Package org.apache.ldap.server.authz.support

Source Code of org.apache.ldap.server.authz.support.ACDFEngine

/*
*   @(#) $Id: ACDFEngine.java 326083 2005-10-18 10:59:38Z akarasulu $
*  
*   Copyright 2004 The Apache Software Foundation
*
*   Licensed under the Apache License, Version 2.0 (the "License");
*   you may not use this file except in compliance with the License.
*   You may obtain a copy of the License at
*
*       http://www.apache.org/licenses/LICENSE-2.0
*
*   Unless required by applicable law or agreed to in writing, software
*   distributed under the License is distributed on an "AS IS" BASIS,
*   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*   See the License for the specific language governing permissions and
*   limitations under the License.
*
*/
package org.apache.ldap.server.authz.support;

import java.util.*;

import javax.naming.Name;
import javax.naming.NamingException;
import javax.naming.directory.Attributes;

import org.apache.ldap.common.aci.ACIItem;
import org.apache.ldap.common.aci.ACITuple;
import org.apache.ldap.common.aci.AuthenticationLevel;
import org.apache.ldap.common.aci.MicroOperation;
import org.apache.ldap.common.exception.LdapNoPermissionException;
import org.apache.ldap.server.event.Evaluator;
import org.apache.ldap.server.event.ExpressionEvaluator;
import org.apache.ldap.server.schema.AttributeTypeRegistry;
import org.apache.ldap.server.schema.OidRegistry;
import org.apache.ldap.server.subtree.RefinementEvaluator;
import org.apache.ldap.server.subtree.RefinementLeafEvaluator;
import org.apache.ldap.server.subtree.SubtreeEvaluator;
import org.apache.ldap.server.partition.DirectoryPartitionNexusProxy;


/**
* An implementation of Access Control Decision Function (18.8, X.501).
* <p>
* This engine simply filters the collection of tuples using the following
* {@link ACITupleFilter}s sequentially:
* <ol>
* <li>{@link RelatedUserClassFilter}</li>
* <li>{@link RelatedProtectedItemFilter}</li>
* <li>{@link MaxValueCountFilter}</li>
* <li>{@link MaxImmSubFilter}</li>
* <li>{@link RestrictedByFilter}</li>
* <li>{@link MicroOperationFilter}</li>
* <li>{@link HighestPrecedenceFilter}</li>
* <li>{@link MostSpecificUserClassFilter}</li>
* <li>{@link MostSpecificProtectedItemFilter}</li>
* </ol>
* <p>
* Operation is determined to be permitted if and only if there is at least one
* tuple left and all of them grants the access. (18.8.4. X.501)
*
* @author The Apache Directory Project
* @version $Rev: 326083 $, $Date: 2005-10-18 06:59:38 -0400 (Tue, 18 Oct 2005) $
*/
public class ACDFEngine
{
    private final ACITupleFilter[] filters;

    /**
     * Creates a new instance.
     *
     * @param oidRegistry an OID registry to be used by internal components
     * @param attrTypeRegistry an attribute type registry to be used by internal components
     *
     * @throws NamingException if failed to initialize internal components
     */
    public ACDFEngine( OidRegistry oidRegistry, AttributeTypeRegistry attrTypeRegistry ) throws NamingException
    {
        Evaluator entryEvaluator = new ExpressionEvaluator( oidRegistry, attrTypeRegistry );
        SubtreeEvaluator subtreeEvaluator = new SubtreeEvaluator( oidRegistry );
        RefinementEvaluator refinementEvaluator = new RefinementEvaluator(
                new RefinementLeafEvaluator( oidRegistry ) );

        filters = new ACITupleFilter[] {
                new RelatedUserClassFilter( subtreeEvaluator ),
                new RelatedProtectedItemFilter( attrTypeRegistry, refinementEvaluator, entryEvaluator ),
                new MaxValueCountFilter(),
                new MaxImmSubFilter(),
                new RestrictedByFilter(),
                new MicroOperationFilter(),
                new HighestPrecedenceFilter(),
                new MostSpecificUserClassFilter(),
                new MostSpecificProtectedItemFilter(),
        };
    }

    /**
     * Checks the user with the specified name can access the specified resource
     * (entry, attribute type, or attribute value) and throws {@link LdapNoPermissionException}
     * if the user doesn't have any permission to perform the specified grants.
     *
     * @param proxy the proxy to the partition nexus
     * @param userGroupNames the collection of the group DNs the user who is trying to access the resource belongs
     * @param username the DN of the user who is trying to access the resource
     * @param entryName the DN of the entry the user is trying to access
     * @param attrId the attribute type of the attribute the user is trying to access.
     *               <tt>null</tt> if the user is not accessing a specific attribute type.
     * @param attrValue the attribute value of the attribute the user is trying to access.
     *                  <tt>null</tt> if the user is not accessing a specific attribute value.
     * @param microOperations the {@link MicroOperation}s to perform
     * @param aciTuples {@link ACITuple}s translated from {@link ACIItem}s in the subtree entries
     * @throws NamingException if failed to evaluate ACI items
     */
    public void checkPermission(
            DirectoryPartitionNexusProxy proxy,
            Collection userGroupNames, Name username, AuthenticationLevel authenticationLevel,
            Name entryName, String attrId, Object attrValue,
            Collection microOperations, Collection aciTuples, Attributes entry ) throws NamingException
    {
        if( !hasPermission(
                proxy,
                userGroupNames, username, authenticationLevel,
                entryName, attrId, attrValue,
                microOperations, aciTuples, entry ) )
        {
            throw new LdapNoPermissionException();
        }
    }


    public static final Collection USER_LOOKUP_BYPASS;
    static
    {
        Collection c = new HashSet();
        c.add( "normalizationService" );
        c.add( "authenticationService" );
        c.add( "authorizationService" );
        c.add( "oldAuthorizationService" );
        c.add( "schemaService" );
        c.add( "subentryService" );
        c.add( "operationalAttributeService" );
        c.add( "eventService" );
        USER_LOOKUP_BYPASS = Collections.unmodifiableCollection( c );
    }


    /**
     * Returns <tt>true</tt> if the user with the specified name can access the specified resource
     * (entry, attribute type, or attribute value) and throws {@link LdapNoPermissionException}
     * if the user doesn't have any permission to perform the specified grants.
     *
     * @param proxy the proxy to the partition nexus
     * @param userGroupNames the collection of the group DNs the user who is trying to access the resource belongs
     * @param userName the DN of the user who is trying to access the resource
     * @param entryName the DN of the entry the user is trying to access
     * @param attrId the attribute type of the attribute the user is trying to access.
     *               <tt>null</tt> if the user is not accessing a specific attribute type.
     * @param attrValue the attribute value of the attribute the user is trying to access.
     *                  <tt>null</tt> if the user is not accessing a specific attribute value.
     * @param microOperations the {@link MicroOperation}s to perform
     * @param aciTuples {@link ACITuple}s translated from {@link ACIItem}s in the subtree entries
     */
    public boolean hasPermission(
            DirectoryPartitionNexusProxy proxy,
            Collection userGroupNames, Name userName, AuthenticationLevel authenticationLevel,
            Name entryName, String attrId, Object attrValue,
            Collection microOperations, Collection aciTuples, Attributes entry ) throws NamingException
    {
        if( entryName == null )
        {
            throw new NullPointerException( "entryName" );
        }

        Attributes userEntry = proxy.lookup( userName, USER_LOOKUP_BYPASS );

        // Determine the scope of the requested operation.
        OperationScope scope;
        if( attrId == null )
        {
            scope = OperationScope.ENTRY;
        }
        else if( attrValue == null )
        {
            scope = OperationScope.ATTRIBUTE_TYPE;
        }
        else
        {
            scope = OperationScope.ATTRIBUTE_TYPE_AND_VALUE;
        }

        // Clone aciTuples in case it is unmodifiable.
        aciTuples = new ArrayList( aciTuples );

        // Filter unrelated and invalid tuples
        for( int i = 0; i < filters.length; i++ )
        {
            ACITupleFilter filter = filters[ i ];
            aciTuples = filter.filter(
                    aciTuples, scope, proxy,
                    userGroupNames, userName, userEntry, authenticationLevel,
                    entryName, attrId, attrValue, entry, microOperations );
        }

        // Deny access if no tuples left.
        if( aciTuples.size() == 0 )
        {
            return false;
        }

        // Grant access if and only if one or more tuples remain and
        // all grant access. Otherwise deny access.
        for( Iterator i = aciTuples.iterator(); i.hasNext(); )
        {
            ACITuple tuple = ( ACITuple ) i.next();
            if( !tuple.isGrant() )
            {
                return false;
            }
        }

        return true;
    }
}
TOP

Related Classes of org.apache.ldap.server.authz.support.ACDFEngine

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.