org.opencms.security.CmsAccessControlEntry Maven / Gradle / Ivy
Show all versions of opencms-test Show documentation
/*
* This library is part of OpenCms -
* the Open Source Content Management System
*
* Copyright (c) Alkacon Software GmbH & Co. KG (http://www.alkacon.com)
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* For further information about Alkacon Software GmbH & Co. KG, please see the
* company website: http://www.alkacon.com
*
* For further information about OpenCms, please see the
* project website: http://www.opencms.org
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
package org.opencms.security;
import org.opencms.util.CmsUUID;
import java.util.Comparator;
import java.util.StringTokenizer;
/**
* An access control entry defines the permissions of a user or group for a distinct resource.
*
* Besides the CmsPermissionSet
to define the permissions, the access control entry
* contains the UUID of the resource and of the principal (user or group) who has the defined permissions.
* Since the principal is identified by its UUID, any other entity may act as principal also.
*
*
Additionally, the entry stores various flags:
* ACCESS_FLAGS_DELETED
indicates that this entry is deleted
* ACCESS_FLAGS_INHERIT
indicates that this entry should be inherited
* ACCESS_FLAGS_OVERWRITE
indicates that this entry overwrites inherited settings
* ACCESS_FLAGS_INHERITED
indicates that this entry is inherited
* ACCESS_FLAGS_USER
indicates that the principal is a single user
* ACCESS_FLAGS_GROUP
indicates that the principal is a group
*
*
* @since 6.0.0
*/
public class CmsAccessControlEntry {
/** Flag to indicate the principal type 'all others'. */
public static final int ACCESS_FLAGS_ALLOTHERS = 128;
/** Flag to indicate the principal type group. */
public static final int ACCESS_FLAGS_GROUP = 32;
/** Flag to indicate that an access control entry should be inherited. */
public static final int ACCESS_FLAGS_INHERIT = 2;
/** Flag to indicate that an access control entry was inherited (read only). */
public static final int ACCESS_FLAGS_INHERITED = 8;
/** Flag to indicate that an access control entry overwrites inherited entries. */
public static final int ACCESS_FLAGS_OVERWRITE = 4;
/** Flag to indicate the principal type 'overwrite all'. */
public static final int ACCESS_FLAGS_OVERWRITE_ALL = 256;
/** Flag to indicate that the principal is responsible for the resource. */
public static final int ACCESS_FLAGS_RESPONSIBLE = 64;
/** Flag to indicate the principal type role. */
public static final int ACCESS_FLAGS_ROLE = 512;
/** Flag to indicate the principal type user. */
public static final int ACCESS_FLAGS_USER = 16;
/**
* ACE comparator.
*
* Sorts the given list of {@link CmsAccessControlEntry} objects.
*
* The 'overwrite all' ace in first place, the 'all others' ace in second place.
*/
public static final Comparator COMPARATOR_ACE = new Comparator() {
/**
* @see java.util.Comparator#compare(java.lang.Object, java.lang.Object)
*/
public int compare(CmsAccessControlEntry ace1, CmsAccessControlEntry ace2) {
if (ace1 == ace2) {
return 0;
}
CmsUUID id1 = (ace1).getPrincipal();
CmsUUID id2 = (ace2).getPrincipal();
return COMPARATOR_PRINCIPALS.compare(id1, id2);
}
};
/**
* ACE principals comparator.
*
* Sorts the given list of {@link CmsAccessControlEntry} objects.
*
* The 'overwrite all' ace in first place, the 'all others' ace in second place.
*/
public static final Comparator COMPARATOR_PRINCIPALS = new Comparator() {
/**
* @see java.util.Comparator#compare(java.lang.Object, java.lang.Object)
*/
public int compare(CmsUUID id1, CmsUUID id2) {
if (id1 == id2) {
return 0;
}
if (id1.equals(id2)) {
return 0;
} else if (id1.equals(PRINCIPAL_OVERWRITE_ALL_ID)) {
return -1;
} else if (id1.equals(PRINCIPAL_ALL_OTHERS_ID)) {
if (id2.equals(PRINCIPAL_OVERWRITE_ALL_ID)) {
return 1;
} else {
return -1;
}
} else if (id2.equals(PRINCIPAL_ALL_OTHERS_ID)) {
if (id1.equals(PRINCIPAL_OVERWRITE_ALL_ID)) {
return -1;
} else {
return 1;
}
} else if (id2.equals(PRINCIPAL_OVERWRITE_ALL_ID)) {
return 1;
}
return id1.compareTo(id2);
}
};
/** The used id for ace's that apply to all other principals. */
public static final CmsUUID PRINCIPAL_ALL_OTHERS_ID;
/** The used name for ace's that apply to all other principals. */
public static final String PRINCIPAL_ALL_OTHERS_NAME = "ALL_OTHERS";
/** The used id for ace's that overwrites all inherited permissions. */
public static final CmsUUID PRINCIPAL_OVERWRITE_ALL_ID;
/** The used name for ace's that overwrites all inherited permissions. */
public static final String PRINCIPAL_OVERWRITE_ALL_NAME = "OVERWRITE_ALL";
/** UUID which is used to read all access control entries, should never be written to the database. */
public static final CmsUUID PRINCIPAL_READALL_ID;
/** Flags of this access control entry. */
private int m_flags;
/** The permission set. */
private CmsPermissionSetCustom m_permissions;
/** Id of the principal. */
private CmsUUID m_principal;
/** Id of the resource. */
private CmsUUID m_resource;
/**
* Constructor to create a new access control entry for a given resource
* based on an existing access control entry.
*
* @param resource the resource
* @param base the base for the created access control entry
*/
public CmsAccessControlEntry(CmsUUID resource, CmsAccessControlEntry base) {
m_resource = resource;
m_principal = base.m_principal;
m_permissions = base.m_permissions;
m_flags = base.m_flags;
}
/**
* Constructor to create a new access control entry on a given resource and a given principal.
* Permissions are specified as permission set, flags as bitset.
*
* @param resource the resource
* @param principal the id of a principal (user or group)
* @param permissions the set of allowed and denied permissions as permission set
* @param flags additional flags of the access control entry
*/
public CmsAccessControlEntry(CmsUUID resource, CmsUUID principal, CmsPermissionSet permissions, int flags) {
m_resource = resource;
m_principal = principal;
m_permissions = new CmsPermissionSetCustom(permissions);
m_flags = flags;
}
/**
* Constructor to create a new access control entry on a given resource and a given principal.
* Permissions and flags are specified as bitsets.
*
* @see CmsPermissionSet
*
* @param resource the resource
* @param principal the id of a principal (user or group)
* @param allowed the set of allowed permissions
* @param denied set set of explicitly denied permissions
* @param flags additional flags of the access control entry
*/
public CmsAccessControlEntry(CmsUUID resource, CmsUUID principal, int allowed, int denied, int flags) {
m_resource = resource;
m_principal = principal;
m_permissions = new CmsPermissionSetCustom(allowed, denied);
m_flags = flags;
}
/**
* Constructor to create a new access control entry on a given resource and a given principal.
* Permission and flags are specified as string of the format {{+|-}{r|w|v|c|i}}*
*
* @param resource the resource
* @param principal the id of a principal (user or group)
* @param acPermissionString allowed and denied permissions and also flags
*/
public CmsAccessControlEntry(CmsUUID resource, CmsUUID principal, String acPermissionString) {
m_resource = resource;
m_principal = principal;
m_flags = 0;
StringTokenizer tok = new StringTokenizer(acPermissionString, "+-", true);
StringBuffer permissionString = new StringBuffer();
while (tok.hasMoreElements()) {
String prefix = tok.nextToken();
String suffix = tok.nextToken();
switch (suffix.charAt(0)) {
case 'I':
case 'i':
if (prefix.charAt(0) == '+') {
m_flags |= CmsAccessControlEntry.ACCESS_FLAGS_INHERIT;
}
if (prefix.charAt(0) == '-') {
m_flags &= ~CmsAccessControlEntry.ACCESS_FLAGS_INHERIT;
}
break;
case 'O':
case 'o':
if (prefix.charAt(0) == '+') {
m_flags |= CmsAccessControlEntry.ACCESS_FLAGS_OVERWRITE;
}
if (prefix.charAt(0) == '-') {
m_flags &= ~CmsAccessControlEntry.ACCESS_FLAGS_OVERWRITE;
}
break;
case 'L':
case 'l':
if (prefix.charAt(0) == '+') {
m_flags |= CmsAccessControlEntry.ACCESS_FLAGS_RESPONSIBLE;
}
if (prefix.charAt(0) == '-') {
m_flags &= ~CmsAccessControlEntry.ACCESS_FLAGS_RESPONSIBLE;
}
break;
default:
permissionString.append(prefix);
permissionString.append(suffix);
break;
}
}
m_permissions = new CmsPermissionSetCustom(permissionString.toString());
}
static {
PRINCIPAL_ALL_OTHERS_ID = CmsUUID.getConstantUUID(PRINCIPAL_ALL_OTHERS_NAME.toLowerCase());
PRINCIPAL_OVERWRITE_ALL_ID = CmsUUID.getConstantUUID(PRINCIPAL_OVERWRITE_ALL_NAME.toLowerCase());
PRINCIPAL_READALL_ID = CmsUUID.getConstantUUID("principal-read-all");
}
/**
* Sets the explicitly denied permissions in the access control entry.
*
* @param denied the denied permissions as bitset
*/
public void denyPermissions(int denied) {
m_permissions.denyPermissions(denied);
}
/**
* @see java.lang.Object#equals(java.lang.Object)
*/
@Override
public boolean equals(Object obj) {
if (obj == this) {
return true;
}
if (obj instanceof CmsAccessControlEntry) {
CmsAccessControlEntry other = (CmsAccessControlEntry)obj;
if (other.m_flags != m_flags) {
return false;
}
if (other.getPermissions().getAllowedPermissions() != getPermissions().getAllowedPermissions()) {
return false;
}
if (other.getPermissions().getDeniedPermissions() != getPermissions().getDeniedPermissions()) {
return false;
}
if (!other.m_resource.equals(m_resource)) {
return false;
}
if (!other.m_principal.equals(m_principal)) {
return false;
}
return true;
}
return false;
}
/**
* Returns the currently allowed permissions as bitset.
*
* @return the allowed permissions
*/
public int getAllowedPermissions() {
return m_permissions.getAllowedPermissions();
}
/**
* Returns the currently denied permissions as bitset.
*
* @return the denied permissions
*/
public int getDeniedPermissions() {
return m_permissions.getDeniedPermissions();
}
/**
* Returns the current flags of the access control entry.
*
* @return bitset with flag values
*/
public int getFlags() {
return m_flags;
}
/**
* Returns the string representation of the "inherit" flag.
*
* @return string of the format {{+|-}i}*
*/
public String getInheritingString() {
if (isInheriting()) {
return "+i";
} else {
return "-i";
}
}
/**
* Returns the current permission set (both allowed and denied permissions).
*
* @return the set of permissions
*/
public CmsPermissionSet getPermissions() {
return m_permissions;
}
/**
* Returns the principal assigned with this access control entry.
*
* @return the principal
*/
public CmsUUID getPrincipal() {
return m_principal;
}
/**
* Returns the resource assigned with this access control entry.
*
* @return the resource
*/
public CmsUUID getResource() {
return m_resource;
}
/**
* Returns the string representation of the "responsible" flag.
*
* @return string of the format {{+|-}l}*
*/
public String getResponsibleString() {
if (isResponsible()) {
return "+l";
} else {
return "-l";
}
}
/**
* Sets the allowed permissions in the access control entry.
*
* @param allowed the allowed permissions as bitset
*/
public void grantPermissions(int allowed) {
m_permissions.grantPermissions(allowed);
}
/**
* @see java.lang.Object#hashCode()
*/
@Override
public int hashCode() {
if (m_permissions != null) {
return m_permissions.hashCode() * m_flags;
}
return CmsUUID.getNullUUID().hashCode();
}
/**
* Checks if the {@link #ACCESS_FLAGS_ALLOTHERS} flag is set.
*
* @return true
if the {@link #ACCESS_FLAGS_ALLOTHERS} flag is set
*/
public boolean isAllOthers() {
return (m_flags & ACCESS_FLAGS_ALLOTHERS) == ACCESS_FLAGS_ALLOTHERS;
}
/**
* Returns if this access control entry has the inherited flag set.
* Note: to check if an access control entry is inherited, also the
* resource id and the id of the current resource must be different.
*
* @return true, if the inherited flag is set
*/
public boolean isInherited() {
return ((m_flags & CmsAccessControlEntry.ACCESS_FLAGS_INHERITED) > 0);
}
/**
* Returns if this ace is being inherited to the folder subresources.
*
* @return true
, if this ace is being inherited to the folder subresources
*/
public boolean isInheriting() {
return ((m_flags & CmsAccessControlEntry.ACCESS_FLAGS_INHERIT) > 0);
}
/**
* Checks if the {@link #ACCESS_FLAGS_OVERWRITE_ALL} flag is set.
*
* @return true
if the {@link #ACCESS_FLAGS_OVERWRITE_ALL} flag is set
*/
public boolean isOverwriteAll() {
return (m_flags & ACCESS_FLAGS_OVERWRITE_ALL) == ACCESS_FLAGS_OVERWRITE_ALL;
}
/**
* Returns if the principal is responsible for the current resource.
*
* @return true ,if the principal is responsible for the current resource
*/
public boolean isResponsible() {
return ((m_flags & CmsAccessControlEntry.ACCESS_FLAGS_RESPONSIBLE) > 0);
}
/**
* Resets the given flags in the access control entry.
*
* @param flags bitset with flag values to reset
*/
public void resetFlags(int flags) {
m_flags &= ~flags;
}
/**
* Sets the given flags in the access control entry.
*
* @param flags bitset with flag values to set
*/
public void setFlags(int flags) {
m_flags |= flags;
}
/**
* Sets the access flags to identify the given principal type.
*
* @param principal the principal to set the flags for
*/
public void setFlagsForPrincipal(I_CmsPrincipal principal) {
setFlags(
principal.isGroup() ? CmsAccessControlEntry.ACCESS_FLAGS_GROUP : CmsAccessControlEntry.ACCESS_FLAGS_USER);
}
/**
* Sets the allowed and denied permissions of the access control entry.
*
* @param permissions the set of permissions
*/
public void setPermissions(CmsPermissionSet permissions) {
m_permissions.setPermissions(permissions);
}
/**
* Returns the String representation of this access control entry object.
* @see java.lang.Object#toString()
*/
@Override
public String toString() {
return "[Ace:] "
+ "ResourceId="
+ m_resource
+ ", PrincipalId="
+ m_principal
+ ", Permissions="
+ m_permissions.toString()
+ ", Flags="
+ m_flags;
}
}