All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.jackrabbit.oak.security.authorization.permission.PermissionHook Maven / Gradle / Ivy

There is a newer version: 1.62.0
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.jackrabbit.oak.security.authorization.permission;

import java.util.HashMap;
import java.util.Map;
import javax.annotation.Nonnull;

import org.apache.jackrabbit.oak.api.CommitFailedException;
import org.apache.jackrabbit.oak.plugins.nodetype.TypePredicate;
import org.apache.jackrabbit.oak.plugins.tree.RootFactory;
import org.apache.jackrabbit.oak.spi.commit.CommitInfo;
import org.apache.jackrabbit.oak.spi.commit.PostValidationHook;
import org.apache.jackrabbit.oak.spi.mount.Mount;
import org.apache.jackrabbit.oak.spi.mount.MountInfoProvider;
import org.apache.jackrabbit.oak.spi.security.authorization.accesscontrol.AccessControlConstants;
import org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionConstants;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
import org.apache.jackrabbit.oak.spi.state.DefaultNodeStateDiff;
import org.apache.jackrabbit.oak.spi.state.NodeBuilder;
import org.apache.jackrabbit.oak.spi.state.NodeState;
import org.apache.jackrabbit.oak.spi.state.NodeStateUtils;

import static org.apache.jackrabbit.JcrConstants.JCR_SYSTEM;
import static org.apache.jackrabbit.oak.plugins.memory.EmptyNodeState.EMPTY_NODE;

/**
 * {@code CommitHook} implementation that processes any modification made to
 * access control content and updates persisted permission store associated
 * with access control related data stored in the repository.
 * 

* The permission entries are grouped by principal and stored below the store root based on the hash value of the * access controllable path. hash collisions are handled by adding subnodes accordingly. *

 *   /jcr:system/rep:permissionStore/workspace-name
 *      /everyone
 *          /552423  [rep:PermissionStore]
 *              /0     [rep:Permissions]
 *              /1     [rep:Permissions]
 *              /c0     [rep:PermissionStore]
 *                  /0      [rep:Permissions]
 *                  /1      [rep:Permissions]
 *                  /2      [rep:Permissions]
 *              /c1     [rep:PermissionStore]
 *                  /0      [rep:Permissions]
 *                  /1      [rep:Permissions]
 *                  /2      [rep:Permissions]
 * 
*/ public class PermissionHook implements PostValidationHook, AccessControlConstants, PermissionConstants { private final RestrictionProvider restrictionProvider; private final String workspaceName; private final MountInfoProvider mountInfoProvider; private NodeBuilder permissionStore; private PrivilegeBitsProvider bitsProvider; private TypePredicate isACL; private TypePredicate isACE; private TypePredicate isGrantACE; private Map modified = new HashMap(); private Map deleted = new HashMap(); public PermissionHook(String workspaceName, RestrictionProvider restrictionProvider, MountInfoProvider mountInfoProvider) { this.workspaceName = workspaceName; this.restrictionProvider = restrictionProvider; this.mountInfoProvider = mountInfoProvider; } //---------------------------------------------------------< CommitHook >--- @Nonnull @Override public NodeState processCommit( NodeState before, NodeState after, CommitInfo info) throws CommitFailedException { NodeBuilder rootAfter = after.builder(); permissionStore = getPermissionStore(rootAfter); bitsProvider = new PrivilegeBitsProvider(RootFactory.createReadOnlyRoot(after)); isACL = new TypePredicate(after, NT_REP_ACL); isACE = new TypePredicate(after, NT_REP_ACE); isGrantACE = new TypePredicate(after, NT_REP_GRANT_ACE); Diff diff = new Diff(""); after.compareAgainstBaseState(before, diff); apply(); return rootAfter.getNodeState(); } //-------------------------------------------------------------< Object >--- @Override public String toString() { return "PermissionHook"; } //------------------------------------------------------------< private >--- private void apply() { for (Map.Entry entry : deleted.entrySet()) { entry.getValue().removePermissionEntries(); } for (Map.Entry entry : modified.entrySet()) { entry.getValue().updatePermissionEntries(); } modified.clear(); deleted.clear(); } @Nonnull private static NodeBuilder getPermissionStore(NodeBuilder rootBuilder) { // permission root has been created during workspace initialization return rootBuilder.getChildNode(JCR_SYSTEM).getChildNode(REP_PERMISSION_STORE); } @Nonnull private NodeBuilder getPermissionRoot(String path) { Mount m = mountInfoProvider.getMountByPath(path); return permissionStore.getChildNode(MountPermissionProvider.getPermissionRootName(m, workspaceName)); } private final class Diff extends DefaultNodeStateDiff { private final String parentPath; private Diff(String parentPath) { this.parentPath = parentPath; } @Override public boolean childNodeAdded(String name, NodeState after) { if (NodeStateUtils.isHidden(name)) { // ignore hidden nodes return true; } String path = parentPath + '/' + name; if (isACL.apply(after)) { PermissionStoreEditor psEditor = createPermissionStoreEditor(name, after); modified.put(psEditor.getPath(), psEditor); } else { after.compareAgainstBaseState(EMPTY_NODE, new Diff(path)); } return true; } @Override public boolean childNodeChanged(String name, NodeState before, NodeState after) { if (NodeStateUtils.isHidden(name)) { // ignore hidden nodes return true; } String path = parentPath + '/' + name; if (isACL.apply(before)) { if (isACL.apply(after)) { PermissionStoreEditor psEditor = createPermissionStoreEditor(name, after); modified.put(psEditor.getPath(), psEditor); // also consider to remove the ACL from removed entries of other principals PermissionStoreEditor beforeEditor = createPermissionStoreEditor(name, before); beforeEditor.removePermissionEntries(psEditor); if (!beforeEditor.isEmpty()) { deleted.put(parentPath, beforeEditor); } } else { PermissionStoreEditor psEditor = createPermissionStoreEditor(name, before); deleted.put(psEditor.getPath(), psEditor); } } else if (isACL.apply(after)) { PermissionStoreEditor psEditor = createPermissionStoreEditor(name, after); modified.put(psEditor.getPath(), psEditor); } else { after.compareAgainstBaseState(before, new Diff(path)); } return true; } @Override public boolean childNodeDeleted(String name, NodeState before) { if (NodeStateUtils.isHidden(name)) { // ignore hidden nodes return true; } String path = parentPath + '/' + name; if (isACL.apply(before)) { PermissionStoreEditor psEditor = createPermissionStoreEditor(name, before); deleted.put(psEditor.getPath(), psEditor); } else { EMPTY_NODE.compareAgainstBaseState(before, new Diff(path)); } return true; } private PermissionStoreEditor createPermissionStoreEditor(@Nonnull String nodeName, @Nonnull NodeState nodeState) { return new PermissionStoreEditor(parentPath, nodeName, nodeState, getPermissionRoot(parentPath), isACE, isGrantACE, bitsProvider, restrictionProvider); } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy