All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.acegisecurity.vote.BasicAclEntryVoter Maven / Gradle / Ivy

There is a newer version: 1.0.7
Show newest version
/* Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.acegisecurity.vote;

import org.acegisecurity.Authentication;
import org.acegisecurity.AuthorizationServiceException;
import org.acegisecurity.ConfigAttribute;
import org.acegisecurity.ConfigAttributeDefinition;

import org.acegisecurity.acl.AclEntry;
import org.acegisecurity.acl.AclManager;
import org.acegisecurity.acl.basic.BasicAclEntry;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

import org.springframework.beans.factory.InitializingBean;

import org.springframework.util.Assert;

import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;

import java.util.Iterator;


/**
 * 

* Given a domain object instance passed as a method argument, ensures the * principal has appropriate permission as defined by the {@link AclManager}. *

* *

* The AclManager is used to retrieve the access control list * (ACL) permissions associated with a domain object instance for the current * Authentication object. This class is designed to process * {@link AclEntry}s that are subclasses of {@link * org.acegisecurity.acl.basic.BasicAclEntry} only. Generally these are * obtained by using the {@link org.acegisecurity.acl.basic.BasicAclProvider}. *

* *

* The voter will vote if any {@link ConfigAttribute#getAttribute()} matches * the {@link #processConfigAttribute}. The provider will then locate the * first method argument of type {@link #processDomainObjectClass}. Assuming * that method argument is non-null, the provider will then lookup the ACLs * from the AclManager and ensure the principal is {@link * org.acegisecurity.acl.basic.BasicAclEntry#isPermitted(int)} for at least * one of the {@link #requirePermission}s. *

* *

* If the method argument is null, the voter will abstain from * voting. If the method argument could not be found, an {@link * org.acegisecurity.AuthorizationServiceException} will be thrown. *

* *

* In practical terms users will typically setup a number of * BasicAclEntryVoters. Each will have a different {@link * #processDomainObjectClass}, {@link #processConfigAttribute} and {@link * #requirePermission} combination. For example, a small application might * employ the following instances of BasicAclEntryVoter: * *

    *
  • * Process domain object class BankAccount, configuration * attribute VOTE_ACL_BANK_ACCONT_READ, require permission * SimpleAclEntry.READ *
  • *
  • * Process domain object class BankAccount, configuration * attribute VOTE_ACL_BANK_ACCOUNT_WRITE, require permission list * SimpleAclEntry.WRITE and SimpleAclEntry.CREATE * (allowing the principal to have either of these two permissions *
  • *
  • * Process domain object class Customer, configuration attribute * VOTE_ACL_CUSTOMER_READ, require permission * SimpleAclEntry.READ *
  • *
  • * Process domain object class Customer, configuration attribute * VOTE_ACL_CUSTOMER_WRITE, require permission list * SimpleAclEntry.WRITE and SimpleAclEntry.CREATE *
  • *
* * Alternatively, you could have used a common superclass or interface for the * {@link #processDomainObjectClass} if both BankAccount and * Customer had common parents. *

* *

* If the principal does not have sufficient permissions, the voter will vote * to deny access. *

* *

* The AclManager is allowed to return any implementations of * AclEntry it wishes. However, this provider will only be able * to validate against AbstractBasicAclEntrys, and thus a vote to * deny access will be made if no AclEntry is of type * AbstractBasicAclEntry. *

* *

* All comparisons and prefixes are case sensitive. *

* * @author Ben Alex * @version $Id: BasicAclEntryVoter.java,v 1.9 2006/01/26 10:04:36 benalex Exp $ */ public class BasicAclEntryVoter extends AbstractAclVoter implements InitializingBean { //~ Static fields/initializers ============================================= private static final Log logger = LogFactory.getLog(BasicAclEntryVoter.class); //~ Instance fields ======================================================== private AclManager aclManager; private String internalMethod; private String processConfigAttribute; private int[] requirePermission; //~ Methods ================================================================ public void afterPropertiesSet() throws Exception { Assert.notNull(processConfigAttribute, "A processConfigAttribute is mandatory"); Assert.notNull(aclManager, "An aclManager is mandatory"); if ((requirePermission == null) || (requirePermission.length == 0)) { throw new IllegalArgumentException( "One or more requirePermission entries is mandatory"); } } public AclManager getAclManager() { return aclManager; } /** * Optionally specifies a method of the domain object that will be used to * obtain a contained domain object. That contained domain object will be * used for the ACL evaluation. This is useful if a domain object contains * a parent that an ACL evaluation should be targeted for, instead of the * child domain object (which perhaps is being created and as such does * not yet have any ACL permissions) * * @return null to use the domain object, or the name of a * method (that requires no arguments) that should be invoked to * obtain an Object which will be the domain object * used for ACL evaluation */ public String getInternalMethod() { return internalMethod; } public String getProcessConfigAttribute() { return processConfigAttribute; } public int[] getRequirePermission() { return requirePermission; } public void setAclManager(AclManager aclManager) { this.aclManager = aclManager; } public void setInternalMethod(String internalMethod) { this.internalMethod = internalMethod; } public void setProcessConfigAttribute(String processConfigAttribute) { this.processConfigAttribute = processConfigAttribute; } public void setRequirePermission(int[] requirePermission) { this.requirePermission = requirePermission; } public boolean supports(ConfigAttribute attribute) { if ((attribute.getAttribute() != null) && attribute.getAttribute().startsWith(getProcessConfigAttribute())) { return true; } else { return false; } } public int vote(Authentication authentication, Object object, ConfigAttributeDefinition config) { Iterator iter = config.getConfigAttributes(); while (iter.hasNext()) { ConfigAttribute attr = (ConfigAttribute) iter.next(); if (this.supports(attr)) { // Need to make an access decision on this invocation // Attempt to locate the domain object instance to process Object domainObject = getDomainObjectInstance(object); // If domain object is null, vote to abstain if (domainObject == null) { if (logger.isDebugEnabled()) { logger.debug("Voting to abstain - domainObject is null"); } return AccessDecisionVoter.ACCESS_ABSTAIN; } // Evaluate if we are required to use an inner domain object if ((internalMethod != null) && !"".equals(internalMethod)) { try { Class clazz = domainObject.getClass(); Method method = clazz.getMethod(internalMethod, new Class[] {}); domainObject = method.invoke(domainObject, new Object[] {}); } catch (NoSuchMethodException nsme) { throw new AuthorizationServiceException( "Object of class '" + domainObject.getClass() + "' does not provide the requested internalMethod: " + internalMethod); } catch (IllegalAccessException iae) { if (logger.isDebugEnabled()) { logger.debug("IllegalAccessException", iae); if (iae.getCause() != null) { logger.debug("Cause: " + iae.getCause().getMessage(), iae.getCause()); } } throw new AuthorizationServiceException( "Problem invoking internalMethod: " + internalMethod + " for object: " + domainObject); } catch (InvocationTargetException ite) { if (logger.isDebugEnabled()) { logger.debug("InvocationTargetException", ite); if (ite.getCause() != null) { logger.debug("Cause: " + ite.getCause().getMessage(), ite.getCause()); } } throw new AuthorizationServiceException( "Problem invoking internalMethod: " + internalMethod + " for object: " + domainObject); } } // Obtain the ACLs applicable to the domain object AclEntry[] acls = aclManager.getAcls(domainObject, authentication); // If principal has no permissions for domain object, deny if ((acls == null) || (acls.length == 0)) { if (logger.isDebugEnabled()) { logger.debug( "Voting to deny access - no ACLs returned for this principal"); } return AccessDecisionVoter.ACCESS_DENIED; } // Principal has some permissions for domain object, check them for (int i = 0; i < acls.length; i++) { // Locate processable AclEntrys if (acls[i] instanceof BasicAclEntry) { BasicAclEntry processableAcl = (BasicAclEntry) acls[i]; // See if principal has any of the required permissions for (int y = 0; y < requirePermission.length; y++) { if (processableAcl.isPermitted(requirePermission[y])) { if (logger.isDebugEnabled()) { logger.debug("Voting to grant access"); } return AccessDecisionVoter.ACCESS_GRANTED; } } } } // No permissions match if (logger.isDebugEnabled()) { logger.debug( "Voting to deny access - ACLs returned, but insufficient permissions for this principal"); } return AccessDecisionVoter.ACCESS_DENIED; } } // No configuration attribute matched, so abstain return AccessDecisionVoter.ACCESS_ABSTAIN; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy