blob: 0899a8207640a734bc02e2e0a179b674e77b2beb [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.jackrabbit.oak.spi.security.authorization.cug.impl;
import java.security.Principal;
import java.util.List;
import java.util.Set;
import javax.jcr.security.AccessControlList;
import javax.jcr.security.AccessControlManager;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableSet;
import org.apache.jackrabbit.commons.jackrabbit.authorization.AccessControlUtils;
import org.apache.jackrabbit.oak.api.CommitFailedException;
import org.apache.jackrabbit.oak.api.ContentSession;
import org.apache.jackrabbit.oak.api.Root;
import org.apache.jackrabbit.oak.api.Tree;
import org.apache.jackrabbit.oak.api.Type;
import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
import org.apache.jackrabbit.oak.spi.nodetype.NodeTypeConstants;
import org.apache.jackrabbit.oak.spi.security.authorization.AuthorizationConfiguration;
import org.apache.jackrabbit.oak.spi.security.authorization.accesscontrol.AccessControlConstants;
import org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider;
import org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
import org.apache.jackrabbit.oak.spi.security.principal.EveryonePrincipal;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.junit.Before;
import org.junit.Test;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
public class CugEvaluationTest extends AbstractCugTest implements NodeTypeConstants {
private ContentSession testSession;
private Root testRoot;
private Principal testGroupPrincipal;
private Tree content;
private Tree content2;
private Tree a;
private Tree c;
@Before
@Override
public void before() throws Exception {
super.before();
// create cugs
// - /content/a : allow testGroup, deny everyone
// - /content/aa/bb : allow testGroup, deny everyone
// - /content/a/b/c : allow everyone, deny testGroup (isolated)
// - /content2 : allow everyone, deny testGroup (isolated)
// regular acl:
// - /content : allow testUser, jcr:read
// - /content : allow testGroup, jcr:read, jcr:write, jcr:readAccessControl
setupCugsAndAcls();
testGroupPrincipal = getTestGroupPrincipal();
content = root.getTree("/content");
content2 = root.getTree("/content2");
a = root.getTree("/content/a");
c = root.getTree("/content/a/b/c");
testSession = createTestSession();
testRoot = testSession.getLatestRoot();
}
@Override
public void after() throws Exception {
try {
if (testSession != null) {
testSession.close();
}
} finally {
super.after();
}
}
private PermissionProvider createPermissionProvider(ContentSession cs) {
return getSecurityProvider().getConfiguration(AuthorizationConfiguration.class).getPermissionProvider(root, adminSession.getWorkspaceName(), cs.getAuthInfo().getPrincipals());
}
private PermissionProvider createPermissionProvider(Principal... principals) {
return getSecurityProvider().getConfiguration(AuthorizationConfiguration.class).getPermissionProvider(root, adminSession.getWorkspaceName(), ImmutableSet.copyOf(principals));
}
@Test
public void testRead() {
List<String> noAccess = ImmutableList.of(
"/", UNSUPPORTED_PATH, /* no access */
"/content/a", "/content/a/b", "/content/aa/bb", /* granted by ace, denied by cug */
"/content2" /* granted by cug only */
);
for (String p : noAccess) {
assertFalse(p, testRoot.getTree(p).exists());
}
List<String> readAccess = ImmutableList.of("/content", "/content/subtree", "/content/a/b/c", "/content/aa");
for (String p : readAccess) {
assertTrue(p, testRoot.getTree(p).exists());
}
}
@Test
public void testReadAcl() {
assertFalse(testRoot.getTree("/content/rep:policy").exists());
}
@Test
public void testReadAcl2() throws Exception {
try (ContentSession cs = createTestSession2()) {
Root r = cs.getLatestRoot();
assertTrue(r.getTree("/content/rep:policy").exists());
}
}
@Test
public void testReadCug() {
List<String> noAccess = ImmutableList.of(
"/content/a/rep:cugPolicy", "/content/aa/bb/rep:cugPolicy", "/content2/rep:cugPolicy"
);
for (String p : noAccess) {
assertFalse(p, testRoot.getTree(p).exists());
}
}
@Test
public void testReadCug2() throws Exception {
try (ContentSession cs = createTestSession2()) {
Root r = cs.getLatestRoot();
assertTrue(r.getTree("/content/a/rep:cugPolicy").exists());
assertFalse(r.getTree("/content2/rep:cugPolicy").exists());
}
}
@Test
public void testWrite() throws Exception {
List<String> readOnly = ImmutableList.of("/content", "/content/a/b/c");
for (String p : readOnly) {
try {
Tree content = testRoot.getTree(p);
TreeUtil.addChild(content, "writeTest", NT_OAK_UNSTRUCTURED);
testRoot.commit();
fail();
} catch (CommitFailedException e) {
assertTrue(e.isAccessViolation());
} finally {
testRoot.refresh();
}
}
}
@Test
public void testWrite2() throws Exception {
ContentSession cs = createTestSession2();
Root r = cs.getLatestRoot();
try {
PermissionProvider pp = createPermissionProvider(cs);
assertTrue(pp.isGranted(root.getTree("/content/writeTest"), null, Permissions.ADD_NODE));
assertTrue(pp.isGranted(root.getTree("/content/a/b/c/writeTest"), null, Permissions.ADD_NODE));
List<String> paths = ImmutableList.of("/content", "/content/a/b/c");
for (String p : paths) {
Tree content = r.getTree(p);
TreeUtil.addChild(content, "writeTest", NT_OAK_UNSTRUCTURED);
r.commit();
}
} finally {
r.refresh();
cs.close();
}
}
@Test
public void testWriteAcl() throws Exception {
ContentSession cs = createTestSession2();
Root r = cs.getLatestRoot();
try {
Tree tree = r.getTree("/content/a/b/c");
tree.setProperty(JCR_MIXINTYPES, ImmutableList.of(MIX_REP_CUG_MIXIN, AccessControlConstants.MIX_REP_ACCESS_CONTROLLABLE), Type.NAMES);
tree.addChild(AccessControlConstants.REP_POLICY).setProperty(JCR_PRIMARYTYPE, AccessControlConstants.NT_REP_ACL, Type.NAME);
r.commit();
fail();
} catch (CommitFailedException e) {
assertTrue(e.isAccessViolation());
} finally {
r.refresh();
}
}
@Test
public void testWriteCug() throws Exception {
ContentSession cs = createTestSession2();
Root r = cs.getLatestRoot();
try {
// modify the existing cug
Tree tree = r.getTree("/content/a/rep:cugPolicy");
tree.setProperty(REP_PRINCIPAL_NAMES, ImmutableList.of(EveryonePrincipal.NAME, testGroupPrincipal.getName()), Type.STRINGS);
r.commit();
fail();
} catch (CommitFailedException e) {
assertTrue(e.isAccessViolation());
} finally {
r.refresh();
}
}
@Test
public void testIsGrantedTestGroup() {
// testGroup
PermissionProvider pp = createPermissionProvider(testGroupPrincipal);
assertTrue(pp.isGranted(content, null, Permissions.READ));
assertTrue(pp.isGranted(a, null, Permissions.READ));
assertFalse(pp.isGranted(c, null, Permissions.READ));
assertTrue(pp.isGranted(content, null, Permissions.READ_ACCESS_CONTROL));
assertTrue(pp.isGranted(a, null, Permissions.READ_ACCESS_CONTROL));
assertTrue(pp.isGranted(c, null, Permissions.READ_ACCESS_CONTROL));
}
@Test
public void testIsGrantedEveryone() {
// everyone
PermissionProvider pp = createPermissionProvider(EveryonePrincipal.getInstance());
assertFalse(pp.isGranted(content, null, Permissions.READ));
assertFalse(pp.isGranted(content2, null, Permissions.READ));
assertFalse(pp.isGranted(a, null, Permissions.READ));
assertFalse(pp.isGranted(c, null, Permissions.READ));
assertFalse(pp.isGranted(content, null, Permissions.READ_ACCESS_CONTROL));
assertFalse(pp.isGranted(content2, null, Permissions.READ_ACCESS_CONTROL));
assertFalse(pp.isGranted(a, null, Permissions.READ_ACCESS_CONTROL));
assertFalse(pp.isGranted(c, null, Permissions.READ_ACCESS_CONTROL));
}
@Test
public void testIsGrantedTestGroupEveryone() {
// testGroup + everyone
PermissionProvider pp = createPermissionProvider(testGroupPrincipal, EveryonePrincipal.getInstance());
assertTrue(pp.isGranted(content, null, Permissions.READ));
assertTrue(pp.isGranted(a, null, Permissions.READ));
assertTrue(pp.isGranted(c, null, Permissions.READ));
assertTrue(pp.isGranted(content, null, Permissions.READ_ACCESS_CONTROL));
assertTrue(pp.isGranted(a, null, Permissions.READ_ACCESS_CONTROL));
assertTrue(pp.isGranted(c, null, Permissions.READ_ACCESS_CONTROL));
}
@Test
public void testIsGrantedTestUserEveryone() throws Exception {
// testUser + everyone
PermissionProvider pp = createPermissionProvider(getTestUser().getPrincipal(), EveryonePrincipal.getInstance());
assertTrue(pp.isGranted(content, null, Permissions.READ));
assertFalse(pp.isGranted(a, null, Permissions.READ));
assertTrue(pp.isGranted(c, null, Permissions.READ));
assertFalse(pp.isGranted(content, null, Permissions.READ_ACCESS_CONTROL));
assertFalse(pp.isGranted(a, null, Permissions.READ_ACCESS_CONTROL));
assertFalse(pp.isGranted(c, null, Permissions.READ_ACCESS_CONTROL));
}
@Test
public void testHasPrivilegesTestGroup() {
// testGroup
PermissionProvider pp = createPermissionProvider(testGroupPrincipal);
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(a, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(c, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertTrue(pp.hasPrivileges(a, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertTrue(pp.hasPrivileges(c, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
}
@Test
public void testHasPrivilegesEveryone() {
// everyone
PermissionProvider pp = createPermissionProvider(EveryonePrincipal.getInstance());
assertFalse(pp.hasPrivileges(content, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(content2, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(a, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(c, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(content, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertFalse(pp.hasPrivileges(content2, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertFalse(pp.hasPrivileges(a, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertFalse(pp.hasPrivileges(c, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
}
@Test
public void testHasPrivilegesTestGroupEveryone() {
// testGroup + everyone
PermissionProvider pp = createPermissionProvider(testGroupPrincipal, EveryonePrincipal.getInstance());
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(a, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(c, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertTrue(pp.hasPrivileges(a, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertTrue(pp.hasPrivileges(c, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
}
@Test
public void testHasPrivilegesTestUserEveryone() throws Exception {
// testUser + everyone
PermissionProvider pp = createPermissionProvider(getTestUser().getPrincipal(), EveryonePrincipal.getInstance());
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(a, PrivilegeConstants.JCR_READ));
assertTrue(pp.hasPrivileges(c, PrivilegeConstants.JCR_READ));
assertFalse(pp.hasPrivileges(content, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertFalse(pp.hasPrivileges(a, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
assertFalse(pp.hasPrivileges(c, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL));
}
@Test
public void testHasAllPrivileges() {
// testGroup
PermissionProvider pp = createPermissionProvider(testGroupPrincipal);
assertFalse(pp.hasPrivileges(content, PrivilegeConstants.JCR_ALL));
assertFalse(pp.hasPrivileges(a, PrivilegeConstants.JCR_ALL));
assertFalse(pp.hasPrivileges(c, PrivilegeConstants.JCR_ALL));
}
@Test
public void testHasAllPrivileges2() throws Exception {
AccessControlManager acMgr = getAccessControlManager(root);
AccessControlList acl = AccessControlUtils.getAccessControlList(acMgr, "/content/a");
acl.addAccessControlEntry(testGroupPrincipal, privilegesFromNames(PrivilegeConstants.JCR_ALL));
acMgr.setPolicy("/content/a", acl);
root.commit();
// testGroup
PermissionProvider pp = createPermissionProvider(testGroupPrincipal);
assertFalse(pp.hasPrivileges(root.getTree("/content"), PrivilegeConstants.JCR_ALL));
assertTrue(pp.hasPrivileges(root.getTree("/content/a"), PrivilegeConstants.JCR_ALL));
assertTrue(pp.hasPrivileges(root.getTree("/content/a/b"), PrivilegeConstants.JCR_ALL));
assertFalse(pp.hasPrivileges(root.getTree("/content/a/b/c"), PrivilegeConstants.JCR_ALL));
}
@Test
public void testHasAllPrivilegesAdmin() {
PermissionProvider pp = createPermissionProvider(adminSession);
assertTrue(pp.hasPrivileges(content, PrivilegeConstants.JCR_ALL));
assertTrue(pp.hasPrivileges(a, PrivilegeConstants.JCR_ALL));
assertTrue(pp.hasPrivileges(c, PrivilegeConstants.JCR_ALL));
}
@Test
public void testGetPrivilegesTestGroup() {
Set<String> w_rac = ImmutableSet.of(PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL);
Set<String> r_w_rac = ImmutableSet.of(PrivilegeConstants.JCR_READ, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL);
// testGroup
PermissionProvider pp = createPermissionProvider(testGroupPrincipal);
assertEquals(r_w_rac, pp.getPrivileges(content));
assertEquals(r_w_rac, pp.getPrivileges(a));
assertEquals(w_rac, pp.getPrivileges(c));
assertTrue(pp.getPrivileges(content2).isEmpty());
}
@Test
public void testGetPrivilegesEveryone() {
// everyone
PermissionProvider pp = createPermissionProvider(EveryonePrincipal.getInstance());
assertTrue(pp.getPrivileges(content).isEmpty());
assertTrue(pp.getPrivileges(content2).isEmpty());
assertTrue(pp.getPrivileges(a).isEmpty());
assertTrue(pp.getPrivileges(c).isEmpty());
}
@Test
public void testGetPrivilegesTestGroupEveryone() {
Set<String> r_w_rac = ImmutableSet.of(PrivilegeConstants.JCR_READ, PrivilegeConstants.REP_WRITE, PrivilegeConstants.JCR_READ_ACCESS_CONTROL);
// testGroup + everyone
PermissionProvider pp = createPermissionProvider(testGroupPrincipal, EveryonePrincipal.getInstance());
assertEquals(r_w_rac, pp.getPrivileges(content));
assertEquals(r_w_rac, pp.getPrivileges(a));
assertEquals(r_w_rac, pp.getPrivileges(c));
assertTrue(pp.getPrivileges(content2).isEmpty());
}
@Test
public void testGetPrivilegesTestUserEveryone() throws Exception {
// testUser + everyone
PermissionProvider pp = createPermissionProvider(getTestUser().getPrincipal(), EveryonePrincipal.getInstance());
Set<String> r = ImmutableSet.of(PrivilegeConstants.JCR_READ);
assertEquals(r, pp.getPrivileges(content));
assertEquals(r, pp.getPrivileges(c));
assertTrue(pp.getPrivileges(a).isEmpty());
assertTrue(pp.getPrivileges(content2).isEmpty());
}
}