001 //$HeadURL: svn+ssh://jwilden@svn.wald.intevation.org/deegree/base/branches/2.5_testing/src/org/deegree/security/drm/SecurityHelper.java $ 002 /*---------------------------------------------------------------------------- 003 This file is part of deegree, http://deegree.org/ 004 Copyright (C) 2001-2009 by: 005 Department of Geography, University of Bonn 006 and 007 lat/lon GmbH 008 009 This library is free software; you can redistribute it and/or modify it under 010 the terms of the GNU Lesser General Public License as published by the Free 011 Software Foundation; either version 2.1 of the License, or (at your option) 012 any later version. 013 This library is distributed in the hope that it will be useful, but WITHOUT 014 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS 015 FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more 016 details. 017 You should have received a copy of the GNU Lesser General Public License 018 along with this library; if not, write to the Free Software Foundation, Inc., 019 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 020 021 Contact information: 022 023 lat/lon GmbH 024 Aennchenstr. 19, 53177 Bonn 025 Germany 026 http://lat-lon.de/ 027 028 Department of Geography, University of Bonn 029 Prof. Dr. Klaus Greve 030 Postfach 1147, 53001 Bonn 031 Germany 032 http://www.geographie.uni-bonn.de/deegree/ 033 034 e-mail: info@deegree.org 035 ----------------------------------------------------------------------------*/ 036 package org.deegree.security.drm; 037 038 import java.util.HashSet; 039 import java.util.Iterator; 040 import java.util.Set; 041 042 import org.deegree.security.GeneralSecurityException; 043 import org.deegree.security.UnauthorizedException; 044 import org.deegree.security.drm.model.RightType; 045 import org.deegree.security.drm.model.Role; 046 import org.deegree.security.drm.model.User; 047 048 /** 049 * Helper class that performs access checks. 050 * <p> 051 * 052 * @author <a href="mschneider@lat-lon.de">Markus Schneider</a> 053 * @author last edited by: $Author: apoth $ 054 * 055 * @version $Revision: 28661 $, $Date: 2010-12-09 09:12:29 +0100 (Do, 09 Dez 2010) $ 056 */ 057 public class SecurityHelper { 058 059 /** 060 * Returns the administrator (the 'Administrator'- or a 'SUBADMIN:'-role) for the given role. 061 * <p> 062 * 063 * @param access 064 * @param role 065 * @return the administrator (the 'Administrator'- or a 'SUBADMIN:'-role) for the given role. 066 * @throws GeneralSecurityException 067 * 068 */ 069 public static Role findAdminForRole( SecurityAccess access, Role role ) 070 throws GeneralSecurityException { 071 072 Role[] allRoles = access.getAllRoles(); 073 Role admin = access.getRoleById( Role.ID_SEC_ADMIN ); 074 for ( int i = 0; i < allRoles.length; i++ ) { 075 if ( allRoles[i].getName().startsWith( "SUBADMIN:" ) ) { 076 // if a subadmin-role has the update right, it is 077 // considered to be the administrative for the role 078 if ( allRoles[i].hasRight( access, RightType.UPDATE, role ) ) { 079 admin = allRoles[i]; 080 } 081 } 082 } 083 return admin; 084 } 085 086 /** 087 * Returns the associated 'Administrator'- or 'SUBADMIN:'-role of the token holder. 088 * <p> 089 * 090 * @param access 091 * @return the associated 'Administrator'- or 'SUBADMIN:'-role of the token holder. 092 * <p> 093 * @throws ManagementException 094 * @throws GeneralSecurityException 095 */ 096 public static Role checkForAdminOrSubadminRole( SecurityAccess access ) 097 throws ManagementException, GeneralSecurityException { 098 Role adminOrSubadminRole = null; 099 Role[] roles = access.getUser().getRoles( access ); 100 for ( int i = 0; i < roles.length; i++ ) { 101 if ( roles[i].getID() == Role.ID_SEC_ADMIN || roles[i].getName().startsWith( "SUBADMIN:" ) ) { 102 if ( adminOrSubadminRole == null ) { 103 adminOrSubadminRole = roles[i]; 104 } else { 105 throw new ManagementException( "Unzulässige Rollenvergabe: Benutzer '" 106 + access.getUser().getTitle() + "' hat sowohl die Rolle '" 107 + adminOrSubadminRole.getTitle() + "' als auch die Rolle '" 108 + roles[i].getTitle() + "'." ); 109 } 110 } 111 } 112 if ( adminOrSubadminRole == null ) { 113 throw new UnauthorizedException( "Sie haben nicht die für den Zugriff " + "benötigte 'Administrator'- " 114 + "bzw. Subadministrator-Rolle." ); 115 } 116 return adminOrSubadminRole; 117 } 118 119 /** 120 * Tests if the given token is associated with the 'Administrator'-role. 121 * <p> 122 * 123 * @param access 124 * @throws GeneralSecurityException 125 * this is an UnauthorizedException if the user does not have the 126 * 'Administrator'-role 127 */ 128 public static void checkForAdminRole( SecurityAccess access ) 129 throws GeneralSecurityException { 130 Role[] roles = access.getUser().getRoles( access ); 131 for ( int i = 0; i < roles.length; i++ ) { 132 if ( roles[i].getID() == Role.ID_SEC_ADMIN ) { 133 return; 134 } 135 } 136 throw new UnauthorizedException( "Sie haben nicht die für den Zugriff " + "benötigte 'Administrator'-Rolle." ); 137 } 138 139 /** 140 * Tests if the 'SUBADMIN:' and 'Administrator'-roles are all disjoint (so that there are no 141 * users that have more than 1 role). 142 * <p> 143 * 144 * @param access 145 * @throws ManagementException 146 * if there is a user with more than one role 147 * @throws GeneralSecurityException 148 */ 149 @SuppressWarnings("unchecked") 150 public static void checkSubadminRoleValidity( SecurityAccess access ) 151 throws ManagementException, GeneralSecurityException { 152 153 Role[] subadminRoles = access.getRolesByNS( "SUBADMIN" ); 154 Set<User>[] rolesAndUsers = new Set[subadminRoles.length + 1]; 155 String[] roleNames = new String[subadminRoles.length + 1]; 156 157 // admin role 158 User[] users = access.getRoleById( Role.ID_SEC_ADMIN ).getAllUsers( access ); 159 rolesAndUsers[0] = new HashSet<User>(); 160 roleNames[0] = "Administrator"; 161 for ( int i = 0; i < users.length; i++ ) { 162 rolesAndUsers[0].add( users[i] ); 163 } 164 165 // subadmin roles 166 for ( int i = 1; i < rolesAndUsers.length; i++ ) { 167 users = subadminRoles[i - 1].getAllUsers( access ); 168 rolesAndUsers[i] = new HashSet<User>(); 169 roleNames[i] = subadminRoles[i - 1].getTitle(); 170 for ( int j = 0; j < users.length; j++ ) { 171 rolesAndUsers[i].add( users[j] ); 172 } 173 } 174 175 // now check if all usersets are disjoint 176 for ( int i = 0; i < rolesAndUsers.length - 1; i++ ) { 177 Set userSet1 = rolesAndUsers[i]; 178 for ( int j = i + 1; j < rolesAndUsers.length; j++ ) { 179 Set userSet2 = rolesAndUsers[j]; 180 Iterator it = userSet2.iterator(); 181 while ( it.hasNext() ) { 182 User user = (User) it.next(); 183 if ( userSet1.contains( user ) ) { 184 throw new ManagementException( "Ungültige Subadmin-Rollenvergabe. Benutzer '" + user.getTitle() 185 + "' würde sowohl die Rolle '" + roleNames[i] 186 + "' als auch die Rolle '" + roleNames[j] + "' erhalten." ); 187 } 188 } 189 } 190 } 191 } 192 }