1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
|
/*
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.qpid.server.security.access.plugins;
import java.security.Principal;
import org.apache.commons.configuration.ConfigurationException;
import org.apache.log4j.Logger;
import org.apache.qpid.server.configuration.plugins.ConfigurationPlugin;
import org.apache.qpid.server.security.AbstractPlugin;
import org.apache.qpid.server.security.Result;
import org.apache.qpid.server.security.SecurityManager;
import org.apache.qpid.server.security.SecurityPluginFactory;
import org.apache.qpid.server.security.access.ObjectProperties;
import org.apache.qpid.server.security.access.ObjectType;
import org.apache.qpid.server.security.access.Operation;
import org.apache.qpid.server.security.access.config.RuleSet;
/**
* This access control plugin implements version two plain text access control.
*/
public class AccessControl extends AbstractPlugin
{
public static final Logger _logger = Logger.getLogger(AccessControl.class);
private RuleSet _ruleSet;
public static final SecurityPluginFactory<AccessControl> FACTORY = new SecurityPluginFactory<AccessControl>()
{
public Class<AccessControl> getPluginClass()
{
return AccessControl.class;
}
public String getPluginName()
{
return AccessControl.class.getName();
}
public AccessControl newInstance(ConfigurationPlugin config) throws ConfigurationException
{
AccessControlConfiguration configuration = config.getConfiguration(AccessControlConfiguration.class.getName());
// If there is no configuration for this plugin then don't load it.
if (configuration == null)
{
return null;
}
AccessControl plugin = new AccessControl();
plugin.configure(configuration);
return plugin;
}
};
public Result getDefault()
{
return _ruleSet.getDefault();
}
/**
* Object instance access authorisation.
*
* Delegate to the {@link #authorise(Operation, ObjectType, ObjectProperties)} method, with
* the operation set to ACCESS and no object properties.
*/
public Result access(ObjectType objectType, Object instance)
{
return authorise(Operation.ACCESS, objectType, ObjectProperties.EMPTY);
}
/**
* Check if an operation is authorised by asking the configuration object about the access
* control rules granted to the current thread's {@link Principal}. If there is no current
* user the plugin will abstain.
*/
public Result authorise(Operation operation, ObjectType objectType, ObjectProperties properties)
{
Principal principal = SecurityManager.getThreadPrincipal();
// Abstain if there is no user associated with this thread
if (principal == null)
{
return Result.ABSTAIN;
}
return _ruleSet.check(principal.getName(), operation, objectType, properties);
}
public void configure(ConfigurationPlugin config)
{
super.configure(config);
AccessControlConfiguration accessConfig = (AccessControlConfiguration) _config;
_ruleSet = accessConfig.getRuleSet();
}
}
|