use of com.sun.identity.entitlement.PrivilegeIndexStore in project OpenAM by OpenRock.
the class PolicyIndexTest method storeAndRetrieve.
@Test
public void storeAndRetrieve() throws SSOException, PolicyException, EntitlementException, Exception {
SSOToken adminToken = (SSOToken) AccessController.doPrivileged(AdminTokenAction.getInstance());
PolicyManager pm = new PolicyManager(adminToken, "/");
Set<String> hostIndexes = new HashSet<String>();
Set<String> pathIndexes = new HashSet<String>();
Set<String> parentPathIndexes = new HashSet<String>();
hostIndexes.add("http://www.sun.com");
pathIndexes.add("/private");
parentPathIndexes.add("/");
ResourceSearchIndexes indexes = new ResourceSearchIndexes(hostIndexes, pathIndexes, parentPathIndexes);
PrivilegeIndexStore pis = PrivilegeIndexStore.getInstance(SubjectUtils.createSubject(adminToken), "/");
for (Iterator<IPrivilege> i = pis.search("/", indexes, Collections.EMPTY_SET, false); i.hasNext(); ) {
IPrivilege eval = i.next();
if (!(eval instanceof Privilege)) {
throw new Exception("incorrect deserialized policy, wrong type");
}
Privilege p = (Privilege) eval;
if (!p.getEntitlement().getResourceName().equals(URL_RESOURCE)) {
throw new Exception("incorrect deserialized policy");
}
}
}
use of com.sun.identity.entitlement.PrivilegeIndexStore in project OpenAM by OpenRock.
the class OpenSSOPolicyDataStore method addPolicy.
public void addPolicy(Subject subject, String realm, Privilege privilege) throws EntitlementException {
// Delegation to applications is currently not configurable, passing super admin (see AME-4959)
ApplicationPrivilegeManager applPrivilegeMgr = ApplicationPrivilegeManager.getInstance(realm, PrivilegeManager.superAdminSubject);
if (!applPrivilegeMgr.hasPrivilege(privilege, ApplicationPrivilege.Action.MODIFY)) {
throw new EntitlementException(326);
}
String name = "";
try {
Object policy = PrivilegeUtils.privilegeToPolicyObject(realm, privilege);
name = PrivilegeUtils.getPolicyName(policy);
if (policy instanceof Policy || policy instanceof com.sun.identity.entitlement.xacml3.core.Policy) {
String dn = getPolicyDistinguishedName(realm, name);
if (SMSEntry.checkIfEntryExists(dn, dsameUserToken)) {
throw new EntitlementException(EntitlementException.POLICY_ALREADY_EXISTS);
}
createParentNode(dsameUserToken, realm);
SMSEntry s = new SMSEntry(dsameUserToken, dn);
Map<String, Set<String>> map = new HashMap<String, Set<String>>();
Set<String> setServiceID = new HashSet<String>(2);
map.put(SMSEntry.ATTR_SERVICE_ID, setServiceID);
setServiceID.add("NamedPolicy");
Set<String> setObjectClass = new HashSet<String>(4);
map.put(SMSEntry.ATTR_OBJECTCLASS, setObjectClass);
setObjectClass.add(SMSEntry.OC_TOP);
setObjectClass.add(SMSEntry.OC_SERVICE_COMP);
Set<String> setValue = new HashSet<String>(2);
map.put(SMSEntry.ATTR_KEYVAL, setValue);
setValue.add(POLICY_XML + "=" + PrivilegeUtils.policyToXML(policy));
s.setAttributes(map);
String[] logParams = { DNMapper.orgNameToRealmName(realm), name };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.MESSAGE, Level.INFO, "ATTEMPT_ADD_PRIVILEGE", logParams, subject);
s.save();
OpenSSOLogger.log(OpenSSOLogger.LogLevel.MESSAGE, Level.INFO, "SUCCEEDED_ADD_PRIVILEGE", logParams, subject);
PrivilegeIndexStore pis = PrivilegeIndexStore.getInstance(dsameUserSubject, realm);
Set<IPrivilege> privileges = new HashSet<IPrivilege>();
privileges.add(privilege);
pis.add(privileges);
} else {
PrivilegeManager.debug.error("OpenSSOPolicyDataStore.addPolicy: unknown class " + policy.getClass().getName());
}
} catch (PolicyException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_PRIVILEGE", logParams, subject);
Object[] params = { name };
throw new EntitlementException(202, params, e);
} catch (SSOException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_PRIVILEGE", logParams, subject);
Object[] params = { name };
throw new EntitlementException(202, params, e);
} catch (SMSException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_PRIVILEGE", logParams, subject);
Object[] params = { name };
throw new EntitlementException(202, params, e);
}
}
use of com.sun.identity.entitlement.PrivilegeIndexStore in project OpenAM by OpenRock.
the class OpenSSOPolicyDataStore method addReferral.
public void addReferral(Subject subject, String realm, ReferralPrivilege referral) throws EntitlementException {
String name = referral.getName();
String dn = getPolicyDistinguishedName(realm, name);
SSOToken adminToken = SubjectUtils.getSSOToken(subject);
if (adminToken == null) {
Object[] params = { name };
throw new EntitlementException(260, params);
}
// Delegation to applications is currently not configurable, passing super admin (see AME-4959)
ApplicationPrivilegeManager applPrivilegeMgr = ApplicationPrivilegeManager.getInstance(realm, PrivilegeManager.superAdminSubject);
if (!applPrivilegeMgr.hasPrivilege(referral, ApplicationPrivilege.Action.MODIFY)) {
throw new EntitlementException(326);
}
try {
createParentNode(dsameUserToken, realm);
SMSEntry s = new SMSEntry(dsameUserToken, dn);
Map<String, Set<String>> map = new HashMap<String, Set<String>>();
Set<String> setServiceID = new HashSet<String>(2);
map.put(SMSEntry.ATTR_SERVICE_ID, setServiceID);
setServiceID.add("NamedPolicy");
Set<String> setObjectClass = new HashSet<String>(4);
map.put(SMSEntry.ATTR_OBJECTCLASS, setObjectClass);
setObjectClass.add(SMSEntry.OC_TOP);
setObjectClass.add(SMSEntry.OC_SERVICE_COMP);
Set<String> setValue = new HashSet<String>(2);
map.put(SMSEntry.ATTR_KEYVAL, setValue);
Policy p = PrivilegeUtils.referralPrivilegeToPolicy(realm, referral);
setValue.add(POLICY_XML + "=" + p.toXML());
s.setAttributes(map);
String[] logParams = { DNMapper.orgNameToRealmName(realm), name };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.MESSAGE, Level.INFO, "ATTEMPT_ADD_REFERRAL", logParams, subject);
s.save();
OpenSSOLogger.log(OpenSSOLogger.LogLevel.MESSAGE, Level.INFO, "SUCCEEDED_ADD_REFERRAL", logParams, subject);
PrivilegeIndexStore pis = PrivilegeIndexStore.getInstance(dsameUserSubject, realm);
Set<IPrivilege> tmp = new HashSet<IPrivilege>();
tmp.add(referral);
pis.add(tmp);
} catch (PolicyException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_REFERRAL", logParams, subject);
Object[] params = { name };
throw new EntitlementException(261, params, e);
} catch (SSOException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_REFERRAL", logParams, subject);
Object[] params = { name };
throw new EntitlementException(261, params, e);
} catch (SMSException e) {
String[] logParams = { DNMapper.orgNameToRealmName(realm), name, e.getMessage() };
OpenSSOLogger.log(OpenSSOLogger.LogLevel.ERROR, Level.INFO, "FAILED_ADD_REFERRAL", logParams, subject);
Object[] params = { name };
throw new EntitlementException(261, params, e);
}
}
use of com.sun.identity.entitlement.PrivilegeIndexStore in project OpenAM by OpenRock.
the class NotificationServlet method handleReferralPrivilegeDeleted.
private void handleReferralPrivilegeDeleted(HttpServletRequest req) {
String referralName = req.getParameter(ATTR_NAME);
String realm = req.getParameter(ATTR_REALM_NAME);
PrivilegeIndexStore pis = PrivilegeIndexStore.getInstance(PolicyConstants.SUPER_ADMIN_SUBJECT, realm);
try {
pis.deleteReferral(referralName, false);
} catch (EntitlementException e) {
//ignore
}
// Get an instance as required otherwise it can cause issues on container restart.
DataStore.getInstance().clearIndexCount(realm, true);
}
use of com.sun.identity.entitlement.PrivilegeIndexStore in project OpenAM by OpenRock.
the class NotificationServlet method handlePrivilegeDeleted.
private void handlePrivilegeDeleted(HttpServletRequest req) {
String privilegeName = req.getParameter(ATTR_NAME);
String realm = req.getParameter(ATTR_REALM_NAME);
PrivilegeIndexStore pis = PrivilegeIndexStore.getInstance(PolicyConstants.SUPER_ADMIN_SUBJECT, realm);
try {
pis.delete(privilegeName, false);
} catch (EntitlementException e) {
//ignore
}
// Get an instance as required otherwise it can cause issues on container restart.
DataStore.getInstance().clearIndexCount(realm, false);
}
Aggregations