdminGroupName = OsgiUtil.toString(properties.get(PAR_USER_ADMIN_GROUP_NAME), null); if ( userAdminGroupName != null && ! DEFAULT_USER_ADMIN_GROUP_NAME.equals(userAdminGroupName)) { log.warn("Configuration setting for {} is deprecated and will not have any effect", PAR_USER_ADMIN_GROUP_NAME); } String groupAdminGroupName = OsgiUtil.toString(properties.get(PAR_GROUP_ADMIN_GROUP_NAME), null); if ( groupAdminGroupName != null && ! DEFAULT_GROUP_ADMIN_GROUP_NAME.equals(userAdminGroupName)) { log.warn("Configuration setting for {} is deprecated and will not have any effect", PAR_GROUP_ADMIN_GROUP_NAME); } } }