OAK-9335 : AuthorizableAction doesn't allow to monitor and respond to system user creation
git-svn-id: https://svn.apache.org/repos/asf/jackrabbit/oak/trunk@1885915 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java b/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
index a1ef22e..0968c9c 100644
--- a/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
+++ b/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
@@ -286,6 +286,8 @@
if (protectedParent.getStatus() == Tree.Status.NEW) {
if (a.isGroup()) {
userManager.onCreate((Group) a);
+ } else if (((User) a).isSystemUser()) {
+ userManager.onCreate((User) a);
} else {
userManager.onCreate((User) a, currentPw);
}
diff --git a/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java b/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
index c0cae58..a5f1e63 100644
--- a/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
+++ b/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
@@ -61,6 +61,8 @@
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
+import static com.google.common.base.Preconditions.checkArgument;
+
/**
* UserManagerImpl...
*/
@@ -194,6 +196,7 @@
setPrincipal(userTree, principal);
User user = new SystemUserImpl(userID, userTree, this);
+ onCreate(user);
log.debug("System user created: {}", userID);
return user;
@@ -274,7 +277,14 @@
action.onCreate(user, password, root, namePathMapper);
}
} else {
- log.debug("Omit onCreate action for system users.");
+ log.warn("onCreate(User,String) called for system user. Use onCreate(User) instead.");
+ }
+ }
+
+ void onCreate(@NotNull User systemUser) throws RepositoryException {
+ checkArgument(systemUser.isSystemUser());
+ for (AuthorizableAction action : actionProvider.getAuthorizableActions(securityProvider)) {
+ action.onCreate(systemUser, root, namePathMapper);
}
}
diff --git a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserImporterTest.java b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserImporterTest.java
index 96ac65a..4c907d6 100644
--- a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserImporterTest.java
+++ b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserImporterTest.java
@@ -478,7 +478,8 @@
init(true);
importer.propertiesCompleted(createSystemUserTree());
// create-actions must not be called for system users
- verifyNoInteractions(testAction);
+ verify(testAction).onCreate(any(User.class), any(Root.class), any(NamePathMapper.class));
+ verify(testAction, never()).onCreate(any(User.class), nullable(String.class), any(Root.class), any(NamePathMapper.class));
}
@Test
diff --git a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplActionsTest.java b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplActionsTest.java
new file mode 100644
index 0000000..7358f8f
--- /dev/null
+++ b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplActionsTest.java
@@ -0,0 +1,182 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.jackrabbit.oak.security.user;
+
+import com.google.common.collect.ImmutableSet;
+import org.apache.jackrabbit.api.security.user.Group;
+import org.apache.jackrabbit.api.security.user.User;
+import org.apache.jackrabbit.oak.AbstractSecurityTest;
+import org.apache.jackrabbit.oak.api.Root;
+import org.apache.jackrabbit.oak.commons.UUIDUtils;
+import org.apache.jackrabbit.oak.namepath.NamePathMapper;
+import org.apache.jackrabbit.oak.plugins.value.jcr.PartialValueFactory;
+import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
+import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
+import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
+import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration;
+import org.apache.jackrabbit.oak.spi.security.user.action.AuthorizableAction;
+import org.apache.jackrabbit.oak.spi.security.user.action.AuthorizableActionProvider;
+import org.apache.jackrabbit.oak.spi.security.user.action.GroupAction;
+import org.apache.jackrabbit.oak.spi.security.user.action.UserAction;
+import org.apache.jackrabbit.oak.spi.xml.ImportBehavior;
+import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter;
+import org.junit.After;
+import org.junit.Before;
+import org.junit.Test;
+
+import javax.jcr.RepositoryException;
+import java.util.Collections;
+import java.util.List;
+import java.util.Set;
+
+import static org.apache.jackrabbit.oak.spi.security.user.UserConstants.PARAM_AUTHORIZABLE_ACTION_PROVIDER;
+import static org.junit.Assert.assertNotNull;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.reset;
+import static org.mockito.Mockito.times;
+import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.verifyNoInteractions;
+import static org.mockito.Mockito.verifyNoMoreInteractions;
+import static org.mockito.Mockito.when;
+import static org.mockito.Mockito.withSettings;
+
+public class UserManagerImplActionsTest extends AbstractSecurityTest {
+
+ private final AuthorizableActionProvider actionProvider = mock(AuthorizableActionProvider.class);
+ private final AuthorizableAction action = mock(AuthorizableAction.class, withSettings().extraInterfaces(GroupAction.class, UserAction.class));
+
+ private UserManagerImpl userMgr;
+
+ @Before
+ public void before() throws Exception {
+ super.before();
+ userMgr = new UserManagerImpl(root, new PartialValueFactory(getNamePathMapper()), securityProvider);
+ reset(action);
+ }
+
+ @After
+ public void after() throws Exception {
+ try {
+ reset(action, actionProvider);
+ root.refresh();
+ } finally {
+ super.after();
+ }
+ }
+
+ @Override
+ protected ConfigurationParameters getSecurityConfigParameters() {
+ List actions = Collections.singletonList(action);
+ when(actionProvider.getAuthorizableActions(any(SecurityProvider.class))).thenReturn(actions);
+ return ConfigurationParameters.of(UserConfiguration.NAME,
+ ConfigurationParameters.of(
+ PARAM_AUTHORIZABLE_ACTION_PROVIDER, actionProvider,
+ ProtectedItemImporter.PARAM_IMPORT_BEHAVIOR, ImportBehavior.NAME_BESTEFFORT));
+ }
+
+ @Test
+ public void testCreateUser() throws Exception {
+ User u1 = userMgr.createUser("uid", "pw");
+ User u2 = userMgr.createUser("uid2", null, new PrincipalImpl("name2"), "relpath");
+ verify(action, times(1)).onCreate(u1, "pw", root, getNamePathMapper());
+ verify(action, times(1)).onCreate(u2, null, root, getNamePathMapper());
+ verifyNoMoreInteractions(action);
+ }
+
+ @Test
+ public void testOnUserCreateWithSystemUser() throws RepositoryException {
+ User user = when(mock(User.class).isSystemUser()).thenReturn(true).getMock();
+ userMgr.onCreate(user, null);
+ verifyNoInteractions(action);
+ }
+
+ @Test
+ public void testCreateSystemUser() throws Exception {
+ User su = userMgr.createSystemUser("sid", "system/relpath");
+ assertNotNull(su);
+ verify(action, times(1)).onCreate(su, root, getNamePathMapper());
+ verifyNoMoreInteractions(action);
+ }
+
+ @Test(expected = IllegalArgumentException.class)
+ public void testOnSystemUserCreateWithRegularUser() throws RepositoryException {
+ User user = when(mock(User.class).isSystemUser()).thenReturn(false).getMock();
+ userMgr.onCreate(user);
+ verifyNoInteractions(action);
+ }
+
+ @Test
+ public void testCreateGroup() throws Exception {
+ Group gr1 = userMgr.createGroup("gId");
+ Group gr2 = userMgr.createGroup(new PrincipalImpl("grName"));
+ Group gr3 = userMgr.createGroup(new PrincipalImpl("grName2"), "relPath");
+ verify(action, times(3)).onCreate(any(Group.class), any(Root.class), any(NamePathMapper.class));
+ verifyNoMoreInteractions(action);
+ }
+
+ @Test
+ public void testChangePw() throws Exception {
+ User u1 = userMgr.createUser("uid", null);
+ u1.changePassword("new");
+ u1.changePassword("changedAgain", "new");
+
+ verify(action).onCreate(u1, null, root, getNamePathMapper());
+ verify(action, times(2)).onPasswordChange(any(User.class), any(String.class), any(Root.class), any(NamePathMapper.class));
+ verifyNoMoreInteractions(action);
+ }
+
+ @Test
+ public void testDisable() throws Exception {
+ User u1 = userMgr.createUser("uid", "pw");
+ u1.disable("disable");
+ u1.disable(null);
+
+ verify(action).onCreate(u1, "pw", root, getNamePathMapper());
+ verify((UserAction) action).onDisable(u1, "disable", root, getNamePathMapper());
+ verify((UserAction) action).onDisable(u1, null, root, getNamePathMapper());
+ verifyNoMoreInteractions(action);
+ }
+
+ @Test
+ public void testAddMembers() throws Exception {
+ User testUser = getTestUser();
+ Group gr1 = userMgr.createGroup("gId");
+ gr1.addMember(testUser);
+ gr1.addMembers("memberId1", "memberId2", gr1.getID());
+
+ gr1.removeMember(testUser);
+ gr1.removeMembers("memberId1");
+
+ verify(((GroupAction) action)).onMemberAdded(gr1, testUser, root, getNamePathMapper());
+ verify(((GroupAction) action)).onMembersAdded(gr1, ImmutableSet.of("memberId1", "memberId2"), Collections.singleton(gr1.getID()), root, getNamePathMapper());
+ verify(((GroupAction) action), never()).onMembersAddedContentId(any(Group.class), any(Iterable.class), any(Iterable.class), any(Root.class), any(NamePathMapper.class));
+
+ verify(((GroupAction) action)).onMemberRemoved(gr1, testUser, root, getNamePathMapper());
+ verify(((GroupAction) action)).onMembersRemoved(gr1, Collections.singleton("memberId1"), Collections.emptySet(), root, getNamePathMapper());
+ }
+
+ @Test
+ public void testOnMembersAddedByContentId() throws Exception {
+ Group testGroup = mock(Group.class);
+ Set<String> membersIds = ImmutableSet.of(UUIDUtils.generateUUID());
+
+ userMgr.onGroupUpdate(testGroup, false, true, membersIds, Collections.emptySet());
+ verify(((GroupAction) action), times(1)).onMembersAddedContentId(testGroup, membersIds, Collections.emptySet(), root, getNamePathMapper());
+ }
+}
\ No newline at end of file
diff --git a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplTest.java b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplTest.java
index 665b0c0..196bd49 100644
--- a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplTest.java
+++ b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/user/UserManagerImplTest.java
@@ -16,13 +16,10 @@
*/
package org.apache.jackrabbit.oak.security.user;
-import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
-import com.google.common.collect.ImmutableSet;
import org.apache.jackrabbit.JcrConstants;
import org.apache.jackrabbit.api.security.user.Authorizable;
import org.apache.jackrabbit.api.security.user.AuthorizableExistsException;
-import org.apache.jackrabbit.api.security.user.Group;
import org.apache.jackrabbit.api.security.user.User;
import org.apache.jackrabbit.api.security.user.UserManager;
import org.apache.jackrabbit.oak.AbstractSecurityTest;
@@ -32,19 +29,13 @@
import org.apache.jackrabbit.oak.api.Tree;
import org.apache.jackrabbit.oak.api.Type;
import org.apache.jackrabbit.oak.commons.PathUtils;
-import org.apache.jackrabbit.oak.commons.UUIDUtils;
import org.apache.jackrabbit.oak.namepath.NamePathMapper;
import org.apache.jackrabbit.oak.namepath.impl.LocalNameMapper;
import org.apache.jackrabbit.oak.namepath.impl.NamePathMapperImpl;
import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
import org.apache.jackrabbit.oak.plugins.value.jcr.PartialValueFactory;
-import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
-import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
-import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration;
import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
-import org.apache.jackrabbit.oak.spi.security.user.action.AuthorizableActionProvider;
-import org.apache.jackrabbit.oak.spi.security.user.action.GroupAction;
import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
import org.junit.After;
import org.junit.Assert;
@@ -55,23 +46,17 @@
import javax.jcr.UnsupportedRepositoryOperationException;
import java.security.Principal;
import java.util.ArrayList;
-import java.util.Collections;
import java.util.Iterator;
import java.util.List;
-import java.util.Set;
import java.util.UUID;
-import static org.apache.jackrabbit.oak.spi.security.user.UserConstants.PARAM_AUTHORIZABLE_ACTION_PROVIDER;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
-import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.times;
-import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
/**
@@ -416,26 +401,4 @@
User u = getTestUser();
userMgr.createGroup(u.getPrincipal());
}
-
- @Test
- public void testOnMembersAddedByContentId() throws Exception {
- GroupAction groupAction = mock(GroupAction.class);
- List actions = ImmutableList.of(groupAction);
- AuthorizableActionProvider actionProvider = mock(AuthorizableActionProvider.class);
- when(actionProvider.getAuthorizableActions(any(SecurityProvider.class))).thenReturn(actions);
- ConfigurationParameters params = ConfigurationParameters.of(PARAM_AUTHORIZABLE_ACTION_PROVIDER, actionProvider);
-
- UserConfiguration uc = when(mock(UserConfiguration.class).getParameters()).thenReturn(params).getMock();
- SecurityProvider sp = mock(SecurityProvider.class);
- when(sp.getConfiguration(UserConfiguration.class)).thenReturn(uc);
-
- UserManagerImpl um = new UserManagerImpl(root, new PartialValueFactory(getNamePathMapper()), sp);
-
- Group testGroup = mock(Group.class);
- Set<String> membersIds = ImmutableSet.of(UUIDUtils.generateUUID());
-
- um.onGroupUpdate(testGroup, false, true, membersIds, Collections.emptySet());
- verify(groupAction, times(1)).onMembersAddedContentId(testGroup, membersIds, Collections.emptySet(), root, getNamePathMapper());
-
- }
}
\ No newline at end of file
diff --git a/oak-doc/src/site/markdown/security/user/authorizableaction.md b/oak-doc/src/site/markdown/security/user/authorizableaction.md
index 0d431d6..f8a5d3b 100644
--- a/oak-doc/src/site/markdown/security/user/authorizableaction.md
+++ b/oak-doc/src/site/markdown/security/user/authorizableaction.md
@@ -91,6 +91,7 @@
- implement `AuthorizableActionProvider` interface exposing your custom action(s).
- make the provider implementation an OSGi service and make it available to the Oak repository.
+- make sure the `AuthorizableActionProvider` is listed as required service with the `SecurityProvider` (see also [Introduction](../introduction.html#configuration]))
##### Examples
diff --git a/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/AuthorizableAction.java b/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/AuthorizableAction.java
index 18d23b6..434fb50 100644
--- a/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/AuthorizableAction.java
+++ b/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/AuthorizableAction.java
@@ -25,6 +25,7 @@
import org.apache.jackrabbit.oak.namepath.NamePathMapper;
import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
+import org.jetbrains.annotations.NotNull;
/**
* The {@code AuthorizableAction} interface provide an implementation
@@ -90,6 +91,22 @@
void onCreate(User user, String password, Root root, NamePathMapper namePathMapper) throws RepositoryException;
/**
+ * Allows to add application specific modifications or validation associated
+ * with the creation of a new <strong>system</strong>system. Note, that this method is called
+ * <strong>before</strong> any {@code Root#commit()} call.
+ *
+ *
+ * @param user The new system user that has not yet been persisted;
+ * e.g. the associated tree is still 'NEW'.
+ * @param root The root associated with the user manager.
+ * @param namePathMapper The {@code NamePathMapper} present with the editing session.
+ * @throws RepositoryException If an error occurs.
+ */
+ default void onCreate(@NotNull User systemUser, @NotNull Root root, @NotNull NamePathMapper namePathMapper) throws RepositoryException {
+ // nop
+ }
+
+ /**
* Allows to add application specific behavior associated with the removal
* of an authorizable. Note, that this method is called <strong>before</strong>
* {@link org.apache.jackrabbit.api.security.user.Authorizable#remove} is executed (and persisted); thus the
diff --git a/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/package-info.java b/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/package-info.java
index 88739fd..31a21e0 100644
--- a/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/package-info.java
+++ b/oak-security-spi/src/main/java/org/apache/jackrabbit/oak/spi/security/user/action/package-info.java
@@ -14,7 +14,7 @@
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-@Version("1.2.0")
+@Version("1.3.0")
package org.apache.jackrabbit.oak.spi.security.user.action;
import org.osgi.annotation.versioning.Version;
diff --git a/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/action/AbstractAuthorizableActionTest.java b/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/action/AbstractAuthorizableActionTest.java
index bf6b7d2..7168d82 100644
--- a/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/action/AbstractAuthorizableActionTest.java
+++ b/oak-security-spi/src/test/java/org/apache/jackrabbit/oak/spi/security/user/action/AbstractAuthorizableActionTest.java
@@ -27,6 +27,7 @@
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.verifyNoInteractions;
+import static org.mockito.Mockito.when;
public class AbstractAuthorizableActionTest {
@@ -43,12 +44,24 @@
}
@Test
- public void testOnCreate() throws Exception {
+ public void testOnCreateGroup() throws Exception {
Group gr = mock(Group.class);
action.onCreate(gr, root, namePathMapper);
+ verifyNoInteractions(gr, root, namePathMapper);
+ }
+
+ @Test
+ public void testOnCreateUser() throws Exception {
User user = mock(User.class);
action.onCreate(user, null, root, namePathMapper);
- verifyNoInteractions(user, gr, root, namePathMapper);
+ verifyNoInteractions(user, root, namePathMapper);
+ }
+
+ @Test
+ public void testOnCreateSystemUser() throws Exception {
+ User user = when(mock(User.class).isSystemUser()).thenReturn(true).getMock();
+ action.onCreate(user, root, namePathMapper);
+ verifyNoInteractions(user, root, namePathMapper);
}
@Test