All Downloads are FREE. Search and download functionalities are using the official Maven repository.
Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
org.apache.jackrabbit.oak.security.authorization.permission.PermissionStoreImpl Maven / Gradle / Ivy
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.jackrabbit.oak.security.authorization.permission;
import java.util.Collection;
import java.util.HashMap;
import java.util.Map;
import java.util.TreeSet;
import javax.annotation.CheckForNull;
import javax.annotation.Nonnull;
import javax.annotation.Nullable;
import org.apache.jackrabbit.oak.api.PropertyState;
import org.apache.jackrabbit.oak.api.Root;
import org.apache.jackrabbit.oak.api.Tree;
import org.apache.jackrabbit.oak.api.Type;
import org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionConstants;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBits;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* {@code PermissionStoreImpl}...
*/
class PermissionStoreImpl implements PermissionStore, PermissionConstants {
/**
* default logger
*/
private static final Logger log = LoggerFactory.getLogger(PermissionStoreImpl.class);
private final String permissionRootName;
private final RestrictionProvider restrictionProvider;
private final Map principalTreeMap = new HashMap();
private Tree permissionsTree;
private PrivilegeBits allBits;
PermissionStoreImpl(Root root, String permissionRootName, RestrictionProvider restrictionProvider) {
this.permissionRootName = permissionRootName;
this.restrictionProvider = restrictionProvider;
reset(root);
}
@Override
public void flush(@Nonnull Root root) {
principalTreeMap.clear();
reset(root);
}
private void reset(@Nonnull Root root) {
permissionsTree = PermissionUtil.getPermissionsRoot(root, permissionRootName);
allBits = new PrivilegeBitsProvider(root).getBits(PrivilegeConstants.JCR_ALL);
}
//----------------------------------------------------< PermissionStore >---
@Override
@CheckForNull
public Collection load(@Nullable Collection entries, @Nonnull String principalName, @Nonnull String path) {
Tree principalRoot = getPrincipalRoot(principalName);
if (principalRoot != null) {
String name = PermissionUtil.getEntryName(path);
if (principalRoot.hasChild(name)) {
Tree child = principalRoot.getChild(name);
if (PermissionUtil.checkACLPath(child, path)) {
entries = loadPermissionEntries(path, entries, child);
} else {
// check for child node
for (Tree node : child.getChildren()) {
if (PermissionUtil.checkACLPath(node, path)) {
entries = loadPermissionEntries(path, entries, node);
}
}
}
}
}
return entries == null || entries.isEmpty() ? null : entries;
}
@Override
public long getNumEntries(@Nonnull String principalName, long max) {
// we ignore the hash-collisions here
Tree tree = getPrincipalRoot(principalName);
return tree == null ? 0 : tree.getChildrenCount(max);
}
@Override
@Nonnull
public PrincipalPermissionEntries load(@Nonnull String principalName) {
long t0 = System.nanoTime();
PrincipalPermissionEntries ret = new PrincipalPermissionEntries();
Tree principalRoot = getPrincipalRoot(principalName);
if (principalRoot != null) {
for (Tree entryTree : principalRoot.getChildren()) {
loadPermissionEntries(entryTree, ret.getEntries());
}
}
ret.setFullyLoaded(true);
long t1 = System.nanoTime();
if (log.isDebugEnabled()) {
log.debug(String.format("loaded %d entries in %.2fus for %s.%n", ret.getSize(), (t1 - t0) / 1000.0, principalName));
}
return ret;
}
//------------------------------------------------------------< private >---
@CheckForNull
private Tree getPrincipalRoot(@Nonnull String principalName) {
if (principalTreeMap.containsKey(principalName)) {
return principalTreeMap.get(principalName);
} else {
Tree principalRoot = PermissionUtil.getPrincipalRoot(permissionsTree, principalName);
if (!principalRoot.exists()) {
principalRoot = null;
}
principalTreeMap.put(principalName, principalRoot);
return principalRoot;
}
}
private void loadPermissionEntries(@Nonnull Tree tree,
@Nonnull Map> pathEntryMap) {
String path = TreeUtil.getString(tree, PermissionConstants.REP_ACCESS_CONTROLLED_PATH);
if (path != null) {
Collection entries = pathEntryMap.get(path);
if (entries == null) {
entries = new TreeSet();
pathEntryMap.put(path, entries);
}
for (Tree child : tree.getChildren()) {
if (child.getName().charAt(0) == 'c') {
loadPermissionEntries(child, pathEntryMap);
} else {
entries.add(createPermissionEntry(path, child));
}
}
} else {
log.error("Permission entry at '{}' without rep:accessControlledPath property.", tree.getPath());
}
}
@CheckForNull
private Collection loadPermissionEntries(@Nonnull String path,
@Nullable Collection ret,
@Nonnull Tree tree) {
for (Tree ace : tree.getChildren()) {
if (ace.getName().charAt(0) != 'c') {
if (ret == null) {
ret = new TreeSet();
}
ret.add(createPermissionEntry(path, ace));
}
}
return ret;
}
@Nonnull
private PermissionEntry createPermissionEntry(@Nonnull String path,
@Nonnull Tree entryTree) {
PropertyState ps = entryTree.getProperty(REP_PRIVILEGE_BITS);
PrivilegeBits bits = (isJcrAll(ps)) ? allBits : PrivilegeBits.getInstance(ps);
boolean isAllow = TreeUtil.getBoolean(entryTree, REP_IS_ALLOW);
return new PermissionEntry(path,
isAllow,
Integer.parseInt(entryTree.getName()),
bits,
restrictionProvider.getPattern(path, entryTree));
}
private static boolean isJcrAll(@CheckForNull PropertyState property) {
return property != null && property.count() == 1 && property.getValue(Type.LONG, 0) == DYNAMIC_ALL_BITS;
}
}