summaryrefslogtreecommitdiffstats
path: root/sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca
diff options
context:
space:
mode:
authorslaws <slaws@13f79535-47bb-0310-9956-ffa450edef68>2011-10-12 11:58:27 +0000
committerslaws <slaws@13f79535-47bb-0310-9956-ffa450edef68>2011-10-12 11:58:27 +0000
commit8d6c685a54393756ce92363b866e549604b12a5a (patch)
tree998d16d3f1b3bd9c46a29bed909342d09909033d /sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca
parent6b2492ecc25117702608cedf876ae48efb824e0e (diff)
TUSCANY-3960 - start porting JSR250 support from 1.x
git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@1182320 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca')
-rw-r--r--sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca/policy/security/jsr250/JSR250PolicyProcessor.java221
1 files changed, 221 insertions, 0 deletions
diff --git a/sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca/policy/security/jsr250/JSR250PolicyProcessor.java b/sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca/policy/security/jsr250/JSR250PolicyProcessor.java
new file mode 100644
index 0000000000..37540a1a31
--- /dev/null
+++ b/sca-java-2.x/trunk/modules/policy-security-jsr250/src/main/java/org/apache/tuscany/sca/policy/security/jsr250/JSR250PolicyProcessor.java
@@ -0,0 +1,221 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.tuscany.sca.policy.security.jsr250;
+
+import java.lang.reflect.Method;
+
+import javax.annotation.security.DenyAll;
+import javax.annotation.security.PermitAll;
+import javax.annotation.security.RolesAllowed;
+import javax.annotation.security.RunAs;
+import javax.xml.namespace.QName;
+
+import org.apache.tuscany.sca.assembly.AssemblyFactory;
+import org.apache.tuscany.sca.assembly.ConfiguredOperation;
+import org.apache.tuscany.sca.assembly.OperationsConfigurator;
+import org.apache.tuscany.sca.assembly.Service;
+import org.apache.tuscany.sca.assembly.xml.Constants;
+import org.apache.tuscany.sca.implementation.java.IntrospectionException;
+import org.apache.tuscany.sca.implementation.java.JavaImplementation;
+import org.apache.tuscany.sca.implementation.java.introspect.BaseJavaClassVisitor;
+import org.apache.tuscany.sca.interfacedef.Interface;
+import org.apache.tuscany.sca.interfacedef.Operation;
+import org.apache.tuscany.sca.interfacedef.java.JavaInterface;
+import org.apache.tuscany.sca.interfacedef.java.JavaOperation;
+import org.apache.tuscany.sca.policy.PolicyExpression;
+import org.apache.tuscany.sca.policy.PolicyFactory;
+import org.apache.tuscany.sca.policy.PolicySet;
+import org.apache.tuscany.sca.policy.PolicySubject;
+import org.apache.tuscany.sca.policy.authorization.AuthorizationPolicy;
+import org.apache.tuscany.sca.policy.identity.SecurityIdentityPolicy;
+
+/**
+ * Processes an {@link javax.annotation.security.*} annotation
+ * Below is a list of annotations
+ *
+ * Type Method
+ * RunAs x
+ * RolesAllowed x x
+ * PermitAll x x
+ * DenyAll x
+ *
+ */
+public class JSR250PolicyProcessor extends BaseJavaClassVisitor {
+ private static final QName RUN_AS = new QName(Constants.SCA11_TUSCANY_NS,"runAs");
+ private static final QName ALLOW = new QName(Constants.SCA11_TUSCANY_NS,"allow");
+ private static final QName PERMIT_ALL = new QName(Constants.SCA11_TUSCANY_NS,"permitAll");
+ private static final QName DENY_ALL = new QName(Constants.SCA11_TUSCANY_NS,"denyAll");
+
+ private PolicyFactory policyFactory;
+
+ public JSR250PolicyProcessor(AssemblyFactory assemblyFactory, PolicyFactory policyFactory) {
+ super(assemblyFactory);
+ this.policyFactory = policyFactory;
+ }
+
+
+ @Override
+ public <T> void visitClass(Class<T> clazz, JavaImplementation type) throws IntrospectionException {
+
+ RunAs runAs = clazz.getAnnotation(javax.annotation.security.RunAs.class);
+ if (runAs != null) {
+
+ String roleName = runAs.value();
+ if(roleName == null) {
+ //FIXME handle monitor or error
+ }
+
+ SecurityIdentityPolicy policy = new SecurityIdentityPolicy();
+ policy.setRunAsRole(roleName);
+
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(RUN_AS);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(SecurityIdentityPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+ type.getPolicySets().add(policySet);
+ }
+
+ RolesAllowed rolesAllowed = clazz.getAnnotation(javax.annotation.security.RolesAllowed.class);
+ if(rolesAllowed != null) {
+ if(rolesAllowed.value().length == 0) {
+ //FIXME handle monitor or error
+ }
+
+ AuthorizationPolicy policy = new AuthorizationPolicy();
+ policy.setAccessControl(AuthorizationPolicy.AcessControl.allow);
+
+ for(String role : rolesAllowed.value()) {
+ policy.getRoleNames().add(role);
+ }
+
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(ALLOW);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(AuthorizationPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+ type.getPolicySets().add(policySet);
+ }
+
+ PermitAll permitAll = clazz.getAnnotation(javax.annotation.security.PermitAll.class);
+ if(permitAll != null) {
+ AuthorizationPolicy policy = new AuthorizationPolicy();
+ policy.setAccessControl(AuthorizationPolicy.AcessControl.permitAll);
+
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(PERMIT_ALL);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(AuthorizationPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+ type.getPolicySets().add(policySet);
+ }
+
+ }
+
+ @Override
+ public void visitMethod(Method method, JavaImplementation type) throws IntrospectionException {
+ RolesAllowed rolesAllowed = method.getAnnotation(javax.annotation.security.RolesAllowed.class);
+ if(rolesAllowed != null) {
+ if(rolesAllowed.value().length == 0) {
+ //FIXME handle monitor or error
+ }
+
+ AuthorizationPolicy policy = new AuthorizationPolicy();
+ policy.setAccessControl(AuthorizationPolicy.AcessControl.allow);
+
+ for(String role : rolesAllowed.value()) {
+ policy.getRoleNames().add(role);
+ }
+
+ // find the operation in the interface model
+ Operation operation = getOperationModel(method, type);
+
+ if (operation != null){
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(ALLOW);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(AuthorizationPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+
+ operation.getPolicySets().add(policySet);
+ }
+ }
+
+ PermitAll permitAll = method.getAnnotation(javax.annotation.security.PermitAll.class);
+ if(permitAll != null) {
+ AuthorizationPolicy policy = new AuthorizationPolicy();
+ policy.setAccessControl(AuthorizationPolicy.AcessControl.permitAll);
+
+ // find the operation in the interface model
+ Operation operation = getOperationModel(method, type);
+
+ if (operation != null){
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(PERMIT_ALL);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(AuthorizationPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+
+ operation.getPolicySets().add(policySet);
+ }
+ }
+
+ DenyAll denyAll = method.getAnnotation(javax.annotation.security.DenyAll.class);
+ if(denyAll != null) {
+ AuthorizationPolicy policy = new AuthorizationPolicy();
+ policy.setAccessControl(AuthorizationPolicy.AcessControl.denyAll);
+
+ // find the operation in the interface model
+ Operation operation = getOperationModel(method, type);
+
+ if (operation != null){
+ PolicySet policySet = policyFactory.createPolicySet();
+ policySet.setName(DENY_ALL);
+ PolicyExpression policyExpression = policyFactory.createPolicyExpression();
+ policyExpression.setName(AuthorizationPolicy.NAME);
+ policyExpression.setPolicy(policy);
+ policySet.getPolicies().add(policyExpression);
+ policySet.setUnresolved(false);
+
+ operation.getPolicySets().add(policySet);
+ }
+ }
+ }
+
+ private Operation getOperationModel(Method method, JavaImplementation type){
+
+ for(Operation op : type.getOperations()){
+ if (((JavaOperation)op).getJavaMethod().equals(method)){
+ return op;
+ }
+ }
+
+ return null;
+ }
+}