1 package org
.argeo
.security
.jackrabbit
;
3 import java
.security
.Principal
;
4 import java
.util
.ArrayList
;
5 import java
.util
.Iterator
;
9 import javax
.jcr
.AccessDeniedException
;
10 import javax
.jcr
.Node
;
11 import javax
.jcr
.PathNotFoundException
;
12 import javax
.jcr
.RepositoryException
;
13 import javax
.jcr
.Session
;
14 import javax
.jcr
.UnsupportedRepositoryOperationException
;
15 import javax
.jcr
.lock
.LockException
;
16 import javax
.jcr
.security
.AccessControlException
;
17 import javax
.jcr
.security
.AccessControlList
;
18 import javax
.jcr
.security
.AccessControlManager
;
19 import javax
.jcr
.security
.AccessControlPolicy
;
20 import javax
.jcr
.security
.AccessControlPolicyIterator
;
21 import javax
.jcr
.security
.Privilege
;
22 import javax
.jcr
.version
.VersionException
;
23 import javax
.security
.auth
.Subject
;
25 import org
.apache
.commons
.logging
.Log
;
26 import org
.apache
.commons
.logging
.LogFactory
;
27 import org
.apache
.jackrabbit
.api
.security
.user
.Group
;
28 import org
.apache
.jackrabbit
.api
.security
.user
.User
;
29 import org
.apache
.jackrabbit
.api
.security
.user
.UserManager
;
30 import org
.apache
.jackrabbit
.core
.DefaultSecurityManager
;
31 import org
.apache
.jackrabbit
.core
.security
.SecurityConstants
;
32 import org
.apache
.jackrabbit
.core
.security
.SystemPrincipal
;
33 import org
.apache
.jackrabbit
.core
.security
.authorization
.WorkspaceAccessManager
;
34 import org
.argeo
.ArgeoException
;
35 import org
.argeo
.jcr
.JcrUtils
;
36 import org
.springframework
.security
.Authentication
;
37 import org
.springframework
.security
.GrantedAuthority
;
39 /** Intermediary class in order to have a consistent naming in config files. */
40 public class ArgeoSecurityManager
extends DefaultSecurityManager
{
41 private Log log
= LogFactory
.getLog(ArgeoSecurityManager
.class);
44 /** Since this is called once when the session is created, we take the opportunity to synchronize Spring and Jackrabbit users and groups.*/
45 public String
getUserID(Subject subject
, String workspaceName
)
46 throws RepositoryException
{
47 long begin
= System
.currentTimeMillis();
49 if (!subject
.getPrincipals(SystemPrincipal
.class).isEmpty())
50 return super.getUserID(subject
, workspaceName
);
52 Authentication authen
;
53 Set
<Authentication
> authens
= subject
54 .getPrincipals(Authentication
.class);
55 if (authens
.size() == 0)
56 throw new ArgeoException("No Spring authentication found in "
59 authen
= authens
.iterator().next();
61 UserManager systemUm
= getSystemUserManager(workspaceName
);
63 String userId
= authen
.getName();
64 User user
= (User
) systemUm
.getAuthorizable(userId
);
66 user
= systemUm
.createUser(userId
, authen
.getCredentials()
67 .toString(), authen
, null);
68 log
.info(userId
+ " added as " + user
);
71 setHomeNodeAuthorizations(user
);
74 List
<String
> userGroupIds
= new ArrayList
<String
>();
75 for (GrantedAuthority ga
: authen
.getAuthorities()) {
76 Group group
= (Group
) systemUm
.getAuthorizable(ga
.getAuthority());
78 group
= systemUm
.createGroup(ga
.getAuthority());
79 log
.info(ga
.getAuthority() + " added as " + group
);
81 if (!group
.isMember(user
))
82 group
.addMember(user
);
83 userGroupIds
.add(ga
.getAuthority());
87 // check if user has not been removed from some groups
88 for (Iterator
<Group
> it
= user
.declaredMemberOf(); it
.hasNext();) {
89 Group group
= it
.next();
90 if (!userGroupIds
.contains(group
.getID()))
91 group
.removeMember(user
);
94 if (log
.isTraceEnabled())
95 log
.trace("Spring and Jackrabbit Security synchronized for user "
96 + userId
+ " in " + (System
.currentTimeMillis() - begin
)
101 protected void setHomeNodeAuthorizations(User user
) {
102 // give all privileges on user home
103 // FIXME: fails on an empty repo
104 String userId
= "<not yet set>";
106 userId
= user
.getID();
107 Node userHome
= JcrUtils
.getUserHome(getSystemSession(), userId
);
108 if (userHome
!= null) {
109 String path
= userHome
.getPath();
110 AccessControlPolicy policy
= null;
111 AccessControlManager acm
= getSystemSession()
112 .getAccessControlManager();
113 AccessControlPolicyIterator policyIterator
= acm
114 .getApplicablePolicies(path
);
115 if (policyIterator
.hasNext()) {
116 policy
= policyIterator
.nextAccessControlPolicy();
118 AccessControlPolicy
[] existingPolicies
= acm
120 policy
= existingPolicies
[0];
122 if (policy
instanceof AccessControlList
) {
123 Privilege
[] privileges
= { acm
124 .privilegeFromName(Privilege
.JCR_ALL
) };
125 ((AccessControlList
) policy
).addAccessControlEntry(
126 user
.getPrincipal(), privileges
);
127 acm
.setPolicy(path
, policy
);
130 } catch (Exception e
) {
131 log
.warn("Cannot set authorization on user node for " + userId
132 + ": " + e
.getMessage());
138 protected WorkspaceAccessManager
createDefaultWorkspaceAccessManager() {
139 WorkspaceAccessManager wam
= super
140 .createDefaultWorkspaceAccessManager();
141 return new ArgeoWorkspaceAccessManagerImpl(wam
);
144 private class ArgeoWorkspaceAccessManagerImpl
implements SecurityConstants
,
145 WorkspaceAccessManager
{
146 private final WorkspaceAccessManager wam
;
148 // private String defaultWorkspace;
150 public ArgeoWorkspaceAccessManagerImpl(WorkspaceAccessManager wam
) {
155 public void init(Session systemSession
) throws RepositoryException
{
156 wam
.init(systemSession
);
157 // defaultWorkspace = ((RepositoryImpl) getRepository()).getConfig()
158 // .getDefaultWorkspaceName();
161 public void close() throws RepositoryException
{
164 public boolean grants(Set
<Principal
> principals
, String workspaceName
)
165 throws RepositoryException
{
166 // everybody has access to all workspaces
167 // TODO: implements finer access to workspaces
170 // anonymous has access to the default workspace (required for
171 // remoting which does a default login when initializing the
173 // Boolean anonymous = false;
174 // for (Principal principal : principals)
175 // if (principal instanceof AnonymousPrincipal)
178 // if (anonymous && workspaceName.equals(defaultWorkspace))
181 // return wam.grants(principals, workspaceName);