1 package org
.argeo
.security
.jackrabbit
;
3 import java
.security
.Principal
;
4 import java
.util
.ArrayList
;
5 import java
.util
.Iterator
;
10 import javax
.jcr
.RepositoryException
;
11 import javax
.jcr
.Session
;
12 import javax
.jcr
.security
.AccessControlList
;
13 import javax
.jcr
.security
.AccessControlManager
;
14 import javax
.jcr
.security
.AccessControlPolicy
;
15 import javax
.jcr
.security
.AccessControlPolicyIterator
;
16 import javax
.jcr
.security
.Privilege
;
17 import javax
.security
.auth
.Subject
;
19 import org
.apache
.commons
.logging
.Log
;
20 import org
.apache
.commons
.logging
.LogFactory
;
21 import org
.apache
.jackrabbit
.api
.security
.user
.Group
;
22 import org
.apache
.jackrabbit
.api
.security
.user
.User
;
23 import org
.apache
.jackrabbit
.api
.security
.user
.UserManager
;
24 import org
.apache
.jackrabbit
.core
.DefaultSecurityManager
;
25 import org
.apache
.jackrabbit
.core
.security
.SecurityConstants
;
26 import org
.apache
.jackrabbit
.core
.security
.SystemPrincipal
;
27 import org
.apache
.jackrabbit
.core
.security
.authorization
.WorkspaceAccessManager
;
28 import org
.argeo
.ArgeoException
;
29 import org
.argeo
.jcr
.JcrUtils
;
30 import org
.springframework
.security
.Authentication
;
31 import org
.springframework
.security
.GrantedAuthority
;
33 /** Intermediary class in order to have a consistent naming in config files. */
34 public class ArgeoSecurityManager
extends DefaultSecurityManager
{
35 private Log log
= LogFactory
.getLog(ArgeoSecurityManager
.class);
38 /** Since this is called once when the session is created, we take the opportunity to synchronize Spring and Jackrabbit users and groups.*/
39 public String
getUserID(Subject subject
, String workspaceName
)
40 throws RepositoryException
{
41 long begin
= System
.currentTimeMillis();
43 if (!subject
.getPrincipals(SystemPrincipal
.class).isEmpty())
44 return super.getUserID(subject
, workspaceName
);
46 Authentication authen
;
47 Set
<Authentication
> authens
= subject
48 .getPrincipals(Authentication
.class);
49 if (authens
.size() == 0)
50 throw new ArgeoException("No Spring authentication found in "
53 authen
= authens
.iterator().next();
55 UserManager systemUm
= getSystemUserManager(workspaceName
);
57 String userId
= authen
.getName();
58 User user
= (User
) systemUm
.getAuthorizable(userId
);
60 user
= systemUm
.createUser(userId
, authen
.getCredentials()
61 .toString(), authen
, null);
62 log
.info(userId
+ " added as " + user
);
65 setHomeNodeAuthorizations(user
);
68 List
<String
> userGroupIds
= new ArrayList
<String
>();
69 for (GrantedAuthority ga
: authen
.getAuthorities()) {
70 Group group
= (Group
) systemUm
.getAuthorizable(ga
.getAuthority());
72 group
= systemUm
.createGroup(ga
.getAuthority());
73 log
.info(ga
.getAuthority() + " added as " + group
);
75 if (!group
.isMember(user
))
76 group
.addMember(user
);
77 userGroupIds
.add(ga
.getAuthority());
81 // check if user has not been removed from some groups
82 for (Iterator
<Group
> it
= user
.declaredMemberOf(); it
.hasNext();) {
83 Group group
= it
.next();
84 if (!userGroupIds
.contains(group
.getID()))
85 group
.removeMember(user
);
88 if (log
.isTraceEnabled())
89 log
.trace("Spring and Jackrabbit Security synchronized for user "
90 + userId
+ " in " + (System
.currentTimeMillis() - begin
)
95 protected void setHomeNodeAuthorizations(User user
) {
96 // give all privileges on user home
97 // FIXME: fails on an empty repo
98 String userId
= "<not yet set>";
100 userId
= user
.getID();
101 Node userHome
= JcrUtils
.getUserHome(getSystemSession(), userId
);
102 if (userHome
!= null) {
103 String path
= userHome
.getPath();
104 AccessControlPolicy policy
= null;
105 AccessControlManager acm
= getSystemSession()
106 .getAccessControlManager();
107 AccessControlPolicyIterator policyIterator
= acm
108 .getApplicablePolicies(path
);
109 if (policyIterator
.hasNext()) {
110 policy
= policyIterator
.nextAccessControlPolicy();
112 AccessControlPolicy
[] existingPolicies
= acm
114 policy
= existingPolicies
[0];
116 if (policy
instanceof AccessControlList
) {
117 Privilege
[] privileges
= { acm
118 .privilegeFromName(Privilege
.JCR_ALL
) };
119 ((AccessControlList
) policy
).addAccessControlEntry(
120 user
.getPrincipal(), privileges
);
121 acm
.setPolicy(path
, policy
);
124 } catch (Exception e
) {
125 log
.warn("Cannot set authorization on user node for " + userId
126 + ": " + e
.getMessage());
132 protected WorkspaceAccessManager
createDefaultWorkspaceAccessManager() {
133 WorkspaceAccessManager wam
= super
134 .createDefaultWorkspaceAccessManager();
135 return new ArgeoWorkspaceAccessManagerImpl(wam
);
138 private class ArgeoWorkspaceAccessManagerImpl
implements SecurityConstants
,
139 WorkspaceAccessManager
{
140 private final WorkspaceAccessManager wam
;
142 // private String defaultWorkspace;
144 public ArgeoWorkspaceAccessManagerImpl(WorkspaceAccessManager wam
) {
149 public void init(Session systemSession
) throws RepositoryException
{
150 wam
.init(systemSession
);
151 // defaultWorkspace = ((RepositoryImpl) getRepository()).getConfig()
152 // .getDefaultWorkspaceName();
155 public void close() throws RepositoryException
{
158 public boolean grants(Set
<Principal
> principals
, String workspaceName
)
159 throws RepositoryException
{
160 // everybody has access to all workspaces
161 // TODO: implements finer access to workspaces
164 // anonymous has access to the default workspace (required for
165 // remoting which does a default login when initializing the
167 // Boolean anonymous = false;
168 // for (Principal principal : principals)
169 // if (principal instanceof AnonymousPrincipal)
172 // if (anonymous && workspaceName.equals(defaultWorkspace))
175 // return wam.grants(principals, workspaceName);