/* * Copyright 2013 Robert von Burg * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package li.strolch.privilege.policy; import li.strolch.privilege.base.AccessDeniedException; import li.strolch.privilege.base.PrivilegeException; import li.strolch.privilege.handler.PrivilegeHandler; import li.strolch.privilege.i18n.PrivilegeMessages; import li.strolch.privilege.model.Privilege; import li.strolch.privilege.model.PrivilegeContext; import li.strolch.privilege.model.Restrictable; import li.strolch.privilege.model.internal.Role; import li.strolch.utils.collections.Tuple; import li.strolch.utils.dbc.DBC; import java.text.MessageFormat; import static li.strolch.privilege.policy.PrivilegePolicyHelper.checkByAllowDenyValues; import static li.strolch.privilege.policy.PrivilegePolicyHelper.preValidate; /** * This {@link PrivilegePolicy} expects a {@link Tuple} as {@link Restrictable#getPrivilegeValue()}. The Tuple must * contain {@link Role} as first and second value. Then the policy decides depending on the user specific privileges * (see {@link PrivilegeHandler}), uses the basic Allow and Deny to detect if the username of * the certificate is allowed * * @author Robert von Burg */ public class RoleAccessPrivilege implements PrivilegePolicy { @Override public void validateAction(PrivilegeContext ctx, Privilege privilege, Restrictable restrictable) throws AccessDeniedException { validateAction(ctx, privilege, restrictable, true); } @Override public boolean hasPrivilege(PrivilegeContext ctx, Privilege privilege, Restrictable restrictable) throws PrivilegeException { return validateAction(ctx, privilege, restrictable, false); } private boolean validateAction(PrivilegeContext ctx, Privilege privilege, Restrictable restrictable, boolean assertHasPrivilege) throws AccessDeniedException { String privilegeName = preValidate(privilege, restrictable); // get the value on which the action is to be performed Object object = restrictable.getPrivilegeValue(); // if the object is null, then the validation is only that the privilege must exist if (object == null) return true; // RoleAccessPrivilege policy expects the privilege value to be a role if (!(object instanceof Tuple tuple)) { String msg = Restrictable.class.getName() + PrivilegeMessages.getString( "Privilege.illegalArgument.nontuple"); msg = MessageFormat.format(msg, restrictable.getClass().getSimpleName()); throw new PrivilegeException(msg); } // if everything is allowed, then no need to carry on if (privilege.isAllAllowed()) return true; // get role name as privilege value String oldRole = tuple.getFirst() instanceof Role r ? r.getName() : tuple.getFirst(); String newRole = tuple.getSecond() instanceof Role r ? r.getName() : tuple.getSecond(); switch (privilegeName) { case PrivilegeHandler.PRIVILEGE_GET_ROLE, PrivilegeHandler.PRIVILEGE_ADD_ROLE, PrivilegeHandler.PRIVILEGE_REMOVE_ROLE -> { DBC.INTERIM.assertNull("For " + privilegeName + " first must be null!", oldRole); DBC.INTERIM.assertNotNull("For " + privilegeName + " second must not be null!", newRole); return checkByAllowDenyValues(ctx, privilege, restrictable, newRole, assertHasPrivilege); } case PrivilegeHandler.PRIVILEGE_MODIFY_ROLE -> { DBC.INTERIM.assertNotNull("For " + privilegeName + " first must not be null!", oldRole); DBC.INTERIM.assertNotNull("For " + privilegeName + " second must not be null!", newRole); DBC.INTERIM.assertEquals("oldRole and newRole names must be the same", oldRole, newRole); return checkByAllowDenyValues(ctx, privilege, restrictable, newRole, assertHasPrivilege); } default -> { String msg = Restrictable.class.getName() + PrivilegeMessages.getString( "Privilege.roleAccessPrivilege.unknownPrivilege"); msg = MessageFormat.format(msg, privilegeName); throw new PrivilegeException(msg); } } } }