Package org.apache.jackrabbit.core.security.authorization.acl

Source Code of org.apache.jackrabbit.core.security.authorization.acl.ReadTest

/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements.  See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License.  You may obtain a copy of the License at
*
*      http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.jackrabbit.core.security.authorization.acl;

import org.apache.jackrabbit.api.JackrabbitSession;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlList;
import org.apache.jackrabbit.core.security.authorization.AbstractEvaluationTest;
import org.apache.jackrabbit.core.security.authorization.AccessControlConstants;
import org.apache.jackrabbit.test.NotExecutableException;

import javax.jcr.AccessDeniedException;
import javax.jcr.Node;
import javax.jcr.RepositoryException;
import javax.jcr.Session;
import javax.jcr.Value;
import javax.jcr.ValueFactory;
import javax.jcr.security.AccessControlManager;
import javax.jcr.security.Privilege;
import java.security.Principal;
import java.util.Collections;
import java.util.HashMap;
import java.util.Map;

/**
* <code>ReadTest</code>...
*/
public class ReadTest extends AbstractEvaluationTest {

    private String path;
    private String childNPath;

    @Override
    protected void setUp() throws Exception {
        super.setUp();

        // create some nodes below the test root in order to apply ac-stuff
        Node node = testRootNode.addNode(nodeName1, testNodeType);
        Node cn1 = node.addNode(nodeName2, testNodeType);
        superuser.save();

        path = node.getPath();
        childNPath = cn1.getPath();
    }

    @Override
    protected boolean isExecutable() {
        return EvaluationUtil.isExecutable(acMgr);
    }

    @Override
    protected JackrabbitAccessControlList getPolicy(AccessControlManager acM, String path, Principal principal) throws RepositoryException, AccessDeniedException, NotExecutableException {
        return EvaluationUtil.getPolicy(acM, path, principal);
    }

    @Override
    protected Map<String, Value> getRestrictions(Session s, String path) {
        return Collections.emptyMap();
    }

    public void testReadDenied() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);

        /* deny READ privilege for testUser at 'path' */
        withdrawPrivileges(path, privileges, getRestrictions(superuser, path));
        /*
         allow READ privilege for testUser at 'childNPath'
         */
        givePrivileges(childNPath, privileges, getRestrictions(superuser, childNPath));


        Session testSession = getTestSession();

        assertFalse(testSession.nodeExists(path));
        assertTrue(testSession.nodeExists(childNPath));
        Node n = testSession.getNode(childNPath);
        n.getDefinition();
    }

    public void testDenyUserAllowGroup() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         deny READ privilege for testUser at 'path'
         */
        withdrawPrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));
        /*
         allow READ privilege for group at 'path'
         */
        givePrivileges(path, group, privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(path));
    }

    public void testAllowGroupDenyUser() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
        allow READ privilege for group at 'path'
        */
        givePrivileges(path, group, privileges, getRestrictions(superuser, path));
        /*
        deny READ privilege for testUser at 'path'
        */
        withdrawPrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(path));
    }

    public void testAllowUserDenyGroup() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         allow READ privilege for testUser at 'path'
         */
        givePrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));
        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(path));
    }

    public void testDenyGroupAllowUser() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        /*
         allow READ privilege for testUser at 'path'
         */
        givePrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(path));
    }

    public void testDenyGroupAllowEveryone() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();
        Principal everyone = ((JackrabbitSession) superuser).getPrincipalManager().getEveryone();

        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        /*
         allow READ privilege for everyone at 'path'
         */
        givePrivileges(path, everyone, privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(path));
    }

    public void testAllowEveryoneDenyGroup() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();
        Principal everyone = ((JackrabbitSession) superuser).getPrincipalManager().getEveryone();

        /*
         allow READ privilege for everyone at 'path'
         */
        givePrivileges(path, everyone, privileges, getRestrictions(superuser, path));

        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(path));
    }

    public void testDenyGroupPathAllowEveryoneChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();
        Principal everyone = ((JackrabbitSession) superuser).getPrincipalManager().getEveryone();

        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        /*
         allow READ privilege for everyone at 'childNPath'
         */
        givePrivileges(path, everyone, privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(childNPath));
    }

    public void testAllowEveryonePathDenyGroupChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();
        Principal everyone = ((JackrabbitSession) superuser).getPrincipalManager().getEveryone();

        /*
         allow READ privilege for everyone at 'path'
         */
        givePrivileges(path, everyone, privileges, getRestrictions(superuser, path));

        /*
         deny READ privilege for group at 'childNPath'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(childNPath));
    }

    public void testAllowUserPathDenyGroupChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         allow READ privilege for testUser at 'path'
         */
        givePrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));
        /*
         deny READ privilege for group at 'childPath'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(childNPath));
    }

    public void testDenyGroupPathAllowUserChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         deny READ privilege for group at 'path'
         */
        withdrawPrivileges(path, group, privileges, getRestrictions(superuser, path));

        /*
         allow READ privilege for testUser at 'childNPath'
         */
        givePrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertTrue(testSession.nodeExists(childNPath));
    }

    public void testDenyUserPathAllowGroupChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
         deny READ privilege for testUser at 'path'
         */
        withdrawPrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, path));
        /*
         allow READ privilege for group at 'childNPath'
         */
        givePrivileges(path, group, privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(childNPath));
    }

    public void testAllowGroupPathDenyUserChildPath() throws Exception {
        Privilege[] privileges = privilegesFromName(Privilege.JCR_READ);
        Principal group = getTestGroup().getPrincipal();

        /*
        allow READ privilege for everyone at 'path'
        */
        givePrivileges(path, group, privileges, getRestrictions(superuser, path));
        /*
        deny READ privilege for testUser at 'childNPath'
        */
        withdrawPrivileges(path, testUser.getPrincipal(), privileges, getRestrictions(superuser, childNPath));

        Session testSession = getTestSession();
        assertFalse(testSession.nodeExists(childNPath));
    }

    public void testGlobRestriction() throws Exception {
        Session testSession = getTestSession();
        AccessControlManager testAcMgr = getTestACManager();
        ValueFactory vf = superuser.getValueFactory();
        /*
          precondition:
          testuser must have READ-only permission on test-node and below
        */
        checkReadOnly(path);
        checkReadOnly(childNPath);

        Privilege[] read = privilegesFromName(Privilege.JCR_READ);

        Map<String, Value> restrictions = new HashMap<String, Value>(getRestrictions(superuser, path));
        restrictions.put(AccessControlConstants.P_GLOB.toString(), vf.createValue("*/"+jcrPrimaryType));

        withdrawPrivileges(path, read, restrictions);

        assertTrue(testAcMgr.hasPrivileges(path, read));
        assertTrue(testSession.hasPermission(path, javax.jcr.Session.ACTION_READ));
        testSession.getNode(path);

        assertTrue(testAcMgr.hasPrivileges(childNPath, read));
        assertTrue(testSession.hasPermission(childNPath, javax.jcr.Session.ACTION_READ));
        testSession.getNode(childNPath);

        String propPath = path + "/" + jcrPrimaryType;
        assertFalse(testSession.hasPermission(propPath, javax.jcr.Session.ACTION_READ));
        assertFalse(testSession.propertyExists(propPath));

        propPath = childNPath + "/" + jcrPrimaryType;
        assertFalse(testSession.hasPermission(propPath, javax.jcr.Session.ACTION_READ));
        assertFalse(testSession.propertyExists(propPath));
    }
}
TOP

Related Classes of org.apache.jackrabbit.core.security.authorization.acl.ReadTest

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.